StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Philosophy: Cyber Ethics - Article Example

Cite this document
Summary
"Philosophy: Cyber Ethics" paper states that, unlike other technological objects, computers have logic malleability. Computers are logically malleable since they can be shaped and molded to do any activity that can be characterized in terms of inputs, outputs, and connecting logical operations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Philosophy: Cyber Ethics
Read Text Preview

Extract of sample "Philosophy: Cyber Ethics"

Writing a computer program is like building a house, there is always room for making numerous decisions about matters not specified in order to construct the house no matter how detailed the specifications may be.

Similarly in order, to implement a program that satisfies the specifications a programmer makes some value judgments about what is important and what is not. Eventually, these values become part of the final product and usually are invisible to someone who runs the program. Sometimes invisible programming values are so invisible that even the programmers are unaware of them. Programs may also have bugs or may be based on implicit assumptions which do not become obvious until there is a crisis.

The third invisibility factor which perhaps is the most disturbing is an invisible complex calculation. Nowadays computers are capable of enormous calculations which are beyond human comprehension. Even if a program is understood, it does not necessarily follow that the calculations based on that program are understood. Computers today are able to perform and definitely supercomputers in the future will perform calculations that are too complex for human inspection and understanding. Although the above may look like just ordinary cases in the course of computer technology, they are relevant to computer ethics due to the fact that computer technology is essentially involved and there is a question about what policies are to be instituted in order to best detect and prevent such abuses.

Without access to the programs used for executing such cases, or sophisticated computer programs, such activities may easily go unnoticed. 3. Nicholas Carr's statement that we “begin to take on the qualities of those technologies” basically means that we start behaving like the technologies we are using and leave behind or completely forget our earlier inherent abilities. Nicholas gives the classic example of the mechanical clock which disassociated time from human events and assisted create them in an autonomous world of mathematically measurable sequences.

This later led to the theoretical framework of divided time which became the point of reference for both thought and action. Other examples of the way we have taken on the qualities of the new technology include taking prescribed drugs such as Prozac and Ritalin, which aid our bodies in proper functioning. Thus pharmaceutical drugs and electronic devices all control the complex biochemistry and micro-cellular structure of our brains. All this affects an individual’s behavior, personality as well as other characteristics.

This simply means that the latest technological advances could well be changing our identity as humans.4. The Amish use a number of principles in determining whether to adopt a new form of technology or not. Some of these include; whether the technology will bring them together or draw them apart, in the case of cell phones, they ask themselves whether they will be used to make a living or just for gossiping and frivolous chatter and finally, the Amish ask themselves whether technology is in any anyway enhancing their community, and who exactly benefits from it.

Does technology value human life? These principles are good since they help in safeguarding an individual’s personality, family time, and overall community cohesiveness. I usually do not pick up calls from 7 pm in the evening up to 8 am the next day. I shun the internet as much as possible unless when I am replying to my emails or when there is a news item I want to catch. I employ these principles so that I can have time for myself and my family.5. Christine in her article about people breaking rules of etiquette while using cell phones says that it’s more than just a lack of manners: “it amounts to a radical disengagement from the public sphere.” 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyperethics Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Cyperethics Article Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/philosophy/1651038-cyperethics
(Cyperethics Article Example | Topics and Well Written Essays - 250 Words)
Cyperethics Article Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/philosophy/1651038-cyperethics.
“Cyperethics Article Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/philosophy/1651038-cyperethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Philosophy: Cyber Ethics

Cyber Ethics and the Use of Technology Laws

From the paper "cyber ethics and the Use of Technology Laws" it is clear that generally, innovative individuals in society should be accredited for their exceptional work and be supported all the way in protecting their ideas and implemented programs.... The focus of this essay will be centered on the argumentative approaches that support the fact that ethics regarding to matters has both its pros and cons when viewed from the educative and economical paradigms....
6 Pages (1500 words) Essay

Computer Ethics and Professional Responsibility

He starts with introducing cyber ethics to readers.... To manage with this several works of different writers will be discussed in the paper such as 'Computer ethics and professional responsibility', 'ethics and Technology' and 'Leonardo's Laptop'.... According to the study conducted, ethics and technology can be termed as a text book on ethical issues in cyber science.... These ethics involve philosophy, sociology, and library science students....
6 Pages (1500 words) Annotated Bibliography

Ethical Ramifications of Medicine and Psychiatry in Cyberspace

It is important to understand what ethics are and then to see how various ethical issues in cyberspace can be tackled by psychiatrists as well as medical practitioners.... Despite the strict application of ethics, the field itself is so broad that it often becomes difficult to define it in any particular shape or form (Fisher, 2003).... The matter is even more complicated when it comes to ethics in cyberspace where they may be different questions with regard to privacy and confidentiality....
7 Pages (1750 words) Case Study

Cyber Security

Most importantly, it will discuss how companies use such as rights theory, justice theory, an ethics of character, and an ethics of care while relating the same about the particular incident.... US President Barack Obama in mentioned in a speech “Technology is reshaping every aspect of our lives, With the development of science and technology, the possibility of cyber threat increases.... cyber criminals vary from organized group of hackers supported by various kinds of political, ethical or retaliatory motives to virtual robbery activities, inspired by financial gain....
10 Pages (2500 words) Term Paper

Ethics and Cyber-Ethics

The author of the paper "Ethics and Cyber-Ethics" argues in a well-organized manner that Cory Doctorow's Little Brother is about cyber ethics in examining how technology has aroused the technology gurus and the government to act unethically on both ends.... On the Other hand, cyber ethics is the practice of applying responsible and ethical behavior while at the same time observing moral obligations and duties with respect to digital media and online environments (Whittier, 2006)....
4 Pages (1000 words) Book Report/Review

Ethical Issue in Information Technology

This paper, Ethical Issue in Information Technology, stresses that the term information ethics refers to the discipline of applies ethics developed by Luciano Floridi.... In his theory of information ethics, he asserted that information ethics should be included under the umbrella of computer ethics.... This area of ethics examines the concerns arising in the modern world due to the constant development of information technology....
6 Pages (1500 words) Term Paper

Concept of Virtual Space in Cyberethics

The paper "The Concept of Virtual Space in cyber ethics " is a good example of a literature review on information technology.... This site highlights several issues concerning cyber ethics and cyber world.... This site highlights several issues concerning cyber ethics and cyber world.... yberethics just like any other kind of ethics endeavor to have ethical behavior, cyber participants must make moral decisions each and every time they conduct their activities in the cyber in order to maintain the utmost respect for people and their property and also obey the law....
7 Pages (1750 words) Literature review

Technological Ethics, Cyber Ethics

The paper "Technological Ethics, cyber ethics" states that with the current use of ordinary online tools and search facilities, ordinary users can easily acquire people's information that is private.... The ethical term used for computer ethics is cyber ethics.... Philosophical ethics is a philosophy branch aimed at exploring moral virtues while evaluating the actions of humans.... owever, there is another critic of this case based on the deontological approach of philosophical ethics....
6 Pages (1500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us