Wednesday, September 11, 2019

Cyperethics Article Example | Topics and Well Written Essays - 250 words

Cyperethics - Article Example Just as the power of the steam engine was harnessed as a raw resource during the Industrial Revolution, so is the logic of a computer as a raw resource of the Computer Revolution. Since logic applies everywhere, the potential applications of computer technology seem limitless and that’s the main reason computers have caused a revolution. 2. James Moor discusses the following three kinds of invisibility; first and foremost is the invisible abuse which is the intentional use of the invisible operations of a computer to engage in unethical conduct. The best illustration of this is the case of a programmer who after realizing he could steal excess interest from a bank, instructed a computer to deposit the fraction of cents left over after rounding off in his own bank account. The second invisibility factor is the presence of invisible programming values, which basically are values embedded in a computer program. Writing a computer program is like building a house, there is always room for making numerous decisions about matters not specified in order to construct the house no matter how detailed the specifications may be. Similarly in order, to implement a program which satisfies the specifications a programmer makes some value judgments about what is important and what is not. Eventually these values become part of the final product and usually are invisible to someone who runs the program. Sometimes invisible programming values are so invisible that even the programmers are unaware of them. Programs may also have bugs or may be based on implicit assumptions which do not become obvious until there is a crisis. The third invisibility factor which perhaps is the most disturbing is invisible complex calculation. Nowadays computers are capable of enormous calculations which are beyond human comprehension. Even if a program is understood, it does not necessarily follow that the calculations based on that program are understood. Computers

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.