Creating moral buffers in weapon control interface design

We examine the ethical and social issues surrounding the design of human-computer interfaces that are designed for control of highly autonomous weapons systems. With the improvements of global positioning satellite communications and control algorithms, it is currently possible to launch weapons. These systems are highly autonomous in that they do not need constant human supervision and manual control for operation and indeed, only require human intervention when a change in a goal state is required. In the swarm concept, human decision makers are removed even further from the decision-making loop.

[1]  Kevin W. Bowyer,et al.  Face recognition technology: security versus privacy , 2004, IEEE Technology and Society Magazine.

[2]  J. Lantos,et al.  The rise and fall of the futility movement. , 2000, The New England journal of medicine.

[3]  W. V. O'brien,et al.  The Conduct of Just and Limited War. , 1982, American Journal of International Law.

[4]  Kathleen L. Mosier,et al.  Does automation bias decision-making? , 1999, Int. J. Hum. Comput. Stud..

[5]  M. Mcluhan The Gutenberg galaxy : the making of typographic man , 1963 .

[6]  Clifford Nass,et al.  Computers are social actors , 1994, CHI '94.

[7]  E. Eisenstein The printing press as an agent of change , 1969 .

[8]  Christopher D. Wickens,et al.  A model for types and levels of human interaction with automation , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[9]  Philip A.E. Brey,et al.  The Politics of Computer Systems and the Etics of Design , 1998 .

[10]  Carl E. Landwehr,et al.  A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .

[11]  K. Mosier,et al.  Human Decision Makers and Automated Decision Aids: Made for Each Other? , 1996 .

[12]  Clifford Nass,et al.  The media equation - how people treat computers, television, and new media like real people and places , 1996 .

[13]  Raja Parasuraman,et al.  Humans and Automation: Use, Misuse, Disuse, Abuse , 1997, Hum. Factors.

[14]  Monica Duffy Toft,et al.  Encyclopedia of violence, peace, and conflict , 2000 .

[15]  L. Jean Camp,et al.  Trust and Risk in Internet Commerce , 2000 .

[16]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[17]  G JohnsonDeborah,et al.  Using the new ACM code of ethics in decision making , 1993 .

[18]  Aaron Strauss,et al.  Carnival Booth: An Algorithm for Defeating the Computer-Assisted Passenger Screening System , 2002, First Monday.

[19]  Ellen Alderman,et al.  Right to Privacy , 2001, Challenging Human Rights Violations: Using International Law in U.S. Courts.

[20]  Max Boot The New American Way of War , 2003 .

[21]  Batya Friedman,et al.  Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..

[22]  A. D. Jones,et al.  Obedience to Authority , 1974 .

[23]  H. Jonas The Imperative of Responsibility: In Search of an Ethics for the Technological Age , 1985 .

[24]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[25]  E R Wold,et al.  The rise and fall of the futility movement. , 2000, The New England journal of medicine.

[26]  Lynette I. Millett,et al.  Reasoning about computers as moral agents: a research note , 1997 .

[27]  J. Fountain Building the Virtual State: Information Technology and Institutional Change , 2001 .

[28]  A. D. Jones,et al.  Obedience to Authority , 1974 .