skip to main content
article
Free Access

The XXII self-assessment: the ethics of computing

Published:01 November 1990Publication History
First page image

References

  1. 1 Parker. I).B., Swopc, S., and Baker B.N. Ethical Coflicts in Information and Computer Scienice, Technology, and Business. Final Report, Aug. 1988, prepared for Directorate for Bilogical, Behavioral, and Socail Studies, National Science Foundation, SRI Project 2609.Google ScholarGoogle Scholar
  2. 2 Parkcr, D.B. Ethical Conflicts in Computer Science and Technology. AFIPS Press, Arlilngton Va., 1981.Google ScholarGoogle Scholar
  3. 3 Parker, D.B,, Swope, S., and Baker B.N. Ethical conflicts in Information and Computer Science, Technology and Business. QED Information Sciences, Wellesley, Ms., 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 1 Bynum, T.W., (Ed.) Computers and ethics. Metaphilos., (Oct. 198.5).Google ScholarGoogle Scholar
  5. 2 DeDombal,F.T. Ethical considerations concerning computers in medicine in the 1980s.J. Med. Ethics 13, (Dec.1987), 179-184.Google ScholarGoogle Scholar
  6. 3 Earley, T.M., and Hulse, D. Humanizing a technological society: Eithical implications for the counselor. J. Couns,dev 64, (1984),334- 346.Google ScholarGoogle Scholar
  7. 4 Hoffman, W.M., and Mo{~re, .J.M., (EDs.) Ethics and the Management of Computer Technology. Oelgeschlager, Gunn & Hath, Cambridge, Ma. 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 5 Johnson, D. Computer Ethics. Prentice Hall, Englewood Cliffs, N,J., 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 6 Johnson D. G. Mapping ordillary morals onto the computer society: A pliilosophical perspective.J. Soc. Issues 40, (1984), 62-76.Google ScholarGoogle ScholarCross RefCross Ref
  10. 7 Johnson D., and Sliapper,.J.W. Ethical Issues the Use of Computers. Wadsworth Press, Behnolit, Ca., 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 8 Jonas, H. Technology and responsibility: Relfections on the new tasks of ethics. Soc. Res. 41), 1 (Jan. 1973), 31-54.Google ScholarGoogle Scholar
  12. 9 Kranzbcrg, M., (F,d.) Ethics i, a, Age of Pervasive Technology. Westview Press, Boulder, Co. 1980.Google ScholarGoogle Scholar
  13. 10 Moor, .l. What is .Computer Ethics?Google ScholarGoogle Scholar
  14. 11 Morrison, P.R. Lin~its to technocratic consciousrtess: Information technology and terrorism as exampie. Sci., 7),oh., amt l-t"um. Values 11, 4 (Apr. 1986), 4-16.Google ScholarGoogle ScholarCross RefCross Ref
  15. 12 Mumford, E., and Weir, M. Computer Systems in Work Design--The Ethics Method. Associated Business Press, l~ondon, 1979.Google ScholarGoogle Scholar

Index Terms

  1. The XXII self-assessment: the ethics of computing

      Recommendations

      Reviews

      James Clinton Spohrer

      The application of ethics in the computer industry is difficult for several reasons: (1) computer-mediated communications, such as electronic mail, alter relationships among people; (2) information stored electronically can be manipulated (for example, copied, distributed, accessed, or utilized) in fundamentally different ways than printed information; (3) efforts to keep information confidential conflict with the potentially larger benefit of sharing information; (4) the authenticity of easily manipulated electronic information is suspect; (5) as a field, the computer industry is relatively young; and (6) as computers proliferate, the boundary between professionals and skilled amateurs is blurred. This paper includes a copy of the ACM code of professional ethics and a series of scenarios describing ethical dilemmas. Readers are invited to work through the scenarios to help them explore and develop their ability to make decisions that are consistent with their own personal code of professional conduct. The 15 scenarios deal with a wide variety of situations including a computer scientist accepting a grant on a possibly unachievable program, a computer hacker accessing commercial computer services, computer users sharing software inadvertently, programmers using other programs as models for their own products, instructors using students to test instructional software, and an information security manager monitoring electronic mail. Readers can compare their responses and reasoning about the scenarios to those obtained from a panel. All computer professionals may find this paper valuable.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 33, Issue 11
        Nov. 1990
        123 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/92755
        Issue’s Table of Contents

        Copyright © 1990 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 November 1990

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader