Ethical Aspects - Informatisation de l’éthique Flashcards
What is the IEEE Code of Ethics focused on?
It emphasizes public safety, privacy, and sustainability in technology development.
Fill in the blank: The Holberton-Turing Oath promotes ethical AI practices, focusing on principles like privacy, responsibility, and _____.
transparency.
Define ‘computer ethics’ as per James H. Moor.
The study of computer technology’s social impact and creating policies for ethical use.
What is ‘logical malleability’ in computers?
The ability of computers to perform any function defined by inputs, outputs, and logical operations, allowing wide adaptability.
Name the four types of moral agents according to Moor.
Ethical impact agent, implicit ethical agent, explicit ethical agent, and full ethical agent.
Fill in the blank: An implicit ethical agent includes machines with ____ to prevent harm.
safety procedures.
What distinguishes a ‘full ethical agent’ from other moral agents?
A full ethical agent would have consciousness, intentionality, and free will, similar to humans.
What is one limitation of Asimov’s Three Laws of Robotics?
They are limited in practical applications, especially in military robotics where harm may be inherent.
Define the ‘invisibility factor’ in computing ethics.
The hidden processes in computing that can lead to ethical issues, such as unnoticed misuse or embedded biases.
Explain ‘invisible abuse’ in computing ethics.
Misuse of computer operations that remain undetected due to the hidden nature of computational processes.
Fill in the blank: Algorithmic governance raises ethical concerns due to its lack of ____ in decision-making.
transparency.
What does ‘non-monotonic logic’ address in moral programming?
It allows the adaptation of moral rules as new information arises, which helps in resolving ethical dilemmas.
Why is probabilistic modeling limited in moral programming?
It lacks the consistency and reliability required for ethical decision-making in all scenarios.
Fill in the blank: Ethical hacking emphasizes understanding and ____ a system, not necessarily breaking laws.
modifying.
List three core principles of hacker ethics.
Free access to technology, freedom of information, and skepticism of authority.