* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Readings in Cyberethics
Bernard Williams wikipedia , lookup
Cosmopolitanism wikipedia , lookup
Virtue ethics wikipedia , lookup
Alasdair MacIntyre wikipedia , lookup
Kantian ethics wikipedia , lookup
J. Baird Callicott wikipedia , lookup
Secular morality wikipedia , lookup
Aristotelian ethics wikipedia , lookup
Primary care ethics wikipedia , lookup
Sexual ethics wikipedia , lookup
Consequentialism wikipedia , lookup
Compliance and ethics program wikipedia , lookup
Ethical intuitionism wikipedia , lookup
Morality and religion wikipedia , lookup
Marketing ethics wikipedia , lookup
Thomas Hill Green wikipedia , lookup
Medical ethics wikipedia , lookup
Accounting ethics wikipedia , lookup
Clare Palmer wikipedia , lookup
Arthur Schafer wikipedia , lookup
Ethics of technology wikipedia , lookup
Jewish ethics wikipedia , lookup
Readings in Cyberethics Notes from book by Spinello Chapter One • Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics 1 Contents • Privacy in Cyberspace • Security and Crime in Cyberspace • Professional Ethics, Codes of Conduct, and Computer/Information Professionals Cyberethics • The field of applied ethics that examines moral, legal, and social issues in the development and use of cybertechnology. Cybertechnology • Cybertechnology: the broad spectrum of technologies that range from stand-alone computers to the cluster of networked computing, information, and communication technologies. Pioneers in Field • Terrell Bynum -- applied ethics • Deborah Johnson -- “new species” theory • James Moore -- logical malleability (general purpose machines) gives rise to “vacuums.” Terrell Byrnum • “Ethics and the Information Revolution” • History of cyberethics beginning with Norbert Weiner, 1940s • Unique moral issues? • Powerful technologies have profound social consequences Deborah Johnson • “Ethics Online” • Unique ethical considerations: – Global and interactive scope of the Net – Anonymity – reproducibility James Moore • “What is Computer Ethics?” • Multipurpose machine • Vacuums – Laws and social policies – Conceptual frameworks and muddles James Moore • 4 steps – – – – Identify any policy vacuums Clarify conceptual muddles Revise policies or formulate new ones Justify them • “routine ethics” not sufficient Cyberethics methodology • Brey’s “disclosive computer ethics” • 3-levels – Disclosive – Theoretical – application Rational Ethical Theory • Consequences or duty • Utilitarianism -- assess consequences of a policy -- advance the greatest good for the greatest number • Deontological (duty-based) -- everyone is respected as an individual.