skip to main content
survey
Open Access

The Ethics of Computing: A Survey of the Computing-Oriented Literature

Published:22 February 2016Publication History
Skip Abstract Section

Abstract

Computing technologies and artifacts are increasingly integrated into most aspects of our professional, social, and private lives. One consequence of this growing ubiquity of computing is that it can have significant ethical implications that computing professionals need to be aware of. The relationship between ethics and computing has long been discussed. However, this is the first comprehensive survey of the mainstream academic literature of the topic. Based on a detailed qualitative analysis of the literature, the article discusses ethical issues, technologies that they are related to, and ethical theories, as well as the methodologies that the literature employs, its academic contribution, and resulting recommendations. The article discusses general trends and argues that the time has come for a transition to responsible research and innovation to ensure that ethical reflection of computing has practical and manifest consequences.

References

  1. Alison Adam. 2001. Computer ethics in a different voice. Information and Organization 11, 4, 235--261.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. Al Ameen, J. Liu, and K. Kwak. 2012. Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems 36, 1, 93--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bill Albrecht, Ken Christensen, Venu Dasigi, Jim Huggins, and Jody Paul. 2012. The pledge of the computing professional: Recognizing and promoting ethics in the computing professions. SIGCAS Computers and Society 42, 1, 6--8. DOI:http://dx.doi.org/10.1145/2422512.2422513 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Allen, I. Smit, and W. Wallach. 2005. Artificial morality: Top-down, bottom-up, and hybrid approaches. Ethics and Information Technology 7, 3, 149--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. J. Allen and L. D. Roberts. 2010. The ethics of outsourcing online survey research. International Journal of Technoethics 1, 3, 35--48. DOI:http://dx.doi.org/10.4018/jte.2010070104 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Allhoff, P. Lin, J. Moor, and J. Weckert. 2010. Ethics of human enhancement: 25 questions & answers. Studies in Ethics, Law, and Technology 4, 1. DOI:http://dx.doi.org/10.2202/1941-6008.1110Google ScholarGoogle ScholarCross RefCross Ref
  7. M. L. Anderson. 2005. Why is AI so scary? Artificial Intelligence 169, 2, 201--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Angrist. 2009. Eyes wide open: The personal genome project, citizen science and veracity in informed consent. Personalized Medicine 6, 691--699.Google ScholarGoogle ScholarCross RefCross Ref
  9. Aristotle. 2007. The Nicomachean Ethics. Filiquarian Publishing, LLC, Minneapolis, MN.Google ScholarGoogle Scholar
  10. S. A. Bagüés, A. Zeidler, C. Klein, F. Valdivielso, and R. Matias. 2010. Enabling personal privacy for pervasive computing environments. Journal of Universal Computer Science 16, 341--371.Google ScholarGoogle Scholar
  11. D. Banerjee, T. P. Cronan, and T. W. Jones. 1998. Modeling IT ethics: A study in situational ethics. MIS Quarterly 22, 1, 31--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jeremy Bentham. 1789. An Introduction to the Principles of Morals and Legislation. Dover Publications Inc., Mineola, NY.Google ScholarGoogle Scholar
  13. Sebastian Boell and Dubravka Cecez-Kecmanovic. 2014. A hermeneutic approach for conducting literature reviews and literature searches. Communications of the Association for Information Systems 34, 1.Google ScholarGoogle ScholarCross RefCross Ref
  14. K. W. Bowyer. 2004. Face recognition technology: Security versus privacy. IEEE Technology and Society Magazine 23, 1, 9--20. DOI:http://dx.doi.org/10.1109/MTAS.2004.1273467Google ScholarGoogle ScholarCross RefCross Ref
  15. P. Brey. 2005. Freedom and privacy in ambient intelligence. Ethics and Information Technology 7, 3, 157--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Philip Brey and Johnny H. Soraker. 2009. Philosophy of computing and information technology. In Dov M. Gabbay, Anthonie W. M. Meijers, John Woods, and Paul Thagard (Eds). Philosophy of Technology and Engineering Sciences: 9. North Holland, 1341--1408.Google ScholarGoogle Scholar
  17. S. Brown, N. Hine, A. Sixsmith, and P. Garner. 2004. Care in the community. BT Technology Journal 22, 3, 56--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Elizabeth A. Buchanan and Erin E. Hvizdak. 2009. Online survey tools: Ethical and methodological concerns of human research ethics committees. Journal of Empirical Research on Human Research Ethics 4, 2, 37--48.Google ScholarGoogle ScholarCross RefCross Ref
  19. T. Bynum. 2008a. Norbert Wiener and the rise of information ethics. In Jeroen van den Hoven and John Weckert (Eds). Information Technology and Moral Philosophy. Cambridge University Press, New York, NY, 8--25.Google ScholarGoogle Scholar
  20. Terrell Bynum. 2008b. Computer and information ethics. In Stanford Encyclopedia of Philosophy. Retrieved January 14, 2016 from http://plato.stanford.edu/entries/ethics-computer/.Google ScholarGoogle Scholar
  21. Terrell Ward Bynum and Simon Rogerson. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. WileyBlackwell, Hoboken, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Cary, H. J. Wen, and P. Mahatanankoon. 2003. Data mining: Consumer privacy, ethical policy, and systems development practices. Human Systems Management 22, 4, 157--168.Google ScholarGoogle ScholarCross RefCross Ref
  23. W. B. Chiou, P. H. Wan, and C. S. Wan. 2012. A new look at software piracy: Soft lifting primes an inauthentic sense of self, prompting further unethical behavior. International Journal of Human Computer Studies 70, 2, 107--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Suparna Choudhury, Jennifer R. Fishman, Michelle L. McGowan, and Eric T. Juengst. 2014. Big data, open science and the brain: lessons learned from genomics. Frontiers in Human Neuroscience 8, 239. DOI:http://dx.doi.org/10.3389/fnhum.2014.00239Google ScholarGoogle ScholarCross RefCross Ref
  25. Ellen Wright Clayton. 2005. Informed consent and biobanks. Journal of Law, Medicine & Ethics 33, 1, 15--21. DOI:http://dx.doi.org/10.1111/j.1748-720X.2005.tb00206.xGoogle ScholarGoogle ScholarCross RefCross Ref
  26. Eli Cohen and Larry Cornwell. 1989. A question of ethics: Developing information system ethics. Journal of Business Ethics 8, 6, 431--437.Google ScholarGoogle ScholarCross RefCross Ref
  27. D. Collingridge. 1980. The Social Control of Technology. Palgrave Macmillan, Basingstoke, UK.Google ScholarGoogle Scholar
  28. Mary L. Cummings. 2006. Integrating ethics in design through the value-sensitive design approach. Science and Engineering Ethics 12, 4, 701--715. DOI:http://dx.doi.org/10.1007/s11948-006-0065-0Google ScholarGoogle ScholarCross RefCross Ref
  29. J. K. Estell and K. Christensen. 2011. The need for a new graduation rite of passage. Communications of the ACM 54, 2, 113--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Joshua Fairfield and Hannah Shtein. 2014. Big data, big problems: Emerging issues in the ethics of data science and journalism. Journal of Mass Media Ethics 29, 1, 38--51. DOI:http://dx.doi.org/10.1080/08900523.2014.863126Google ScholarGoogle ScholarCross RefCross Ref
  31. D. Feil-Seifer and M. J. Mataric. 2011. Socially assistive robotics: Ethical issues related to technology. IEEE Robotics and Automation Magazine 18, 1, 24--31.Google ScholarGoogle ScholarCross RefCross Ref
  32. Luciano Floridi. 2010. Information ethics. In Luciano Floridi (Ed.). The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press, New York, NY, 77--97.Google ScholarGoogle Scholar
  33. Luciano Floridi. 2011. The informational nature of personal identity. Minds and Machines 21, 4, 549--566. DOI:http://dx.doi.org/10.1007/s11023-011-9259-6 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Luciano Floridi. 2013. The Philosophy of Information Reprint edition., Oxford University Press, Oxford, UK.Google ScholarGoogle Scholar
  35. Luciano Floridi and J. W. Sanders. 2004. On the morality of artificial agents. Minds and Machines 14, 3, 349--379. DOI:http://dx.doi.org/10.1023/B:MIND.0000035461.63578.9d Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. M. Friedewald, O. D. Costa, Y. Punie, P. Alahuhta, and S. Heinonen. 2005. Perspectives of ambient intelligence in the home environment. Telematics and Informatics 22, 3, 221--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Batya Friedman, Peter Kahn, and Alan Borning. 2008. Value sensitive design and information systems. In Ken Himma and Herman Tavani (Eds.). The Handbook of Information and Computer Ethics. Wiley Blackwell, Hoboken, NJ, 69--102.Google ScholarGoogle Scholar
  38. General Medical Council. 2008. Consent: patients and doctors making decisions together. Retrieved January 14, 2016 from http://www.gmc-uk.org/guidance/ethical_guidance/consent_guidance_index.asp.Google ScholarGoogle Scholar
  39. Carol Gilligan. 1990. In a Different Voice: Psychological Theory and Women's Development. Harvard University Press, Cambridge, MA.Google ScholarGoogle Scholar
  40. C. Girvan and T. Savage. 2012. Ethical considerations for educational research in a virtual world. Interactive Learning Environments 20, 3, 239--251.Google ScholarGoogle ScholarCross RefCross Ref
  41. Emilie Steele Giustozzi and Betsy Van derVeer Martens. 2011. The new competitive intelligence agents: “Programming” competitive intelligence ethics into corporate cultures. Webology 8, 2.Google ScholarGoogle Scholar
  42. M. E. Gorman. 2001. Turning students into ethical professionals. IEEE Technology and Society Magazine 20, 4, 21--27. DOI:http://dx.doi.org/10.1109/44.974504Google ScholarGoogle ScholarCross RefCross Ref
  43. Don Gotterbarn, Keith Miller, and Simon Rogerson. 1999. Computer society and ACM approve software engineering code of ethics. Computer 32, 10, 84--88.Google ScholarGoogle ScholarCross RefCross Ref
  44. Armin Grunwald. 2010. From speculative nanoethics to explorative philosophy of nanotechnology. Nanoethics 4, 2, 91--101. DOI:http://dx.doi.org/10.1007/s11569-010-0088-5Google ScholarGoogle ScholarCross RefCross Ref
  45. Amy Gutmann. 2011. The ethics of synthetic biology: Guiding principles for emerging technologies. Hastings Center Report 41, 4, 17--22.Google ScholarGoogle ScholarCross RefCross Ref
  46. K. L. Hacker, S. M. Mason, and E. L. Morgan. 2009. Digital disempowerment in a network society. International Journal of Electronic Government Research 5, 2, 57--71.Google ScholarGoogle ScholarCross RefCross Ref
  47. C. Heeney. 2012. Breaching the contract? Privacy and the UK census. Information Society 28, 5, 316--328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. E. Hildt. 2010. Brain--Computer interaction and medical access to the brain: Individual, social and ethical implications. Studies in Ethics, Law, and Technology 4, 3.Google ScholarGoogle Scholar
  49. K. E. Himma. 2009. Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? Ethics and Information Technology 11, 1, 19--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. K. E. Himma and H. T. Tavani. 2008. The handbook of information and computer ethics. Wiley, Hoboken, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Jeroen van den Hoven and John Weckert (Eds.) 2008. Information Technology and Moral Philosophy. Cambridge University Press, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Gordon Hull. 2012. Robert Merges: Justifying intellectual property. Ethics and Information Technology 14, 2, 169--177. DOI:http://dx.doi.org/10.1007/s10676-012-9287-9 Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. John P. A. Ioannidis. 2013. Informed consent, big data, and the oxymoron of research that is not research. American Journal of Bioethics 13, 4, 40--42. DOI:http://dx.doi.org/10.1080/15265161.2013.768864Google ScholarGoogle ScholarCross RefCross Ref
  54. Deborah G. Johnson. 1985. Computer Ethics. Prentice-Hall, Upper Saddle River, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Deborah G. Johnson and Helen Nissenbaum. 1995. Computers, Ethics and Social Values. Pearson, New York, NY.Google ScholarGoogle Scholar
  56. Damien Joseph, Kok-Yee Ng, Christine Koh, and Soon Ang. 2007. Turnover of information technology professionals: a narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly 31, 3, 547--577. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Immanuel Kant. 1797. Grundlegung zur Metaphysik der Sitten. Reclam, Ditzingen.Google ScholarGoogle Scholar
  58. Immanuel Kant. 1788. Kritik der praktischen Vernunft. Reclam, Ditzingen.Google ScholarGoogle Scholar
  59. Bonnie Kaplan and Sergio Litewka. 2008. Ethical challenges of telemedicine and telehealth. Cambridge Quarterly of Healthcare Ethics 17, 4, 401--416.Google ScholarGoogle ScholarCross RefCross Ref
  60. B. M. Kious. 2001. The Nuremberg Code: its history and implications. Princeton Journal of Bioethics 4, 7--19.Google ScholarGoogle Scholar
  61. Aleksandra K. Krotoski. 2012. Data-driven research: Open data opportunities for growing knowledge, and ethical issues that arise. Insights: the UKSG Journal 25, 1, 28--32. DOI:http://dx.doi.org/10.1629/2048-7754.25.1.28Google ScholarGoogle Scholar
  62. V. Lally, M. Sharples, F. Tracy, N. Bertram, and S. Masters. 2012. Researching the ethical dimensions of mobile, ubiquitous and immersive technology enhanced learning (MUITEL): A thematic review and dialogue. Interactive Learning Environments 20, 3, 217--238.Google ScholarGoogle ScholarCross RefCross Ref
  63. Bruno Latour and Couze Venn. 2002. Morality and technology: The end of the means. Theory Culture Society 19, 5--6, 247--260. DOI:http://dx.doi.org/10.1177/026327602761899246Google ScholarGoogle ScholarCross RefCross Ref
  64. M. Li and S. Buchthal. 2012. Advisory services in the virtual world: An empowerment perspective. Electronic Commerce Research 12, 1, 53--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. L. Little and P. Briggs. 2009. Pervasive healthcare: The elderly perspective. In 2nd International Conference on PErvasive Technologies Related to Assistive Environments (PETRA’09). Corfu. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Stine Lomborg and Anja Bechmann. 2014. Using APIs for data collection on social media. Inf. Soc. 30, 4 (2014), 256--265. DOI:http://dx.doi.org/10.1080/01972243.2014.915276 Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. David Lyon. 2003. Surveillance as social sorting: Privacy, Risk, and Digital Discrimination. Routledge, London, UK.Google ScholarGoogle Scholar
  68. Alasdair C. MacIntyre. 2007. After Virtue: A Study in Moral Theory. University of Notre Dame Press, Notre Dame, IN.Google ScholarGoogle Scholar
  69. John Mack. 2004. Beyond HIPAA: Ethics in the e-health arena. Ethical guidelines help ensure that credible health information appears on the Internet. Healthcare Executive 19, 5, 32--3.Google ScholarGoogle Scholar
  70. Phil Macnaghten and Richard Owen. 2011. Good governance for geoengineering. Nature 479, 7373, 293. DOI:http://dx.doi.org/10.1038/479293aGoogle ScholarGoogle ScholarCross RefCross Ref
  71. N. Manders-Huits. 2010. Practical versus moral identities in identity management. Ethics and Information Technology 12, 1, 43--55. Google ScholarGoogle ScholarCross RefCross Ref
  72. Alexander Markowetz, Konrad Błaszkiewicz, Christian Montag, Christina Switala, and Thomas E. Schlaepfer. 2014. Psycho-informatics: Big data shaping modern psychometrics. Medical Hypotheses 82, 4, 405--411. DOI:http://dx.doi.org/10.1016/j.mehy.2013.11.030Google ScholarGoogle ScholarCross RefCross Ref
  73. M. Lynne Markus and Kevin Mentzer. 2014. Foresight for a responsible future with ICT. Information System Frontiers 1--16. DOI:http://dx.doi.org/10.1007/s10796-013-9479-9 Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Maris Martinsons, et al. 2009. The Ethics of IT Professionals in Japan and China. Journal of the Association for Information Systems 10, 11, 834--859.Google ScholarGoogle ScholarCross RefCross Ref
  75. A. Marturano. 2002. The role of metaethics and the future of computer ethics. Ethics and Information Technology 4, 1, 71--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. M. T. McFall. 2012. Real character-friends: Aristotelian friendship, living together, and technology. Ethics and Information Technology 14, 3, 221--230.Google ScholarGoogle ScholarCross RefCross Ref
  77. K. W. Miller. 2009. Joining the conversation about IT ethics. IT Professional 11, 5, 48--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. John Stuart Mill. 1861. Utilitarianism (2nd rev. ed)., Hackett Publishing Co, Inc., Cambridge, MA.Google ScholarGoogle Scholar
  79. John Mingers. 2001. Combining IS research methods: Towards a pluralist methodology. Information Systems Research 12, 3, 240--259. DOI:http://dx.doi.org/Article Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. John Mingers and Geoff Walsham. 2010. Towards ethical information systems: The contribution of discourse ethics. MIS Quarterly 34, 4, 833--854. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. C. Mitcham. 2009. Convivial software: An end-user perspective on free and open source software. Ethics and Information Technology 11, 4, 299--310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Brent Mittelstadt and Luciano Floridi. 2015. The ethics of big data: Current and foreseeable issues in biomedical contexts. Science and Engineering Ethics online firsts (2015). DOI:http://dx.doi.org/10.1007/s11948-015-9652-2Google ScholarGoogle Scholar
  83. M. A. Mizani and N. Baykal. 2007. A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example. Journal of Medical Ethics 33, 12, 695--698.Google ScholarGoogle ScholarCross RefCross Ref
  84. Emilio Mordini and Corinna Ottolini. 2007. Body identification, biometrics and medicine: Ethical and social considerations. Annali dell’Istituto Superiore di Sanita 43, 1, 51--60.Google ScholarGoogle Scholar
  85. Arash Mostaghimi and Bradley H. Crotty. 2011. Professionalism in the digital age. Annals of Internal Medicine 154, 8, 560--W197.Google ScholarGoogle ScholarCross RefCross Ref
  86. Saskia K. Nagel and Hartmut Remmers. 2012. Self-perception and self-determination in surveillance conditions. American Journal of Bioethics 12, 9, 53--55.Google ScholarGoogle ScholarCross RefCross Ref
  87. Björn Niehaves and Ralf Plattfaut. 2014. Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide. European Journal of Information Systems 23, 6, 708--726. DOI:http://dx.doi.org/10.1057/ejis.2013.19Google ScholarGoogle ScholarCross RefCross Ref
  88. Niels Nijsingh and Marcus Duwell. 2009. Interdisciplinary, applied ethics and social science. In Paul Sollie and Marcus Düwell (Eds.). Evaluating New Technologies: Methodological Problems for the Ethical Assessment of Technology Developments. The International Library of Ethics, Law and Technology. Springer, New York, NY, 79--92.Google ScholarGoogle Scholar
  89. Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Social Science Research Network, Rochester, NY.Google ScholarGoogle Scholar
  90. Andre Oboler, K. Welsh, and L. Cruz. 2012. The danger of big data: Social media as computational social science. First Monday 17, 7.Google ScholarGoogle Scholar
  91. Govindan Parayil. 2005. The digital divide and increasing returns: Contradictions of informational capitalism. The Information Society 21, 1, 41--51.Google ScholarGoogle ScholarCross RefCross Ref
  92. Dinah Payne and Brett J. L. Landry. 2006. A uniform code of ethics: Business and IT professional ethics. Communications of the ACM 49, 11, 80--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. J. A. Quilici-Gonzalez, G. Kobayashi, M. C. Broens, and M. E. Q. Gonzalez. 2010. Ubiquitous computing: Any ethical implications? International Journal of Technoethics 1, 3, 11--23. DOI:http://dx.doi.org/10.4018/jte.2010070102 Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. U. Rashid, H. Schmidtke, and N. Woo. 2007. Managing disclosure of personal health information in smart home healthcare. In 4th International Conference on Universal Access in Human-Computer Interaction (UAHCI’07). Beijing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Frantz Rowe. 2014. What literature review is not: diversity, boundaries and recommendations. European Journal of Information Systems 23, 3, 241--255. DOI:http://dx.doi.org/http://dx.doi.org.proxy.library.dmu.ac.uk/10.1057/ejis.2014.7Google ScholarGoogle ScholarCross RefCross Ref
  96. Bertrand Russell. 2001. The Problems of Philosophy. Oxford University Press, New York, NY.Google ScholarGoogle Scholar
  97. Fariba Sadri. 2011. Ambient intelligence: A survey. ACM Computing Surveys 43, 4, 36.1--36.66. DOI:http://dx.doi.org/10.1145/1978802.1978815 Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. P. Salvini, E. Datteri, C. Laschi, and P. Dario. 2008. Scientific models and ethical issues in hybrid bionic systems research. AI and Society 22, 3, 431--448. DOI:http://dx.doi.org/10.1007/s00146-007-0158-6 Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Suprateek Sarker, Mark Fuller, and Sutirtha Chatterjee. 2009. Ethical information systems development: A Baumanian postmodernist perspective. Journal of the Association for Information Systems 10, 11, 787--815.Google ScholarGoogle ScholarCross RefCross Ref
  100. Geoff Sayre-McCord. 2014. Metaethics. In Edward N. Zalta (Ed.). The Stanford Encyclopedia of Philosophy. Retrieved January 14, 2016 from http://plato.stanford.edu/entries/metaethics/.Google ScholarGoogle Scholar
  101. B. W. Schermer. 2011. The limits of privacy in automated profiling and data mining. Computer Law and Security Review 27, 1, 45--52.Google ScholarGoogle ScholarCross RefCross Ref
  102. Ferdinand Schoeman. 1984. Privacy and intimate information. In Philosophical dimensions of privacy: An anthology, Fertinand Schoeman (Ed.). Cambridge University Press, Cambridge. 403--408.Google ScholarGoogle Scholar
  103. U. Schultze and R. O. Mason. 2012. Studying cyborgs: Re-examining internet studies as human subjects research. Journal of Information Technology 27, 4, 301--312.Google ScholarGoogle ScholarCross RefCross Ref
  104. Richard A. Spinello and Herman T. Tavani. 2004. Intellectual Property Rights in a Networked World: Theory and Practice. Information Science Publishing, Hershey, PA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Richard A. Spinello and Herman T. Tavani. 2001. Readings in CyberEthics. Jones and Bartlett Publishers, Inc., Burlington, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Bernd Stahl. 2012. Morality, Ethics, and Reflection: A categorization of normative IS research. Journal of the Association for Information Systems 13, 8.Google ScholarGoogle ScholarCross RefCross Ref
  107. Jack Stilgoe, Richard Owen, and Phil Macnaghten. 2013. Developing a framework for responsible innovation. Research Policy 42, 9, 1568--1580. DOI:http://dx.doi.org/10.1016/j.respol.2013.05.008Google ScholarGoogle ScholarCross RefCross Ref
  108. E. Stip and V. Rialle. 2005. Environmental cognitive remediation in schizophrenia: Ethical implications of “smart home” technology. Canadian Journal of Psychiatry-Revue Canadienne De Psychiatrie 50, 5, 281--291.Google ScholarGoogle ScholarCross RefCross Ref
  109. J. P. Sullins. 2005. Ethics and artificial life: From modeling to moral agents. Ethics and Inforvvmation Technology 7, 3, 139--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. David R. Tranfield, David Denyer, and Palminder Smart. 2003. Towards a methodology for developing evidence-informed management knowledge by means of systematic review. British Journal of Management 14, 207--222.Google ScholarGoogle ScholarCross RefCross Ref
  111. J. van den Hoven. 2008. Information technology, privacy, and the protection of personal data. In Information Technology and Moral Philosophy. Cambridge Studies in Philosophy and Public Policy. Cambridge University Press, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. L. Van Wel and L. Royakkers. 2004. Ethical issues in web data mining. Ethics and Information Technology 6, 2, 129--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. C. K. Varnhagen et al. 2005. How informed is online informed consent? Ethics & Behavior 15, 1, 37--48.Google ScholarGoogle ScholarCross RefCross Ref
  114. Rene Von Schomberg (Ed.): 2011. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields. Publication Office of the European Union, Luxembourg.Google ScholarGoogle Scholar
  115. Ken Wakita and Toshiyuki Tsurumi. 2007. Finding community structure in mega-scale social networks: [Extended Abstract]. In Proceedings of the 16th International Conference on World Wide Web (WWW’07). ACM, New York, NY, 1275--1276. DOI:http://dx.doi.org/10.1145/1242572.1242805 Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. W. Wallach. 2008. Implementing moral decision making faculties in computers and robots. AI and Society 22, 4, 463--475. Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. D. M. Wasieleski and M. Gal-Or. 2008. An enquiry into the ethical efficacy of the use of radio frequency identification technology. Ethics and Information Technology 10, 1, 27--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. John Weckert and Richard Lucas (Eds.). 2013. Professionalism in the Information and Communication Technology Industry. The Australian National University, Canberra, Australia. Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Joseph Weizenbaum. 1977. Computer Power and Human Reason: From Judgement to Calculation. W. H. Freeman & Co Ltd. Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Y. H. Weng. 2010. Beyond robot ethics: On a legislative consortium for social robotics. Advanced Robotics 24, 13, 1919--1926.Google ScholarGoogle ScholarCross RefCross Ref
  121. Alan F. Westin. 1970. Privacy and Freedom. The Bodley Head, London, UK.Google ScholarGoogle Scholar
  122. Norbert Wiener. 1964. God and Golem, Inc. A Comment on Certain Points where Cybernetics Impinges on Religion. MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  123. Norbert Wiener. 1954. The Human Use of Human Beings. Doubleday, New York, NY.Google ScholarGoogle Scholar
  124. David Wilkinson and Mike Thelwall. 2011. Researching personal information on the public web methods and ethics. Social Science Computer Review 29, 4, 387--401. DOI:http://dx.doi.org/10.1177/0894439310378979 Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. T. J. Williamson. 2010. Predicting building performance: The ethics of computer simulation. Building Research and Information 38, 4, 401--410. DOI:http://dx.doi.org/10.1080/09613218.2010.481204Google ScholarGoogle ScholarCross RefCross Ref
  126. D. Wright, S. Gutwirth, M. Friedewald, E. Vildjiounaite, and Y. Punie. 2008. Safeguards in a World of Ambient Intelligence. Springer-Verlag, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. Aimee van Wynsberghe. 2013. Designing robots for care: Care centered value-sensitive design. Science and Engineering Ethics 19, 2, 407--433.Google ScholarGoogle ScholarCross RefCross Ref
  128. Joy Y. Zhang, Claire Marris, and Nikolas Rose. 2011. The transnational governance of synthetic biology—Scientific uncertainty, cross-borderness and the “art” of governance. London School of Economics and Political Science, London, UK.Google ScholarGoogle Scholar
  129. M. Zimmer. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics and Information Technology 12, 4, 313--325. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Ethics of Computing: A Survey of the Computing-Oriented Literature

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 48, Issue 4
        May 2016
        605 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/2891449
        • Editor:
        • Sartaj Sahni
        Issue’s Table of Contents

        Copyright © 2016 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 February 2016
        • Revised: 1 November 2015
        • Accepted: 1 November 2015
        • Received: 1 June 2015
        Published in csur Volume 48, Issue 4

        Check for updates

        Qualifiers

        • survey
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader