Disclosive Computer Ethics: The Exposure and Evaluation of Embedded Normativity in Computer Technology

ثبت نشده
چکیده

This essay provides a critique of mainstream computer ethics and argues for the importance of an additional approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a theoretical level, and an an application level.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Method in Computer Ethics : Towards a Multi - Level Interdisciplinary Approach

This essay considers methodological aspects of computer ethics and argues for a multi-level interdisciplinary approach with a central role for what is called disclosive computer ethics. Disclosive computer ethics is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. In the methodology for computer ethics research proposed in the es...

متن کامل

The Opportunities Afforded by Embedded Computer Systems for Monitoring and Control of Industrial Processes in Less-Industrialised Countries (TECHNICAL NOTE)

The dramatic changes in integrated-circuit technology over the last two decades have been of great benefit to countries such as Zimbabwe. High volume production of VLSI chips has produced a supply of intelligent, versatile electronic processing devices at very low cost. In particular the facilities of the microcontroller have steadily developed to the accompaniment of a reduction in price. Sinc...

متن کامل

An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation

Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...

متن کامل

Mapping Activity Diagram to Petri Net: Application of Markov Theory for Analyzing Non-Functional Parameters

The quality of an architectural design of a software system has a great influence on achieving non-functional requirements of a system. A regular software development project is often influenced by non-functional factors such as the customers' expectations about the performance and reliability of the software as well as the reduction of underlying risks. The evaluation of non-functional paramet...

متن کامل

Object-Oriented Programming, and Computer Ethics

225 words): What James Moor famously described as “policy vacuums” due to the ICTrevolution have challenged our traditional ethical theories, and strained our conceptual resources. However, supplying philosophers with ethical challenges is not the only way in which computer science can be of assistance to the development of ethical theories. In this paper I will argue that terminology based on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010