ecity2-infoethics.paper.pdf

 %6
? C_1
!"/
860(09124269862)
:K:= 3T:=
A+ :38#$
J% J 2 :2 $;
J% J ' '1;$
: M
'K %%P =H2 ,%<%%" 7 Evx Ni G" 1x B k'K %%P ;E1K& 8'9 7 vx k'K
@& 1 ;x k'K ;1K& , 0/ 624 1 «8'9 7 vx k'K» .B %< P 8@6P
k'K» 7%# 7 ^K e' ." 9 7 8'9 ;70 'K 7 8@6P (< =# 7 B 1 1x 7<
$B  k'K 6x k'K 4B =V + 60B ;E1a x 1 & ; ˆ @8 «vx
« vx k'K » .%4 x 1 ;vx ;E1w& 7 vx $ 'K =H2 ;1> ,2
w@8 ;E%6B 7 'K ;E=@/6B vx ,JJ*6 ,< 1x B ;1> k'K 8 i 0m@E
; «60 k'K» 7 «B k'K » =V ;Q 708 L .%4 x 1 ,&zJ* > 162&
.7 x1 %" 60 1x vx k'K -6* P7 1 &
La9
The Second Conference on Electronic City
=+: :16KB ,44 ;Q@:F # 1 > -6* P7 «8'9 )'» ,NP ;E:x ;2 7 V ( (ITC )9 7 8'9 ;70 I4 , 16 .+ 7 4B = 7 =@> 0 w&
"
.B 16& }7 $7 7 BB ;E;< =+: &< 2 $7 4K > 8@6P > I0
=# 7 B 1 1x 7< @& 1 ;x k'K ;1K& , 0/ 624 1 «8'9 7 vx k'K»
7 C" ;x k'K > B 1 16& ." 9 7 8'9 ;70 'K 7 8@6P (<
.x CEK & > 8h 7 =H2 K 1 ;E,P 7 _# * ‘0:" ‘H @h
k'K 4B =V + 60B ;E1a x 1 & ; ˆ @8 «vx k'K» 7%# 7 ^K e'
x 1 ;vx ;E1w& 7 vx $ 'K =H2 ;1> ,2 $B  k'K 6x
;E=@/6B vx ,JJ*6 ,< 1x B ;1> k'K 8 i 0m@E « vx k'K » .%4
k'K » =V ;Q 708 L .%4 x 1 ,&zJ* > 162& w@8 ;E%6B 7 'K
.7 x1 %" 60 1x vx k'K -6* P7 1 & ; «60 k'K» 7 «B
B ;E7 ,%< %%" ”% 1x ,0F 16&34 ‘E %0F 8'9 7 vx k'K ,7
7 7 SB %&
JJ* : 7 E)6x &< JJ* ;E,B E4x :E7s" x ƒx< ;EWE7s" EQ:
1
- computer and information ethics
- utilitarianism
3
- virtue ethics
4
- cyberethics
5
- internet ethics
6
- information revolution
7
- computer and information ethics
8
- utilitarianism
9
- virtue ethics
10
- cyberethics
11
- internet ethics
2
1481
AB 0" W 8'9 ;70 k'K ®> 0 _> j7& 1w< C+ 1 1IB6 7 A> .B %&
;70 8@6P 'K ;E%" 7 =H2 e9 CxB ; %0F O' @8 ‘/P 7 :x 34
.B 16Q NP &7 ;%C:F ,08 1 ;a FF 6& ~6# Q W* E W %& ,% ;EN& Q0E %
;N& l0E > ;70 ;%0N 7 1/B k9 1x %0& @8 E 1: 7 B ;70 1NP
®# d# ‡ CN B 4 ;70 %" ‘/B 7 3K žW" ,08 1 E;70 E K0&7 CN .%@0
K% 16& 7 .%%P 'K ;4=w& " 7 ,%7N& > -6* >B 8'9 ;70 ;34(
e %& ,< 8h 7 =H2 6x , B 1 7 8'9 7 vx k'K A# B 0&< ; B
.4 ,% K EyB" Rˆ 7 l0E >B 1`2 e9 ; @# jh
'K =@6# ;E%" K 7 & 1: @
(_% `
A)#
.]]
