首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
This article discusses some``historical milestones' in computer ethics, aswell as two alternative visions of the futureof computer ethics. Topics include theimpressive foundation for computer ethics laiddown by Norbert Wiener in the 1940s and early1950s; the pioneering efforts of Donn Parker,Joseph Weizenbaum and Walter Maner in the1970s; Krystyna Gorniak's hypothesis thatcomputer ethics will evolve into ``globalethics'; and Deborah Johnson's speculation thatcomputer ethics may someday ``disappear'.  相似文献   

2.
This paper will address the question of the morality of technology. I believe this is an important question for our contemporary society in which technology, especially information technology, is increasingly becoming the default mode of social ordering. I want to suggest that the conventional manner of conceptualising the morality of technology is inadequate – even dangerous. The conventional view of technology is that technology represents technical means to achieve social ends. Thus, the moral problem of technology, from this perspective, is the way in which the given technical means are applied to particular (good or bad) social ends. In opposition to this I want to suggest that the assumed separation, of this approach, between technical means and social ends are inappropriate. It only serves to hide the most important political and ethical dimensions of technology. I want to suggest that the morality of technology is much more embedded and implicit than such a view would suggest. In order to critique this approach I will draw on phenomenology and the more recent work of Bruno Latour. With these intellectual resources in mind I will propose disclosive ethics as a way to make the morality of technology visible. I will give a brief account of this approach and show how it might guide our␣understanding of the ethics and politics of technology by considering two examples of contemporary information technology: search engines and plagiarism detection systems.  相似文献   

3.
4.
This article offers a discussion of the connection between technology and values and, specifically, I take a closer look at ethically sound design. In order to bring the discussion into a concrete context, the theory of Value Sensitive Design (VSD) will be the focus point. To illustrate my argument concerning design ethics, the discussion involves a case study of an augmented window, designed by the VSD Research Lab, which has turned out to be a potentially surveillance-enabling technology. I call attention to a “positivist problem” that has to do with the connection between the design context and the use context, which VSD seems to presuppose, and I argue that it is necessary to clearly distinguish between the two, since the designers’ intentions do not always correspond with the users’ practice; in fact, the relation between design and use is very complex and principally unpredictable. Thus, a design theory must accept that foresight is limited to anticipation rather than prediction. To overcome the positivist problem, I suggest a phenomenological approach to technology inspired by Don Ihde’s concept of multistability. This argument, which is general in nature and thus applies to any theory of design ethics, is intended as a constructive criticism, which can hopefully contribute to the further development of design ethics.  相似文献   

5.
Traditional approaches to computer ethics regard computers as tools, andfocus, therefore, on the ethics of their use. Alternatively, computer ethicsmight instead be understood as a study of the ethics of computationalagents, exploring, for example, the different characteristics and behaviorsthat might benefit such an agent in accomplishing its goals. In this paper,I identify a list of characteristics of computational agents that facilitatetheir pursuit of their end, and claim that these characteristics can beunderstood as virtues within a framework of virtue ethics. This frameworkincludes four broad categories – agentive, social, environmental, and moral– each of which can be understood as a spectrum of virtues rangingbetween two extreme subcategories. Although the use of a virtue frameworkis metaphorical rather than literal, I argue that by providing a frameworkfor identifying and critiquing assumptions about what a `good' computer is,a study of android arete provides focus and direction to the developmentof future computational agents.  相似文献   

6.
Artificial Life (ALife) has two goals. One attempts to describe fundamental qualities of living systems through agent based computer models. And the second studies whether or not we can artificially create living things in computational mediums that can be realized either, virtually in software, or through biotechnology. The study of ALife has recently branched into two further subdivisions, one is “dry” ALife, which is the study of living systems “in silico” through the use of computer simulations, and the other is “wet” ALife that uses biological material to realize what has only been simulated on computers, effectively wet ALife uses biological material as a kind of computer. This is challenging to the field of computer ethics as it points towards a future in which computer and bioethics might have shared concerns. The emerging studies into wet ALife are likely to provide strong empirical evidence for ALife’s most challenging hypothesis: that life is a certain set of computable functions that can be duplicated in any medium. I believe this will propel ALife into the midst of the mother of all cultural battles that has been gathering around the emergence of biotechnology. Philosophers need to pay close attention to this debate and can serve a vital role in clarifying and resolving the dispute. But even if ALife is merely a computer modeling technique that sheds light on living systems, it still has a number of significant ethical implications such as its use in the modeling of moral and ethical systems, as well as in the creation of artificial moral agents.  相似文献   

7.
方环非 《科技与管理》2006,8(3):133-136
在任何组织的运营中,管理伦理是其极为重要的组成部分。从逻辑上看,组织注重管理伦理建设,也必然会促进组织的长期可持续发展。尽管短期内管理伦理纲领的执行,会在一定意义上影响组织利益,出现对公正性认知的觉醒,激发或增进组织成员的公平意识,组织成员质疑组织中的公正性问题,但其今后为组织带来的积极效果将足以补偿其付出的成本。在组织管理伦理中,首先要强调公正性,同时需要充分发挥人力资源在组织过程和活动中的职能,利用组织伦理纲领地推行,科学地进行组织伦理管理。  相似文献   

8.
The computer revolution can beusefully divided into three stages, two ofwhich have already occurred: the introductionstage and the permeation stage. We have onlyrecently entered the third and most importantstage – the power stage – in which many ofthe most serious social, political, legal, andethical questions involving informationtechnology will present themselves on a largescale. The present article discusses severalreasons to believe that future developments ininformation technology will make computerethics more vibrant and more important thanever. Computer ethics is here to stay!  相似文献   

9.
The paper presents, firstly, a brief review of the long history of information ethics beginning with the Greek concept of parrhesia or freedom of speech as analyzed by Michel Foucault. The recent concept of information ethics is related particularly to problems which arose in the last century with the development of computer technology and the internet. A broader concept of information ethics as dealing with the digital reconstruction of all possible phenomena leads to questions relating to digital ontology. Following Heidegger’s conception of the relation between ontology and metaphysics, the author argues that ontology has to do with Being itself and not just with the Being of beings which is the matter of metaphysics. The primary aim of an ontological foundation of information ethics is to question the metaphysical ambitions of digital ontology understood as today’s pervading understanding of Being. The author analyzes some challenges of digital technology, particularly with regard to the moral status of digital agents. The author argues that information ethics does not only deal with ethical questions relating to the infosphere. This view is contrasted with arguments presented by Luciano Floridi on the foundation of information ethics as well as on the moral status of digital agents. It is argued that a reductionist view of the human body as digital data overlooks the limits of digital ontology and gives up one basis for ethical orientation. Finally issues related to the digital divide as well as to intercultural aspects of information ethics are explored – and long and short-term agendas for appropriate responses are presented.  相似文献   

10.
A number of different uniquenessclaims have been made about computer ethics inorder to justify characterizing it as adistinct subdiscipline of applied ethics. Iconsider several different interpretations ofthese claims and argue, first, that none areplausible and, second, that none provideadequate justification for characterizingcomputer ethics as a distinct subdiscipline ofapplied ethics. Even so, I argue that computerethics shares certain important characteristicswith medical ethics that justifies treatingboth as separate subdisciplines of appliedethics.  相似文献   

11.
12.
Does gender matter in computer ethics?   总被引:6,自引:0,他引:6  
Computer ethics is a relatively young discipline,hence it needs time both for reflection and forexploring alternative ethical standpoints in buildingup its own theoretical framework. Feminist ethics isoffered as one such alternative particularly to informissues of equality and power. We argue that feministethics is not narrowly confined to women's issues but is an approach with wider egalitarianapplications. The rise of feminist ethics in relationto feminist theory in general is described and withinthat the work of Gilligan and others on an ethic of care. We argue for the need to connect theory toempirical evidence. Empirical studies of gender andbusiness and computer ethics are reviewed. We noteconcerns with surveying a student audience, the issueof how far questionnaires and interviews can get tothe heart of ethical beliefs and problems ofperforming statistical analyses of quantitative data.Although we recognize them, our own small surveycannot avoid all these problems. Nevertheless byrefining our scenarios we are able to offer analternative reading of a hacking problem in terms ofan ethic of care thereby pointing a way forward forfuture research in computer ethics inspired byfeminist theory.  相似文献   

13.
This paper is an attempt to present disclosive ethics as a framework for computer and information ethics – in line with the suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful politics since information technology is an opaque technology – i.e. relatively closed to scrutiny. It presents the design of technology as a process of closure in which design and use decisions become black-boxed and progressively enclosed in increasingly complex socio-technical networks. It further argues for a disclosive ethics that aims to disclose the nondisclosure of politics by claiming a place for ethics in every actual operation of power – as manifested in actual design and use decisions and practices. It also proposes that disclosive ethics would aim to trace and disclose the intentional and emerging enclosure of politics from the very minute technical detail through to social practices and complex social-technical networks. The paper then proceeds to do a disclosive analysis of facial recognition systems. This analysis discloses that seemingly trivial biases in recognition rates of FRSs can emerge as very significant political acts when these systems become used in practice. Paper prepared for the Technology and Ethics Workshop at Twente  相似文献   

14.
[目的/意义]考察软件技术的扩散动态、发展阶段及关键路径,深入认识软件技术的扩散规律,促进软件技术的跨领域、跨学科传播。[方法/过程]选取Web of Science核心合集2004-2019年CiteSpace相关论文381篇,基于扩散指标、扩散曲线和扩散路径分析探寻以CiteSpace为例的软件技术在学科领域间的扩散规律,考察不同阶段的扩散状态并预测扩散趋势,识别扩散网络中的关键主路径及关键节点。[结果/结论]CiteSpace被广泛应用于多个研究领域,主要包括计算机科学、工程、图书情报学、商业与经济等,不同学科对应的扩散区间具有差异性,呈现学科之间的领先-滞后现象;相关引用论文和发表论文逐年增加,目前处于扩散曲线的起飞阶段,预计短期内其扩散速率会保持加速增长,影响力进一步扩大;关键主路径上的文献节点对软件技术扩散发挥了重要作用。  相似文献   

15.
In this essay, a new approach to the ethics of emerging information technology will be presented, called anticipatory technology ethics (ATE). The ethics of emerging technology is the study of ethical issues at the R&D and introduction stage of technology development through anticipation of possible future devices, applications, and social consequences. In the essay, I will first locate emerging technology in the technology development cycle, after which I will consider ethical approaches to emerging technologies, as well as obstacles in developing such approaches. I will argue that any sound approach must centrally include futures studies of technology. I then present ATE and some applications of it to emerging information technologies. In ATE, ethical analysis is performed at three levels, the technology, artifact and application levels, and at each levels distinct types of ethical questions are asked. ATE analyses result in the identification and evaluation of a broad range of ethical issues that can be anticipated in relation to an emerging information technology. This ethical analysis can then be used for ethical recommendations for design or governance.  相似文献   

16.
This article discusses mechanisms and principles for assignment of moral responsibility to intelligent robots, with special focus on military robots. We introduce the concept autonomous power as a new concept, and use it to identify the type of robots that call for moral considerations. It is furthermore argued that autonomous power, and in particular the ability to learn, is decisive for assignment of moral responsibility to robots. As technological development will lead to robots with increasing autonomous power, we should be prepared for a future when people blame robots for their actions. It is important to, already today, investigate the mechanisms that control human behavior in this respect. The results may be used when designing future military robots, to control unwanted tendencies to assign responsibility to the robots. Independent of the responsibility issue, the moral quality of robots’ behavior should be seen as one of many performance measures by which we evaluate robots. How to design ethics based control systems should be carefully investigated already now. From a consequentialist view, it would indeed be highly immoral to develop robots capable of performing acts involving life and death, without including some kind of moral framework.  相似文献   

17.
张翮 《科教文汇》2011,(22):3-4
生命科学的迅猛发展不可避免地涉及人类自身,随着后基因组时代的到来,合成生物学、人造生命技术的发展必将广泛地应用于能源、环境、材料、医药等诸多领域,因此科学技术进步与传统伦理之间的矛盾也必将出现,从而影响和改变人类未来的生活。  相似文献   

18.
生命科学的迅猛发展不可避免地涉及人类自身,随着后基因组时代的到来,合成生物学、人造生命技术的发展必将广泛地应用于能源、环境、材料、医药等诸多领域,因此科学技术进步与传统伦理之间的矛盾也必将出现,从而影响和改变人类未来的生活。  相似文献   

19.
I explore philosophically the phenomenon of home wireless networks as used to share broadband Internet connections. Because such networks are frequently unsecured, third parties can use them to access the Internet. Here I consider carefully whether this kind of behaviour should be properly called theft. I begin with a brief non-technical introduction to 802.11 wireless networks. Subsequently, I present a four part argument – appealing to the unsecured nature of the networks discussed, entrenched software and hardware behaviours, trespass law, and the openness of ‹public park’ spectrum – suggesting that this kind of behaviour is permissible and should not be construed as theft. Substantively, I conclude that, despite the quite compelling considerations that these arguments bring to bear, this behaviour is theft. Additionally, I draw attention to significant flaws in the design and implementation of wireless technology (specifically in the out-of-the-box configuration for wireless access points and in the wireless connectivity of early versions of Windows XP) that facilitate the intentional and unintentional theft of Internet bandwidth. I suggest some simple mechanisms that could be incorporated into the technology which would serve to remove the ethical ambiguity in its usage by third parties, including adding the ability for a network owner to explicitly mark her network as not for public use,␣and changes to default hardware and software behaviours. I conclude by encouraging increased use of value-sensitive design practices in the development of future wireless technologies.  相似文献   

20.
当技术伦理发生冲突时,技术主体就面临着在多种伦理或伦理原则中选择优先适用何者的问题,这就涉及了技术伦理位阶问题。技术伦理冲突是技术伦理位阶存在的逻辑前提。技术伦理位阶可以根据技术主体的身份、技术活动的类型进行判别。在技术活动中优先适用的伦理或伦理原则称为上位技术伦理,次优适用的伦理或伦理原则称为下位技术伦理。作为恒定上位技术伦理的普世伦理因其是人们最基本、最低限度的共同价值、标准和态度,故任何技术活动都必须优先适用它。判别技术伦理位阶可以解决技术伦理冲突,从而帮助专业技术人员解决伦理困惑,使得技术活动合目的性地进行。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号