Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

The XXII self-assessment: the ethics of computing

Published: 01 November 1990 Publication History
First page of PDF

References

[1]
Parker. I).B., Swopc, S., and Baker B.N. Ethical Coflicts in Information and Computer Scienice, Technology, and Business. Final Report, Aug. 1988, prepared for Directorate for Bilogical, Behavioral, and Socail Studies, National Science Foundation, SRI Project 2609.
[2]
Parkcr, D.B. Ethical Conflicts in Computer Science and Technology. AFIPS Press, Arlilngton Va., 1981.
[3]
Parker, D.B, Swope, S., and Baker B.N. Ethical conflicts in Information and Computer Science, Technology and Business. QED Information Sciences, Wellesley, Ms., 1990.
[4]
Bynum, T.W., (Ed.) Computers and ethics. Metaphilos., (Oct. 198.5).
[5]
DeDombal,F.T. Ethical considerations concerning computers in medicine in the 1980s.J. Med. Ethics 13, (Dec.1987), 179-184.
[6]
Earley, T.M., and Hulse, D. Humanizing a technological society: Eithical implications for the counselor. J. Couns,dev 64, (1984),334- 346.
[7]
Hoffman, W.M., and Mo{~re, .J.M., (EDs.) Ethics and the Management of Computer Technology. Oelgeschlager, Gunn & Hath, Cambridge, Ma. 1982.
[8]
Johnson, D. Computer Ethics. Prentice Hall, Englewood Cliffs, N,J., 1985.
[9]
Johnson D. G. Mapping ordillary morals onto the computer society: A pliilosophical perspective.J. Soc. Issues 40, (1984), 62-76.
[10]
Johnson D., and Sliapper,.J.W. Ethical Issues the Use of Computers. Wadsworth Press, Behnolit, Ca., 1985.
[11]
Jonas, H. Technology and responsibility: Relfections on the new tasks of ethics. Soc. Res. 41), 1 (Jan. 1973), 31-54.
[12]
Kranzbcrg, M., (F,d.) Ethics i, a, Age of Pervasive Technology. Westview Press, Boulder, Co. 1980.
[13]
Moor, .l. What is .Computer Ethics?
[14]
Morrison, P.R. Lin~its to technocratic consciousrtess: Information technology and terrorism as exampie. Sci., 7),oh., amt l-t"um. Values 11, 4 (Apr. 1986), 4-16.
[15]
Mumford, E., and Weir, M. Computer Systems in Work Design--The Ethics Method. Associated Business Press, l~ondon, 1979.

Cited By

View all
  • (2019)Same question as last time: Gewissensbits – Wie würden Sie urteilen?Informatik Spektrum10.1007/s00287-019-01153-6Online publication date: 14-Feb-2019
  • (2016)Skills Development of Professional Ethics in Engineering Degrees in the European Higher Education AreaInternational Joint Conference SOCO’16-CISIS’16-ICEUTE’1610.1007/978-3-319-47364-2_72(736-740)Online publication date: 1-Oct-2016
  • (2013)Overcoming social awareness in computer-supported groupsComputer Supported Cooperative Work (CSCW)10.1007/BF008056952:4(285-297)Online publication date: 19-Sep-2013
  • Show More Cited By

Recommendations

Reviews

James Clinton Spohrer

The application of ethics in the computer industry is difficult for several reasons: (1) computer-mediated communications, such as electronic mail, alter relationships among people; (2) information stored electronically can be manipulated (for example, copied, distributed, accessed, or utilized) in fundamentally different ways than printed information; (3) efforts to keep information confidential conflict with the potentially larger benefit of sharing information; (4) the authenticity of easily manipulated electronic information is suspect; (5) as a field, the computer industry is relatively young; and (6) as computers proliferate, the boundary between professionals and skilled amateurs is blurred. This paper includes a copy of the ACM code of professional ethics and a series of scenarios describing ethical dilemmas. Readers are invited to work through the scenarios to help them explore and develop their ability to make decisions that are consistent with their own personal code of professional conduct. The 15 scenarios deal with a wide variety of situations including a computer scientist accepting a grant on a possibly unachievable program, a computer hacker accessing commercial computer services, computer users sharing software inadvertently, programmers using other programs as models for their own products, instructors using students to test instructional software, and an information security manager monitoring electronic mail. Readers can compare their responses and reasoning about the scenarios to those obtained from a panel. All computer professionals may find this paper valuable.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 33, Issue 11
Nov. 1990
123 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/92755
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1990
Published in CACM Volume 33, Issue 11

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)216
  • Downloads (Last 6 weeks)45
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Same question as last time: Gewissensbits – Wie würden Sie urteilen?Informatik Spektrum10.1007/s00287-019-01153-6Online publication date: 14-Feb-2019
  • (2016)Skills Development of Professional Ethics in Engineering Degrees in the European Higher Education AreaInternational Joint Conference SOCO’16-CISIS’16-ICEUTE’1610.1007/978-3-319-47364-2_72(736-740)Online publication date: 1-Oct-2016
  • (2013)Overcoming social awareness in computer-supported groupsComputer Supported Cooperative Work (CSCW)10.1007/BF008056952:4(285-297)Online publication date: 19-Sep-2013
  • (2012)Online Gaming to Find a New Job – Examining Job Seekers' Intention to Use Serious Games as a Self-Assessment ToolGerman Journal of Human Resource Management: Zeitschrift für Personalforschung10.1177/23970022120260030226:3(218-240)Online publication date: 1-Aug-2012
  • (2012)How to build an appropriate information ethics code for enterprises in Chinese cultural societyComputers in Human Behavior10.1016/j.chb.2011.10.01328:2(420-433)Online publication date: Mar-2012
  • (2011)The Significance of a Suitable Information Ethical CodeJournal of Information Ethics10.3172/JIE.20.1.5420:1(54-85)Online publication date: 19-Aug-2011
  • (2009)Help to find the needle in a haystackProceedings of the special interest group on management information system's 47th annual conference on Computer personnel research10.1145/1542130.1542133(7-12)Online publication date: 28-May-2009
  • (2009)Efficient Topic-Based File Sharing in Hybrid Wireless NetworksProceedings of the 42nd Hawaii International Conference on System Sciences10.1109/HICSS.2009.180(1-9)Online publication date: 5-Jan-2009
  • (2005)Developing leadership skills in software engineering students through an undergraduate research programSoftware Engineering Education10.1007/3-540-58951-1_114(305-321)Online publication date: 2-Jun-2005
  • (2004)Whatever Happened to Information Systems Ethics?Information Systems Research10.1007/1-4020-8095-6_10(159-174)Online publication date: 2004
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media