Enjoy Upto 50% off on all Your Assignments ORDER NOW
Download Free Sample Order New Solution

Introduction

The pervasiveness of computer technology including artifacts increases the importance of computing's ethical considerations. Despite decades of research in this area, there is still a lack of consensus regarding important aspects of computing morality as understood and applied by the groups of technological practitioners and academic researchers. The very first systematic and thorough overview of the research on computational ethics is presented in this essay. Professional groups like the Association for Computing Machinery (ACM) strive for an employment qualification that has a strong ethical foundation. To guarantee that computation can achieve its potential advantages, computer programmer’s scientists and other technical professionals are concerned with the social as well as ethical implications of their job. These experts also need to be aware of the factors that influence the social and legal context wherein they operate. The acceptability of new technology, as well as the legislation as well as other reactions to them, can be significantly influenced by ethics (Barker & Lee, 2014).

Additionally, funding applications increasingly call for an understanding of social as well as ethical implications, and impact statements in grant submissions challenge computer programmers to consider potential and likely effects of their research. We utilise this essay to outline significant ethical issues, pertinent technology, applicable moral philosophy, as well as other elements that characterise modern understanding of the morality of computing in hopes of assisting software engineers in greater understanding those challenges. On this foundation, we discover knowledge errors and make connections to related debates in other domains. This enables us to suggest research topics and doable actions for identifying and addressing ethical issues earlier on in computational innovation and development. 

Background Analysis

An outline of the wide range of the research on ethics and computing is given by this survey. Computing specialists with little training in ethics make up one important demographic. So, let's start with a definition of the term. There are several separate but related definitions of "ethics" (ACM Executive Council, 2013). It refers to the experience of something as being correct or beneficial at its most fundamental level. By "ethical usage of computers," one can refer to something that is morally upright, decency-conforming, or socially desirable. A social network or current cultural explicit values and guidelines serve as the foundation for such an awareness about an act's ethicality. It is necessary to explicitly think on the foundations and presumptions underlying moral decisions in situations when these principles and norms are no longer clearly relevant or where they conflict. That's what morality, a branch of moral philosophy, accomplishes. Not all IT professionals have a keen interest in learning about the specifics of ethics. Thus, it is crucial to emphasise that even while many of its practical talks and judgments are guided by ethical notions and values, it is crucial to have a basic understanding of them. This might be most apparent in moral quandaries, where a practical decision is taken in the face of conflicting ideals. An illustration would be the development of Brain Computer Interfaces (BCIs), which could be used to improve communication between severely impaired people and their environment.

Even though this is unquestionably a morally admirable thing, technical decisions may limit users' freedom of action and undermine their liberty. It is not exactly evident how specific technical decisions in this situation might be interpreted from an ethical standpoint. The ethical issues surrounding big data are an alternative and contemporary example. Utilization which promises a wide range of advantages, from enhanced public safety to improved consumer experience, can employ huge databases. They also raise serious concerns regarding ideas like privacy as well as property. Finding the ethical difficulties in this situation is a demanding task in and of itself, and connecting them to technical decisions that strike the optimal balance between competing interests and values is equally challenging. In certain situations, the implicit logic might be very intricate. Such conundrums might necessitate the use of ethical principles like accountability, virtue, or usefulness when they are expressly stated.

A certain amount of philosophical ethical knowledge is essential in order to comprehend the complexity of such dilemmas. Moral philosophy, moral philosophy, and practical ethics are the subdisciplines that make up philosophical ethics (Adkinson et al., 2012). Also included in morality is a connection to moral philosophy (Wack et al., 2015). The goal of descriptive ethics is to explain and comprehend moral principles, standards, and behaviours. This can serve as the foundation for normative ethics, that goes beyond simple explanation and aims to defend certain ethical stances. Normative ethics has developed a variety of well-known viewpoints that are commonly used to reflect on why a specific action may be regarded as good or evil and that permeate ethical discussion. Notable ethical normative theories or stances include ethical values, deontological ethics, and utilitarian calculus. According to non - consequentialist, an action's ethical worth can be determined in its results. The utilitarian school of thought, which maintains that an action's ethical worth is determined by its total value of happiness less its total amount of suffering, represents the most popular utilitarian’s theory. These concepts have a close connection to British 19th-century philosophers such (Anderson, 2012). To the contrary side, deontology maintains that the owner's purpose determines the morality of a given action. The German philosopher (Barker & Lee, 2014), the most well-known exponent of deontology, developed the Moral Principle, that holds that the equation to determine of a maxim seems to be the mark of a moral conduct. The third scenario to be discussed here is ethics, which is opposed to consequentialism and deontology's importance of individual behaviour. According to the standpoint of virtue ethics, which has its roots in Greek Ancient and is still widely accepted today, the agent's personality is where ethics should be placed. Something that exhibits a restrained character and therefore is demonstrated in deliberate practise is morally admirable. 

Legal Recourse Available in Australia

At both the personal and community level, ethical issues can be resolved. Ethics should be thought of in terms of how people are impacted by other people's actions. When a person learns that his father had Huntington's illness and that there is 50% possibility that he has acquired the genetic mutation, the results can be emotionally and emotionally damaging. When determining what information to share and how to release it, the danger of injury to that individual becomes a crucial ethical factor. It will be necessary to weigh the risk against by the moral imperatives of preserving the impacted person's liberty and right to know. The ethical ramifications of disclosing genetic data to family and friends are significant. They are susceptible to the consequences of data on their feeling of privacy and family ties, as well as the effects of data on how they perceive themselves. When a grandfather learns that he possesses the hereditary mutation that causes his grandson's disability, it may alter and negatively affect how he views himself and his connections with his offspring. Additionally, he might be worried about how the confidentiality of this data would be safeguarded and whether he or his successors will not be treated differently because of the data.

Different interests are connected to families and communities’ interests in various ways. The way is a regulation governing the disclosure of this information and the degree that its laws or even other industry regulations regulate what can be divulged convey the manner in which a civilization weighs individual risks and preferences against those of the relatives, the society, as well as culture as a whole. It might not appropriately reflect the desire of others to forbid the publication of genetic data in order to avert the kind of damage that an individual at danger for Huntington's disease may experience. Flexible answers that consider the desires of individuals as well as the requirements of communities and families may be generated from harmonizing ethical issues. The laws that a society or group passes might be seen as a reflection of its way of life. The attitude of the society serves as the foundation for such laws, allowing them to express the moral principles of that community. In fact, some of the problems raised by this investigation already have solutions given to them by existing laws. For instance, except in some instances, privacy rules forbid the acquisition, use, or publication of genetic data without authorization. Similarly, to this, unfair uses of genetic data are prohibited by anti-discrimination legislation (Barker & Lee, 2014).

The language wherein ethics is articulated contains two separate types of assertions. Ethics includes claims about what is right or wrong, what should be or should not be done, as well as the justifications for those claims. For example, it is morally required that researchers obtain authorization from subjects before using their genetic data for research out of respect for their autonomy and right to make their own decisions. Alternatively, since doing so will allow for the use of more information to allow for the conduct of greater research, academics must be permitted to use genetic data that has been coded without receiving permission. All people in society will profit as a result, as well as those whose data is used. These assertions, often known as normative claims, describe the way individuals ought to behave. Ethics also makes declarations regarding the kind of arguments employed in ethical claims. For example, one of the tenets of "principles morality" is to protect an individual's autonomy. But at the other side, acting to get the best result is an explanation based on the outcomes rather than principles. These defences are known as "consequentialist ethics." This chapter contains a lot of normative statements. The chapter discusses the variety of ethical factors that will likely be used to support decisions regarding genetic data. The designed and planned suggested in this study to safeguard genetic data strike a compromise between these factors (Milberg et al., 2015). 

Proposed Solution

Professionalism is a major topic for computing ethics. As previously said, there is a continuous stream of initiatives by professional organisations associated to computing to define computing as a profession (Moor, 2015). Whether computing may be regarded as a career is one important question. One common characteristic that distinguishes professions is their obligation to the general public. Giving someone professionalism is justified by paying attention to ethics (Bynum, 2014). Thus, describing computers as a profession implies that morality will be taken seriously by computing experts. Professionalism is considered an ethical concern in this research to the extent to which it has tangible effects on how computing ethics are handled in the actual world. It is likely not unexpected that the connections to technology in study concerned with the issue appeared to be broad because professionalism is a vast topic that spans many facets of computers. The three top systems all displayed a broad, standardised scope (Milberg et al., 2015).

Trust is a complex idea that is frequently linked to security and privacy particularly with regards to the collection of data. This conceptual overlap could be seen in the studied literature, where trust and privacy were regularly explored in tandem. Trust is a quality of connections among data authors, owners, managers, including analysts that is thought of as a component of security. In these interactions, there is reciprocal trust in the proper use of information management to process the data in an accurate way. A system's apparent accountability, purpose, transparency, as well as trustworthiness are all evaluated through the lens of trust. Credibility here refers to credibility; one must consider that the system as well as its administrators are adequately accountable to handle one's data with care. Motivation has to do with the operators' real and planned usage of user information, that must be communicated with some transparency. When confidence is present, processing of data can happen without hindrance within a set of agreed-upon approved procedures or goals. This method assumes that systems as well as operators are more reliable when they have well defined hierarchy of roles, guidelines for identifying permissible uses, including user supervision methods. Although trust is typically used to define the type of relationship among individuals involved that information systems manage, it can also be a crucial element of relationships between individuals and computers or between consumers as well as the systems itself. In the studied literature, confidence was frequently explored regarding the Net, where it might be challenging to build trusting relationships because users often form new ties with every web visit. Like this, people communicate directly with data systems, therefore it is possible that the administrators' personalities are not revealed (European Commission, 2015). The use of automatic "sorting" processes, such as algorithmic profiles (Gordon et al., n.d) as well as surveillance tools, may also happen without users' knowledge (Kissel, 2016). When making decisions that affect users directly and involve normative judgments, information systems help humans think more clearly and make better decisions. By doing this, the moral responsibility that is typically attributed to living actors is replaced. Consumers may need to have more faith in information systems to handle their data as well as inputs in appropriate ways, regardless of how those data are ultimately used with human actors. Recognizing the circumstances under which trust can legitimately exist among users, structures, as well as technicians is not an easy task, as computer technology progressively plays a role in the collection of private identifiable as well as decision-making processes (without getting into a thorough conversation of the prospective value impartiality and ethical agency of computational power) (Moor, 2015). 

Case Study

Computer scientists and other associated technical professionals are an important group of stakeholders that has a significant impact on how computational research is conducted and, as a result, how computers artefacts as well as products are generated (e.g., software engineers, data scientists). Such specialists frequently make the technical decisions that have a significant impact on the ethical and social implications of computing. The ethical elements of computers and the methods for assessing and evaluating the effects of their labour are typically not areas of expertise for these scientific specialists. These have long been acknowledged, and numerous initiatives have been undertaken to increase computing specialists' understanding of and involvement in the societal and ethical dimensions of their job, for instance by incorporating them into core curriculum or professional certification programmes. Due to this, the majority of computer processing specialists who have completed a structured training programme, including a college graduate program, are aware of the codes of conduct and massive expectations forth by professional organisations like the ACM, the British Computing Society (BCS), the Organization of Engineering and Science (IET), and many others (Moor, 2015).

However, it offers little about which innovations are of specific importance, whether ethical concerns are most pertinent, or how such issues could be discovered or addressed in practise. This professionalism-focused approach is crucial for integrating ethics into clinical conduct. Since the very beginning of digital computing, there has been discussion about the potential for computing technologies to create ethical and societal issues that are fundamentally different from those posed by other innovations (Laudon, 2015). As a result, there is now a rapidly expanding scholarly dialogue including experts from many different disciplines and specialties. Many areas of social, organisational, and private life are now influenced by computing gadgets and technologies. As a result, there is increased focus on the ethical as well as social ramifications of such technology. Researchers interested in computing ethics are drawn from a diverse range of disciplines, including computer science, philosophy, law, as well as social sciences. In order to present a thorough picture of the current discussion, this article analyses the literature on the ethical and political ramifications of computers that is accessible in major academic publications. It investigates the conversation to determine which innovations are examined, which ethical concerns are connected to all of these, how study is used to support statements about the ethics of computers, and what findings and recommendations are drawn from this. This article is the very first to openly examine the debate, even though there has been significant amount of research on the ethics of computers, including many synopses of the field (Milberg et al., 2015) including anthologies attempting to cover the key topics (Barker & Lee, 2014). We can comprehend how the subject of ethics with computing is conveyed to professional audiences by concentrating on well-known academic periodicals. 

Conclusion

The significance of ethical issues in computing keeps expanding as a result of how pervasively computer technology and artefacts are used in industrialised countries in both private and public spheres. While many people in these cultures may be impacted by such ethical dilemmas, members of the technical groups that study, plan, create, and use these innovations play a crucial role. The summary of the entire debate, nevertheless, offers enduring information that will assist educate software engineers with respect to their personal and making an assessment. We were able to demonstrate that some components of the conversation are very well established depending on the broad structure of a paper about computing morality. The study reveals that there is a deep interest in many technologies as well as a highly comprehensive debate on a wide variety of ethical issues relating to computing. Although less in-depth than the ethical problems it has the potential to define, ethical theory is widely debated. Other areas are still in their infancy. Methodology, suggestions, and paper contributions are not always well established. This article demonstrates the wealth of resources available to technical community members for gaining a thorough awareness of ethical concerns in computing. By outlining important ethical concerns and their connections to other subcategories, the article also helps to raise awareness of these problems. The paper also highlights some of the flaws in certain recent studies on computing ethics. The assessment of the documents shows that the majority of the authors responsible for investigating the ethics of computer science remain attached to their school discipline customs and fail continue providing actionable recommendations to important people, despite the fact that the societal significance of computing as well as its ethical implications call for a cooperation between researchers from various disciplines and academic traditions. 

Bibliography

ACM Executive Council (2013). ACM code of ethics and professional conduct. Communications of the ACM, 36(2), 99-105.

Adkinson, W., Eisenach, J., & Lenard, T. (2012). Privacy online: A report on the information practices and policies of commercial Web sites. Retrieved August 2006, from http://www.pff.org/publications/privacyonlinefinalael.pdf 

Anderson, R. (2012). Social impacts of computing: Codes of professional ethics. Social Science Computing Review, 10(2), 453-469. 

Barker, W., & Lee, A. (2014). Information security, Volume II: Appendices to guide for mapping types of information and information systems to security categories. National Institute of Standards and Technology, , NIST Special Publication 800- 60 Version II. 

Bynum, T. (2014). Ethical challenges to citizens of ‘‘the automatic age’’: Norbert Wiener on the information society. Journal of Information, Communication and Ethics in Society, 2(2), 65-74. 

Computer Security Division of the Information Technology Laboratory of National Institute of Standards and Technology (2014). Standards for Security Categorization of Federal Information and Information Systems, FIPS PUB 199. http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf 

European Commission (2015). Creating a safer information society by improving the security of information infrastructures and combating computer-related crime. http://www.cybercrime.gov/intl/EUCommunication.0101.pdf 

Gordon, L., Loeb, M., Lucyshyn, W., & Richardson, R. (n.d.). The 2006 CSI/FBI Computer Crime and Security Survey. http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2006.pdf 

Kissel, R. (2016). Glossary of key information security terms. National Institute of Standards and Technology.

Laudon, K. (2015). Ethical concepts and information technology. Communications of the ACM, 38(12). 

Milberg, S. J., Smith, H. J., & Kallman, E. A. (2015). Values, personal information privacy, and regulatory approaches. Comm. of the ACM, 38, 65-74.

Moor, J. (2015). What is computer ethics. In D.G. Johnson & H.Nissenbaum (Ed.), Computers, ethics & social values. Prentice-Hall. 

Wack, J., Cutler, K., & Pole, J. (2012). Guidelines on firewalls and firewall policy: Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology, NIST Special Publication 800-41. 2002. http://csrc.nist.gov/publications/nistpubs/800-41/sp800-41.pdf

You Might Also Like:-

ITECH3002 Group Social Computing Issues Assignment Sample

Online Assignment Expert: Exploring the Benefits of Statistical Computing with STATA

Computer Assignment Help

Upto 50% Off*
Get A Free Quote in 5 Mins*
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Why Us


Complete Confidentiality
All Time Assistance

Get 24x7 instant assistance whenever you need.

Student Friendly Prices
Student Friendly Prices

Get affordable prices for your every assignment.

Before Time Delivery
Before Time Delivery

Assure you to deliver the assignment before the deadline

No Plag No AI
No Plag No AI

Get Plagiarism and AI content free Assignment

Expert Consultation
Expert Consultation

Get direct communication with experts immediately.

Get
500 Words Free
on your assignment today

ezgif

It's Time To Find The Right Expert to Prepare Your Assignment!

Do not let assignment submission deadlines stress you out. Explore our professional assignment writing services with competitive rates today!

Secure Your Assignment!

Online Assignment Expert - Whatsapp Get 50% + 20% EXTRAAADiscount on WhatsApp

refresh