LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Duquenoy, Penny (2005)
Publisher: International Federation for Information Processing
Languages: English
Types: Part of book or chapter of book
Subjects:
This paper begins by drawing on early discussions concerning ethical aspects of computer technology and proceeds to use them to highlight different problem areas: technical, application, and environment. We then look at some of the major issues under discussion since these early writings, to show the scope of the problems, as well as their changing nature, as different technologies are introduced.\ud This background sets the scene for the discussions of moral responsibility, and moral choices referred to above. Some of the technologies that are on the horizon, are discussed showing some correspondence to concerns raised more than 20 years ago. \ud Finally, the moral points raised are brought together in a set of questions that could provide the basis of moral consideration when designing for the future.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Baase, Sara (2003) A Gift of Fire: Social, Legal, and Ethical Issues in Computing (2nd Ed.). Prentice Hall.
    • [2] Duquenoy, Penny. and Harold Thimbleby (1999) “Justice and Design” in HumanComputer Interaction, INTERACT'99, M.Angela Sasse and Chris Johnson (Eds.) IOS Press on behalf of the International Federation for Information Processing (IFIP).
    • [3] Hamelink, Cees J. (2000) The Ethics of Cyberspace. Sage Publications.
    • [4] Johnson, Deborah G. and Snapper, John W. (1985) Ethical Issues in the use of Computers, Wadsworth Publishing Company. (Out of print).
    • [5] Johnson, Deborah G. (1985) Computer Ethics (2nd Ed.). Prentice-Hall Inc.
    • [6] Kizza, Joseph Migga (2002) Computer Network Security and Cyber Ethics. McFarland.
    • [7] Kling, Rob (Ed.) (1991) Computerisation and Controversy: Value conflicts and Social Choices (2nd Ed.), Academic Press.
    • [8] Lessig, Lawrence (1997) Code and other Laws of Cyberspace. Basic Books.
    • [9] Moor, James H., (1995) "What is Computer Ethics?" in Metaphilosophy, 16 (4)
    • [10] Langford, Duncan (Ed.) (2000) Internet Ethics. McMillan Press.
    • [11] Spinello, Richard (2000) Cyberethics. Jones and Bartlett.
    • [12] Whitby, Blay (1996) Reflections on Artificial Intelligence. Intellect Books.
    • [13] Weizenbaum, Joseph (1993) Computer Power and Human Reason. W.H. Freeman and Company, San Fransisco. First published 1976.
    • [14] Wiener, N. (1960) "Some Moral and Technical Consequences of Automation". Science, 131, pp.1355-8.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article