Ethics And Technology Term Paper

Ethics and Computing in Computer Science EMPOWERMENT AND RESPONSIBILITY

Errors and Hazards and Their Consequences

Despite the best of care and talent, computation is subject to uncertainties, which experts call "errors (Landau, 2008)." Some of these errors are man-made and some are produced by the computer itself. The four classes of errors are blunders or bad theory, random errors, approximation or algorithm errors, and round-off errors. Blunders are typographical errors or errors caused by running or using the wrong program or similar errors. Random errors are results of occurrences like fluctuations in electronics or cosmic rays running through the computer. Algorithm or approximation errors include the substitution of finite by infinite figures or variable inputs by constants. And round-off errors are inaccuracies as the finite number of digits for storing floating numbers (Landau). Peter Neumann at the SRI International identified more than 400 incidents of these errors, hazards and other problems, which can injure users and lead to financial loss. And these are not isolated or infrequent incidents. They happen as a consequence of encouraging programmers to produce large programs in haste and despite the awareness of the strong probability of these errors and hazards (Jacky).

Computing hazards include a race condition and memory leak (Jacky, 1989). A race condition or hazard is a system misbehavior, which results from the sequence or timing uncontrollable events or outside stimuli on which the output depends. And a memory leak refers to the gradual loss of available memory when a program or application in an operating system from continued but temporary use. But a classic computing hazard involves Therac-25. The Therac-25 is a radiation therapy machine produced by the Atomic Energy of Canada Limited put to use after the Therac-6 and Therac-20. There were 6 incidents between 1985 and 1987 during which medical patients were given massive doses of radiation approximately 100 times the intended doses. These deadly occurrences reveal the dangers that software control of safety critical systems are capable of inflicting (Jacky).

The sad state is that the production and control of these wares are still largely unregulated (Jacky, 1989). Only aviation and nuclear power application softwares are subjected to government approval prior to purchase. The Food and Drug Administration, fortunately, started regulating software for use as medical devices. After the Therac incidents, there arose the clamor for certification of software professionals involved in safety projects. Concerned sectors want stricter government control. There are other sectors, however, which oppose this because of the likelihood of government interference and increased costs. Some believe that the solution is not regulation but effective management. Those in the industry have three approaches to the problem. The first is to regulate the people who provide the services. The second is to certify organizations, companies or departments, which produce software and other wares. And the third is to regulate the products themselves. When systems fail, the victims or their families may file lawsuits against the vendors and the providers for damages (Jacky).

II. Artificial Intelligence, Robotics, Cybernetic Augmentations and Their Consequences

Artificial intelligence or AI is a computer with the learning or cognitive abilities or consciousness of a human being (Yudkowsky, 2008; Tech Target 2005)). It has been described as a "machine with a soul." The two basic approaches to AI are top-down and the bottom-up, the latter being the more familiar. Most scientists, however, believe that the top-down version is better because it allows the computer to "learn" about the environment. The ultimate goal for aI is to pass the Turing Test in which a human interrogator converses simultaneously via instant messaging with a human subject and with a computer. This computer has attained or been programmed with human-level intelligence. If the interrogator cannot distinguish between them because both sound human, the computer passes the test. It means that it has attained human level of cognition. A truly intelligent computer, however, may be unpredictable and even dangerous. If it attains the human level, it can design a more advanced model beyond the human ability to understand. As a dire consequence, these machines may take over the earth (Yudkowsky, Tech Target).

Physicalist John Searle presents the Chinese Room argument that computers do not really understand language (Koperski, 1991). Even a machine that is programmed to always respond appropriately, it will only be merely following man-made instructions. It does not possess the will to obey...

...

These soldiers would not need to eat grass while in combat. They will be able to communicate by mental telepathy and perform incredible tasks like Spiderman or even Superman. But this dream will have to be subjected to realistic tests and standards of biomedical ethics, which regulate research and experimentation of human subjects. Advocates of this "upgrade" may justify it as a "military necessity" in order to secure volunteers for the test. Nonetheless, there will be other specific issues to hurdle. These super-fighters may be commanded or refuse to be commanded to undertake risky combat. Such enhancements may also be viewed as risky or unproven or pose long-term health risks, such as addiction. The question of reversibility and safety are further concerns that can surface. There, too, are the legal and policy implications. The impact of these enhancements on international humanitarian law or the laws of war is likely to be raised. Enhancements, which modify soldiers in a biological way, may also breach the Biological Weapons Convention if enhanced humans function as "biological agents." As a whole, enhancements are likely to be viewed as more frightening and threatening than improving the human condition (Lin).
III. Societal Consequences of Computer Science and the Technologies

When the internet was first discovered, it was an uncharted dimension where everyone could easily and freely go in and come out (McChesney, 2013). Nobody owned it. There were no commercials, no one was watching and those who went in and out could do what they wanted. It was very promising and life seemed good. But in the last five years, something began to take place. From many fronts, many large corporations have been emerging and using the internet for their private or selfish purposes. And they are very powerful. These include AT & T, Verizon, Comcast, Google, Facebook, Apple, and Amazon. They are extremely successful in securing information from users of the internet. Privacy has ceased to exist in the internet. What these giants do is to sell the information they are able to freely secure in and through the internet to advertisers. They do this with the cooperation of, and in collaboration with, the government, the national security state and the military. And this is disturbing (McChesney).

Everyone should be told or reminded that internet access is controlled by a cartel of these mentioned giants (McChesney, 2013). We in America pay far more paying for cellular phones than people in any other country. The same is true with broadband wired access. The issue here is not the technology or economics but corrupt policy making and the power and its motive behind these giant firms. Their vast power enables them to virtually privatize cyberspace. That power thus virtually allows them to own it. What is worse is that internet users have no choice. These giants dominate and swarm the internet with their wares. In the beginning, the internet promised to be a great economic booster of growth. It could surely enhance economic growth in all countries. It could create new businesses and employments. It could boost economic growth like no other force could or ever did. Yet from the late 90s, something else developed. It has become the biggest generator of monopolies. Whether the internet user enters Google, Apple, Facebook or Amazon, he interplays with network economics. If he is sensitive, he gets the feel that there now seems to be an invisible owner or owners of cyberspace. And he soon realizes that these virtual owners realize incredible profits from the internet. It is very much like colonization in ancient times (McChesney).

And just like in colonization times, these huge empires or colonizers -- named Google, Facebook, Apple and Amazon -- are like powerful continents in the world much like in the late 19th century times of colonization (McChesney, 2013). They use their continents to gather profits and use these profits to spread their control and even launch attacks on other contents and grab the profits of those other continents. They know that all of them are out to make as much profit in colonizing. If a country does not have a continent, it is not a participant in the competition. It has no power. They are also clever enough to use patents to bar newcomers from the realm. A more frightening reality today is the resulting loss of privacy. A Google-related company or a Facebook-related company, for instance, collects individual information about any person and we do not even know about…

Sources Used in Documents:

BIBLIOGRAPHY

Jacky, J. (1989). Safety-critical computing, hazards, practices, standards and regulation.

Vol. 29, # 5, "Programmed for Disaster: Software Errors that Imperil Lives."

Department of Radiation: University of Washington. Retrieved on March 22, 2014

from http://staff.washington.edu/jon/pubs/safety-critical.html
Koperski, J. (1991). Frames, brains and Chinese rooms: problems with artificial intelligence. School of religion: Liberty University. Retrieved on March 22, 2014 from http://digitalcommons.liberty.educ/cgi/viewcontent.cgi?article=1088&Content=maters
University. Retrieved on March 23, 2014 from http://www.science.oregonstate.edu/~rubin/INSTANCES/WebModules/1_ComputerPrecision/PrecisionFiles/Pdfs/PrecisionII_15Sept.pdf
Lin, P. (2012). More than human? The ethics of biologically enhancing soldiers. The Atlantic: The Atlantic Monthly Group. Retrieved on March 22, 201 from http://www.theatlantic.com/technology/archive/2012/02/more-than-human-the-ethics-of-biologically-enhancing-soldiers/253217/
McChesney, R.M. (2013). Digital disconnect: How Capitalism is turning the internet against democracy. Democracy Now: Creative Commons Attribution. Retrieved on March 22, 2014 from http://www.democracynow.org/2013/4/5/digital_disconnect_robert-_mcchesney_on_how
Tech Target (2005). Turning test. WhatIs.com? Computing Fundamentals. Retrieved on March 22, 2014 from http://whatis.techtarget.com.com/definition/Turning=test
Yudkowsky, E. (2008). Artificial intelligence as a positive and negative factor in global risk. "Global Catastrophic Risk," Bostrom, N. And Cirkovic, MM., eds. Machine Intelligence Institute: Oxford University Press. Retrieved on March 22, 2014 from http://intelligence.org/files/AIPosNegFactor.pdf


Cite this Document:

"Ethics And Technology" (2014, March 22) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/ethics-and-technology-185705

"Ethics And Technology" 22 March 2014. Web.26 April. 2024. <
https://www.paperdue.com/essay/ethics-and-technology-185705>

"Ethics And Technology", 22 March 2014, Accessed.26 April. 2024,
https://www.paperdue.com/essay/ethics-and-technology-185705

Related Documents

This may be done without the consent of the owner of the information thus also infringing on their right to privacy. Education has also been revolutionized greatly by technology. As a result of technological advancements it is now possible for teachers and students to communicate over thousands of miles. Instructors are also able to give assignments which students can submit despite the distance. In this way, technology has enabled global

Ethics and Professional Behavior The American court system is one that has existed as long as the constitution has been in existence. They are provided for in the constitution of the U.S.A. And have the powers and mandate as prescribed in the constitution. The courts are fundamental in the society in regards to maintaining law and order and also bringing amicable, legal and acceptable settlements among people, organizations, institutions and even

Ethics, Morality, & Medicine in My Sister's Keeper Ethics & Morality Ethics, Morality, & Medicine in My Sister's Keeper Ethics, Morality, & Medicine in My Sister's Keeper Both ethics are morality of topics of philosophical discourse. Ethics is sometimes also referred to as moral philosophy. Moral philosophy or ethics may defend, recommend, and/or systematize behaviors that are right and wrong. Morality could be explained as the context within which ethics are codified. Morality is

Ethic Discussion Psychology -Ethics Ethics add to the beauty of profession whether medicine, healthcare, sociology, politics, education, business and even technology. Lack of ethics might not kill someone in most of cases but it certainly does affect the beauty of life. In psychology, ethics does play a role in developing trust between the client and the professional. Single parenting is a social psychology problem that also demands ethical practice since it deals

It is important that I am honest to anyone who I choose to be my mentor. Communication must be frank and honest, as learning is the key to research. Requirements for IRB Approval Institutional Review Boards (IRB) are the governing bodies that determine what research may be conducted at the university. This is the approving authority for future knowledge and must be treated with honor and respect. As a student under

Ethics and the Internet As the computer has evolved in the modern world, so the potential for communication has also increased. The computer, and the development of the Internet, has meant that human society has become more connected than ever before and the barriers between nations and people around the globe have been broken down. While this is a positive development in many ways, the growth of the Internet has also