Abstract
Computing technologies and artifacts are increasingly integrated into most aspects of our professional, social, and private lives. One consequence of this growing ubiquity of computing is that it can have significant ethical implications that computing professionals need to be aware of. The relationship between ethics and computing has long been discussed. However, this is the first comprehensive survey of the mainstream academic literature of the topic. Based on a detailed qualitative analysis of the literature, the article discusses ethical issues, technologies that they are related to, and ethical theories, as well as the methodologies that the literature employs, its academic contribution, and resulting recommendations. The article discusses general trends and argues that the time has come for a transition to responsible research and innovation to ensure that ethical reflection of computing has practical and manifest consequences.
- Alison Adam. 2001. Computer ethics in a different voice. Information and Organization 11, 4, 235--261.Google ScholarCross Ref
- M. Al Ameen, J. Liu, and K. Kwak. 2012. Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems 36, 1, 93--101. Google ScholarDigital Library
- Bill Albrecht, Ken Christensen, Venu Dasigi, Jim Huggins, and Jody Paul. 2012. The pledge of the computing professional: Recognizing and promoting ethics in the computing professions. SIGCAS Computers and Society 42, 1, 6--8. DOI:http://dx.doi.org/10.1145/2422512.2422513 Google ScholarDigital Library
- C. Allen, I. Smit, and W. Wallach. 2005. Artificial morality: Top-down, bottom-up, and hybrid approaches. Ethics and Information Technology 7, 3, 149--155. Google ScholarDigital Library
- P. J. Allen and L. D. Roberts. 2010. The ethics of outsourcing online survey research. International Journal of Technoethics 1, 3, 35--48. DOI:http://dx.doi.org/10.4018/jte.2010070104 Google ScholarDigital Library
- F. Allhoff, P. Lin, J. Moor, and J. Weckert. 2010. Ethics of human enhancement: 25 questions & answers. Studies in Ethics, Law, and Technology 4, 1. DOI:http://dx.doi.org/10.2202/1941-6008.1110Google ScholarCross Ref
- M. L. Anderson. 2005. Why is AI so scary? Artificial Intelligence 169, 2, 201--208. Google ScholarDigital Library
- M. Angrist. 2009. Eyes wide open: The personal genome project, citizen science and veracity in informed consent. Personalized Medicine 6, 691--699.Google ScholarCross Ref
- Aristotle. 2007. The Nicomachean Ethics. Filiquarian Publishing, LLC, Minneapolis, MN.Google Scholar
- S. A. Bagüés, A. Zeidler, C. Klein, F. Valdivielso, and R. Matias. 2010. Enabling personal privacy for pervasive computing environments. Journal of Universal Computer Science 16, 341--371.Google Scholar
- D. Banerjee, T. P. Cronan, and T. W. Jones. 1998. Modeling IT ethics: A study in situational ethics. MIS Quarterly 22, 1, 31--60. Google ScholarDigital Library
- Jeremy Bentham. 1789. An Introduction to the Principles of Morals and Legislation. Dover Publications Inc., Mineola, NY.Google Scholar
- Sebastian Boell and Dubravka Cecez-Kecmanovic. 2014. A hermeneutic approach for conducting literature reviews and literature searches. Communications of the Association for Information Systems 34, 1.Google ScholarCross Ref
- K. W. Bowyer. 2004. Face recognition technology: Security versus privacy. IEEE Technology and Society Magazine 23, 1, 9--20. DOI:http://dx.doi.org/10.1109/MTAS.2004.1273467Google ScholarCross Ref
- P. Brey. 2005. Freedom and privacy in ambient intelligence. Ethics and Information Technology 7, 3, 157--166. Google ScholarDigital Library
