ITM 407 Study Guide - Disclose
Document Summary
Read huff"s article on unintentional power in the design of computing systems. He describes the extra responsibility that comes with increased knowledge and the concept of unintentional power. The software might be used in environments that are more complex or more dangerous than those which it was initially designed. The people with the original power are removed from those who are affected. The software may have be created for the purpose of a specific environment. In last week"s reading, brey suggested that we need to work at three levels in looking for potential ethical issues in cyber technology: First: disclose embedded features that have a moral importance. Second: test these features against standard ethical theories. Third: apply standard or newly revised ethical theories to the issues. Value sensitive design might be an easier concept to grasp. Watch the video and describe the differences between the three levels - context, empirical and technical.