David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Information Technology 2 (2):125-129 (2000)
This essay considers methodological aspects ofcomputer ethics and argues for a multi-levelinterdisciplinary approach with a central role forwhat is called disclosive computer ethics. Disclosivecomputer ethics is concerned with the moraldeciphering of embedded values and norms in computersystems, applications and practices. In themethodology for computer ethics research proposed inthe essay, research takes place at three levels: thedisclosure level, in which ideally philosophers,computer scientists and social scientists collaborateto disclose embedded normativity in computer systemsand practices, the theoretical level, in whichphilosophers develop and modify moral theory, and theapplication level, that draws from research performedat the other two levels, and at which normativeevaluations of computer systems and practices takesplace
|Keywords||Computer Science Ethics User Interfaces and Human Computer Interaction Management of Computing and Information Systems Library Science Technology Management|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
James H. Moor (2005). Why We Need Better Ethics for Emerging Technologies. Ethics and Information Technology 7 (3):111-119.
David Wright (2011). A Framework for the Ethical Impact Assessment of Information Technology. Ethics and Information Technology 13 (3):199-226.
Ari Takanen, Petri Vuorijärvi, Marko Laakso & Juha Röning (2004). Agents of Responsibility in Software Vulnerability Processes. Ethics and Information Technology 6 (2):93-110.
Gordana Dodig-Crnkovic & Virginia Horniak (2006). Togetherness and Respect: Ethical Concerns of Privacy in Global Web Societies. [REVIEW] AI and Society 20 (3):372-383.
Toni Robertson (2006). Ethical Issues in Interaction Design. Ethics and Information Technology 8 (2):49-59.
Similar books and articles
Kenman Wong (2000). The Development of Computer Ethics: Contributions From Business Ethics and Medical Ethics. Science and Engineering Ethics 6 (2):245-253.
Antonio Marturano (2002). The Role of Metaethics and the Future of Computer Ethics. Ethics and Information Technology 4 (1):71-78.
Mathias Klang (2004). Spyware – the Ethics of Covert Software. Ethics and Information Technology 6 (3):193-202.
Jacek Sojka (1996). Business Ethics and Computer Ethics: The View From Poland. Science and Engineering Ethics 2 (2):191-200.
TerrellWard Bynum (2001). Computer Ethics: Its Birth and its Future. [REVIEW] Ethics and Information Technology 3 (2):109-112.
Antonio Marturano & Ruth Chadwick (2004). How the Role of Computing is Driving New Genetics' Public Policy. Ethics and Information Technology 6 (1):43-53.
Michael E. Palanski (2012). Forgiveness and Reconciliation in the Workplace: A Multi-Level Perspective and Research Agenda. [REVIEW] Journal of Business Ethics 109 (3):275-287.
Deborah G. Johnson & Keith W. Miller (2008). Un-Making Artificial Moral Agents. Ethics and Information Technology 10 (2-3):123-133.
Michael J. Quinn (2006). On Teaching Computer Ethics Within a Computer Science Department. Science and Engineering Ethics 12 (2):335-343.
Justine Johnstone (2007). Technology as Empowerment: A Capability Approach to Computer Ethics. [REVIEW] Ethics and Information Technology 9 (1):73-87.
Added to index2009-01-28
Total downloads152 ( #22,512 of 1,790,308 )
Recent downloads (6 months)1 ( #429,822 of 1,790,308 )
How can I increase my downloads?