Ethical protocols design

Ethics and Information Technology 9 (1):49-62 (2007)
  Copy   BIBTEX


The paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined in such a way as to (i) discriminate specific cases in which an individual’s GIP can be infringed without accessing the individual’s data; (ii) separate unauthorised accesses to data that do not respect the right to GIP from access that do; and (iii) distinguish different degrees of GIP. Finally a camera phone is used to illustrate the proposed solution



    Upload a copy of this work     Papers currently archived: 80,119

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library


Added to PP

65 (#194,788)

6 months
2 (#318,740)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Matteo Turilli
Oxford University

References found in this work

On the morality of artificial agents.Luciano Floridi & J. W. Sanders - 2004 - Minds and Machines 14 (3):349-379.
Is semantic information meaningful data?Luciano Floridi - 2005 - Philosophy and Phenomenological Research 70 (2):351-370.
Business codes of multinational firms: What do they say?Muel Kaptein - 2004 - Journal of Business Ethics 50 (1):13-31.
The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.

View all 10 references / Add more references