3 Rs in Computer Ethics

Title: Reason, Relativity and Responsibility in Computer Ethics
Author: James H. Moor
Publisher: James H. Moor
URL: "What is Computer Ethics?" by James H. Moor

Abstract

Computing and its applied technologies have become so widespread that they may lead mankind to either success or destruction. James H. Moor presents computer ethics as a fundamental tool to mediate between the computer revolution and humanity. He explains the nature of computer ethics by discarding both Routine Ethics (which disregards the uniqueness of the problems in computer ethics) and Cultural Relativism (which disregards the stability of human core values), emphasizing the importance of human core values in developing a guide for computer ethics.

These core values, as Moor emphasizes, correlate with the computer's nature to be logically malleable (capable of being manipulated to perform any activity characterized in terms of inputs, outputs, and connecting logical operations) and informationally enriching (able to be modified to enhance capabilities and improve overall performance). They also address what he calls the policy vacuum and conceptual muddle created by the fast-changing computer revolution.

Three-Point Learning

1. The computer revolution has progressed to such an extent that it is creating gaps within national and international policies. Mankind must fully understand the nature of computers in order to proactively create appropriate policies, rather than merely trying to cope with the revolution.

2. Given the current situation, proper handling and dissemination of information should always be considered to ensure security.

3. The ability of humans to reason, relate, and be responsible for their actions manifests from their core values. These values can be used to address issues in computer ethics.

Applications

As a responsible citizen, this blogger will ensure that his posts are sound and informative. He will not allow his posts, correspondences, or online activities to harm others or invade other users' privacy, while also protecting himself.

No comments: