Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-m42fx Total loading time: 0 Render date: 2024-07-16T11:44:07.195Z Has data issue: false hasContentIssue false

21 - Ethical Protocols Design

from PART IV - APPROACHES TO MACHINE ETHICS

Published online by Cambridge University Press:  01 June 2011

Michael Anderson
Affiliation:
University of Hartford, Connecticut
Susan Leigh Anderson
Affiliation:
University of Connecticut
Get access

Summary

Introduction

The responsibilities of a system designer are growing and expanding in fields that only ten years ago were the exclusive realms of philosophy, sociology, or jurisprudence. Nowadays, a system designer must have a deep understanding not only of the social and legal implications of what he is designing, but also of the ethical nature of the systems he is conceptualizing. These artifacts not only behave autonomously in their environments, embedding themselves into the functional tissue or our society but also “re-ontologise” part of our social environment, shaping new spaces in which people operate.

It is in the public interest that automated systems minimize their usage of limited resources, are safe for users, and integrate ergonomically within the dynamics of everyday life. For instance, one expects banks to offer safe, multifunction ATMs, hospitals to ensure that electro-medical instruments do not electrocute patients, and nuclear plants to employ redundant, formally specified control systems.

It is equally important to the public interest that artificial autonomous entities behave correctly. Autonomous and interactive systems affect the social life of millions of individuals, while performing critical operations such as managing sensitive information, financial transactions, or the packaging and delivery of medicines. The development of a precise understanding of what it means for such artifacts to behave in accordance with the ethical principles endorsed by a society is a pressing issue.

Type
Chapter
Information
Machine Ethics , pp. 375 - 397
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Alast, W.M.P.. Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management. Lecture Notes in Computer Science, 3098: 1–65, 2004.CrossRefGoogle Scholar
Adam, A.. Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine?Ethics and Information Technology, 7(4): 233–242, 2005.CrossRefGoogle Scholar
Allen, C., Smit, I. and Wallach, W.. Artificial Morality: Top–Down, Bottom–up, and Hybrid Approaches. Ethics and Information Technology, 7(3): 149–155, 2005.CrossRefGoogle Scholar
Arbel, A. and Kaff, A.E., Crash: Ten Days in October. Will It Strike Again?Longman Financial Services, Chicago, 1989.Google Scholar
Bickerton, M. and Siddiqi, J.. The Classification of Requirements Engineering Methods. In Fickas, S. and Finkelstein, A., editors, Requirements Engineering '93, pp. 182–186. IEEE Computer Society Press, 1993.Google Scholar
Coulouris, G., Dollimore, J. and Kindberg, T., Distributed Systems: Concepts and Design. 4 ed. Addison–Wesley, Harlow, 2005.Google Scholar
Cunha, J.C. and Rana, O., Grid Computing: Software Environments and Tools. Springer, London, 2006.CrossRefGoogle Scholar
DeCew, J.. Privacy. In Zalta, E. N., editor, Stanford Encyclopedia of Philosophy, 2006.
Fitzpatrick, R., Cooke, P., Southall, C., Kauldhar, K. and Waters, P.. Evaluation of an Automated Dispensing System in a Hospital Pharmacy Dispensary. The Pharmaceutical Journal, 274: 763–765, 2005.Google Scholar
Floridi, L.. Is Semantic Information Meaningful Data?Philosophy and Phenomenological Research, 70(2): 351–370, 2005.CrossRefGoogle Scholar
Floridi, L.. The Ontological Interpretation of Informational Privacy. Ethics and Information Technology, 7(4): 185– 200, 2006.CrossRefGoogle Scholar
Floridi, L. and Sanders, J.W.. The Method of Abstraction. In Negrotti, M., editor, Yearbook of the Artificial Nature, Culture and Technology, pp. 177–220. P. Lang, Bern, 2004.Google Scholar
Floridi, L. and Sanders, J. W.. On the Morality of Artificial Agents. Minds and Machines, 14(3): 349–379, 2004.CrossRefGoogle Scholar
Graham, R.. Robots Benefit Patients and Staff in Hospitals and Community Pharmacies. The Pharmaceutical Journal, 273: 534, 2004.Google Scholar
Greco, G.M., Paronitti, G., Turilli, M. and Floridi, L.. How to Do Philosophy Informationally. Lecture Notes in Artificial Intelligence, 3782: 623–634, 2005.Google Scholar
Gross, D.. Attack of the Machines. Is Your Stockbroker a Robot?Slate, Jan. 18, 2005.Google Scholar
Hawkes, T., Structuralism and Semiotics. 2 ed. Routledge, London, 2003.Google Scholar
Hewitt, C., Bishop, P. and Steiger, R.. A Universal Modular Actor Formalism for Artificial Intelligence. IJCAI3, pp. 235–245. Stanford, CL, 1973.Google Scholar
Kaptein, M.. Business Codes of Multinational Firms: What Do They Say?Journal of Business Ethics, 50(1): 13–31, 2004.CrossRefGoogle Scholar
Ozsu, M. T. and Valduriez, P., Principles of Distributed Database Systems. 2 ed. Prentice Hall, London, 1999.Google Scholar
Penycate, J.. Identity Theft: Stealing Your Name. BBC News, Monday, 18 June, 2001.Google Scholar
Ranger, S.. Bank Automates to Boost Customer Service. Case Study: HSBC Speeds up Queries with Workflow Automation. Silicon.com, Monday 06 February, 2006.
Synovate, . Identity Theft Survey. Federal Trade Commission, 2003.
Tavani, H.T. and Moor, J.H.. Privacy Protection, Control of Information, and Privacy-Enhancing Technologies. SIGCAS Computer Society, 31(1): 6–11, 2001.CrossRefGoogle Scholar
Waldrop, M.M.. Computers Amplify Black Monday. Science, 238(4827): 602–604, 1987.CrossRefGoogle ScholarPubMed
Warren, S. and Brandeis, L.D.. The Right to Privacy. Harvard Law Review, 4(5): 193–220, 1890.CrossRefGoogle Scholar
Webley, S. and Le, M. Jeune. Corporate Use of Codes of Ethics: 2004 Survey. IBE, 2005.
Wiegel, V., Hoven, J. and G.- Lokhorst, J.. Privacy, Deontic Epistemic Action Logic and Software Agents. Ethics and Information Technology, 7(4): 251–264, 2005.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×