Disclosive Computer Ethics: The Exposure and Evaluation of Embedded Normativity in Computer Technology
ثبت نشده
چکیده
This essay provides a critique of mainstream computer ethics and argues for the importance of an additional approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a theoretical level, and an an application level.
منابع مشابه
Method in Computer Ethics : Towards a Multi - Level Interdisciplinary Approach
This essay considers methodological aspects of computer ethics and argues for a multi-level interdisciplinary approach with a central role for what is called disclosive computer ethics. Disclosive computer ethics is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. In the methodology for computer ethics research proposed in the es...
متن کاملThe Opportunities Afforded by Embedded Computer Systems for Monitoring and Control of Industrial Processes in Less-Industrialised Countries (TECHNICAL NOTE)
The dramatic changes in integrated-circuit technology over the last two decades have been of great benefit to countries such as Zimbabwe. High volume production of VLSI chips has produced a supply of intelligent, versatile electronic processing devices at very low cost. In particular the facilities of the microcontroller have steadily developed to the accompaniment of a reduction in price. Sinc...
متن کاملAn Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation
Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...
متن کاملMapping Activity Diagram to Petri Net: Application of Markov Theory for Analyzing Non-Functional Parameters
The quality of an architectural design of a software system has a great influence on achieving non-functional requirements of a system. A regular software development project is often influenced by non-functional factors such as the customers' expectations about the performance and reliability of the software as well as the reduction of underlying risks. The evaluation of non-functional paramet...
متن کاملObject-Oriented Programming, and Computer Ethics
225 words): What James Moor famously described as “policy vacuums” due to the ICTrevolution have challenged our traditional ethical theories, and strained our conceptual resources. However, supplying philosophers with ethical challenges is not the only way in which computer science can be of assistance to the development of ethical theories. In this paper I will argue that terminology based on ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010