Ethics and Technology Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Ethics and Computing in Computer Science


Errors and Hazards and Their Consequences

Despite the best of care and talent, computation is subject to uncertainties, which experts call "errors (Landau, 2008)." Some of these errors are man-made and some are produced by the computer itself. The four classes of errors are blunders or bad theory, random errors, approximation or algorithm errors, and round-off errors. Blunders are typographical errors or errors caused by running or using the wrong program or similar errors. Random errors are results of occurrences like fluctuations in electronics or cosmic rays running through the computer. Algorithm or approximation errors include the substitution of finite by infinite figures or variable inputs by constants. And round-off errors are inaccuracies as the finite number of digits for storing floating numbers (Landau). Peter Neumann at the SRI International identified more than 400 incidents of these errors, hazards and other problems, which can injure users and lead to financial loss. And these are not isolated or infrequent incidents. They happen as a consequence of encouraging programmers to produce large programs in haste and despite the awareness of the strong probability of these errors and hazards (Jacky).

Computing hazards include a race condition and memory leak (Jacky, 1989). A race condition or hazard is a system misbehavior, which results from the sequence or timing uncontrollable events or outside stimuli on which the output depends. And a memory leak refers to the gradual loss of available memory when a program or application in an operating system from continued but temporary use. But a classic computing hazard involves Therac-25. The Therac-25 is a radiation therapy machine produced by the Atomic Energy of Canada Limited put to use after the Therac-6 and Therac-20. There were 6 incidents between 1985 and 1987 during which medical patients were given massive doses of radiation approximately 100 times the intended doses. These deadly occurrences reveal the dangers that software control of safety critical systems are capable of inflicting (Jacky).

The sad state is that the production and control of these wares are still largely unregulated (Jacky, 1989). Only aviation and nuclear power application softwares are subjected to government approval prior to purchase. The Food and Drug Administration, fortunately, started regulating software for use as medical devices. After the Therac incidents, there arose the clamor for certification of software professionals involved in safety projects. Concerned sectors want stricter government control. There are other sectors, however, which oppose this because of the likelihood of government interference and increased costs. Some believe that the solution is not regulation but effective management. Those in the industry have three approaches to the problem. The first is to regulate the people who provide the services. The second is to certify organizations, companies or departments, which produce software and other wares. And the third is to regulate the products themselves. When systems fail, the victims or their families may file lawsuits against the vendors and the providers for damages (Jacky).

II. Artificial Intelligence, Robotics, Cybernetic Augmentations and Their Consequences

Artificial intelligence or AI is a computer with the learning or cognitive abilities or consciousness of a human being (Yudkowsky, 2008; Tech Target 2005)). It has been described as a "machine with a soul." The two basic approaches to AI are top-down and the bottom-up, the latter being the more familiar. Most scientists, however, believe that the top-down version is better because it allows the computer to "learn" about the environment. The ultimate goal for aI is to pass the Turing Test in which a human interrogator converses simultaneously via instant messaging with a human subject and with a computer. This computer has attained or been programmed with human-level intelligence. If the interrogator cannot distinguish between them because both sound human, the computer passes the test. It means that it has attained human level of cognition. A truly intelligent computer, however, may be unpredictable and even dangerous. If it attains the human level, it can design a more advanced model beyond the human ability to understand. As a dire consequence, these machines may take over the earth (Yudkowsky, Tech Target).

Physicalist John Searle presents the Chinese Room argument that computers do not really understand language (Koperski, 1991). Even a machine that is programmed to always respond appropriately, it will only be merely following man-made instructions. It does not possess the will to obey or disobey the set instructions or respond in any other way (Koperski).

One more dream-like capability of computers is the "upgrade" of human beings into future soldiers who will be invulnerable to torture, starvation and loss of sleep (Lin, 2012). These soldiers would not need to eat grass while in combat. They will be able to communicate by mental telepathy and perform incredible tasks like Spiderman or even Superman. But this dream will have to be subjected to realistic tests and standards of biomedical ethics, which regulate research and experimentation of human subjects. Advocates of this "upgrade" may justify it as a "military necessity" in order to secure volunteers for the test. Nonetheless, there will be other specific issues to hurdle. These super-fighters may be commanded or refuse to be commanded to undertake risky combat. Such enhancements may also be viewed as risky or unproven or pose long-term health risks, such as addiction. The question of reversibility and safety are further concerns that can surface. There, too, are the legal and policy implications. The impact of these enhancements on international humanitarian law or the laws of war is likely to be raised. Enhancements, which modify soldiers in a biological way, may also breach the Biological Weapons Convention if enhanced humans function as "biological agents." As a whole, enhancements are likely to be viewed as more frightening and threatening than improving the human condition (Lin).

III. Societal Consequences of Computer Science and the Technologies

When the internet was first discovered, it was an uncharted dimension where everyone could easily and freely go in and come out (McChesney, 2013). Nobody owned it. There were no commercials, no one was watching and those who went in and out could do what they wanted. It was very promising and life seemed good. But in the last five years, something began to take place. From many fronts, many large corporations have been emerging and using the internet for their private or selfish purposes. And they are very powerful. These include AT & T, Verizon, Comcast, Google, Facebook, Apple, and Amazon. They are extremely successful in securing information from users of the internet. Privacy has ceased to exist in the internet. What these giants do is to sell the information they are able to freely secure in and through the internet to advertisers. They do this with the cooperation of, and in collaboration with, the government, the national security state and the military. And this is disturbing (McChesney).

Everyone should be told or reminded that internet access is controlled by a cartel of these mentioned giants (McChesney, 2013). We in America pay far more paying for cellular phones than people in any other country. The same is true with broadband wired access. The issue here is not the technology or economics but corrupt policy making and the power and its motive behind these giant firms. Their vast power enables them to virtually privatize cyberspace. That power thus virtually allows them to own it. What is worse is that internet users have no choice. These giants dominate and swarm the internet with their wares. In the beginning, the internet promised to be a great economic booster of growth. It could surely enhance economic growth in all countries. It could create new businesses and employments. It could boost economic growth like no other force could or ever did. Yet from the late 90s, something else developed. It has become the biggest generator of monopolies. Whether the internet user enters Google, Apple, Facebook or Amazon, he interplays with network economics. If he is sensitive, he gets the feel that there now seems to be an invisible owner or owners of cyberspace. And he soon realizes that these virtual owners realize incredible profits from the internet. It is very much like colonization in ancient times (McChesney).

And just like in colonization times, these huge empires or colonizers -- named Google, Facebook, Apple and Amazon -- are like powerful continents in the world much like in the late 19th century times of colonization (McChesney, 2013). They use their continents to gather profits and use these profits to spread their control and even launch attacks on other contents and grab the profits of those other continents. They know that all of them are out to make as much profit in colonizing. If a country does not have a continent, it is not a participant in the competition. It has no power. They are also clever enough to use patents to bar newcomers from the realm. A more frightening reality today is the resulting loss of privacy. A Google-related company or a Facebook-related company, for instance,…[continue]

Cite This Term Paper:

"Ethics And Technology" (2014, March 22) Retrieved October 27, 2016, from

"Ethics And Technology" 22 March 2014. Web.27 October. 2016. <>

"Ethics And Technology", 22 March 2014, Accessed.27 October. 2016,

Other Documents Pertaining To This Topic

  • Ethics in Technology

    Ethics in Technology Business - Management The purpose of this paper is to highlight and present the ethical issues that are involved in using modern technology. The paper highlights some of the current ethical issues faced by computer users that are due to unethical practice and lack of proper ethical policies by different businesses. The paper pinpoints the causes and gives recommendation on how the current issues can be minimized. A portion

  • Ethics Reproductive Technologies There

    The next objection of IVF separating the procreation and marital aspects of marriage and in the end damaging the marital relationship was totally untrue in this case. This couple had a very strong relationship and going through the process of gestational surrogacy strengthen their martial relationship as opposed to damaging it. The last objection of adoption is a better answer to the trouble of childlessness may very well be

  • Ethics & Information Technology Ethics & Technology

    ETHICS & INFORMATION TECHNOLOGY Ethics & Technology The first aspect of this article that struck the author is how human beings began as hunter-gatherers of food, materials for shelter, and defense -- and now human beings are hunter gatherers of information. Just as hunting and gathering affected the kind of society humans were millions of years ago, hunting and gathering information in the 21st century affects the kinds of societies present in

  • Ethics and Technology Questions What

    Creating reporting agencies that know how to deal with such information in a proactive manner is necessary, rather than relying upon the media to publicize the negative information. The lack of protective legislation is another problem. However, there is often great difficulty in generating legislative and popular support for protections to be accorded to whistle-blowers. Historically, many whistleblowers are like Daniel Ellsberg, who revealed the true nature of the war

  • Ethics and Technology Successfully Combating

    If the question put to the competitive intelligence team were, "how can we make a product that consumers want to buy?," and if this question were at the forefront of every action, there would be no need for unethical behavior. For an issue like product design, we would not need to try to copy another company's interface, but would instead study why that interface was popular with consumers, and

  • Ethics and Technology Illegal Downloads

    Arguably the deficiencies in processes and technologies throughout the distribution channel enable the unethical sharing of digital property by consumers in the first place. it's as if the incompetence of these channel partners' platforms, either from a website standpoint with the support of DRM technologies or the reliance on faulty, often poorly designed DRM systems, technologies and techniques create much opportunity to take digital and intellectual property and repurpose it

  • Ethics Information Technology it Is Commonly Argued

    Ethics Information Technology It is commonly argued that information technology and information systems is largely value neutral in the same way that other technologies do not necessarily have any ethical implications by themselves. However, one interesting observation is that such advances in technology can largely influence the power structures of organizational hierarchies and create an opportunity for unethical practices to emerge. For example, take Enron. Enron's board of directors virtually waved

Read Full Term Paper
Copyright 2016 . All Rights Reserved