- Philip Brey and Johnny H. Soraker. 2009. Philosophy of computing and information technology. In Dov M. Gabbay, Anthonie W. M. Meijers, John Woods, and Paul Thagard (Eds). Philosophy of Technology and Engineering Sciences: 9. North Holland, 1341--1408.Google Scholar
- S. Brown, N. Hine, A. Sixsmith, and P. Garner. 2004. Care in the community. BT Technology Journal 22, 3, 56--64. Google ScholarDigital Library
- Elizabeth A. Buchanan and Erin E. Hvizdak. 2009. Online survey tools: Ethical and methodological concerns of human research ethics committees. Journal of Empirical Research on Human Research Ethics 4, 2, 37--48.Google ScholarCross Ref
- T. Bynum. 2008a. Norbert Wiener and the rise of information ethics. In Jeroen van den Hoven and John Weckert (Eds). Information Technology and Moral Philosophy. Cambridge University Press, New York, NY, 8--25.Google Scholar
- Terrell Bynum. 2008b. Computer and information ethics. In Stanford Encyclopedia of Philosophy. Retrieved January 14, 2016 from http://plato.stanford.edu/entries/ethics-computer/.Google Scholar
- Terrell Ward Bynum and Simon Rogerson. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. WileyBlackwell, Hoboken, NJ. Google ScholarDigital Library
- C. Cary, H. J. Wen, and P. Mahatanankoon. 2003. Data mining: Consumer privacy, ethical policy, and systems development practices. Human Systems Management 22, 4, 157--168.Google ScholarCross Ref
- W. B. Chiou, P. H. Wan, and C. S. Wan. 2012. A new look at software piracy: Soft lifting primes an inauthentic sense of self, prompting further unethical behavior. International Journal of Human Computer Studies 70, 2, 107--115. Google ScholarDigital Library
- Suparna Choudhury, Jennifer R. Fishman, Michelle L. McGowan, and Eric T. Juengst. 2014. Big data, open science and the brain: lessons learned from genomics. Frontiers in Human Neuroscience 8, 239. DOI:http://dx.doi.org/10.3389/fnhum.2014.00239Google ScholarCross Ref
- Ellen Wright Clayton. 2005. Informed consent and biobanks. Journal of Law, Medicine & Ethics 33, 1, 15--21. DOI:http://dx.doi.org/10.1111/j.1748-720X.2005.tb00206.xGoogle ScholarCross Ref
- Eli Cohen and Larry Cornwell. 1989. A question of ethics: Developing information system ethics. Journal of Business Ethics 8, 6, 431--437.Google ScholarCross Ref
- D. Collingridge. 1980. The Social Control of Technology. Palgrave Macmillan, Basingstoke, UK.Google Scholar
- Mary L. Cummings. 2006. Integrating ethics in design through the value-sensitive design approach. Science and Engineering Ethics 12, 4, 701--715. DOI:http://dx.doi.org/10.1007/s11948-006-0065-0Google ScholarCross Ref
- J. K. Estell and K. Christensen. 2011. The need for a new graduation rite of passage. Communications of the ACM 54, 2, 113--115. Google ScholarDigital Library
- Joshua Fairfield and Hannah Shtein. 2014. Big data, big problems: Emerging issues in the ethics of data science and journalism. Journal of Mass Media Ethics 29, 1, 38--51. DOI:http://dx.doi.org/10.1080/08900523.2014.863126Google ScholarCross Ref
- D. Feil-Seifer and M. J. Mataric. 2011. Socially assistive robotics: Ethical issues related to technology. IEEE Robotics and Automation Magazine 18, 1, 24--31.Google ScholarCross Ref
- Luciano Floridi. 2010. Information ethics. In Luciano Floridi (Ed.). The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press, New York, NY, 77--97.Google Scholar
- Luciano Floridi. 2011. The informational nature of personal identity. Minds and Machines 21, 4, 549--566. DOI:http://dx.doi.org/10.1007/s11023-011-9259-6 Google ScholarDigital Library
- Luciano Floridi. 2013. The Philosophy of Information Reprint edition., Oxford University Press, Oxford, UK.Google Scholar