%0< 7 ¦¤¬­ . dh 8'9 ;70 7 vx
7 X8 => S% ;E:" ;' ª¨ ‘E ‘ 7 vx 8@6P 7 'K ;E%" ) K W0
k'K» E%/ 1x % k'K ;1K& ,%< %%" 1 1I2
1 «xK 7 %K x&» ,08 6x 8'9;70
Q:E7s" I2 10 34,0 .%& % «8'9
,F H2 )6x ;6# 7 8h .%B ›F
Q: B%0N 7 h 6B 07 w<
,JJ*6 ;E`2 ;w 7 vx 0 7 Evx
Ww@E @E 1 7 X7 NP l0P , . MIT
7 vx 0Er 7 @2P , ; vx vx
7 w76w ;Evx %& 1 & ƒ@x 0 7 w<
,xx ; SP ;BNP 7 8'9 ;E1w&
Wx:x .x %%P %0@% 8'9 ;E;70 Q
OE E7 7 k'K < ,% 1 & , %" 7
;E& O624 %7 1 ƒ@x ; 07 1x EO'
.%10 e ;%P =H2 ,0m@E 1x ... 7 80J
34 : ;E1" Ww@E % 1 X B#
X 7 7< %%" 1x ;%%P W 07 E4< C+ 1
07 CE l0P ~7 6> .% ƒ6B ,< ˆ%/ K 1x
;1K& Sh7 @ ,@4 7 %:* ,% CE ƒB
Ca8 8@6P 7 'K 6B 1x x 0W"
«vx k'K» a E,08 3 .2E k'K 0 W" 07 .B X' w76w ;Evx ƒ6B
I6B %/ E1E 7 7 ‘6KB «8'9 k'K»
)' 7» O*6B ,NP l0P G" 1x x
7 341" 7 ‘41B D6x !> 1 2 A> .4
7 % «ƒ J8» ,7 7 .%& %EK «6/0
.2 8'9 7 vx k'K ‘0 (< 34 (
«& 7 K ; ;2 ;Ei» ,7 1x ,< ;B 1 %: CN 4E ,%& e9 , 07 ;E1:%
'K ;E%%N 7 E K 1x Ei ˜& %EK
L/6 ;%0@: 7 ;2 7 X8 ;B 1 7 ^K
.7< %EK A 1 7
GxqE .B k'K ) WK XE7 k+ 1x %062
(¦¤ª¥) «ƒ6B» ,08 6x 07 l0P X@ G"
k'K > E16 ;g CE 7 K 6> 7 , ,<
C8 1K& dh 7 @h < 1x %B ›F 1
/ 7 (< X< X< 1x %/ 1E 7 ˆ7%> 7 8@6P ;E%" K 1 ;x X8 ;1K& ,08 1
7 %/ AB 7 .K" w76w ;Evx 'K 7
5
- The Human Use of Human Beings
- God and Golem, Inc.
% #&' $' !" #$ .
. (!)
* +* (&, 6
1
- Norbert Wiener
- cybernetics
- industrial revolution
4
- automatic age
2
3
1482
The Second Conference on Electronic City
C_1
! *9 .F
1x 7< # 16& 1 «E,2 2 I6B » )6x
%x > 7 } B < 2> Xa r 7 j0 0 W" 7 1x 8'9 ;70 D6 'K 7 8@6P
z6* 7 j0 – ,2 %0@Ew& ;E7" D+
.%& w&< X8 7 ^K x
.(©¦}©§^^ ¦¤©ª07) B < C24 6KB
1x %0x 0W" «,2 2 ®I6B» )6x 7
/B 6'B > ,F 00 ;EO 8'9 ;70
a<.) -
%EK ,44 ˆ @8 E 7 0 < W ;%0@
w
6 ;EžW" @6 < E 07 7
07 8'9 ;70 @ 'K ;E%" B .x
@ 7 ,NP EžW" 0 .B ,NP ) ;s7
N # ;E& 7 I2 ;E% ;624 ,0F – %062E x & < =& 1x ,< P
E% 7 ”< ‘8@ ; 8'9 k'K ,08 1x 4
7 B 7 ;
< ,NP ;
F E .8'9 7 ;g
.%@ K 8'9 8'9» 7 .B 8'9 O" 8 wI
1/P 7 < E 8'9 k'K ;341" A'K 07
7 C2 1m0F 7 ;g 1 7 B 1 B
r* 1 3QE 7 =# ƒ6B a0 .(¦©©^ ¦¤ª¥ 07) « %E* 4% 3Q 1#
.%& ,@0E < > L%E 7 + ;1 /h
@62 %0< ‘B 0Hx @ 7 I2 4% 0
!9 7 a 1x «%8 BB A» 1 7 fB %< P 1x B ;g – 7 8'9 O
< 7 Dx
7 Ca8 'K CEI .K" B SP @ 4
;EQ CE < a % P .& 7 %
8'9 k'K _> 7< CE 7 ; SP A
;g } 7 =% %0< A9 1x %8'9 08
.%:x =# 1 E 10 @
:%4 07 7 .%0 (
B)-# 4$ ; E 7
62 ;
F 7 ~ ;1K7 C62E E)4 %B @H 7 %" K 1x C62E EQ 1w C62
.(¤¬ ^¦¤©ª 07)
C2P ;E6KB ˆ @8 < E w6B &
7 (;4) 6K< 7 7 Ca8 ;Ei 7 <
.%N %x :Q 'K
.(¤¬^ ¦¤©ª 07) ( ;EP ,2 1 B 1/& ,2 C2P
07 a 1 I4 % «8'9 J8 » 7 , 7 , 1
,% 12 1 X% 7 < ;w ;Ei - @h
,2 ,&;w ;Ei 1x % «8'9 ”& » ,<
a ." :> a ;w ; % ,P 7 <
O" 7 8'9 ( ;EQ 1 1627 ,&J*& E
8'9 /B7 ‘0N" % 7 < 62 KB 64
.;g – ^K H
P B ,% 8'9
;E%7 7 R> ) 8'9 1 %0x 3K ~K ,NP The Second Conference on Electronic City
;E/ ‘B 8'9 ‘@E 7 % B K C2P
E $+ /$
... 7 ;4C@J !@/ > 1B# AR%6B ,F 0Er
;EW0x 1 7 < 6K" 74 < %& 07 a .%0x O"
K ;Ei @ 3QE B 3"L/ 7 k'K
‘
0 1 1x B ,< < > + 1x 4 16 7
%4C@J ;P X 7 %0x 10: 1:% ® a
7 % %& B < r 1P7 1x 8'9 O" %>7 ƒ
.B 4% + 7 .3v WK 4% `2
:%0x 7
,% 1m< 7 7 %-6* 7 %/6B _> ; ;2 ;E < CE ,: X7%
;E& 7 k9 A> .B CE 7I6 %0 B
,:4% @ ˆ 1x % 1/ 7 ;4
.% %P7 ˆ @2P 7 ˆ r 1F ƒ L'K 7 4
2
- matter-energy
- information age
4
- information objects
3
1483
1
- great principals of justice
`
#c+
1 7 ,%& ,@0E 7 < :* / ; x
2@ k'K 0 ‘K& Sh7 K 07 1x < . P7 162& 4%
7 8h =# K I2 ;E& dh 1 ,< 7 < ;E w& 7 %& 1 7 9K !/
=# ‰B 1 ˆ /B 7 %@ 8'9 k'K =H2
.v L%E 1 ,@0E BB A 1 &
B% ,< 6K0&O7 >& 1w< 8h
BB W 8@6P > ,2 1 ƒ6B Q 7 a
=# 7 O7 7 & 2 7 .%E
7 c0 ; 7 44 14E 7 %0x I < w&
EO7 7 x jP 7 (< 1 ˆ @2 8'9 k'K =H2
7 žW" .B ,Q 7 ‘ 7 2 1 c
k'K =H2 => 7 =# 07 O7 1 67 .@ ~*6B ª 7 EK ƒ ­ ; § ;< ¦ 14NF A
B &' 7 O7 1x C C0x a 8'9
7 %& BB A 1V 1 ;< %%# ;B10@x
‘63" 'K ;E&7 %8 7 %%P =H2 !
.% < w&
.%%P =H2 7 8h d# x Rˆ 7 P W"
A 7 %8 7 E& 7 EO7 ;1w& ;1/P E
Y
41- Zb'
.%0x %E j@6P , < ,< 6 1x P7
E 7 162& ‘/P 07 7 !%J ;E%" w
%E =w& %&163" 7 A7%6 ;E17 ® «E17»
,42 4 .B Q0E Vw %x 7 O3" <
E 1 yB" ; w ;+<B %8 %0N SP 1x
;%E& 7 10 Vw6 7 -6* ;El0E P7 Q0E
x 07 O7 .%& 8'9 k'K ‘> :B"
P7 1x < a0 .%4 k'K 2
E 7 K H 1/P ƒ «A7%6 ;E17 ‘8@»
%>7 'K ;EO B 3" 4 -6* ;El0E
, e ;6 ;EN 7 %8 BB A <
.%2 7 Vw6 7 .B %m" 7 CN
4 1x B ,< 07 AR%6B ,42 = 1 8'9 7 k'K 8h =# ; 7 !9 %
+ 7 < E (%< 6:" 1w0F) ## ;4X7 D % .% B ( &7 7 &
7 El0E A6B 1 O+< C C& 16& 7 >
:x ;%016B 1 07 B0&O7 , (¦¤¥©)
BB A 1 1w< c7: C7 %/6 ;EW0 7 E&
;70 W %< 'K =H2 7 8h /
;6B Q0E, 0 A 1x F .C& 7 %8
®% ;E ˆ 8 .j@6P ‘0# 8'9
; 07 1x 67%# 7 c& N0 .%E B1 k'K ;
Q W ;< /B 0 'B > 1x;70
,< ; ;10 % 1x B ,<% XR 8@6P E
. x@ %E (# 2 = ;EO
O" =8 ‘
0 1 WK ;Ei ´7<CE
1x 0&7 7 CN A 7 E% @ e
.& 164 w a 8h
7 %0
C@J 7 )*6 1 B %0 %m" 8'9
!# 7 ˜%3v WK 4% `2 !9%
;E& 7 7 %8 7 A 64x1 ,w .%4 !# x3 BB = NF 1w< Q %& %E*
The Second Conference on Electronic City
< 6 1x («A7%6 ;E17 ‘8@») P W" .%00x % 7 %E / ;1/P
€# 1 O3" :" ;E& 7 0B 18@ 1m0F
6 ; , ( 8h 7 =2 => 'K
1
- freedom
- equality
3
- benevolence
4
- minimum infringement of freedom
5
- ethical relativism
6
- cross-cultural foundation
2
7
- methodology
- received policy cluster
9
- Moor
8
1484
Ev? > 1? ? f2> 0 .%? L%E 7 + %& 1/P ƒ 'K0B 4B 1x > P7 E,< W" 4E 1? %< %%" ;s7 'K ':
.4x1 %8 BB A ®7'/ < 4%
4 16 7 10 07 ;E? j'9 ,7% .&%
;E17 ‘8@ » ,< 1x ;1/P – 1R8 ‘/P ƒ ;%%P ‘K& % %%P =H2 ,%< %%" 1 1P 1?
k'K =H2 => 7 =# O7 –B 1R8 «A7%6
6 1? ? 0 k'K 7 &
" k'K %0 k'K
%EK 1 'K _> B0 ;E=> Rˆ @6> 8'9
%%P ‘K& 0 ˜%& ': 7 =H2 1 Q*B"
.& S7 1/P O3" 1x 7<
«v? k'K» Ev? W%" & 1? k'K
%0 8'9 k'K 00m0 2x 1x & 1P %
'K =H2 1? ? / ;10 %%P ‘0 7 .%
E %B a 1 .2 I2 ®s7 O<7 1QmE
«16 7 %& %m" ;v? ;70 ‘B » 1x 0B 7 ! ;w@8 1R8 ;1/P 1x ,2
EQ: :< ;E7 %6 7 .%E B 1/P z*& 6 1x ;P 7 %8 7 XB
.? >9 v? X8 ,: ; v? k'K
W0x 1x % % %B0& %E ,B 7 %E
,EK k6: ,: 7 4 A6B E7
G" .1 B 163" 'K 7 8@6P €# 1 ^K ;&
7 ,: BK 1 .%%& E 7 Ca0 ;
4
% 8'9 %%P ;70 XR 0&< 1x 2x @
,< 1? % 5% ; «17 ‘62» M ¦¤¢¥ 0m@E
7 ,@/ 7 ,4x 7 %0& vx ,JJ*6 K
; %& 4 %#6 R 1? EfI0? ;E4?
8'9 %%P ;70 O3" 1 % 7 %0 ... 7 %7
k'K ‘62 ¦¤¥¨ .? I6B v? k'K O<
.%0B ; 1/P ;B 163" 'K fB 1/P
=& 18@ .%B ›F 1 1B M D v?
,< @E 2 624 2 ;0/ 8'9 k'K
. Q: %B &< ;E
7 &< ‘
vB ,2 7 vx ,JJ*6 B 1 ˆ 1x B
=& %& - Q: ‹? 1x ;N0:" ®7
7 E% ,< 07 7 8'9 ;70 k'K .&
C> =V _> 7 &< ;E=JB 7 L%E
K 8h N01 SB7 ;10N" 1x % EO7
1 Q627 ;v? ;EC@J ;v? CP JK
=H2 1w %E W&" C «vx k'K» 7 1x ¦¤¥¨ ‘E A9 . k'K JJ* =@/6B 7 ;70
«=8 k'K» =H2 7 1x $ ;E> 'K
) 0 1? E4? 7 %B ›F 1 E 7 E 18@
& % « ;70 k'K » 7 «60 k'K»
W*" ? 4 %#6 R ;EQ: v? k'K
E> 1? B ,0F 07 ;EO7 7 E% ®624.Q
,JJ*6 ; %/ 0 ‘2P ;EO' ‘6 .%&
k'K» 7 «1*6? k'K» «;Q17 k'K» a
%" 0&< v? k'K v? X8 ,%0@: 7 1I2
.4 «B%0N
.%?
(_R `
?@( d,]
The Second Conference on Electronic City
f&' $' /
M6B )6? :6 G" 1E 1B 1 M
7 ¦¤¢¬ ;E7 ‘/B A: ¦¤¢¨ ‘E X7 ‘@ 0 1> 1? k'K 8h 7 =H2 1? %& 8% 0 67 07
‘I2 ®%: 7 ,@E v? k'K %%P
e ,0 %¡ Q: &
" k'K B %>7
%%P 10 1 ,2P X 1 ,0 %¡ Q:
ˆ @8 7 %& %m" 2 Ev? W%" , %&
.%& %01'8 k'K
1
6
- medical ethics
7
- business ethics
8
- starter kit
9
- Deborah Johnson
1485
- agent ethics
- internet ethics
3
- nanotechnology ethics
4
- Walter Maner
5
- Old Dominion University
2
(_R `
*; + jJ-3 6,- hi]
0 L'K 1? %& %01'8 1K& 1 7 7
,2P B )6? :6 9K 1 N0 1 ¦¤¥© AB
.%00? !K /% '
ˆ ? =H2 Ev? %6/
v? k'K » ,08 MB'? ‘ :6 9* 1
1? 'K 8h ) V> 0 7 ,2P 3QE
k'K jh 1I26 ‘ ;s7 ®@& «–2F
.%? " %062E Ev? W%" %" %& 16I4
.2 v? k'K y ?" B % v?
60B 'K =H2 Ev? 1? ,< 0 ž E_#
%E B 1 v? k'K E >& 1 » 7 K / 1 %? A#6 ;Q@:F 7 DP # 1
.B ,2P 7 0 -/ 19 P 7 624 1?
,< -* ,2P «% =H2 1 ;%%P )7 q"
jh ; 1@ ,7< 7 dh 7 16& ; 1 J#0 =2 ;4=& ; H% Ev? 1? ;70 F 1? %E yB" WB" 1 %&? 7 7
.B e ˆ BB W" 1? %%& k'K 1> 'K ':7 =H2 „% E;70 B f v?
8 1? 7< 1 ? ;E%" 7 Š6 _> ;v? ;70 ' % 1? B 7 .B s7
=H2 6@E 7 E ^JK E16& @a8 C>
: «%3"L/ ˆ 0» Ev? 1? B ,< .v? 'K
; %0 1? _> %3"L/ ˆ 0 Ev?
(_R `
#+ g)R C)1L-
$ ;E@8 7 P7K;77 D2> 6/ E X
1@E !0 1? < ....%& ;
D 7 %3v =& 0
a 1 7%# v? ;70 ® ;E? 7 P
jh B 7 8'9 1N ; ;1P 7 B"
> .B NP ;
;'8 ‘@ v?.%B
.%< ? ! 2 ,< => 1? ? ˆ v? k'K
K ;E'K 7%# ; %> v? ;E7%#
v? k'K X B )6? M 8'9 @ 7
.(¦¬¤^¦¤¥©) B
)6x 2* ‘#I ;7 .%B ›F 1 ¦¤¥© 1? ? 7%
2 M0" ‘2B 1 ,2P ¦¤¥¨ ‘E =7 X 1 68 1 vx 0 L/
': 7 =H2 0 ;E» Ev? 1? , w@ 7 2 ,: W" 4E 1x %0x ;2
%00? %m" @% =H2 %0N W" 'K L/6
X 1 X% 2@ 2x 6:" 1x < .
>B 'K A@/ ;E0E % 7 7
.%&@ e X 7h CE QmE S9 1 %0x
;:" K Sh )6? «C4 A@/
qE X 1 6:" 2x 1x < 7'8
.%0?
. % CE E,< %
K 7 % «:$K ”'K» 6/ 0F :% «NI ;EQ6I&<» ”:0 E,<
v? k'K ‘0 B )6? 62* ,2P )6?
1? %& =% B ;E7 @ 6 1 1' 7
4 v? k'K > , 2Q ;E:? @
%0 B 8h =& )6? 2* W7 .%&
®# ) :$K ”'K DB 1 ˆ 8 vx k'K =H2
JK C> 7 v?; ;E 7 X
0 w Evx .%< %%" vx ;70 ;4x1
% 7 ;70 ‘IJ0 S 7 v? ,JJ*6 ;E`2
; 0 ;E10
4 w 7 %7< CE ;
a ;%%P 8h §¨¨¦7 ¦¤¤ª ;EB7 .,2
P ;E:$K Rˆ @/ .%34 6K «W0x»
E,< ®P ,7% X ;v? 8'9 1 (,?ME) 6B
E/ =@8 ; z*: :$K ˆ BB %%02
1 B? 60 (< 7 , ; ;v? ;70
.B %& 7
)6?
2
- What Is Computer Ethics?
3
- Methaphilosophy
4
- logically malleable
5
- policy vacuums
6
- conceptual muddles
1
- Rensselaer Polytechnic Institute
1486
The Second Conference on Electronic City
; K 'K %8 7 X 2> ; FF 7 ,
ˆ 60B 1x –4%" 7 41Ii7 B I X’B 1>
1x B :0x / vx k'K ‘Ii7 .% P7
6B ; –%%& l0E@E 16 7 D E1a
; EW$K Ca0 0/ X E/ %
: @8 Š6 1
”'K 1x B E;& w .... ;EW0x %E
;vx ;E: $K %8 / 1xx 4
1`2 ƒ 1F 4 .B NI ”'K X' ˆ + :$K
=E 7 '8 1@E ;B E: $K K C4 w
‡%  %B a 1 dh7 7 &7 %6 vx k'K
_# =# CE Q / 7 1R8 K 1R8 LJ
B 1m< .%0x w&< NI Q6I&<
1R8 % 1x B )x 7 ,< E .%0
:$K 7 16& @20 NI )FF 1x B #
;E: $K @ 1x C< %0 2* .%
4%"
.(¦¤¥©§¬¬ ) %E B 1 W0x ;
$K ˆ 6> .%3Q B :" 9 ,< ;vx
;E6Bx ® «:$K ”'K» / ¦¤¥¨‘E K7 E: $K 16B ,< , % ;vx ;E:
«0 0 ;3"L/» 7 H 7 vxk'K
;%/ X4 .%% 1R8 ,< IJ0 7 =8 z*& E 1x %4
vx k'K JJ*6 ;2 8B 1 vx;70
ˆ 'K .BN< %0B ;E%" ;0 E: $K )*6
BB 2 ;EO XNI ¦¤¤¨‘E .%& S7 (
6N 1x C0
4 E: $K 1x C62 ,< %0
;EO / 68 1 .7
:" CEI 1 ;EQ62& C % w@ « ,7»P7K
7 E E 0 /B 'B > a 'K
C02 14%" a>' 1 1P -6* ;E:$K
E 1x %@E %P7 8@6P E ; ; ,0F /
¦¤¤¤)C0
4 w 1R8 ;E:$K , 7
4 > .%0x O 7 @E E,< 8@6P
.(´^
7 K %& =H «BB ;EO» ; & 8@6P
k'K =H2 ; «BB ;EO » .7 -1- 67c;+ (_% m,]
.(¦¤¤¢ )%0x I6B 0 7 JK C> =V vx
K 07 (< vx k'K ®> W%" +< C:F 1x B @8 ;1a vx k'K 1 E
:K0& , vx k'K y @ 162P
.%:4 «8'9 )'» E /B7 %
%0 2 BB ;EO O624 7 I> 1+%+
«:$K ”'K» «0 ;3" L/»CEI ;4x1
E 7 S0 W ;< /B 0 6'B >
4%"» 7 «BB ;EO» «NI ;EQ6I&<»
A:@ 07 1x K 8h ;2 .E 7 %
:%0x 1h8 1`2 => ; O7 «1R8
%&x 07 '
ˆ V .B EO 0F O624 7 j ,<
8'9 ;70 %H 7 => 1x :$K ”'K z*:
.B
E7 I6B DB 1 624 ;x ;Q:" @h
The Second Conference on Electronic City
E1Kx ,4x ; E 7 E 0 E1Kx
;E& I6B 7 % 7 D @E 1 .%0x I>
.kJ A)JE -47 l.+
.%E WEx d 7 0 %%N %&x %0@&E a
4%" 'K S0 7 BB ;EO 64x1
2 vx k'K ; 2 ;EO 06 E
%02 16 7 P ;E:$K 0 ; 1R8
k'K ® =H2 1x W0 ;0 .B %I
8h 7 x L9 ”'K 1x 0 ;E:$K
N: E ¦¤¤¨ ‘E K7 B )06P = vx
.%0x => = 'K
«vx >9 & w7» ,08 vx k'K 1
1x x , 0F , E EP .%& e
1
4
- human values
5
- value-sensitive computer design
1487
- information revolution
- core values
3
- just consequentialism
2
W0x7 x 6 E,< 1 2 1QF `& ,< 1x %00x
; =@6# ;EDB< 0W" 1/B A> ;E;70
.%E ,:
S %0 %6 ;E;70 >9 7 2 ;EO
;EC62B j
6 #B 0F = @E 1
7 % 1 %Q0 1@ ;) %& EDB< 0F
%0& % @62B $ 1w0 ; B 8'9
.(§¨¨¢ ,4' ¦¤¤¢ % ¦¤¤¬X72
§¨¨¬;%) %& Ei :0x E ;3" 7 =8 W
`
n,]
.(¤}¦¨^
& P7 1? ;
F E ;% a 0 1? < ;70 k'K ®> ƒ` ;E;7< 6N K
,08 1 ,N? 0/18@ =? 7 B 8'9 ;%0
;%) B ;% F (< %7 ¦¤¤© G" 8'9
;P ;E%0 ”& .% «8'9 ;» =? M
DP x 7 «w& k'K » ‘a .(§¨¨© ;% 7 ¦¤¤¤
‘B %%P =& 1 %0 8'9 ; .OK 7 07 B ;< B
.%7 % DB< ,& 6KB ;E1J*:
k'K ‘0N" 1x %4 8'9 k'K ) K ‘a 7
,< ‘6 7 % «"76<» ;% E; 7 EDB<
,< ;EL> W ;
F % /B7 ,0F % vx
% 1? B ;’ & "76< 0/ % .8'9 ; -/h
‘a 7 .& =& ,&6J*& ;E4s7 7 A A@8
=» ª J 1 ,%B ; 7 .7 % WE?
