The Ethics of Computing

Computing technologies and artifacts are increasingly integrated into most aspects of our professional, social, and private lives. One consequence of this growing ubiquity of computing is that it can have significant ethical implications that computing professionals need to be aware of. The relationship between ethics and computing has long been discussed. However, this is the first comprehensive survey of the mainstream academic literature of the topic. Based on a detailed qualitative analysis of the literature, the article discusses ethical issues, technologies that they are related to, and ethical theories, as well as the methodologies that the literature employs, its academic contribution, and resulting recommendations. The article discusses general trends and argues that the time has come for a transition to responsible research and innovation to ensure that ethical reflection of computing has practical and manifest consequences.

[1]  Geoff Walsham,et al.  Toward Ethical Information Systems: The Contribution of Discourse Ethics , 2010, MIS Q..

[2]  Stuart Hannabuss Intellectual Property Rights in a Networked World: Theory and Practice , 2006 .

[3]  Kristopher Welsh,et al.  The danger of big data: Social media as computational social science , 2012, First Monday.

[4]  M. Eisenhower The Cambridge Handbook Of Information And Computer Ethics , 2016 .

[5]  Carl Mitcham,et al.  Convivial software: an end-user perspective on free and open source software , 2009, Ethics and Information Technology.

[6]  M. Angrist Eyes wide open: the personal genome project, citizen science and veracity in informed consent. , 2009, Personalized medicine.

[7]  Kenneth J. Christensen,et al.  The pledge of the computing professional: recognizing and promoting ethics in the computing professions , 2012, CSOC.

[8]  Michael Friedewald,et al.  Perspectives of ambient intelligence in the home environment , 2005, Telematics Informatics.

[9]  Govindan Parayil,et al.  The Digital Divide and Increasing Returns: Contradictions of Informational Capitalism , 2005, Inf. Soc..

[10]  Emilio Mordini,et al.  Body identification, biometrics and medicine: ethical and social considerations. , 2007, Annali dell'Istituto Superiore di Sanità.

[11]  Alison E. Adam,et al.  Computer ethics in a different voice , 2001, Inf. Organ..

[12]  Herman T. Tavani,et al.  Readings in Cyberethics , 2001 .

[13]  Kay Mathiesen,et al.  What is Information Ethics? , 2004, CSOC.

[14]  H. Joseph Wen,et al.  Data mining: Consumer privacy, ethical policy, and systems development practices , 2003 .

[15]  Immanuel Kant,et al.  Kritik der praktischen Vernunft , 2003 .

[16]  A. Edel,et al.  After virtue, a study in moral theory , 1983 .

[17]  Dinah M. Payne,et al.  A uniform code of ethics: business and IT professional ethics , 2006, CACM.

[18]  J. Bentham An Introduction to the Principles of Morals and Legislation , 1945, Princeton Readings in Political Thought.

[19]  N. Wiener The Human Use of Human Beings , 1950 .

[20]  M. Thelwall,et al.  Researching Personal Information on the Public Web , 2011 .

[21]  John P A Ioannidis,et al.  Informed Consent, Big Data, and the Oxymoron of Research That Is Not Research , 2013, The American journal of bioethics : AJOB.

[22]  Fariba Sadri,et al.  Ambient intelligence: A survey , 2011, CSUR.

[23]  Carlos Fernández-Valdivielso,et al.  Enabling Personal Privacy for Pervasive Computing Environments , 2010, J. Univers. Comput. Sci..

[24]  Guiou Kobayashi,et al.  Ubiquitous Computing: Any Ethical Implications? , 2010, Int. J. Technoethics.

[25]  E. Buchanan,et al.  Online Survey Tools: Ethical and Methodological Concerns of Human Research Ethics Committees , 2009, Journal of empirical research on human research ethics : JERHRE.

[26]  H. Borko,et al.  Computer power and human reason: From judgement to calculation , 1976 .

[27]  L. Floridi The Cambridge Handbook of Information and Computer Ethics: Information ethics , 2010 .

[28]  Antonio Marturano The role of metaethics and the future of computer ethics , 2004, Ethics and Information Technology.

[29]  Alan Borning,et al.  Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.

[30]  J. Hoven,et al.  Information technology, privacy and the protection of personal data , 2008 .

[31]  Shana M. Mason,et al.  Digital Disempowerment in a Network Society , 2009, Int. J. Electron. Gov. Res..

[32]  Betsy Van der Veer Martens,et al.  The new competitive intelligence agents: "Programming" competitive intelligence ethics into corporate cultures , 2011, Webology.

[33]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[34]  Richard O. Mason,et al.  Studying cyborgs: re-examining internet studies as human subjects research , 2012, J. Inf. Technol..

[35]  Immanuel Kant,et al.  Grundlegung zur Metaphysik der Sitten , 1906 .

[36]  N Baykal,et al.  A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example , 2007, Journal of Medical Ethics.

[37]  K. Himma The Handbook of Information and Computer Ethics , 2007 .

[38]  D. Tranfield,et al.  Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review , 2003 .

[39]  Michael T. McFall Real character-friends: Aristotelian friendship, living together, and technology , 2012, Ethics and Information Technology.

[40]  Kious Bm,et al.  The Nuremberg Code: its history and implications. , 2001 .

[41]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[42]  Paul Sollie,et al.  Evaluating new technologies : methodological problems for the ethical assessment of technology developments , 2009 .

[43]  D. Lyon Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .

[44]  J. Stilgoe,et al.  Developing a framework for responsible innovation* , 2013, The Ethics of Nanotechnology, Geoengineering and Clean Energy.

[45]  Bart W. Schermer,et al.  The limits of privacy in automated profiling and data mining , 2011, Comput. Law Secur. Rev..

[46]  Anja Bechmann,et al.  Using APIs for Data Collection on Social Media , 2014, Inf. Soc..

[47]  B. Russell,et al.  Problems Of Philosophy , 2004, Synthese.

[48]  Frantz Rowe,et al.  What literature review is not: diversity, boundaries and recommendations , 2014, Eur. J. Inf. Syst..

[49]  B. Latour,et al.  Morality and Technology , 2002, The Ethics of Biotechnology.

[50]  Rich Cohan Compliance and ethics: a critical interdependence. Behaving ethically means more than just doing things right--it means doing the right things. , 2004, Healthcare executive.

[51]  K Panico,et al.  Care in the community , 1995, Nature.

[52]  Luciano Floridi,et al.  The Informational Nature of Personal Identity , 2011, Minds and Machines.

[53]  Vincent Rialle,et al.  Environmental Cognitive Remediation in Schizophrenia: Ethical Implications of “Smart Home” Technology , 2005, Canadian journal of psychiatry. Revue canadienne de psychiatrie.

[54]  Björn Niehaves,et al.  Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide , 2014, Eur. J. Inf. Syst..

[55]  D Feil-Seifer,et al.  Socially Assistive Robotics , 2011, IEEE Robotics & Automation Magazine.

[56]  Armin Grunwald,et al.  From Speculative Nanoethics to Explorative Philosophy of Nanotechnology , 2010 .

[57]  David M. Wasieleski,et al.  An enquiry into the ethical efficacy of the use of radio frequency identification technology , 2008, Ethics and Information Technology.

[58]  Mark Shelton,et al.  Computer and Information Ethics , 1999 .

[59]  Nick Hine,et al.  Care in the Community , 2004 .

[60]  Paolo Dario,et al.  Scientific models and ethical issues in hybrid bionic systems research , 2007, AI & SOCIETY.

[61]  Gordon Hull,et al.  Robert Merges: Justifying intellectual property , 2012, Ethics and Information Technology.

[62]  Niels Nijsingh,et al.  Interdisciplinarity, Applied Ethics and Social Science , 2009 .

[63]  Larry W. Cornwell,et al.  A question of ethics: Developing information system ethics , 1989 .

[64]  M. Zimmer “But the data is already public”: on the ethics of research in Facebook , 2010, Ethics and Information Technology.

[65]  Philip A.E. Brey,et al.  Philosophy of Computing and Information Technology , 2009 .

[66]  Claire Marris,et al.  The Transnational Governance of Synthetic Biology: Scientific uncertainty, cross-borderness and the ‘art’ of governance. For the Royal Society Science Policy Centre (UK). , 2011 .

[67]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[68]  Philip Brey,et al.  Freedom and Privacy in Ambient Intelligence , 2005, Ethics and Information Technology.

[69]  Noëmi Manders-Huits,et al.  Practical versus moral identities in identity management , 2010, Ethics and Information Technology.

[70]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[71]  Lambèr M. M. Royakkers,et al.  Ethical issues in web data mining , 2004, Ethics and Information Technology.

[72]  Bernd Carsten Stahl,et al.  Morality, Ethics, and Reflection: A Categorization of Normative IS Research , 2012, J. Assoc. Inf. Syst..

[73]  Simon Rogerson,et al.  Computer Ethics and Professional Responsibility: Introductory Text and Readings , 2003 .

[74]  Aleksandra K Krotoski,et al.  Data-driven research: open data opportunities for growing knowledge, and ethical issues that arise , 2012 .

[75]  John Weckert,et al.  Professionalism in the Information and Communication Technology Industry , 2013 .

[76]  Linda Little,et al.  Pervasive healthcare: the elderly perspective , 2009, PETRA '09.

[77]  C. Gilligan In a Different Voice: Psychological Theory and Women’s Development , 2009 .

[78]  John Mingers,et al.  Combining IS Research Methods: Towards a Pluralist Methodology , 2001, Inf. Syst. Res..

[79]  Luciano Floridi,et al.  The Ethics of Big Data: Current and Foreseeable Issues in Biomedical Contexts , 2015, Science and Engineering Ethics.

[80]  Soon Ang,et al.  Turnover of Information Technology Professionals: A Narrative Review, Meta-Analytic Structural Equation Modeling, and Model Development , 2007, MIS Q..

[81]  Kevin W. Bowyer,et al.  Face recognition technology: security versus privacy , 2004, IEEE Technology and Society Magazine.

[82]  John Mack Beyond HIPAA: ethics in the e-health arena. Ethical guidelines help ensure that credible health information appears on the Internet. , 2004, Healthcare executive.

[83]  Mark A. Fuller,et al.  Ethical Information Systems Development: A Baumanian Postmodernist Perspective , 2009, J. Assoc. Inf. Syst..

[84]  Carina Girvan,et al.  Ethical considerations for educational research in a virtual world , 2012, Interact. Learn. Environ..

[85]  John P. Sullins Ethics and Artificial life: From Modeling to Moral Agents , 2005, Ethics and Information Technology.

[86]  Helge Toutenburg,et al.  The Social Control of Technology , 1982 .

[87]  Terry Williamson Predicting building performance: the ethics of computer simulation , 2010 .

[88]  E. Clayton Informed Consent and Biobanks , 2005, Journal of Law, Medicine & Ethics.

[89]  Bonnie Kaplan,et al.  Ethical Challenges of Telemedicine and Telehealth , 2008, Cambridge Quarterly of Healthcare Ethics.

[90]  Aristotle,et al.  THE NICOMACHEAN ETHICS , 1990 .

[91]  Wendell Wallach,et al.  Implementing moral decision making faculties in computers and robots , 2008, AI & SOCIETY.

[92]  Mary L Cummings,et al.  Integrating ethics in design through the value-sensitive design approach , 2006, Science and engineering ethics.

[93]  C. Allen,et al.  Artificial Morality: Top-down, Bottom-up, and Hybrid Approaches , 2005, Ethics and Information Technology.

[94]  Connie K. Varnhagen,et al.  How Informed Is Online Informed Consent? , 2005, Ethics & behavior.

[95]  Yueh-Hsuan Weng,et al.  Beyond Robot Ethics: On a Legislative Consortium for Social Robotics , 2010, Adv. Robotics.

[96]  Kenneth J. Christensen,et al.  The need for a new graduation rite of passage , 2011, CACM.

[97]  Lynne D. Roberts,et al.  The Ethics of Outsourcing Online Survey Research , 2010, Int. J. Technoethics.

[98]  E. Hildt Brain-Computer Interaction and Medical Access to the Brain: Individual, Social and Ethical Implications , 2011 .

[99]  Michelle L. McGowan,et al.  Big data, open science and the brain: lessons learned from genomics , 2014, Front. Hum. Neurosci..

[100]  Keith W. Miller Joining the Conversation about IT Ethics , 2009, IT Professional.

[101]  Woontack Woo,et al.  Managing Disclosure of Personal Health Information in Smart Home Healthcare , 2007, HCI.

[102]  Michael E. Gorman Turning students into ethical professionals , 2001, IEEE Technol. Soc. Mag..

[103]  Patrick Lin,et al.  Ethics of Human Enhancement: 25 Questions & Answers , 2010 .

[104]  Christian Montag,et al.  Psycho-informatics: Big Data shaping modern psychometrics. , 2014, Medical hypotheses.

[105]  A. Mostaghimi,et al.  Professionalism in the Digital Age , 2011, Annals of Internal Medicine.

[106]  Amy Gutmann,et al.  The Ethics of Synthetic Biology: Guiding Principles for Emerging Technologies , 2011, The Hastings Center report.

[107]  R. V. Schomberg Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields , 2011 .

[108]  Wen-Bin Chiou,et al.  A new look at software piracy: Soft lifting primes an inauthentic sense of self, prompting further unethical behavior , 2012, Int. J. Hum. Comput. Stud..

[109]  Michael Friedewald,et al.  Safeguards in a world of ambient intelligence , 2008 .

[110]  Aimee van Wynsberghe,et al.  Designing Robots for Care: Care Centered Value-Sensitive Design , 2013, Sci. Eng. Ethics.

[111]  Keith W. Miller,et al.  Computer society and ACM approve software engineering code of ethics , 1999 .

[112]  Joshua A.T. Fairfield,et al.  Big Data, Big Problems: Emerging Issues in the Ethics of Data Science and Journalism , 2014 .

[113]  S. Nagel,et al.  Self-Perception and Self-Determination in Surveillance Conditions , 2012, The American journal of bioethics : AJOB.

[114]  J. Weizenbaum Computer Power And Human Reason: From Judgement To Calculation , 1978 .

[115]  Sebastian K. Boell,et al.  A Hermeneutic Approach for Conducting Literature Reviews and Literature Searches , 2014, Commun. Assoc. Inf. Syst..

[116]  Deborah G. Johnson,et al.  Computers, ethics & social values , 1995 .

[117]  Kevin Mentzer,et al.  Foresight for a responsible future with ICT , 2014, Information Systems Frontiers.

[118]  Michael L. Anderson Why is AI so scary? , 2005, Artif. Intell..

[119]  K. Himma Artificial agency, consciousness, and the criteria for moral agency: what properties must an artificial agent have to be a moral agent? , 2009, Ethics and Information Technology.

[120]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[121]  Norbert Wiener,et al.  God and Golem, inc. : a comment on certain points where cybernetics impinges on religion , 1964 .

[122]  Manning Li,et al.  Advisory services in the virtual world: an empowerment perspective , 2012, Electron. Commer. Res..

[123]  Catherine Heeney,et al.  Breaching the Contract? Privacy and the UK Census , 2012, Inf. Soc..

[124]  T. Bynum Information Technology and Moral Philosophy: Norbert Wiener and the Rise of Information Ethics , 2008 .

[125]  Ken Wakita,et al.  Finding community structure in mega-scale social networks: [extended abstract] , 2007, WWW '07.

[126]  Richard Owen,et al.  Environmental science: Good governance for geoengineering , 2011, Nature.

[127]  Jeroen van den Hoven,et al.  Information Technology and Moral Philosophy , 2008 .

[128]  Vic Lally,et al.  Researching the ethical dimensions of mobile, ubiquitous and immersive technology enhanced learning (MUITEL): a thematic review and dialogue , 2012, Interact. Learn. Environ..

[129]  Robert M. Davison,et al.  The Ethics of IT Professionals in Japan and China , 2009, J. Assoc. Inf. Syst..

[130]  C. Allen,et al.  Stanford Encyclopedia of Philosophy , 2011 .

[131]  Luciano Floridi,et al.  On the Morality of Artificial Agents , 2004, Minds and Machines.

[132]  G. Lăzăroiu The Cambridge Handbook of Information and Computer Ethics , 2012 .

[133]  Martin Dodge Wright, David, Serge Gutwirth, Michael Friedewald, Elena Vildjiounaite and Yves Punie (eds.) 2008. Safeguards in a World of Ambient Intelligence. London: Springer. , 2009 .