Wednesday, January 8, 2020

The Invisibility Factor Of Computers - 1185 Words

In James Moor’s publication in METAPHILOSOPHY entitled â€Å"What Is Computer Ethics† Moore discusses the fact that the â€Å"invisibility factor of computers presents us with a dilemma.† The invisibility factor relates to the fact that computer operations are often invisible; they can’t be viewed by man (Moore, 1985). To explain this concept, Moore gives the example of a computer programmer. Moore explains that the computer programmer may be aware of what was input and output, he/she may not completely understand the internal processing that took place to obtain the output. Moore realizes that the use of computers increases efficiency because the user is not burdened with monitoring computer operations (Moore, 1985). However, the computer also makes us anonymous. I believe that people are more likely to act unethically when no one knows who they are. This being the case, there is ethical significance to being invisible. Moore (1985) argues that the invisi bility factor of computers makes society vulnerable. He describes three types of invisibility, which all have ethical significance. Moore (1985) describes invisible abuse as â€Å"the intentional use of the invisible operations of a computer to engage in unethical conduct†. Moore gives several examples of this including a programmer who realized he could steal excess interest from a bank through computer programming and the invasion of the privacy of others when computers are programmed to monitor phone calls and emails. IShow MoreRelatedThe Problem Of Computer Ethics951 Words   |  4 Pagesdiscussed about the difference between the computers from other technologies and how this difference makes a difference in ethical considerations. The concerns listed by the author are related to software, hardware, networks connecting computers and computers themselves. The main problem in computer ethics occurs because of policy vacuum about how computer technology should be used. Soci al and personal policies play an important role in ethical use of computer technology. Conceptual vacuum adds to policyRead MoreThe Key to My Future1075 Words   |  4 Pagesfield of applied science and product design. Specific courses that I will encounter include introductory level physics and science work in thermodynamics, heat transfer, and fluid mechanics. Computational engineering, and even chemistry, will likely factor into my undergraduate degree. However, I also wish to stay open to possibilities in biomechanical engineering careers. I will also be taking introductory course work in neurology and kinesthetic in order to provide myself with the foundational knowledgeRead MoreThe Internet and Cyberbullying Essay576 Words   |  3 Pagesof U.S. students are bullied each school day (Ross). Cyber bullying makes it easy for the bullies to get away with their behavior without any consequences. Also, the factor of invisibility makes them not thinking of themselves as harmful. They view their actions as humorous, or merely as a form of happiness. Another factor that increases cyber bullying is how accessible forms of electronic communications are to teenagers. A recent study showed that â€Å"Over 80 percent of teens use a cellRead MoreWhat Is Computer Ethics Written By James H. Moor889 Words   |  4 PagesAccording to the article What is Computer Ethics written by James H. Moor (1985), the reason behind computers being revolutionary for over 40 years is their logical malleability. With every new technology programmed, there must be a policy that governs its use. Each technology has a different purpose ranging from a simple calculator to social robots that can teach students or show children with medical conditions how to take their medication (Davis, 2013). The potential for social robots to haveRead MoreOnline Disinhibition Effect Essay1644 Words   |  7 Pages In 2004, Professor John Suler, professor of psychology at the Rider University, penned an article named â€Å"The Online Disinhibition Effect† that essentially assessed the characteristics of internet interactions, which served as the contributing factors of such an effect. Interestingly, the term, â€Å"online disinhibition effect† was already popular at the time Professor Suler published his article (Suler, 2004). According to Prof. Suler, there are predominantly two important categories of behavior thatRead MoreAnalysis : The Jazz Photography931 Words   |  4 Pagesemotions and the need for working with available light make it more similar to the practice of candid photography. Also, the human aspects of it – who to shoot and when, the question of photographer’s courage to cross boundaries and get close, invisibility, visibility, and the speed – make it similar to street photography. This post is a summary of author’s experiences and lessons learned through photographing various rehearsals and live performances, mostly in artificial, low-intensity light, noRead MoreGraphene : A Thin Layer Of Pure Carbon1486 Words   |  6 Pagesof the graphene that was separated by using this method was sufficiently high enough to create molecular electronic devices successfully. While this research is very highly regarded, the quality of the graphene produced will still be the limiting factor in technological applications. Once graphene can be produced on very thin pieces of metal or other arbitrary surfaces (of tens of nanometres thick) using chemical vapour disposition at low temperatures and then separated in a way that can controlRead MorePrivacy And Security : A Technological World1356 Words   |  6 Pagessimilar position to Edward Snowden, except as a software designer being the one individual solely responsible for the creation of software to watch for terrorist behavior. With the proliferation of technology in our everyday lives and due to the invisibility factor discussed by James Moor, surveillance on the general population would likely remain unknown to those under surveillance. As a moral agent and understanding that people’s privacy will be invaded, should the software still be designed and ethicallyRead MoreCase Study1575 Words   |  7 Pageswith this approach to IT planning? ïÆ'Ëœ The risk of the company is that there is no back up for the information stored in the system. It is hard to restore the information if the system shutdown and the benefits of this is the security and the invisibility of the information about the company. 2. With hindsight, we know that the decision made by Eric Raffin of the VA to not fail over to the Denver site was the correct one. But, it involved ignoring established backup procedures With the informationRead MoreSoftware Quality Assurance1219 Words   |  5 PagesSoftware Quality Assurance ABSTRACT High complexity, invisibility of the product and opportunity to detect the defects provided the uniqueness which will meet the challenges for the development and operation of quality assurance for software. This paper provides a brief introduction to software quality assurance and discuses about the software quality metrics and their limitations. Keywords: SQA (software Quality Assurance), software quality metrics, process metrics, product metrics

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.