Emerging Technologies With Ethical Implications Term Paper

¶ … Technologies with Ethical Implications The effect of information revolution in changing many facets of life in varied fields like banking and commerce, transportation, health care, entertainment, work and employment and national security is clearly visible in the developed countries of the world. As a result, information technology has started influencing relationships, family and community atmosphere, democracy, freedom, etc. (Computer Ethics: Basic Concepts and Historical Overview) Being an exclusive technology, computers bringup uncommon ethical matters. Computer ethics refers to the study of the characteristics and communal bearing of computer technology and the subsequent creativity and explanation of policies for the ethical utilization of such technology. This vigorous new field of computer ethics, in present modern years, has sprung new university courses, workshop, conference, curriculam materials, professional organizations, articles, books, journals and research centres. In addition, the age of WWW.hasaltered computer ethics into a field of world-wide information ethics. (Moor, 1985, p.267)

Computer ethics takes into account the interactions between data, theories, strategies and principles with respect to continually altering computer technology and hence it is an active and intricate field of study. Computer ethics is neither a rigid collection of policies that can be written on a piece of paper nor a mere employment of ethical principles to a valueless technology. A fresh thinking about the characteristics of computer technology and our values is what Computer ethics demands from us. Computer ethics is a field having its own standing even though it relies on both science and ethics and offers theoretical models for comprehension and guidelines for utilizing computer technology. As there is no policy on how to use computer technology, this leads to appearance of a standard problem in computer ethics. As computers offer fresh abilities to us, we are open to innovative choices for activity. (Moor, 1985, p.267)

In these circumstances, we face either insufficient policies or no policies to guide us. The main role of computer ethics is in devising procedures to guide our actions on what we should do in such circumstances. Obviously we need to tackle few ethical issues as a human being or as a community. Both individual and social policies are taken care by computer ethics for the ethical purpose of computer technology. It may appear that a routine deployment of an ethical theory to develop the suitable policy is what is all needed. However, this is typically not feasible. This is because we encounter no-concept situation along with no-policy situation. (Moor, 1985, p.268)

On first sight, a difficulty involved in computer ethics may look unambiguous; but a small insight will open out a theoretical chaos. In such circumstances, a thorough investigation that presents a logical theoretical structure is required to develop a policy for activity. In fact, computer ethics mainly deals with putting forward theoretical structures for comprehending ethical matters which is based on computer technology. The sign of fundamental difficulty in computer ethics is a situation where computer technology is effectively drawn in without a clear picture on how to comprehend the situation and what to do. Thus, core of computer ethics does not include all ethical situations involving computers. (Moor, 1985, p.270)

The troubles related to Computer ethics are of a simple type. Computer security is the visible major concern in these modern years in the field of Computer ethics, as there are computer viruses and worldwide intelligence work by hackers who are stay at a very huge distance. The logical security is the main problem, which according to Spafford, Heaphy and Ferbrache has been classified in to five parts: (1) Secrecy and confidentiality, (2) Integrity- which necessitates that the data and the programs are not altered without correct authority, (3) Unimpaired service (4) Continuity- which makes sure that the information and behavior which is found today will be the same tomorrow and (5) having control over the accessibility of resources, and the concern is not the physical security of the hardware. A major threat to the computer security is the spiteful kinds of software or the programmed intimidations. Some of the problems of computer security are the "worms" which can travel from machine to machine through networks, and may have their own parts being functioning on several machines; "Trojan horses" appear like a part of the program but are really causing harm behind the scenes; "viruses" are placed into other computer programs and they cannot run on their own; "logic bombs" look for certain situations and then work when they are favorable; and "bacteria"...

...

(Computer Ethics: Basic Concepts and Historical Overview)
Usually, the faithful persons, who have the approval to use the computer system, cause computer crimes such as misappropriation or installing of logic bombs. The alleged hacker who infringes into others computer system without consent is another main threat to the computer security. Usually the hackers search the system to know how the system functions and what files are present, while some deliberately cause damage or pilfer data. The hackers usually shield themselves as emissary of government bodies or as benign protectors of freedom and defenders against cons by important corporations. The self-styled messiahs of the cyberspace assert that they are helping the society by revealing the security dangers and their activities do not cause any damage. The owner should carefully verify his computer system for any flawed or lost data once he knows that there has been an infiltration into his computer system, and any act of hacking is detrimental. The owner of the system should make a pricey and extensive search of the compromised system, even if the hackers have done no damage. (Computer Ethics: Basic Concepts and Historical Overview)

The sufferers are made to spend time and money in verifying and rescuing the system after the felony by the hackers. Due to this the services are also broken up. As long as it is not changed, they think it is good to burglarize and enter other's files. They feel no felony is done. The hackers share the unlawful accessibility codes and passwords by pilfering the computer time and telephone. The pilfering is mostly of very low technology. The functions which do not work and cause break down are smashed by the hackers. (What is a Computer Crime?) Usually the agent considers his actions as role-models for others and considers computer crimes as games or intellectual activity which normally others can't do. (Information Ethics: On the Philosophical Foundation of Computer Ethics)

The information aspect is easily imagined as a magical, political, social, financial dream-like setting, due to the aloofness of the process, the irrelevant nature of information and the virtual communication with undisclosed persons, so a person faultily assumes that his/her actions are illusory and inconsequential as the murder of enemies in a virtual play. The result is that he/she may be wholly ready to accept the universal saying, and take responsibility for his/her actions and expand the regulations of the play to all agents. As, in a moral game, universality without any botheration for the real outcome of an activity is ethically weak as the hacker can be a real Kantian. (Information Ethics: On the Philosophical Foundation of Computer Ethics)

Privacy was first subject of computer ethics which stirred public interest. The computer technology is considered to be intimidating to a person who wishes to keep various types of information which is sensitive like medical records out of the public realm or out of the reach of those who are considered as possible dangers, due to the ease and efficiency with which computer and computer networks can be used to collect, store, search, make comparisons, retrieve and share personal information. New privacy concerns like data-mining, data-matching, recording of "click trails" on the web etc. have arisen due to the commercialization and fast progress of the internet; the rise of WWW; expanding user-friendliness and the authority of processing of computers; and reducing expenses of computer technology in the last 10 years. The philosophers and other thinkers are made to re-consider the idea of privacy due to several problems connected with privacy which are caused by computer technology. (Computer Ethics: Basic Concepts and Historical Overview)

As of today, the most clearly seen difficulties in computer networks is the larceny of intellectual property and software. (Peace, A. Graham; Galletta, dennis. F; Thong, James, p. 154). The physical manifestations of thoughts which are enclosed in music, books, plays, movies and computer software is defined as intellectual property. These valuable properties are available on the Internet, and the computer pirates lift them when they copy music, software, graphics/pictures, movies, books etc. A question may crop up as to how a person is affected, who initiated or manufactured these forms of entertainment? Is pilfering computer hardware innovated and produced by someone equal to stealing a product? Who will pay for this robbery? (What is a Computer Crime?)

By fixing a peer-to-peer (P2P) file sharing software program it may be easy and safe to copy movies, recordings and computer programs. But, most of the information that one need to copy are protected…

Sources Used in Documents:

References

Barger, Robert N. "In Search of a Common Rationale for Computer Ethics" University of Notre Dame, Read at the Third Annual Computer Ethics Institute Conference, The Brookings Institution, Washington, DC. April 28, 1994. Retrieved at http://www.nd.edu/~rbarger/common-rat.html. Accessed on 10 September, 2004

Chmura, Gail. "What do Students Think about Computer Ethics?" VSTE (Virginia Society for Technology in Education) Journal Volume: 18, No. 1 Fall/Winter 2003-2004; pp: 32-41

Computer Ethics: Basic Concepts and Historical Overview" 14 August, 2001. Retrieved at http://plato.stanford.edu/entries/ethics-computer/. Accessed on 10 September, 2004

Floridi, Luciano. "Information Ethics: On the Philosophical Foundation of Computer Ethics" Retrieved at http://www.wolfson.ox.ac.uk/~floridi/ie.htm. Accessed on 10 September, 2004
What is a Computer Crime?" Retrieved at http://www.cybercrime.gov/rules/lessonplan1.htm. Accessed on 10 September, 2004


Cite this Document:

"Emerging Technologies With Ethical Implications" (2004, September 12) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/emerging-technologies-with-ethical-implications-174743

"Emerging Technologies With Ethical Implications" 12 September 2004. Web.24 April. 2024. <
https://www.paperdue.com/essay/emerging-technologies-with-ethical-implications-174743>

"Emerging Technologies With Ethical Implications", 12 September 2004, Accessed.24 April. 2024,
https://www.paperdue.com/essay/emerging-technologies-with-ethical-implications-174743

Related Documents

Globalization and Its Ethical Implications The dynamic force of globalization, a phenomenon of interconnectedness and integration of economies around the world, has resulted not only to increasing opportunities for trade diversification but presents inherent risk such as global financial instability, increased inequalities, terrorism. In an increasingly interdependent world, increasing world population, scientific and technology innovation advancement, global human development issues, global governance, peace and security, global environment and natural resources are

Ethical Argument
PAGES 9 WORDS 3188

Ethical Argument Proclaimed by scientists, the thriving cloning of an adult sheep and the prospect to clone a human being is one of the most striking and latest instances of a scientific innovation turning out to be a major argumentative issue. A variety of critics, physicians and legal specialists, scientists and theologians, talk-radio hosts, as well as editorial column writers, for the period of the preceding few months, have been effectively

AbstractThis paper examines the increasing integration of robotics across healthcare for applications ranging from pharmaceutical production to surgical assistance. As automation continues advancing, thoughtful oversight is required to optimize safety, effectiveness, and ethical use. Evidence-based policies must proactively shape development to maximize societal benefit. If guided prudently, collaborative human-robot healthcare may usher an era of improved access, quality, and discovery transcending current constraints. Achieving this optimal outcome, however, requires informed

Ethical Communication and Social Media: Discussion and Implications “Almost a quarter of the world’s population is now on Facebook. In the USA nearly 80% of all internet users are on this platform. Because social networks feed off interactions among people, they become more powerful as they grow” (Gaitho, 2018). Social media has created a manifestation of a branch of society that human civilization has never had to deal with before. Due to the

Ethical Theory & Moral Practice Debates about theory and practice are ancient. Each generation considers the dynamics that surround issues about the interdependency of theory and praxis to be uniquely challenging. Complexity is a variable closely linked with knowledge. As science has added layer upon layer of knowledge, decision-making dilemmas have been confounded by new and staggering concomitant factors. In concert, theoretical frameworks for social science disciplines have been adapted to

Geolocation of the user based on the user's Internet protocol (IP) address. Location-based service companies that specialize in identity protection use this approach, and IP addresses, blocks of IP addresses and credit card billing addresses can all be used to develop a location profile. 2. Personal computer/web browser identification examines the hypertext transfer protocol (HTTP) browser header and other information from the user's computer or device, and compares them to