Nobody downloaded yet

James Moor - Computer Ethics - Essay Example

Comments (0) Cite this document
Summary
In “What is Computer Ethics”, philosopher James H. Moor makes a broad, ambitions account of the nature of computer ethics, with the implicit intent of deriving a special science set off from the other regions of ethical thinking. In his essay, Moor seeks to explain the causes of ethical questions brought on by computer-related technological forces in our society as opposed to other kinds of technologies…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
James Moor - Computer Ethics
Read TextPreview

Extract of sample "James Moor - Computer Ethics"

Download file to see previous pages 269). Thus, individuals are empowered to perform a large number of operations previously unavailable to them. An example might be the ability to make microloans to individuals in developing countries: an ability that most people in developed countries did not have 20 to 30 years ago. As ethical philosophers have pointed out for centuries, even though one can perform a certain action that does not necessarily mean one ought to perform that action. Given this basis for Moor’s discussion of computer ethics, it seems that Moor successfully argues for special consideration of computer ethics as a specialized area in moral philosophy. Early in his essay, Moor introduces the concept of a “policy vacuum”, which limits the public’s ability to utilize the potential of computer technology. A policy vacuum is an absence of officially recognized public standards for how to utilize a resource. One often finds a policy vacuum where there is cutting-edge technology that the public does not seem to have a use for. A current example of a policy vacuum might be related to green technology, which is subject to endless political debates. Even though the technology exists, it is unclear how the public will deploy those resources and gain benefits from it. Another example of a policy vacuum may exist in developing nations where modern technology is new and not well-understood. In such a case, the country may not see the need for the new resource and thus not capitalize on its potential. Moor also introduces the notion of a “conceptual vacuum” early in his paper. Although a conceptual vacuum occurs in concert with a policy vacuum, the conceptual vacuum invariably occurs before and causes the policy vacuum. That is, without a “coherent conceptual framework within which to formulate a policy for action”, there can be no policy for action, which produces the inevitable result of a policy vacuum. A coherent conceptual framework is necessary because one cannot, for instance, explain the benefits of high-speed broadband to the leader of a developing country who has never used, let alone heard of, the internet. Another example of a conceptual vacuum might be, with respect to the United States, is the debate over the use of renewable energy and “green” technology. The consequences of a change to alternative sources of energy might not be conceptually compatible with a view of the world that does not admit of the consequences of global climate change. Thus, a policy vacuum results when those who are in charge of making decisions cannot comprehend the conceptual basis of their decisions. Further into his essay, Moor begins to establish a basis for comparing the “Computer Revolution” with the “Industrial Revolution”. The reason for this comparison probably lies in the ethical dilemmas evoked by the Industrial Revolution, which Moor is trying to draw parallels with in our modern age. In one respect, the Computer Revolution is complete: the sense in which our lives have become thoroughly interconnected with computer technology (by means of laptop computers and mobile phones). Nevertheless, in a second sense, the Computer Revolution is not over: the sense in which computer technology has yet to fully develop and fully integrate with every ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“James Moor - Computer Ethics Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1407596-james-moor-computer-ethics
(James Moor - Computer Ethics Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/environmental-studies/1407596-james-moor-computer-ethics.
“James Moor - Computer Ethics Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/environmental-studies/1407596-james-moor-computer-ethics.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF James Moor - Computer Ethics

Computer crimes,ethics, and privacy

...of computers, and these crimes have had a ponderous impact on the moral values of the people, especially adolescents. In this paper we will attempt to highlight some computer crimes and explain how these crimes give rise to ethical issues. Also a detailed discussion will be made on the breach of privacy through computer crimes. The paper talks about computer technology and ethical issues it poses therefore it is perfectly related to the chapter. Computer Crimes Computer crimes are formally defined as crimes that involve a computer and a network (Moore, 4). Crimes that...
6 Pages(1500 words)Research Paper

Computer Ethics

...? Computer Ethics Introduction Computer ethics have been a fundamental issue since the emergence of computers. The rapid growth and development of computers has led to the evolution of how they can be used inappropriately (Cavalier, 2005). This is to the detriment of society and its values. Since the application of computers is widespread, its use and application in juvenile practices is also vast. With the evolution of computer use in our society, the storage of most of people’s has become digitalized. The information stored varies from highly sensitive to potentially harmless information about the user....
3 Pages(750 words)Essay

Computer ethics and law

...?Discusses Ethical and Moral Obligations of Computer Professional (BSC of conduct or IEEE-CS ACM Software Engineering of Ethics and Professional Practice) The code of ethics was developed by the Joint Task force on Software Engineering Ethics and Professional Practices to address the need for “appropriate set(s) of standards for professional practice of Software Engineering upon which industrial decisions, professional certification, and educational curricula can be based" (Gotterbarn & Rogerson 1997, p. 89). The IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice - often abbreviated as IEEE-CS/ACM SECEPP provides...
5 Pages(1250 words)Essay

Computer Ethics

...Question Computer ethics will change. Computer technology constitutes the remaking of society. This is the 2nd industrial revolution. This affects all major aspects of life and this will make our world small. The computer generation will have many faces, this will change radically everything we think and do. There will be radical changes in the work place. For instance, the typewriter has been replaced by computers. The fifty office employees have been reduced to ten skeleton-force employees using the computers as their clerical assistants. Many computer programs can now do the architects', engineers', accountants', and...
6 Pages(1500 words)Essay

Othello, the Moor of venice

...nothing" (3.3.76; 3.3.84). Without Iago, there is no doubt in his mind as to Desdemona's motivation. In the same scene, he remarks to himself, "when I love thee not, Chaos is come again" (3.3.91). This line gives us insight into Othello's heart. Desdemona is, to him, a goddess of civilization who transforms him from a despised Moor into an honored Venetian. Until Iago skews the balance, Othello's love for Desdemona is stable and grateful. Even when Iago plants seeds of doubt in his mind, Othello has trouble believing Iago's lies. He says, "I do not think but Desdemona's honest" (3.3.225). He demands proof, and threatens Iago with his wrath if these accusations are groundless. Once the physical evidence of the...
2 Pages(500 words)Essay

Computer Professional Ethics Journals

...Computer Professional Ethics Journal no. __ Computer Professional Ethics Journal no. __ One information privacy principle (under the Information Privacy Principles under the Privacy Act 1988) that can most affect a behavior or a computer scientist is the “access to records containing personal information.” In this entry it states that: Where a record-keeper has possession or control of a record that contains personal information, the individual concerned shall be entitled to have access to that record, except to the extent that the record-keeper is required or authorized to refuse to provide the individual with access to that record under the applicable provisions of any law of the Commonwealth that provides for access by persons... to...
2 Pages(500 words)Essay

Computer Ethics-Cyberbullying

...such as: its location independence; its secret perpetrator nature; the difficulty to trace or discover it; its ability to rapidly scale; and the lack of codes of conduct and procedures to deal with it (“Cyberbullying - Computer Ethics,” 2011). Finally, this paper argues that the best way to deal with cyberbullying could possibly be through promoting moral cyber-citizenship. This will be a civil process that would follow the success of organized cybercommunities such as the Free and Open Source Software community. References Alexander, L., & Moore, M. (2007, November 21). Deontological Ethics. (E. N. Zalta, Ed.)The Stanford Encyclopedia of Philosophy. Retrieved from...
8 Pages(2000 words)Thesis

Computer Ethics

... Computer Ethics How has the Internet changed the notion of community standards for determining if material is legally obscene? Do you think the community standards criterion can be preserved on the Internet? If so, explain how. If not, explain why. The Internet has not changed the notion of community standards for determining if material is legally obscene, nor can community standards criterion be preserved on the Internet. These points will be proved in the forthcoming subsections. Even the Supreme Court had difficulty trying to figure out how community standards would determine illegally obscene material on the Internet. According to Marzilli (2004), “The Supreme Court considered the issue of how...
2 Pages(500 words)Essay

Computer Ethics

...Computer Ethics While the positive rights allow action, whether of a legal or moral nature, the negative rights permit the inaction of any legal or moral character (Gavison, 2000). While an individual has a negative right, then he holds the right from being subjected to an action of another person or a group of people. While an individual holds a negative right, then he is set free from being coerced, or forced by any authority or individual to a given indulgence. The individual holding a negative right is protected from being abused by the authority or the other individuals (Hodgson, 1998). On the other hand, when an individual holds a positive right, then, the right holds others responsible to act in...
2 Pages(500 words)Essay

Computer Ethics

...Computer Ethics Computer Ethics Computer Ethics Issues Two computer ethics issues related with the use of ransomware includes the issue of privacy and criminal behavior. Individuals involved with the industry of computer sciences are not allowed to gain access to information or enter in another individual’s computer until he/she has the authority to do so. When individuals gain access to unauthorized information, they use it in different ways for their own self interest while ignoring the interest of the society. The utilitarian rule of ethics state that...
2 Pages(500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic James Moor - Computer Ethics for FREE!

Contact Us