Using genetic information while protecting the privacy of the soul

Ethics and Information Technology 1 (4):257-263 (1999)
  Copy   BIBTEX

Abstract

Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the genetic revolution, not to mentionthat inexpensive computing devices will make genetic informationgathering easier, underscores the need for strong and immediateprivacy legislation

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,202

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Analytics

Added to PP
2009-01-28

Downloads
64 (#242,723)

6 months
19 (#121,979)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

James H. Moor
Dartmouth College

References found in this work

Privacy, intimacy, and personhood.Jeffrey Reiman - 1976 - Philosophy and Public Affairs 6 (1):26-44.
Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
Reason, relativity, and responsibility in computer ethics.James H. Moor - 1998 - Acm Sigcas Computers and Society 28 (1):14-21.
Privacy: Philosophical Dimensions.Ferdinand Schoeman - 1984 - American Philosophical Quarterly 21 (3):199 - 213.
Privacy.Charles Culver, James Moor, William Duerfeldt, Marshall Kapp & Mark Sullivan - 1994 - Professional Ethics, a Multidisciplinary Journal 3 (3):3-25.

View all 6 references / Add more references