ITM 407 Study Guide - Disclose

33 views1 pages

Document Summary

Read huff"s article on unintentional power in the design of computing systems. He describes the extra responsibility that comes with increased knowledge and the concept of unintentional power. The software might be used in environments that are more complex or more dangerous than those which it was initially designed. The people with the original power are removed from those who are affected. The software may have be created for the purpose of a specific environment. In last week"s reading, brey suggested that we need to work at three levels in looking for potential ethical issues in cyber technology: First: disclose embedded features that have a moral importance. Second: test these features against standard ethical theories. Third: apply standard or newly revised ethical theories to the issues. Value sensitive design might be an easier concept to grasp. Watch the video and describe the differences between the three levels - context, empirical and technical.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents

Related Questions