Open Access. Powered by Scholars. Published by Universities.®
Business Law, Public Responsibility, and Ethics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Business Law, Public Responsibility, and Ethics
Moral Responsibility For Computing Artifacts: "The Rules" And Issues Of Trust, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf
Moral Responsibility For Computing Artifacts: "The Rules" And Issues Of Trust, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf
School of Computer Science & Engineering Faculty Publications
“The Rules” are found in a collaborative document (started in March 2010) that states principles for responsibility when a computer artifact is designed, developed and deployed into a sociotechnical system. At this writing, over 50 people from nine countries have signed onto The Rules (Ad Hoc Committee, 2010). Unlike codes of ethics, The Rules are not tied to any organization, and computer users as well as computing professionals are invited to sign onto The Rules. The emphasis in The Rules is that both users and professionals have responsibilities in the production and use of computing artifacts. In this paper, we …
Cyberstalking, Personal Privacy, And Moral Responsibility, Herman T. Tavani, Frances Grodzinsky
Cyberstalking, Personal Privacy, And Moral Responsibility, Herman T. Tavani, Frances Grodzinsky
School of Computer Science & Engineering Faculty Publications
This essay examines some ethical aspects of stalking incidents in cyberspace. Particular attention is focused on the Amy Boyer/Liam Youens case of cyberstalking, which has raised a number of controversial ethical questions. We limit our analysis to three issues involving this particular case. First, we suggest that the privacy of stalking victims is threatened because of the unrestricted access to on-line personal information, including on-line public records, currently available to stalkers. Second, we consider issues involving moral responsibility and legal liability for Internet service providers (ISPs) when stalking crimes occur in their `space' on the Internet. Finally, we examine issues …