PHIL 3370 Lecture 3: Homework Questions #1

47 views2 pages

Document Summary

James moor discusses how computers often operate invisibly. Explain the three kinds of invisibility he discusses, and why he thinks the three ways in which computers are invisible are ethically significant. Firstly, james moore describes invisible abuse which can be defined as the deliberate use of the invisible functions of a computer to engage in unethical/immoral behavior. For example, cyber bullying, stealing/criminal offences, and the invasion of privacy/property of others. Computers have the capability to gain information from bank accounts, personal information such as. Sin numbers, passwords, and many other important private documentation. This means that such values are inserted into a computer program when someone is programming a computer. For instance, someone like myself who is using a computer program right now may be unaware of these embedded values. Interestingly, invisible programming can potentially be undetectable to the programmer as well.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers