Moral responsibility for computing artifacts: the rules and issues of trust

Acm Sigcas Computers and Society 42 (2):15-25 (2012)
  Copy   BIBTEX

Abstract

"The Rules" are found in a collaborative document that states principles for responsibility when a computer artifact is designed, developed and deployed into a sociotechnical system. At this writing, over 50 people from nine countries have signed onto The Rules. Unlike codes of ethics, The Rules are not tied to any organization, and computer users as well as computing professionals are invited to sign onto The Rules. The emphasis in The Rules is that both users and professionals have responsibilities in the production and use of computing artifacts. In this paper, we use The Rules to examine issues of trust.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,505

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Computer Ethics.John Weckert (ed.) - 2007 - Routledge.
Using moral rules to address truth in transition and the demise facts.Don Gotterbarn - 2012 - Acm Sigcas Computers and Society 42 (1):21-27.
Solidarity and Social Moral Rules.Adam Cureton - 2012 - Ethical Theory and Moral Practice 15 (5):691-706.

Analytics

Added to PP
2013-10-30

Downloads
45 (#495,167)

6 months
13 (#264,153)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Michael Wolf
Washington and Jefferson College

Citations of this work

No citations found.

Add more citations

References found in this work

The method of levels of abstraction.Luciano Floridi - 2008 - Minds and Machines 18 (3):303–329.
Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Springer Netherlands. Edited by Luciano Floridi & J. W. Sanders.
The ethics of designing artificial agents.Frances S. Grodzinsky, Keith W. Miller & Marty J. Wolf - 2008 - Ethics and Information Technology 10 (2-3):115-121.

Add more references