skip to main content
article
Free Access

Computing and accountability

Published:02 January 1994Publication History
First page image

References

  1. 1 Borning, A. Computer syustem reliability and nuclear war. Commun. ACM 30, 2 (1987), 112-131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Clement, A. Computing at work: Empowering action by low-level users.' Commun. ACM 37, i (Jan. 1994) (this issue). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Corbato, F.J. On building systems that will fail. Communn. ACM 34, 9 (1991), 73-81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 De George, R. Ethical responsibilities of engineers in large organizations. The Pinto case. In Collective Responsibility, L., may and S. Hoffman, Eds., 1991, Rowman land Little field, pp. 151-166.Google ScholarGoogle Scholar
  5. 5 Feinberg, ,J. Collective responsibility. om Doing and Deserving. J. Feinberg. Ed., 1970. Princeton University Press, Princeton N.J.Google ScholarGoogle Scholar
  6. 6 Fitzgerald, S. Hospital Computer Predicts Patients' Chances of survival. The miami Herald, 1992, Miami, p.,6}Google ScholarGoogle Scholar
  7. 7 Hart, H.L.A. Punishment and Responsi bility. Clarendon Press, Oxford, 1968.Google ScholarGoogle Scholar
  8. 8 Hart, H.L.A and Ahonore, T.Causation and the Law. Second ed., Clarendon Press, Oxford, 1985.Google ScholarGoogle Scholar
  9. 9 Jacky, J. Safety-crotoca; cp,{itomg. Hazards, practice, standards and regulations. Unpublished manuscript. Universityu of Washington. 1989.Google ScholarGoogle Scholar
  10. 10 Johnson, D.G. and Mulvey, J.M. Com puter Decisions: Ethical Issujes of Respon sibility and Bias. Statistics and Operations Research Series, Princeton University, 1993.Google ScholarGoogle Scholar
  11. 11 Ladd., J. Computers and moral responsibility: A framework for an ethical; ama;usos. In the Inforamtion Web: Ethical and social Imnplications of Computer Networking, C.C. Gould, Ed. Westview Press, Boulder Colo. 1989.Google ScholarGoogle Scholar
  12. 12 Lefveson, N. Software safety: Why, what, and how. Comput. Surv. 18, 2 (1986), 125-163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 Leveson, N. and Turner, C. An Investigation of the Therac-25 accidents. Computer 26, 7 (1993), 18-41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14 Littlewood, B. and Strigum, L. The risks of software, Sci Am. (1992), 62- 75.Google ScholarGoogle Scholar
  15. 15 Mor, J. What is computer ethics? Metaphilosophy 16, 4 (1986), 266-275.Google ScholarGoogle Scholar
  16. 16 Neuman.P.G. Inside RISKS. Commun.ACM.Google ScholarGoogle Scholar
  17. 17 Nissenbaum, H. Should I copy my neighbor's software? Comput. Philos. To be published.Google ScholarGoogle Scholar
  18. 18 Parnas, D,, Schouwern, J. and Kwan, S.P. Evaluation of sagey-critical software. Commun. ACM 33, 6 (1990). 636-648. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19 Samuelson, P. Adapting Intellectual Preopery Law to New Technologies: A Case Study on Computer Programs. National Research Council, 1992.Google ScholarGoogle Scholar
  20. 20 Samuelson, P. Liability for defective information. Commun. ACM 36, i (1993), 21-26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21 Schuler, D. Community networks: Building a new partipatory medium cp,,im. ACM 37,1 (Jan. 1994) (this issue). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22 Smith, B. The limits of correctness. center for the study of languate and information, Rep. CSLI-85-35, Stanford, 1985.Google ScholarGoogle Scholar
  23. 23 Snapper, j.W. Responsinility for computer-based errors. Metaphilosophy 16 (1985), 289-295.Google ScholarGoogle ScholarCross RefCross Ref
  24. 24 Stallman, R.M. The GNU manifesto. GNU Emacs manual, 1987, 175-84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25 Thompson, S.mThe moral responsino;otu opf m,au hands. In Polotical Ethics and public office. Harvard University Press, Cambrige, Mas. 1987. pp.40-65.Google ScholarGoogle Scholar
  26. 26 Turkle, S. The second self. simon & Schster, Inc., New york, 1984.Google ScholarGoogle Scholar
  27. 27 Velasquez, m/ Why corporations are nbot norally responsible for anything thy do . In Collective Responibility, I., May and S. Hoffman, Eds. Rowman and Little field, 1991, pp. 111 131.Google ScholarGoogle Scholar
  28. 28 Weizenbaum, J. on the inpact of the computer on sociey, Science 176. 12 (1972), 609-614.Google ScholarGoogle Scholar

Index Terms

  1. Computing and accountability

            Recommendations

            Reviews

            Andrew Robert Huber

            Nissenbaums thesis is that computerization is undermining accountability. Accountability provides value to society by motivating those most likely and able to prevent risk and harm to society to do so. Accountability, of course, implies potential for liability to punishments, such as monetary damages. The paper discusses four reasons why computer systems are diminishing accountability: “Many hands”—responsibility is diluted because many people in many organizations work to produce the final system. Collective responsibility issues of this kind are neither unique to computer systems nor easily solved. Bugs—because software errors are viewed as inevitable, the attitude has developed that it is unreasonable to hold developers accountable for any imperfections. The computer as scapegoat—the tendency to blame the computer rather than a human. Ownership without liability—many software producers want ownership rights (such as copyright and patents) to software, but no responsibility or liability for it. Others want software to be free, or free of property rights. Few people in these discussions talk about responsibilities of ownership. Nissenbaum concludes with three recommendations for promoting accountability. First, separate accountability from liability. This distinction would help because it is the fear of monetary damages that makes avoiding accountability so desirable. Nissenbaum argues that for now, accountability is best addressed on a case-by-case basis. Second, clarify and promote a standard of care. Developers and organizations not following such standard practices would be negligent and held liable for certain kinds of errors. Third, impose strict liability on some software. Under strict liability, you are liable if your product harms me, even if you followed all reasonable standards of care. Other products that are consumer-oriented or that have a large impact on society or individuals are held to strict liability. Why shouldnt software be held to the same standard These recommendations would be difficult and controversial to implement—who defines the standards of care, certifies that they were followed, and so on Moreover, the recommendations only partially address the problem. Strict liability partly addresses the problem of ownership without liability, but perhaps by going too far in the opposite direction, and seems in conflict with using standards of care to address accountability for errors. But none of the recommendations do much to resolve the issues of collective responsibility or the computer as scapegoat. Nonetheless, the discussion is thoughtful and thought-provoking. The proposals should serve as a useful basis for further discussion and debate. Nissenbaum is to be commended for addressing a timely issue. This paper is worth reading by all.

            Access critical reviews of Computing literature here

            Become a reviewer for Computing Reviews.

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 37, Issue 1
              Jan. 1994
              95 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/175222
              Issue’s Table of Contents

              Copyright © 1994 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 2 January 1994

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader