Privacy, Deontic Epistemic Action Logic and Software Agents: An Executable Approach to Modeling Moral Constraints in Complex Informational Relationships

Ethics and Information Technology 7 (4):251-264 (2005)
  Copy   BIBTEX

Abstract

In this paper we present an executable approach to model interactions between agents that involve sensitive, privacy-related information. The approach is formal and based on deontic, epistemic and action logic. It is conceptually related to the Belief-Desire-Intention model of Bratman. Our approach uses the concept of sphere as developed by Waltzer to capture the notion that information is provided mostly with restrictions regarding its application. We use software agent technology to create an executable approach. Our agents hold beliefs about the world, have goals and commitment to the goals. They have the capacity to reason about different courses of action, and communicate with one another. The main new ingredient of our approach is the idea to model information itself as an intentional agent whose main goal it is to preserve the integrity of the information and regulate its dissemination. We demonstrate our approach by applying it to an important process in the insurance industry: applying for a life insurance.In this paper we will: (1) describe the challenge organizational complexity poses in moral reasoning about informational relationships; (2) propose an executable approach, using software agents with reasoning capacities grounded in modal logic, in which moral constraints on informational relatio nships can be modeled and investigated; (3) describe the details of our approach, in which information itself is modeled as an intentional agent in its own right; (4) test and validate it by applying it to a concrete ‘hard case’ from the insurance industry; and (5) conclude that our approach upholds and offers potential for both research and practical application.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,349

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Software libre 2004.Andoni Alonso & Carl Mitcham - 2004 - Ethics and Information Technology 6 (1):65-67.
Editorial introduction – surveillance and privacy.Philip Brey - 2005 - Ethics and Information Technology 7 (4):183-184.
Online diaries: Reflections on trust, privacy, and exhibitionism.Paul Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
The limits of privacy, Amitai Etzioni, new York, basic books, 1999.Dag Elgesem - 2000 - Ethics and Information Technology 2 (3):189-191.
The ethics of designing artificial agents.Frances S. Grodzinsky, Keith W. Miller & Marty J. Wolf - 2008 - Ethics and Information Technology 10 (2-3):115-121.
Hubert Dreyfus, on the internet: Thinking in action. [REVIEW]Arun Kumar Tripathi - 2003 - Ethics and Information Technology 5 (1):63-64.
The internet and japanese conception of privacy.Masahiko Mizutani, James Dorsey & James H. Moor - 2004 - Ethics and Information Technology 6 (2):121-128.

Analytics

Added to PP
2017-02-20

Downloads
13 (#1,010,467)

6 months
4 (#790,687)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Ethical protocols design.Matteo Turilli - 2007 - Ethics and Information Technology 9 (1):49-62.

Add more citations

References found in this work

No references found.

Add more references