PHIL 3370 Lecture 3: Homework Questions #1
Document Summary
James moor discusses how computers often operate invisibly. Explain the three kinds of invisibility he discusses, and why he thinks the three ways in which computers are invisible are ethically significant. Firstly, james moore describes invisible abuse which can be defined as the deliberate use of the invisible functions of a computer to engage in unethical/immoral behavior. For example, cyber bullying, stealing/criminal offences, and the invasion of privacy/property of others. Computers have the capability to gain information from bank accounts, personal information such as. Sin numbers, passwords, and many other important private documentation. This means that such values are inserted into a computer program when someone is programming a computer. For instance, someone like myself who is using a computer program right now may be unaware of these embedded values. Interestingly, invisible programming can potentially be undetectable to the programmer as well.