Method in computer ethics: Towards a multi-level interdisciplinary approach [Book Review]

Ethics and Information Technology 2 (2):125-129 (2000)
  Copy   BIBTEX

Abstract

This essay considers methodological aspects ofcomputer ethics and argues for a multi-levelinterdisciplinary approach with a central role forwhat is called disclosive computer ethics. Disclosivecomputer ethics is concerned with the moraldeciphering of embedded values and norms in computersystems, applications and practices. In themethodology for computer ethics research proposed inthe essay, research takes place at three levels: thedisclosure level, in which ideally philosophers,computer scientists and social scientists collaborateto disclose embedded normativity in computer systemsand practices, the theoretical level, in whichphilosophers develop and modify moral theory, and theapplication level, that draws from research performedat the other two levels, and at which normativeevaluations of computer systems and practices takesplace

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,386

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

On teaching computer ethics within a computer science department.Michael J. Quinn - 2006 - Science and Engineering Ethics 12 (2):335-343.
Un-making artificial moral agents.Deborah G. Johnson & Keith W. Miller - 2008 - Ethics and Information Technology 10 (2-3):123-133.
Computer ethics: Its birth and its future. [REVIEW]TerrellWard Bynum - 2001 - Ethics and Information Technology 3 (2):109-112.
Spyware – the ethics of Covert software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.
The role of metaethics and the future of computer ethics.Antonio Marturano - 2002 - Ethics and Information Technology 4 (1):71-78.

Analytics

Added to PP
2009-01-28

Downloads
214 (#90,958)

6 months
9 (#295,075)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Philip Brey
University of Twente

References found in this work

Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.

Add more references