- Luciano Floridi and J. W. Sanders. 2004. On the morality of artificial agents. Minds and Machines 14, 3, 349--379. DOI:http://dx.doi.org/10.1023/B:MIND.0000035461.63578.9d Google ScholarDigital Library
- M. Friedewald, O. D. Costa, Y. Punie, P. Alahuhta, and S. Heinonen. 2005. Perspectives of ambient intelligence in the home environment. Telematics and Informatics 22, 3, 221--238. Google ScholarDigital Library
- Batya Friedman, Peter Kahn, and Alan Borning. 2008. Value sensitive design and information systems. In Ken Himma and Herman Tavani (Eds.). The Handbook of Information and Computer Ethics. Wiley Blackwell, Hoboken, NJ, 69--102.Google Scholar
- General Medical Council. 2008. Consent: patients and doctors making decisions together. Retrieved January 14, 2016 from http://www.gmc-uk.org/guidance/ethical_guidance/consent_guidance_index.asp.Google Scholar
- Carol Gilligan. 1990. In a Different Voice: Psychological Theory and Women's Development. Harvard University Press, Cambridge, MA.Google Scholar
- C. Girvan and T. Savage. 2012. Ethical considerations for educational research in a virtual world. Interactive Learning Environments 20, 3, 239--251.Google ScholarCross Ref
- Emilie Steele Giustozzi and Betsy Van derVeer Martens. 2011. The new competitive intelligence agents: “Programming” competitive intelligence ethics into corporate cultures. Webology 8, 2.Google Scholar
- M. E. Gorman. 2001. Turning students into ethical professionals. IEEE Technology and Society Magazine 20, 4, 21--27. DOI:http://dx.doi.org/10.1109/44.974504Google ScholarCross Ref
- Don Gotterbarn, Keith Miller, and Simon Rogerson. 1999. Computer society and ACM approve software engineering code of ethics. Computer 32, 10, 84--88.Google ScholarCross Ref
- Armin Grunwald. 2010. From speculative nanoethics to explorative philosophy of nanotechnology. Nanoethics 4, 2, 91--101. DOI:http://dx.doi.org/10.1007/s11569-010-0088-5Google ScholarCross Ref
- Amy Gutmann. 2011. The ethics of synthetic biology: Guiding principles for emerging technologies. Hastings Center Report 41, 4, 17--22.Google ScholarCross Ref
- K. L. Hacker, S. M. Mason, and E. L. Morgan. 2009. Digital disempowerment in a network society. International Journal of Electronic Government Research 5, 2, 57--71.Google ScholarCross Ref
- C. Heeney. 2012. Breaching the contract? Privacy and the UK census. Information Society 28, 5, 316--328. Google ScholarDigital Library
- E. Hildt. 2010. Brain--Computer interaction and medical access to the brain: Individual, social and ethical implications. Studies in Ethics, Law, and Technology 4, 3.Google Scholar
- K. E. Himma. 2009. Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? Ethics and Information Technology 11, 1, 19--29. Google ScholarDigital Library
- K. E. Himma and H. T. Tavani. 2008. The handbook of information and computer ethics. Wiley, Hoboken, NJ. Google ScholarDigital Library
- Jeroen van den Hoven and John Weckert (Eds.) 2008. Information Technology and Moral Philosophy. Cambridge University Press, New York, NY. Google ScholarDigital Library
- Gordon Hull. 2012. Robert Merges: Justifying intellectual property. Ethics and Information Technology 14, 2, 169--177. DOI:http://dx.doi.org/10.1007/s10676-012-9287-9 Google ScholarDigital Library
- John P. A. Ioannidis. 2013. Informed consent, big data, and the oxymoron of research that is not research. American Journal of Bioethics 13, 4, 40--42. DOI:http://dx.doi.org/10.1080/15265161.2013.768864Google ScholarCross Ref
- Deborah G. Johnson. 1985. Computer Ethics. Prentice-Hall, Upper Saddle River, NJ. Google ScholarDigital Library
- Deborah G. Johnson and Helen Nissenbaum. 1995. Computers, Ethics and Social Values. Pearson, New York, NY.Google Scholar
- Damien Joseph, Kok-Yee Ng, Christine Koh, and Soon Ang. 2007. Turnover of information technology professionals: a narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly 31, 3, 547--577. Google ScholarDigital Library
- Immanuel Kant. 1797. Grundlegung zur Metaphysik der Sitten. Reclam, Ditzingen.Google Scholar
- Immanuel Kant. 1788. Kritik der praktischen Vernunft. Reclam, Ditzingen.Google Scholar
- Bonnie Kaplan and Sergio Litewka. 2008. Ethical challenges of telemedicine and telehealth. Cambridge Quarterly of Healthcare Ethics 17, 4, 401--416.Google ScholarCross Ref
- B. M. Kious. 2001. The Nuremberg Code: its history and implications. Princeton Journal of Bioethics 4, 7--19.Google Scholar
- Aleksandra K. Krotoski. 2012. Data-driven research: Open data opportunities for growing knowledge, and ethical issues that arise. Insights: the UKSG Journal 25, 1, 28--32. DOI:http://dx.doi.org/10.1629/2048-7754.25.1.28Google Scholar
- V. Lally, M. Sharples, F. Tracy, N. Bertram, and S. Masters. 2012. Researching the ethical dimensions of mobile, ubiquitous and immersive technology enhanced learning (MUITEL): A thematic review and dialogue. Interactive Learning Environments 20, 3, 217--238.Google ScholarCross Ref
- Bruno Latour and Couze Venn. 2002. Morality and technology: The end of the means. Theory Culture Society 19, 5--6, 247--260. DOI:http://dx.doi.org/10.1177/026327602761899246Google ScholarCross Ref
- M. Li and S. Buchthal. 2012. Advisory services in the virtual world: An empowerment perspective. Electronic Commerce Research 12, 1, 53--96. Google ScholarDigital Library
- L. Little and P. Briggs. 2009. Pervasive healthcare: The elderly perspective. In 2nd International Conference on PErvasive Technologies Related to Assistive Environments (PETRA’09). Corfu. Google ScholarDigital Library
- Stine Lomborg and Anja Bechmann. 2014. Using APIs for data collection on social media. Inf. Soc. 30, 4 (2014), 256--265. DOI:http://dx.doi.org/10.1080/01972243.2014.915276 Google ScholarDigital Library
- David Lyon. 2003. Surveillance as social sorting: Privacy, Risk, and Digital Discrimination. Routledge, London, UK.Google Scholar
- Alasdair C. MacIntyre. 2007. After Virtue: A Study in Moral Theory. University of Notre Dame Press, Notre Dame, IN.Google Scholar
- John Mack. 2004. Beyond HIPAA: Ethics in the e-health arena. Ethical guidelines help ensure that credible health information appears on the Internet. Healthcare Executive 19, 5, 32--3.Google Scholar
- Phil Macnaghten and Richard Owen. 2011. Good governance for geoengineering. Nature 479, 7373, 293. DOI:http://dx.doi.org/10.1038/479293aGoogle ScholarCross Ref
- N. Manders-Huits. 2010. Practical versus moral identities in identity management. Ethics and Information Technology 12, 1, 43--55. Google ScholarCross Ref
- Alexander Markowetz, Konrad Błaszkiewicz, Christian Montag, Christina Switala, and Thomas E. Schlaepfer. 2014. Psycho-informatics: Big data shaping modern psychometrics. Medical Hypotheses 82, 4, 405--411. DOI:http://dx.doi.org/10.1016/j.mehy.2013.11.030Google ScholarCross Ref
- M. Lynne Markus and Kevin Mentzer. 2014. Foresight for a responsible future with ICT. Information System Frontiers 1--16. DOI:http://dx.doi.org/10.1007/s10796-013-9479-9 Google ScholarDigital Library
- Maris Martinsons, et al. 2009. The Ethics of IT Professionals in Japan and China. Journal of the Association for Information Systems 10, 11, 834--859.Google ScholarCross Ref
- A. Marturano. 2002. The role of metaethics and the future of computer ethics. Ethics and Information Technology 4, 1, 71--78. Google ScholarDigital Library
- M. T. McFall. 2012. Real character-friends: Aristotelian friendship, living together, and technology. Ethics and Information Technology 14, 3, 221--230.Google ScholarCross Ref
- K. W. Miller. 2009. Joining the conversation about IT ethics. IT Professional 11, 5, 48--50. Google ScholarDigital Library
- John Stuart Mill. 1861. Utilitarianism (2nd rev. ed)., Hackett Publishing Co, Inc., Cambridge, MA.Google Scholar
- John Mingers. 2001. Combining IS research methods: Towards a pluralist methodology. Information Systems Research 12, 3, 240--259. DOI:http://dx.doi.org/Article Google ScholarDigital Library
- John Mingers and Geoff Walsham. 2010. Towards ethical information systems: The contribution of discourse ethics. MIS Quarterly 34, 4, 833--854. Google ScholarDigital Library
- C. Mitcham. 2009. Convivial software: An end-user perspective on free and open source software. Ethics and Information Technology 11, 4, 299--310. Google ScholarDigital Library
- Brent Mittelstadt and Luciano Floridi. 2015. The ethics of big data: Current and foreseeable issues in biomedical contexts. Science and Engineering Ethics online firsts (2015). DOI:http://dx.doi.org/10.1007/s11948-015-9652-2Google Scholar
- M. A. Mizani and N. Baykal. 2007. A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example. Journal of Medical Ethics 33, 12, 695--698.Google ScholarCross Ref
- Emilio Mordini and Corinna Ottolini. 2007. Body identification, biometrics and medicine: Ethical and social considerations. Annali dell’Istituto Superiore di Sanita 43, 1, 51--60.Google Scholar
- Arash Mostaghimi and Bradley H. Crotty. 2011. Professionalism in the digital age. Annals of Internal Medicine 154, 8, 560--W197.Google ScholarCross Ref
- Saskia K. Nagel and Hartmut Remmers. 2012. Self-perception and self-determination in surveillance conditions. American Journal of Bioethics 12, 9, 53--55.Google ScholarCross Ref
- Björn Niehaves and Ralf Plattfaut. 2014. Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide. European Journal of Information Systems 23, 6, 708--726. DOI:http://dx.doi.org/10.1057/ejis.2013.19Google ScholarCross Ref
- Niels Nijsingh and Marcus Duwell. 2009. Interdisciplinary, applied ethics and social science. In Paul Sollie and Marcus Düwell (Eds.). Evaluating New Technologies: Methodological Problems for the Ethical Assessment of Technology Developments. The International Library of Ethics, Law and Technology. Springer, New York, NY, 79--92.Google Scholar
- Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Social Science Research Network, Rochester, NY.Google Scholar
- Andre Oboler, K. Welsh, and L. Cruz. 2012. The danger of big data: Social media as computational social science. First Monday 17, 7.Google Scholar
- Govindan Parayil. 2005. The digital divide and increasing returns: Contradictions of informational capitalism. The Information Society 21, 1, 41--51.Google ScholarCross Ref
- Dinah Payne and Brett J. L. Landry. 2006. A uniform code of ethics: Business and IT professional ethics. Communications of the ACM 49, 11, 80--84. Google ScholarDigital Library
- J. A. Quilici-Gonzalez, G. Kobayashi, M. C. Broens, and M. E. Q. Gonzalez. 2010. Ubiquitous computing: Any ethical implications? International Journal of Technoethics 1, 3, 11--23. DOI:http://dx.doi.org/10.4018/jte.2010070102 Google ScholarDigital Library
- U. Rashid, H. Schmidtke, and N. Woo. 2007. Managing disclosure of personal health information in smart home healthcare. In 4th International Conference on Universal Access in Human-Computer Interaction (UAHCI’07). Beijing. Google ScholarDigital Library
- Frantz Rowe. 2014. What literature review is not: diversity, boundaries and recommendations. European Journal of Information Systems 23, 3, 241--255. DOI:http://dx.doi.org/http://dx.doi.org.proxy.library.dmu.ac.uk/10.1057/ejis.2014.7Google ScholarCross Ref
- Bertrand Russell. 2001. The Problems of Philosophy. Oxford University Press, New York, NY.Google Scholar
- Fariba Sadri. 2011. Ambient intelligence: A survey. ACM Computing Surveys 43, 4, 36.1--36.66. DOI:http://dx.doi.org/10.1145/1978802.1978815 Google ScholarDigital Library
- P. Salvini, E. Datteri, C. Laschi, and P. Dario. 2008. Scientific models and ethical issues in hybrid bionic systems research. AI and Society 22, 3, 431--448. DOI:http://dx.doi.org/10.1007/s00146-007-0158-6 Google ScholarDigital Library
- Suprateek Sarker, Mark Fuller, and Sutirtha Chatterjee. 2009. Ethical information systems development: A Baumanian postmodernist perspective. Journal of the Association for Information Systems 10, 11, 787--815.Google ScholarCross Ref
- Geoff Sayre-McCord. 2014. Metaethics. In Edward N. Zalta (Ed.). The Stanford Encyclopedia of Philosophy. Retrieved January 14, 2016 from http://plato.stanford.edu/entries/metaethics/.Google Scholar
- B. W. Schermer. 2011. The limits of privacy in automated profiling and data mining. Computer Law and Security Review 27, 1, 45--52.Google ScholarCross Ref
- Ferdinand Schoeman. 1984. Privacy and intimate information. In Philosophical dimensions of privacy: An anthology, Fertinand Schoeman (Ed.). Cambridge University Press, Cambridge. 403--408.Google Scholar
- U. Schultze and R. O. Mason. 2012. Studying cyborgs: Re-examining internet studies as human subjects research. Journal of Information Technology 27, 4, 301--312.Google ScholarCross Ref
- Richard A. Spinello and Herman T. Tavani. 2004. Intellectual Property Rights in a Networked World: Theory and Practice. Information Science Publishing, Hershey, PA. Google ScholarDigital Library
- Richard A. Spinello and Herman T. Tavani. 2001. Readings in CyberEthics. Jones and Bartlett Publishers, Inc., Burlington, MA. Google ScholarDigital Library
- Bernd Stahl. 2012. Morality, Ethics, and Reflection: A categorization of normative IS research. Journal of the Association for Information Systems 13, 8.Google ScholarCross Ref
- Jack Stilgoe, Richard Owen, and Phil Macnaghten. 2013. Developing a framework for responsible innovation. Research Policy 42, 9, 1568--1580. DOI:http://dx.doi.org/10.1016/j.respol.2013.05.008Google ScholarCross Ref
- E. Stip and V. Rialle. 2005. Environmental cognitive remediation in schizophrenia: Ethical implications of “smart home” technology. Canadian Journal of Psychiatry-Revue Canadienne De Psychiatrie 50, 5, 281--291.Google ScholarCross Ref
- J. P. Sullins. 2005. Ethics and artificial life: From modeling to moral agents. Ethics and Inforvvmation Technology 7, 3, 139--148. Google ScholarDigital Library
- David R. Tranfield, David Denyer, and Palminder Smart. 2003. Towards a methodology for developing evidence-informed management knowledge by means of systematic review. British Journal of Management 14, 207--222.Google ScholarCross Ref
- J. van den Hoven. 2008. Information technology, privacy, and the protection of personal data. In Information Technology and Moral Philosophy. Cambridge Studies in Philosophy and Public Policy. Cambridge University Press, New York, NY. Google ScholarDigital Library
- L. Van Wel and L. Royakkers. 2004. Ethical issues in web data mining. Ethics and Information Technology 6, 2, 129--140. Google ScholarDigital Library
- C. K. Varnhagen et al. 2005. How informed is online informed consent? Ethics & Behavior 15, 1, 37--48.Google ScholarCross Ref
- Rene Von Schomberg (Ed.): 2011. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields. Publication Office of the European Union, Luxembourg.Google Scholar
- Ken Wakita and Toshiyuki Tsurumi. 2007. Finding community structure in mega-scale social networks: [Extended Abstract]. In Proceedings of the 16th International Conference on World Wide Web (WWW’07). ACM, New York, NY, 1275--1276. DOI:http://dx.doi.org/10.1145/1242572.1242805 Google ScholarDigital Library
- W. Wallach. 2008. Implementing moral decision making faculties in computers and robots. AI and Society 22, 4, 463--475. Google ScholarDigital Library
- D. M. Wasieleski and M. Gal-Or. 2008. An enquiry into the ethical efficacy of the use of radio frequency identification technology. Ethics and Information Technology 10, 1, 27--40. Google ScholarDigital Library
- John Weckert and Richard Lucas (Eds.). 2013. Professionalism in the Information and Communication Technology Industry. The Australian National University, Canberra, Australia. Google ScholarDigital Library
- Joseph Weizenbaum. 1977. Computer Power and Human Reason: From Judgement to Calculation. W. H. Freeman & Co Ltd. Google ScholarDigital Library
- Y. H. Weng. 2010. Beyond robot ethics: On a legislative consortium for social robotics. Advanced Robotics 24, 13, 1919--1926.Google ScholarCross Ref
- Alan F. Westin. 1970. Privacy and Freedom. The Bodley Head, London, UK.Google Scholar
- Norbert Wiener. 1964. God and Golem, Inc. A Comment on Certain Points where Cybernetics Impinges on Religion. MIT Press, Cambridge, MA.Google Scholar
- Norbert Wiener. 1954. The Human Use of Human Beings. Doubleday, New York, NY.Google Scholar
- David Wilkinson and Mike Thelwall. 2011. Researching personal information on the public web methods and ethics. Social Science Computer Review 29, 4, 387--401. DOI:http://dx.doi.org/10.1177/0894439310378979 Google ScholarDigital Library
- T. J. Williamson. 2010. Predicting building performance: The ethics of computer simulation. Building Research and Information 38, 4, 401--410. DOI:http://dx.doi.org/10.1080/09613218.2010.481204Google ScholarCross Ref
- D. Wright, S. Gutwirth, M. Friedewald, E. Vildjiounaite, and Y. Punie. 2008. Safeguards in a World of Ambient Intelligence. Springer-Verlag, New York, NY. Google ScholarDigital Library
- Aimee van Wynsberghe. 2013. Designing robots for care: Care centered value-sensitive design. Science and Engineering Ethics 19, 2, 407--433.Google ScholarCross Ref
- Joy Y. Zhang, Claire Marris, and Nikolas Rose. 2011. The transnational governance of synthetic biology—Scientific uncertainty, cross-borderness and the “art” of governance. London School of Economics and Political Science, London, UK.Google Scholar
- M. Zimmer. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics and Information Technology 12, 4, 313--325. Google ScholarDigital Library
Index Terms
- The Ethics of Computing: A Survey of the Computing-Oriented Literature
Recommendations
Flourishing Ethics
This essay describes a new ethical theory that has begun to coalesce from the works of several scholars in the international computer ethics community. I call the new theory Flourishing Ethics' because of its Aristotelian roots, though it also includes ...
Luciano Floridi's philosophy of information and information ethics: Critical reflections and the state of the art
I describe the emergence of Floridi's philosophy of information (PI) and information ethics (IE) against the larger backdrop of Information and Computer Ethics (ICE). Among their many strengths, PI and IE offer promising metaphysical and ethical ...
Moral luck and computer ethics: Gauguin in cyberspace
I argue that the problem of `moral luck' is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its `logical malleability', leads to ever greater levels of complexity, unreliability ...
Comments