Full Download Book Ethics in Information Technology PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 41

Ethics in Information Technology -

eBook PDF
Visit to download the full and correct content document:
https://ebooksecure.com/download/ethics-in-information-technology-ebook-pdf/
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
ETHICS IN INFORMATION
TECHNOLOGY
Sixth Edition

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
ETHICS IN INFORMATION
TECHNOLOGY
Sixth Edition

George W. Reynolds

Australia • Brazil • Mexico • Singapore • United Kingdom • United States

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.

Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Ethics in Information Technology, © 2019 Cengage Learning, Inc.
Sixth Edition
ALL RIGHTS RESERVED. No part of this work covered by the
George W. Reynolds
copyright herein may be reproduced or distributed in any form or by
SVP, GM Science, Technology & any means, except as permitted by U.S. copyright law, without the
Math: Balraj S. Kalsi prior written permission of the copyright owner.

Senior Product Director: Kathleen McMahon SOURCE FOR ILLUSTRATIONS: © Cengage Learning, Inc.
Product Team Manager: Kristin McNary All screenshots, unless otherwise noted, are used with permission
Associate Product Manager: Kate Mason from Microsoft Corporation. Microsoft® is a registered trademark of
Senior Director, Development: Julia Caballero the Microsoft Corporation.

Senior Content Development Manager:


For product information and technology assistance, contact us at
Leigh Hefferon
Cengage Customer & Sales Support, 1-800-354-9706.
Associate Content Developer: Maria Garguilo
For permission to use material from this text or product, submit all
Product Assistant: Jake Toth requests online at www.cengage.com/permissions.
VP, Marketing for Science, Technology, & Further permissions questions can be e-mailed to
Math: Jason Sakos [email protected].

Marketing Director: Michele McTighe Some of the product names and company names used in this
Marketing Manager: Stephanie Albracht book have been used for identification purposes only and
Production Director: Patty Stephan may be trademarks or registered trademarks of their respective
manufacturers and sellers.
Content Project Manager: Michele Stulga
Art Director: Diana Graham Library of Congress Control Number: 2017950121

Cover Designer: Roycroft Design ISBN: 978-1-337-40587-4


(roycroftdesign.com)
Cengage
Cover Image: iStock.com/sumkinn 20 Channel Street
Boston, MA 02210
USA
Microsoft and the Office logo are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries. Cengage is
an independent entity from the Microsoft Corporation, and not affiliated with
Microsoft in any manner.
iPhone, iPad, and iPod are registered trademarks of Apple Inc.
Cengage reserves the right to revise this publication and make changes
from time to time in its content without notice.
Cengage is a leading provider of customized learning solutions with employees
residing in nearly 40 different countries and sales in more than 125 countries
around the world. Find your local representative at www.cengage.com.
Cengage products are represented in Canada by Nelson Education, Ltd.
To learn more about Cengage, visit www.cengage.com
Purchase any of our products at your local college store or at our preferred
online store: www.cengagebrain.com

Notice to the Reader


Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection with any of the
product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain and include information other than
that provided to it by the manufacturer. The reader is expressly warned to consider and adopt all safety precautions that might be indicated by the
activities described herein and to avoid all potential hazards. By following the instructions contained herein, the reader willingly assumes all risks in
connection with such instructions. The publisher makes no representations or warranties of any kind, including but not limited to, the warranties of
fitness for particular purpose or merchantability, nor are any such representations implied with respect to the material set forth herein, and the
publisher takes no responsibility with respect to such material. The publisher shall not be liable for any special, consequential, or exemplary damages
resulting, in whole or part, from the readers’ use of, or reliance upon, this material.

Printed in the United States of America


Print Number: 01 Print Year: 2017

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
BRIEF CONTENTS

Preface xiii
Chapter 1 An Overview of Ethics 1
Chapter 2 Ethics for IT Workers and IT Users 43
Chapter 3 Cyberattacks and Cybersecurity 83
Chapter 4 Privacy 133
Chapter 5 Freedom of Expression 185
Chapter 6 Intellectual Property 221
Chapter 7 Ethical Decisions in Software Development 263
Chapter 8 The Impact of Information Technology on Society 299
Chapter 9 Social Media 329
Chapter 10 Ethics of IT Organizations 357
Appendix A A Brief Introduction to Morality 397
Glossary 413
Index 427

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
TABLE OF CONTENTS

Preface xiii
Chapter 1 An Overview of Ethics 1
Organizations Behaving Badly 1
What Is Ethics? 3
The Importance of Integrity 5
The Difference Between Morals, Ethics, and Laws 5
Ethics in the Business World 7
Corporate Social Responsibility 10
Why Fostering Corporate Social Responsibility and Good Business Ethics Is Important? 13
Gaining the Goodwill of the Community 13
Creating an Organization That Operates Consistently 14
Fostering Good Business Practices 15
Protecting the Organization and Its Employees from Legal Action 15
Avoiding Unfavorable Publicity 16
How Organizations Can Improve Their Ethics 17
Appoint a Corporate Ethics Officer 18
Require the Board of Directors to Set and Model High Ethical Standards 19
Establish a Corporate Code of Ethics 20
Conduct Social Audits 21
Require Employees to Take Ethics Training 22
Include Ethical Criteria in Employee Appraisals 22
Create an Ethical Work Environment 23
Including Ethical Considerations in Decision Making 24
Develop Problem Statement 24
Identify Alternatives 25
Choose Alternative 26
Implement the Decision 26
Evaluate the Results 26
Ethics in Information Technology 27
Summary 29
Key Terms 30
Self-Assessment Questions 30
Self-Assessment Answers 32
Discussion Questions 33
What Would You Do? 33
Cases 34
End Notes 39

Chapter 2 Ethics for IT Workers and IT Users 43


Organizations Behaving Badly 43
IT Worker Relationships That Must Be Managed 44

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Relationships Between IT Workers and Employers 44
Relationships Between IT Workers and Clients 47
Relationships Between IT Workers and Suppliers 50
Relationships Between IT Workers and Other Professionals 54
Relationships Between IT Workers and IT Users 55
Relationships Between IT Workers and Society 55
Encouraging the Professionalism of IT Workers 56
Professional Codes of Ethics 56
Professional Organizations 57
Certification 59
Licensing of IT Professionals 60
What Can Be Done to Encourage the Ethical Use of IT Resources Among Users? 64
Common Ethical Issues for IT Users 64
Supporting the Ethical Practices of IT Users 66
Summary 70
Key Terms 72
Self-Assessment Questions 72
Self-Assessment Answers 74
Discussion Questions 74
What Would You Do? 75
Cases 76
End Notes 80

Chapter 3 Cyberattacks and Cybersecurity 83


Organizations Behaving Badly 83
The Threat Landscape 85
Why Computer Incidents Are So Prevalent? 86
Types of Exploits 88
Federal Laws for Prosecuting Computer Attacks 99
The CIA Security Triad 100
Implementing CIA at the Organization Level 101
Implementing CIA at the Network Level 107
Implementing CIA at the Application Level 111
Implementing CIA at the End-User Level 112
Response to Cyberattack 114
Incident Notification 114
Protection of Evidence and Activity Logs 115
Incident Containment 115
Eradication 115
Incident Follow-Up 115
Using an MSSP 116
Computer Forensics 117
Summary 119
Key Terms 120
Self-Assessment Questions 121
Self-Assessment Answers 123

viii Table of Contents

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Discussion Questions 123
What Would You Do? 124
Cases 125
End Notes 129

Chapter 4 Privacy 133


Organizations Behaving Badly 133
Privacy Protection and the Law 135
Information Privacy 138
Privacy Laws, Applications, and Court Rulings 138
Key Privacy and Anonymity Issues 157
Consumer Profiling 157
Electronic Discovery 161
Workplace Monitoring 162
Advanced Surveillance Technology 164
Summary 167
Key Terms 170
Self-Assessment Questions 171
Self-Assessment Answers 173
Discussion Questions 173
What Would You Do? 174
Cases 175
End Notes 179

Chapter 5 Freedom of Expression 185


Organizations Behaving Badly 185
First Amendment Rights 187
Obscene Speech 188
Defamation 189
Freedom of Expression: Key Issues 189
Controlling Access to Information on the Internet 190
Internet Censorship 195
Strategic Lawsuit Against Public Participation 196
Anonymity on the Internet 197
John Doe Lawsuits 199
Hate Speech 201
Pornography on the Internet 202
Fake News 205
Summary 208
Key Terms 210
Self-Assessment Questions 210
Self-Assessment Answers 211
Discussion Questions 211
What Would You Do? 213
Cases 214
End Notes 217

Table of Contents ix

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter 6 Intellectual Property 221
Organizations Behaving Badly 221
What Is Intellectual Property? 224
Copyrights 225
Patents 231
Trade Secrets 235
Current Intellectual Property Issues 239
Plagiarism 239
Reverse Engineering 241
Open Source Code 242
Competitive Intelligence 244
Trademark Infringement 246
Cybersquatting 247
Summary 249
Key Terms 252
Self-Assessment Questions 252
Self-Assessment Answers 253
Discussion Questions 254
What Would You Do? 254
Cases 255
End Notes 259

Chapter 7 Ethical Decisions in Software Development 263


Organizations Behaving Badly 263
Software Quality and Why It Is Important 265
The Importance of Software Quality 268
Software Product Liability 269
Strategies for Developing Quality Software 271
Software Development Methodologies 271
Capability Maturity Model Integration 276
Developing Safety-Critical Systems 278
Risk Management 280
Quality Management Standards 282
Summary 286
Key Terms 288
Self-Assessment Questions 289
Self-Assessment Answers 291
Discussion Questions 291
What Would You Do? 292
Cases 293
End Notes 297

Chapter 8 The Impact of Information Technology on Society 299


Organizations Behaving Badly 299
The Impact of IT on the Standard of Living and Worker Productivity 302
IT Investment and Productivity 302
IT and Workplace Automation 305
Artificial Intelligence 306

x Table of Contents

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
The Impact of IT on Health Care 309
Computerized Patient Records 311
Clinical Decision Support 313
Computerized Provider Order Entry 313
Telehealth 313
Summary 317
Key Terms 319
Self-Assessment Questions 319
Self-Assessment Answers 321
Discussion Questions 321
What Would You Do? 322
Cases 323
End Notes 326

Chapter 9 Social Media 329


Organizations Behaving Badly 329
What Is Social Media? 330
Social Networking Platforms 331
Business Applications of Social Media 333
Social Media Marketing 334
Social Media in the Hiring Process 336
Improving Customer Service Using Social Media 336
Social Shopping Platforms 337
Social Networking Ethical Issues 338
Cyberabuse, Cyberharassment, and Cyberstalking 338
Encounters with Sexual Predators 341
Uploading of Inappropriate Material 343
Employee Participation on Social Media Networks 343
Miscellaneous Social Media Issues 344
Summary 346
Key Terms 348
Self-Assessment Questions 348
Self-Assessment Answers 350
Discussion Questions 350
What Would You Do? 351
Cases 351
End Notes 354

Chapter 10 Ethics of IT Organizations 357


Organizations Behaving Badly 357
Use of Contingent Workers 359
The Gig Economy 360
Independent Contractors 361
Advantages of Using Contingent Workers 362
Disadvantages of Using Contingent Workers 363
Deciding When to Use Contingent Workers 363
H-1B Workers 365
Using H-1B Workers Instead of U.S. Workers 366

Table of Contents xi

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Gaming the H-1B Visa Program 367
The Need for H-1B Workers 368
Outsourcing 371
Offshore Outsourcing 371
Pros and Cons of Offshore Outsourcing 372
Strategies for Successful Offshore Outsourcing 374
Whistle-Blowing 375
Protection for Whistle-Blowers 375
Whistle-Blowing Protection for Private-Sector Workers 377
Dealing with a Whistle-Blowing Situation 377
Green Computing 380
Summary 383
Key Terms 385
Self-Assessment Questions 385
Self-Assessment Answers 388
Discussion Questions 388
What Would You Do? 389
Cases 390
End Notes 394

Appendix A A Brief Introduction to Morality 397


Introduction 397
The Knotty Question of Goodness 398
Relativism: Why “Common Sense” Won’t Work 399
Egoism versus Altruism 401
Deontology, or the Ethics of Logical Consistency and Duty 402
Happy Consequences, or Utilitarianism 404
Promises and Contracts 406
A Return to the Greeks: The Good Life of Virtue 407
Feminism and the Ethics of Care 409
Pluralism 410
Summary 411

Glossary 413

Index 427

xii Table of Contents

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
PREFACE

We are excited to publish the sixth edition of Ethics in Information Technology. This new
edition builds on the success of the previous editions and meets the need for a resource
that helps readers understand many of the legal, ethical, and societal issues associated
with information technology. We have responded to the feedback from our previous
edition adopters, students, and other reviewers to create an improved text. We think you
will be pleased with the results.
Ethics in Information Technology, Sixth Edition, fills a void of practical business
information for business managers and IT professionals. The typical introductory
information systems book devotes one chapter to ethics and IT, which cannot possibly
cover the full scope of ethical issues related to IT. Such limited coverage does not meet
the needs of business managers and IT professionals—the people primarily responsible
for addressing ethical issues in the workplace. What is missing is an examination of the
different ethical situations that arise in IT as well as practical advice for addressing
these issues.
Ethics in Information Technology, Sixth Edition, has enough substance for an
instructor to use it in a full-semester course in computer ethics. Instructors can also
use the book as a reading supplement for such courses as Introduction to Management
Information Systems, Principles of Information Technology, Managerial Perspective of
Information Technology, Computer Security, E-Commerce, and so on.

WHAT’S NEW
Ethics in Information Technology, Sixth Edition, has been updated and revised to
incorporate the many new developments and ethical issues that are affecting IT professionals
and influencing professional ethics, such as state licensing of IT professionals;
cyberterrorism and hacktivism; the erosion of privacy due to electronic surveillance;
the positive and negative impacts of social networking; the design and implementation
of safety-critical systems; and the impact of IT on the standard of living, worker
productivity, and health care.
Each chapter opens with a new “Organizations Behaving Badly” real-world scenario
that highlights key issues from the chapter and raises thought-provoking questions.
Critical thinking exercises, also a new feature, are strategically placed at the end of each
major chapter section to encourage the reader to pause, consider, and apply what they’ve
just read. Each chapter ends with a list of key terms and a set of self-assessment questions
that students can use to check their grasp of key points from the chapter. New—and more
varied—end-of-chapter exercises have been added to encourage critical application of
chapter concepts. Students can practice principles they’ve learned with revised Discussion
Questions, and What Would You Do? exercises, as well as all new Cases. Instructors of

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
online courses can use this wealth of material as the basis for discussion forums that allow
their online students to share a variety of perspectives and experiences and to create a
learning community. Such discussions provide students the opportunity to more deeply
understand the material while challenging their critical thinking skills. We think you will
like these changes and additions.

ORGANIZATION
Each of the 10 chapters in this book addresses a different aspect of ethics in information
technology:
• Chapter 1, “An Overview of Ethics,” introduces ethics, ethics in business,
and the importance of ethics in IT. The distinction between morals, ethics,
and laws is defined. The trends that have increased the likelihood of
unethical behavior are identified. The concept of corporate social responsibility
is defined and discussed. The chapter presents reasons why practicing good
business ethics is important in business. A model for improving corporate ethics
is provided. The most commonly observed types of misconduct in the workplace
are identified. The need for an organizational code of ethics is discussed. Key
steps in establishing a sound ethics program are outlined. The role of the chief
ethics officer and board of directors in establishing a strong organizational ethics
program is examined. A useful model for ethical decision making is provided.
The chapter ends with a discussion of the role of ethics in IT.
• Chapter 2, “Ethics for IT Workers and IT Users,” explains the importance
of ethics in the business relationships of IT professionals, including those
between IT workers and employers, clients, suppliers, other professionals,
IT users, and society. The chapter provides suggestions for what can be
done to encourage the professionalism of IT workers by emphasizing the
significance of IT professional organizations and their codes of ethics as
well as certification and licensing. Some ethical issues faced by IT users are
discussed, including software piracy, inappropriate use of computing
resources, and inappropriate sharing of information. Actions that can be
taken to encourage the ethical use of IT resources by end-users are outlined.
The chapter introduces the topic of internal control and compliance and the
role the audit committee and members of the internal audit team have in
ensuring that both the IT organization and IT users follow organizational
guidelines and policies, as well as various legal and regulatory practices.
• Chapter 3, “Cyberattacks and Cybersecurity,” describes the types of ethical
decisions that IT professionals must make, as well as the business needs they
must balance when dealing with security issues. The chapter identifies the
most common computer-related security incidents and provides numerous
reasons why such incidents are increasing. This chapter includes information
on the use of cloud computing, virtualization software, and bring your own
device corporate business policies. It describes some of the more common
hacker attacks, including ransomware, viruses, worms, Trojan horses,
blended threats, distributed denial-of-service, rootkits, advanced persistent

xiv Preface

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
threats, spam, phishing, spear-phishing, smishing, and vishing. Cyberespionage
and cyberterrorism are also covered including the roles of the United States
Computer Emergency Readiness Team (US-CERT) and the Department of
Homeland Security in defending against cyberterrorism. In addition to
providing a useful classification of computer crimes and their perpetrators,
the chapter summarizes the major federal laws that address computer
crime. The chapter introduces the concept of the CIA triad (confidentiality,
integrity, and availability) and outlines steps to implement this concept
throughout the organization at all levels. The chapter discusses the need
for a corporate security policy and offers both a process for establishing a
security policy and several security-related policy templates that can help
an organization to quickly develop effective security policies. A process
for performing an assessment of an organization’s IT resources from both
internal and external threats is presented. Useful guidelines are provided
on how to respond to specific security incidents to quickly resolve problems
and improve ongoing security measures.
• Chapter 4, “Privacy,” explains how the use of IT affects privacy rights and
discusses several key pieces of legislation that have addressed privacy rights
over the years. The Fourth Amendment is explained, and laws designed to
protect personal financial and health data—as well as the privacy of
children—are discussed. Electronic surveillance is covered, along with many
laws associated with this activity, including Executive Order 12333, the
Foreign Intelligence Surveillance Act, and the USA PATRIOT Act including its
various amendments and extensions. Various regulations affecting the export
of personal data from one country to another are covered. The chapter
explains how the personal information businesses gather using IT can be used
to obtain or keep customers (or to monitor employees). It also discusses the
concerns of privacy advocates regarding how much information can be
gathered, with whom it can be shared, how the information is gathered in the
first place, and how it is used. These concerns also extend to the information-
gathering practices of law enforcement and government. Identity theft and
data breaches are covered along with various tactics used by identity thieves;
the chapter also presents some safeguards that can thwart identity theft.
Guidelines and principles for treating consumer data responsibly are offered.
The pros and cons of consumer profiling as well as various tactics for
profiling are discussed. The expanding use of electronic discovery, workplace
monitoring, camera surveillance, vehicle data recorders, and stalking apps is
discussed.
• Chapter 5, “Freedom of Expression,” addresses issues raised by the growing use
of the Internet as a means for freedom of expression, while also examining the
types of speech protected by the First Amendment of the U.S. Constitution.
The chapter covers the ways in which the ease and anonymity with which
Internet users can communicate may pose problems for people who might
be adversely affected by such communications. It describes attempts at
using legislation (such as the Communications Decency Act, the Children
Online Protection Act, and the Children’s Internet Protection Act) and

Preface xv

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
technology, such as Internet filtering, to control access to Internet content
that is unsuitable for children or unnecessary in a business environment.
The use of strategic lawsuits against public participation (SLAPP) lawsuits
is covered. The use of John Doe lawsuits to reveal the identities of
anonymous posters is discussed. Internet censorship, doxing, sexting,
fake news, defamation, hate speech, pornography on the Internet, and
spam are also covered.
• Chapter 6, “Intellectual Property,” defines intellectual property and explains
the varying degrees of ownership protection offered by copyright, patent,
and trade secret laws. Copyright, patent, and trademark infringement are
examined, using many examples. Key U.S. and international rules aimed at
protecting intellectual property are discussed, including the Prioritizing
Resources and Organization for Intellectual Property Act, the General
Agreement on Tariffs and Trade, the World Trade Organization Agreement
on Trade-Related Aspects of Intellectual Property Rights, the World
Intellectual Property Organization Copyright Treaty, and the Digital
Millennium Copyright Act. The chapter explains software patents and
software licensing as well as the use of cross-licensing agreements. It also
addresses key intellectual property issues such as plagiarism, reverse
engineering, open source code, competitive intelligence, trademark
infringement, and cybersquatting. The use of nondisclosure agreements
and noncompete clauses in work contracts is also discussed. Finally, the
chapter addresses several key issues relevant to ethics in IT, including
plagiarism, reverse engineering of software, open source code, competitive
intelligence gathering, and cybersquatting.
• Chapter 7, “Ethical Decisions in Software Development,” provides a thorough
discussion of the software development process and the importance of
software quality. It covers the ethical and economic issues that software
manufacturers must consider when deciding “how good is good enough?”
with regard to their software products—particularly when the software is
safety-critical and its failure can cause loss of human life. Topics include
software product liability, risk management, quality management, and quality
assurance. An overview of and the pros and cons of the waterfall and agile
software development approaches are presented. The chapter also examines
the Capability Maturity Model Integration (CMMI), the ISO 9000 family of
standards, and the Failure mode and effects analysis (FMEA) technique as
strategies for improving software quality.
• Chapter 8, “The Impact of Information Technology on Society,” examines
the effect that IT investment has had on the standard of living and worker
productivity. Also covered are how advances in artificial intelligence, machine
learning, robotics, and natural language processing are fundamentally changing
the way work gets done and have the potential to affect the tasks, roles, and
responsibilities of most workers. The chapter looks at the impact of IT on
the delivery of health care and healthcare costs. Electronic medical records,
electronic health records, and health information exchanges are explained.
The issues with implementing a successful electronic health records system

xvi Preface

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
are discussed. Telehealth and telemedicine are defined and how they help
deliver of health care are discussed.
• Chapter 9, “Social Media,” discusses how people use social media, identifies
common business uses of social media, and examines many of the ethical
issues associated with the use of social media. The most popular social
networking platforms are identified. The business applications of social media
are covered, including the use of social networks to communicate and
promote the benefits of products and services, the use of social media in
the hiring process, improving customer service, and the creation of social
shopping platforms. Common ethical issues that arise for members of
social networking platforms including online abuse, harassment, stalking,
cyberbullying, encounters with sexual predators, the uploading of
inappropriate material, and the inappropriate participation of employees
in social networking are discussed. Other social networking issues
covered include the increased risk of accidents associated with social
media interaction while driving, the tendency of many social media
users to become narcissist in their postings, and the ability to perform self-image
manipulation.
• Chapter 10, “Ethics of IT Organizations,” covers a range of ethical issues facing
IT organizations, including those associated with the use of nontraditional
workers, such as temporary workers, contractors, consulting firms, H-1B
workers, and the use of outsourcing and offshore outsourcing. Also raised is the
issue of discriminatory hiring practices at many large IT firms and the special
issues of independent contractors working in the gig economy. Factors that are
considered in classifying a worker as either an employee or an independent
contractor are provided. The chapter also discusses the risks, protections, and
ethical decisions related to whistle-blowing, and it presents a process for safely
and effectively handling a whistle-blowing situation. In addition to introducing
the concept of green computing, the chapter discusses the ethical issues that
both IT manufacturers and IT users face when a company is considering how
to transition to green computing—and at what cost. It discusses the use of the
Electronic Product Environment Assessment Tool to evaluate, compare, and
select electronic products based on a set of 51 environmental criteria.
• Appendix A provides an in-depth discussion of how ethics and moral codes
developed over time.

PEDAGOGY
Ethics in Information Technology, Sixth Edition, employs a variety of pedagogical features
to enrich the learning experience and provide interest for the instructor and student:
• Opening Quotation. Each chapter begins with a quotation to stimulate
interest in the chapter material.
• Organizations Behaving Badly. At the beginning of each chapter, a brief
real-world scenario illustrates the issues to be discussed, and carefully
crafted focus questions pique the reader’s interest.

Preface xvii

Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Another random document with
no related content on Scribd:
With all his popularity, he was the last man with whom any of them
would have taken a liberty. He would have been bold indeed who
would have asked him why he left the Fifth Hussars, not to speak of
a fine country place, magnificent shooting, and ten thousand a-year,
to lead a dull monotonous life on the scorching plains of India? He
would have been bolder still who would have inquired about the fair
and exceedingly pretty girl, that Captain Vaughan had seen sitting
next him at dinner the day of embarkation. Who was she? Was she
his sister or his sweetheart? Someone said he had a vague idea that
Fairfax was a married man; but he was silenced and crushed by
general consent.
Fairfax was a bachelor—crossed in love, if you will—but a
bachelor pur et simple. Look at his bungalow—rigid simplicity. Look
at his room—not a bit of woman’s work, not a photo, not an
ornament. A perilously narrow camp-bed, a few chairs, a portable kit,
a writing-table, and a squadron of boots, and that was all. There
were a few books, chiefly on cavalry tactics and military history,
leavened with half-a-dozen sporting novels; not a French one among
them. Anything but like the accepted idea of a smart young cavalry
officer’s lair. If, as they say, a man’s room is a type of himself, Fairfax
was a soldier, a rigid moralist, and above all a bachelor, and one who
would no doubt develop into an old bachelor into the bargain.
Captain Campbell and Lieutenant Harvey were sitting in their
mutual verandah, in long chairs, clad in costumes more conspicuous
for ease than elegance, smoking, taking away the characters of their
neighbours’ horses, and minutely discussing the approaching big
races. From horses they came to riders, and finally to Fairfax.
“He is one of the best fellows going, but I cannot make him out; he
looks like a man with a story.”
“He does; and he has one you may be sure,” replied Captain
Campbell with conviction, languidly puffing at his cheroot.
“If he was the life and soul of the Fifth, as we have heard, their
ideas of mirth and jollity are more moderate than I could have
imagined. Sometimes, I grant you, he is in fairish spirits, and he can
say very amusing things; but, as a rule, he is silent and distrait. It is
certainly in field sports and on parade that he shines most; brilliant
sociability is not his forte.”
“No, decidedly not; and yet how all the fellows like him, from the
latest youngster from home upwards; although he is down upon the
boys at times, and has the art of being more politely and
unpleasantly sarcastic than anyone I know. One would think he was
forty to hear him talk, he is so circumspect and staid; and he can’t be
more than six or seven and twenty at the very outside. The
youngsters respect him as if he was the Commander-in-Chief
himself; and the remarks at his end of the table are never so free as
elsewhere. There must be some reason for his premature gravity.
There’s a woman in the case, depend upon it,” said Captain
Campbell, tossing away the end of his cigar with an emphatic
gesture. “Cherchez la femme, say I.”
“I should not wonder. Probably he has been crossed in love—jilted
perhaps,” suggested Mr. Harvey.
“She must be uncommonly hard to please, whoever she is, for he
is one of the best-looking fellows you could see—well-born and rich.”
Captain Campbell paused for a moment to reflect on these
advantages, and then continued: “It is a curious thing that he never
mentions a woman’s name, and is altogether very close about
himself and his family. Do you remark that he takes tremendously
long solitary rides, and gives his horses the most work of any man in
the station, for he gallops often, he gallops far, and he gallops fast.”
“He never seems to care to ride with anyone, don’t you know.” (Mr.
Harvey put in “don’t you know,” on an average, every three words.) “I
offered my agreeable society at various times, but he always put me
off in that quiet way of his, don’t you know; so I thought: ‘My dear
fellow, saint as we think you, you have some little game up, and I’ll
see what it is, don’t you know.’”
“That will do, my dear fellow; that’s the eleventh ‘don’t you know.’
Stick to Fairfax,” exclaimed his companion impatiently.
“Well, last Saturday evening, about five o’clock, I saw him going
out of his compound on that new black Australian of his; and as I
was just going for a ride myself, I nipped up on ‘Agag,’ and struck out
after him, on the sly naturally; and a nice chase he led me—for
nothing too. He went easy enough till he got well out of sight of the
cantonment, and then, by Jove, didn’t he put the pace on! Oculus
meus! how he took it out of the Waler. He rode slap across country
as if he was mad, clean over every nullah, big or little, that came in
his way. I had a hideous conviction that, if I followed him, especially
on ‘Agag,’ I should come to a violent end, so I stayed in a mango
tope, and kept my ‘cold gray’ on him in the distance. When he had
galloped his fill, and exorcised whatever demon possessed him, he
came back after a ring of seven or eight miles, with the black all in a
lather, but looking as cool as a cucumber himself. I joined him—quite
promiscuously of course—but I fancy that he twigged he had been
followed; there was a look in those keen eyes of his that made me
feel deuced uncomfortable. I’m certain that he has something on his
mind. A woman for choice. Maybe he threw her over, and she went
mad, or drowned herself, or something, don’t you know, and the
pangs of remorse are preying on his soul, eh?” cried Mr. Harvey,
having talked himself breathless.
“A lively and cheerful idea truly,” said Captain Campbell, sitting
erect in his chair. “In my opinion it’s far more likely that the girl of his
affections has been faithless. He never talks of a woman, never gets
a letter from one; his correspondents are all of the sterner sex—vide
the letter-rack—and he keeps his own concerns religiously sealed
from every eye, and never talks of himself in connection with any
belongings. He is a mystery, and a most interesting one. Why did he
come out here? Why did he leave his old regiment, where he was so
popular? What makes him so reserved and self-contained? I have
watched him at mess, when all of you were listening open-mouthed
to one of the doctor’s stories. I have seen Fairfax, when he thought
no one was observing him, lean back in his chair, with a sombre
weary look, as if he were sick and tired of life. And that time when
Vaughan had fever so badly, and he nursed him, I sat up with him
part of a night. Vaughan was sleeping, and he remained in the
verandah. I fell asleep too, and when I woke up a couple of hours
later there was Fairfax in the very same attitude as I had left him, still
gazing at the stars, and still apparently thinking profoundly. I watched
him for a good while before I spoke, and there was something
indescribable in his face and attitude that made me feel very sorry
for him, and I seemed nearer to knowing him that night than I had
ever done before. Presently I said, ‘A penny for your thoughts,
Fairfax,’ and he gave such a start as he turned round and said, ‘They
are not worth it; they are merely about myself, and not very pleasant
ones either,’ and then he got up and went back to Vaughan and
stayed beside him the remainder of the night. He is one of the best
fellows and most gentlemanly men I ever knew. But as to following
him as you have done”—flourishing a fresh cheroot in the direction of
his friend—“or ever trying to force myself into his confidence, I would
as soon think of cutting my throat.”
“Did you remark him on Christmas Day?” asked Mr. Harvey
eagerly, as if struck by a sudden thought. “After dinner, when we all
drank ‘Sweethearts and wives,’ how taken aback he looked. I was
sitting opposite him, and he turned as pale as a sheet. He set down
his glass untasted at first, but I remarked that he drank it off
afterwards. There is a woman in the case, that’s certain.—Chokra!
bring me a brandy-and-soda.”

This conversation took place nearly a year after Sir Reginald had
joined the Seventeenth, and during that year two events of
importance had occurred. I will relate them as they came. He had
been several months at Camelabad, and had quite settled down to
Indian military life, and was beginning to look upon the short time he
had spent at home as a sort of fevered vision. He never heard from
Alice. His only correspondents were Mark Mayhew and Geoffrey,
with an occasional note from Helen. He heard from her that his wife
had shut herself up at Monkswood and declined all society, that her
answers to their letters were rare and brief, and that her aunt, Miss
Saville, had been laid up in Ireland with rheumatic fever, and would
not be able to join her niece for some time.
This was all that he had gleaned about Alice since he had left
home; consequently, when carelessly glancing through the Home
News one mail-day his eye was caught by the following, “Fairfax—
On the 10th inst., at Monkswood, Lady Fairfax, of a son,” he was
simply thunderstruck. He took the paper over to his own bungalow
adjoining the mess and read the paragraph over and over again—it
had an absolute fascination for him—but read as he would, it came
to the same thing. It could not be her, it was some other Lady
Fairfax; but scarcely of Monkswood also, his common sense urged.
He felt a conviction that it was true, and yet he could not realise it.
He a father—Alice a mother! Well, at any rate, he was glad it was a
boy. There was an heir to Looton now, whatever happened to him.
His father would hardly have rested in his grave if the Fairfax money
and acres had gone to the Serles and the good old name become
extinct. Yes, he was glad that there was no chance of that now; but
as for Alice, he thought worse of her than ever. That he should know
of their child’s birth through the medium of a newspaper showed the
contempt in which she held him. His dark cheek reddened as he
angrily flung the paper from him and began to pace the room rapidly
from one end to the other. He would take no notice whatever of the
event, as far as Alice was concerned. No, he certainly would not
write to her. This was the resolution he came to, as he proceeded
hastily to dress for mess, where he was, if anything, more silent and
preoccupied than usual.
As he was going to bed that night he called his servant Cox into
his room—a most exceptional proceeding. Cox was an old retainer,
who had followed him from the Fifth, and believed implicitly that the
sun rose and set entirely and exclusively in the person of his master
the major. He alone was in Sir Reginald’s confidence, and naturally a
silent and taciturn man; touching his master’s private affairs, he was
mute as the grave.
“Here, Cox, I thought I would show you this,” said Sir Reginald,
holding out the paper and pointing to the announcement.
Cox saluted, slowly read the paragraph, and stared blankly at his
master; then recovering his manners and his presence of mind, said
concisely:
“I give you joy, sir.”
“Thank you,” said Sir Reginald, pouring out a tumbler of
champagne; “you are to drink his health and keep the news to
yourself.”
“Health and happiness and a long life,” said Cox, quaffing off the
toast as if it was spring water and wiping his mouth with the back of
his hand. After staring expectantly at his master for some seconds,
and finding him evidently buried in his own thoughts, he added
gruffly: “I suppose I may go now, sir.” An eager nod of assent was his
only answer, and he lost no time in backing himself out into the
verandah, and hurrying off to his barrack-room in time to report
himself before the bugles sounded the last post.
The following mail brought a letter from Mrs. Mayhew. She
generally enclosed a little note in her husband’s epistles, but this
was a long effusion for a wonder.
“Monkswood.
“My dear Reginald,
“You will have already seen the birth of your son and heir in
the paper, and no doubt were as much astonished as
everyone else. For the last six months Alice has lived in the
greatest retirement, seeing no one. Two or three times we
have asked her to come up to us, and she always excused
herself with one ridiculous plea after another. A telegram from
the housekeeper last Tuesday brought me down here the
same evening, and I found Alice very, very ill—so ill that for
several days the doctors were afraid to hold out any hopes of
her recovery. I dared not write and tell you this last mail, but
waited till this one, in hopes of sending you better news. Her
youth and a wonderful constitution have pulled her through,
and I may say that she is out of danger, though still extremely
weak, and subject to prolonged fainting fits.
“The life that she has led for the last few months has been
the chief cause of her illness. Morris tells me that she used to
walk for hours through the woods in all weathers, and took so
little food that it is a wonder she did not die of simple inanition.
She never dined, but simply went through the farce of sitting
at table breaking up breadcrumbs, sending away the most
tempting delicacies untasted. Poor motherless girl, angry as I
am with her, I cannot help being sorry for her; she is so
innocent, so utterly inexperienced, and so alone in the world
—thanks to herself of course. If she had been a trusting wife,
how happy and proud you would both be now! She is so good
and patient I cannot help loving her, in spite of myself. Her
pride in her baby is simply ridiculous, and very touching to
see. To hear her, you would think it was the first of its species,
or at any rate that nothing so beautiful and so remarkable in
every way had ever been born. A mother at eighteen, and
looking even younger, I tell her that no one will ever believe
the child is hers. She has about as much experience of
babies as my Hilda—a baby with a baby. He is a splendid boy,
a real Fairfax. If I were to declare that he is like you, you
would say, ‘Rubbish, all babies are exactly alike!’ But he is
very like you all the same. He is to be called Maurice, after
her father, and Mark and I are to be sponsors. I have just
asked Alice if she has any message for you, and she has
replied in a very low and subdued voice—none. I have no
patience with her. I should like to take her baby out of her
arms and give her such a shaking, only she looks so
dreadfully frail and delicate—I really would. I need not tell you
that now, more than ever, it behoves you to trace the false
certificate. It is too provoking that you have not been able to
get leave to go to Cheetapore and search personally. It is
really a dreadful misfortune the register being lost, and the
clergyman and clerk both dead; but money can do a great
deal, and you are the last man in the world to spare it. I will
write again very shortly, and hope to have good news from
you before long.
“Your affectionate Cousin,
“Helen Mayhew.”
Helen kept her promise, and during her stay at Monkswood
Reginald heard from her regularly; but neither line nor message was
ever enclosed from his wife, so neither line nor message was ever
sent by him. He did not even mention her name in his letters—letters
which Helen could not refuse to Alice’s wistful eyes—letters which
Alice read with pale face and trembling lips, and returned without a
single observation.
Two months later a bad attack of jungle fever procured Sir
Reginald leave of absence. For months he had been like a bird
beating against the bars of his cage to get away to Cheetapore, as
letters, telegrams, and inquiries of all kinds had been utterly useless
in throwing any light on the mysterious certificate. But the colonel of
the Seventeenth Hussars was rather short of officers, and could not
spare his smart young major, who had no claim whatever to leave,
having so recently arrived from England; besides, his particular
motto was, “No leave,” and as an Irish sub once angrily expressed it,
“No leave, and as little of that as possible.”
At last Sir Reginald reached Cheetapore, very much knocked up
by the long journey, and a mere shadow of the man who had left it
two years previously. The Twenty-ninth Dragoons, who had replaced
his old regiment, hospitably took him in and “put him up.” For two or
three days he was prostrated by a recurrence of the fever, and fit for
nothing. The first evening he was able to go out he went and called
on the chaplain. He was not at home. Leaving a note to make an
appointment, he went on to the band with one of his entertainers. As
they drove round the circle, Miss Mason—still Miss Mason—lolling
back in her carriage, could scarcely believe her eyes, and Mrs.
Chambers, her once firm ally and now implacable enemy, could
hardly trust hers either. She said to one of the Twenty-ninth, who
lounged up to her barouche: “Who is that in the dog-cart with
Captain Fox? He looks frightfully ill.”
“Oh, that’s Fairfax of the Seventeenth Hussars. He has come
down here on some mysterious errand or other. He would be much
better on his way to Europe instead. Looks as if he was going off the
hooks, doesn’t he?”
“He looks very ill indeed. What on earth brings him here?”
“Well, if you won’t repeat it, I’ll tell you,” coming closer and
speaking confidentially. “Strictly private, you understand. Mum’s the
word.”
“Oh, of course!”
“Well, I believe it’s about a marriage certificate which someone
posted home from here, and has caused the most frightful
unpleasantness in his family. He has a wife in England, so you may
fancy there was rather a scrimmage. He was only just married, and
to a most awfully pretty girl too, when this particular missive dropped
in. She left him at once, and he came out here with the Seventeenth.
He has left no stone unturned to get the affair cleared up, but he has
only managed to come down and see after it himself now—leave
stopped. I fancy he will make it pretty hot for the forger if he finds
him! It’s ten years’ penal servitude, is it not?”
“I am sure I don’t know,” replied the fair culprit faintly, looking very
white. “But oh! if she could only be the means of getting Charlotte
Mason transferred to Australia at Government expense! How too
delightful it would be!” ignoring her own little share in the transaction.
“Did you say that his wife had left him?” she asked, looking intently
at Sir Reginald, whose dog-cart was drawn up close by.
“So he told me.”
“How ill and worn he looks,” she thought, gazing at him.
“Supposing he should die!—he looked as if he had death in his face.
If he did, she would never know a moment’s peace—never! She
would make full confession and trust to his mercy. He would not be
hard upon her, it was not her fault; it was Charlotte Mason’s scheme,
and Charlotte ought to be shown up, unmasked, and transported.”
Being a person who almost always acted on impulse, she beckoned
to Captain Fox as soon as her former cavalier had sauntered away,
and asked him to tell Sir Reginald Fairfax that she wished to speak
to him particularly. Much bewildered and with great reluctance he
slowly followed the messenger to the carriage, where Mrs.
Chambers, with a rather frightened white face, accosted him:
“I see you do not remember me, Captain Fairfax? It quite shocks
me to see you looking so ill.”
He bowed and muttered inaudibly.
“Won’t you get into my carriage for a little, and we can talk over old
times?” Seeing him hesitate, she bent over the side of the carriage
and whispered in his ear: “It’s about the certificate.”
With an alacrity she was quite unprepared for from his languid and
delicate appearance, he accepted her invitation and took a seat
opposite her, and turning his clear dark eyes upon her, looked as if
he would read her very soul.
Meanwhile Captain Fox sauntered off to join a promenading
dandy, muttering to himself: “That Mrs. Chambers sticks at nothing;
she is becoming faster and more foolish than ever! The idea of her
tackling a strange fellow like that! I had no idea he was such an ass!
A regular case of ‘“Walk into my parlour,” said the spider to the fly.’”
“Sir Reginald,” said the spider to the supposed fly, “I have
something to tell you,” and forthwith she unfolded her tale from
beginning to end. When she came to the part where she mentioned
it as a joke his eyes literally blazed, and he seemed with difficulty to
refrain from some exclamation; but till she concluded he was
perfectly silent. When she stopped to take breath after her hurried
confession, he asked, with pardonable vehemence:
“What have I ever done to Miss Mason or you that you should do
me such a deadly injury? Do you know that the happiness of my life
has been utterly destroyed by your ‘joke,’ as you are pleased to call
it? I must say that your and Miss Mason’s reading of the word is very
different to mine. The least you can do, and shall do,” he said,
looking at her sternly, “will be to make out a written confession of
everything, and send it up to my quarters (Captain Fox’s) to-morrow.
I can hardly believe that you can have been the credulous tool you
would appear. Good evening,” he said, springing out of the carriage
and walking over towards that of her confederate, who had been
watching the conference with the liveliest dismay.
“Miss Mason,” he exclaimed abruptly, perfectly heedless of two of
Miss Mason’s satellites, who, with elbows on the carriage, and got-
up with enormous care, had been regaling the fair Charlotte with
scraps of the latest gossip—“Miss Mason,” he reiterated, “I know all!”
There was an indignant tone in his voice and an angry light in his
eyes that absolutely cowed her and astounded her companions.
“You have forged an infamous lie, you have tampered with a church
register, you have caused the greatest misery to a man who never
wronged you, and to a girl whom you have never even seen! You are
a forger,” he continued, almost choked between the two emotions
which were struggling in his breast—joy and rage. “Unless by to-
morrow morning you have made a full and explicit written statement
of the whole affair, duly signed and witnessed, I shall submit the
case to the cantonment magistrate, and you will be prepared to take
the consequences. Penal servitude is what you deserve,” he added
with bitter emphasis, as with a parting look of unspeakable
indignation he turned and made his way through the crowd.
His face was livid, his eyes burned like two coals. Captain Fox
gazed at him in undisguised astonishment. “Jove!” he thought, “what
a temper the fellow must have! He looks ready to jump down the
throat of all Cheetapore this instant. He is not a man I should care to
trifle with. The fair Chambers has evidently put him out, to say the
least of it.”
Sir Reginald hurriedly took him aside, and in as few words as
possible told him the story; and then Captain Fox’s face was a study.
His indignation knew no bounds. His expressions in connection with
Miss Mason’s name were startlingly strong and vehement, and he
laid the whip about his unlucky harness hack as if he had the fair
culprit herself between the shafts.
Mrs. Chambers’ “letter” arrived the following morning, and
although somewhat more pressure had to be brought to bear on
Miss Mason, her confession was received in due time. Both were
enclosed to Mr. Mayhew, who was to read them and forward them to
Monkswood.
“Now she will, she must give in,” thought her husband. “In two
months her letter will be out here, and in three, please goodness, I
shall be in England.”
It is hardly necessary to state that the whole story of the practical
joke was all over Cheetapore in less than two days. Captain Fox was
by no means reticent on the subject, which was soon known to all
the Dragoons, and from them filtered to the cantonment in general.
Sir Reginald was the object of universal sympathy, and interest was
considerably augmented by the rumoured youth and beauty of his
wife. The whole incident had a romantic flavour about it that gratified
the jaded palates of the Cheetapore monde, and it afforded them an
universally interesting nine-days’ wonder. As to Miss Mason, the
place was literally too hot to hold her. She and her colleague were
put into “Coventry” forthwith. Finding such a position unbearable, she
took the earliest opportunity of leaving the station and going on a
long visit “up country.” But wherever she went the story was
whispered with various additions, cela va sans dire; and to the end of
her life she will have good reason to regret her practical joke.

END OF VOL. I.

CHARLES DICKENS AND EVANS, CRYSTAL PALACE PRESS.


PRICE ONE SHILLING,

SWEETHEARTS BY THE SEA


BEING THE
Summer Number for 1882
OF

TINSLEY’S MAGAZINE.
CONTENTS.
A GLEAM OF SUNSHINE. By MABEL COLLINS, Author of
“Too Red a Dawn,” “An Innocent Sinner,” &c.
FLAT REBELLION. A Jersey Story. By BYRON WEBBER,
Author of “In Luck’s Way,” “Pigskin and Willow,” &c.
AFRICAN AND IRISH TIGERS. By JESSIE SALE LLOYD,
Author of “We Costelions,” “The Silent Shadow,” &c.
THE WRECK OF THE DINGLE. By JAMES
O’DONOGHUE.
HILDA’S VICTORY. By ANNABLE GRAY, Author of “Twixt
Shade and Shine,” “Margaret Dunbar,” &c.
ON THE COAST OF CLARE. By RICHARD DOWLING,
Author of “The Duke’s Sweetheart,” “A Sapphire Ring,” &c.
A DOUBLE KNOCK AND A BLOW. By W. W. FENN,
Author of “Blindman’s Holiday,” “After Sundown,” &c.
MR. WALKER’S LUGGAGE. By EDMUND DOWNEY.
HOW HE DISCOVERED IT. By Mrs. ALFRED PHILLIPS,
Author of “Benedicta,” &c.
A PAIR OF —— By ALBANY DE FONBLANQUE, Author of
“Pious Frauds,” &c.

SIX WHOLE-PAGE ENGRAVINGS.

PRICE ONE SHILLING.


TINSLEY BROTHERS, 8, CATHERINE STREET, STRAND.
And at all Booksellers and Railway Stalls.
NEW NOVELS AT EVERY LIBRARY.

COBWEBS. By MABEL COLLINS, Author of “Too Red a


Dawn,” “An Innocent Sinner,” &c. 3 vols.
FOR LOVE AND HONOUR. By FRANCIS ADDISON. 3
vols.
WE COSTELIONS. By J. SALE LLOYD, Author of “The
Silent Shadow,” &c. 3 vols.
HEAVILY HANDICAPPED. By GENIE HOLTZMEYER,
Author of “Mizpah.” 2 vols.
A SAPPHIRE RING. By RICHARD DOWLING, Author of
“The Duke’s Sweetheart,” “Mystery of Killard,” “The
Husband’s Secret,” &c. 3 vols.
SOCIETY’S PUPPETS. By ANNIE THOMAS (Mrs. Pender
Cudlip), Author of “Best for Her,” “Our Set,” “Eyre of Blendon,”
&c. 3 vols.
THE WATER TOWER. By Mrs. HIBBERT-WARE, Author of
“The King of Bath,” &c. 3 vols.
FARNBOROUGH HALL. By HUBERT SIMMONS, Author
of “Stubble Farm,” &c. 3 vols.
A PROFESSIONAL BEAUTY. Second Edition. By Mrs.
ALEXANDER FRASER, Author of “A Maddening Blow,” &c. 3
vols.
WHITE ELEPHANTS: A Novel. 3 vols.
CYNTHIA: A Story of Two Lovers. By a NEW WRITER. 2
vols.
DOCTOR L’ESTRANGE. By ANNETTE LYSTER, Author of
“Riding Out the Gale,” “Bryan and Katie,” &c. 3 vols.
A COSTLY HERITAGE. By ALICE O’HANLON, Author of
“Horace McLean.” 3 vols.

TINSLEY BROTHERS, 8, CATHERINE STREET, STRAND


*** END OF THE PROJECT GUTENBERG EBOOK PROPER
PRIDE ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree to
abide by all the terms of this agreement, you must cease using
and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project

You might also like