WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: SECOND WEEK GROUP MEETING WORK JULY9_2009, Hackers make the inernet more secure. therfore (ArgScheme: modus ponens) Hackers believe intrusions are justified., Some hackers believe that any barriers to information are morally illegitimate. therfore (ArgScheme: modus ponens) If hackers believe that persons including barriers don't deserve respect from person accessing the material., If hackers believe that persons including barriers don't deserve respect from person accessing the material. therfore (ArgScheme: modus ponens) If hackers believe that persons including barriers don't deserve respect from person accessing the material. Then hackers believe intrusions are justified., If all information should not be free then hacking is not a necessary means for increasing knowldge. therefore (ArgScheme: constructive dilemma) Either hacking is not a necessary means for increasing knowledge and/or hacking is necessary means for increasing knowledge (but maybe both), All information should not be free. therfore (ArgScheme: modus ponens) If all information should not be free then hacking is not a necessary means for increasing knowldge., If all information should not be free then hacking is not a necessary means for increasing knowldge. therefore (ArgScheme: constructive dilemma) Theorist and Laypersions believe it is unclear as to if digital intrusions are not necessary. Either it is or is not necessary, If hackers believe that persons including barriers don't deserve respect from person accessing the material. therfore (ArgScheme: modus ponens) Hackers believe intrusions are justified., Hackers believe intrusions are justified. therfore (ArgScheme: modus ponens) Hackers believe that nonmalicious intrusions are morally permissible., Some hackers believe that any barriers to information are morally illegitimate. therfore (ArgScheme: modus ponens) If some hackers believe that any barriers to information are morally illegitimate. Then If hackers believe that persons including barriers don't deserve respect from person accessing the material., hacking increases humanities stock of knowledge about relevent technologies. therfore (ArgScheme: modus ponens) If hacking increases humanities stock of knowledge about relevent technologies. Then Hacking promotes research., Hacking violates the victims rights to their physical property. therfore (ArgScheme: modus ponens) If Hacking violates the victims rights to their physical property then protecting sensitive information about ourself (such as our SSN) is not morally wrong., All information should not be free. therfore (ArgScheme: modus ponens) Hacking is not a necessary means for increasing knowldge., Hacking is permissable for means of protecting injustice therfore (ArgScheme: modus ponens) Hacking is a necessary means for increasing knowldge., Hacking promotes research. therfore (ArgScheme: modus ponens) If hacking promotes research then hacking makes the internet more secure., Hackers believe intrusions are justified. therfore (ArgScheme: modus ponens) If Hackers believe intrusions are justified. Then Hackers believe that nonmalicious intrusions are morally permissible., Civil disobedience is morally justifiable as a protest against injustice. therfore (ArgScheme: modus ponens) If civil disobedience is morally justifialbe as a protest against insutice then hacking is permissable for means of protecting injustice., Civil disobedience is morally justifiable as a protest against injustice. therfore (ArgScheme: modus ponens) Hacking is permissable for means of protecting injustice, Hackers make the inernet more secure. therfore (ArgScheme: modus ponens) If hackers make the internet more secure then hackers believe intrusions are justified., All information should not be free. contraditing (conf scheme) If hackers believe that persons including barriers don't deserve respect from person accessing the material., Unauthorized digital intrusions involve a trespass on computers and networks belonging to other people therfore (ArgScheme: modus ponens) Hacking violates the victims rights to their physical property.