( 7 K e' ) «,'x k'K» 8 ‘
0 1 O'K
:%0? N0:" «0
7 4 41Ii7 4B 1 1& 1x %0x 1
.%& 8'9 ; A/ "76< %
@ ;Q*B" B ,< B  k'K
.? ;4W" 8'9 ; "76< %
D+ 8'9 k'K Q 8 1 .%& 'K ;E/
. 8'9 ; "76< %
7I + ;w 0B %< 'K ;E1a c0 8'9 ; =? %0@ 8'9 P &
B ,< W%E 1w 2 E,< 0
QP O%J 60B ;E1a )FNF 1x %%P 'K a>'
.(§¨¨¬ ;%)%0x =@w E1a 7
8'9 P ; %> O 1 A ;%
%? Q ;B 7 %0? =@ 60B k'K B M
2 ;% ‘a ‘62& % 8'9 k'K ,08
%? ; "76< 1B 8'9 ; %< %%" ’ &
4 1x ;%0< `& ‘
0 1 ;P E 1a 1xF
.7 60B k'K ,2 ;EO 7 E4s7 7 A@8
:4 a (8'9) 164 E1a I+ ,E4 > E,2 };P E E %& - E1<4 ‘
0 1 P @
76 ”& > % 80J 6> 7 EC24
;162 P E ! , 1 .8'9 ”& 1V 1 0/
; ’ 8 ‘
0@ }; ƒ :* B ;
:;7> B %02 K 7 P Q ( ;3" 7 P Q (
_# P E 1x DB0 ; ;E6KB :-
7 %0E =w: ,< 1Q E 7 I `& > 0/
% ,2 + B ;1a 17 ;% 1a .&
; @ % 1? 8 1 7 «O3"» 06 7
1 1x E%7 7 Exx Ew@8 ;18@ :)
4B %0 2 8 06 60B 'K ;E1a
%B Q `& 1x EX") E‡# EW0x, 1B7
.7 @& 1  k'K 7 41Ii7
/ ,< DB06 7 %& A/ (`& K 7 1
4
- infospher
- Luciano Floridi
5 .0-/) 0 1) 2) , 0-*' 3!% $$ 4/
. 56 ' #$ * 0 7& !8% 9:; <:= -/ 0)
2
- flourishing ethics
3
- macroethics
1488
The Second Conference on Electronic City
.BE%/6B ,x 7 7 O7" I> ” 1
vx ;x & ;E;w % x 1x %B
%E P 7 1 8'9 ; I> 7 1/B 7 %?
8'9 ;70 ˜ %EK 8@6P =H2 CN w
K @8 'K ;E1a 7 EW0 e9 1 =H2 1 0?
1m< ;6: 2 & ;E % . v 80J Q 7 E 6 ) .7< %EK P
;vx CHP
"!-c
HI d-O -D- %6
? G
7 «Ef77» Evx W%" +< 1w0 1 1P B 1 vx k'K E &7 ‡ !9 6N %&
; 1 '6 ;1`2 «EwE» $B @ BBP
1x %& > e =H2 7 8h E1@ ,
vx k'K ;E1+%+ 0 ˆ 6/9 ;70
.B j06 :E7s" ;E1 7 E1B‘@6B 7
iI> )E
*B w
0 1`2 0 .B
=+: 7 vx
1 1x B «0 0» 1w 2 (... 7 =B W< B
;vx CHP
:B %& C2 Š0"
0@4 7 JK C>
;w ;E
, X0@4 7 JK C>
;1> ;E`2
;0 E1 7 E 1w0 ,0@9 }68 7 #
,%& NP
%16 6/ ;E 7 A
B G7B ‘H
So: (_% ],d
C0 7 1x ;6 7 1w0 @ }(
; ;2 ;E 1x «NP ;
» ,08 1 vx
%EK ,2w
S0 1 6B A60x
162K %0K@ Evx B @/ 1 1x / P
«%& 21 ;E%%N» wK ;E
X j
CE >6B %0 7 %7@ 1K ;@ 7 1 7 %&@
.%062E Evx 0 ; BB :F
The Second Conference on Electronic City
.%< )2> 1 =+: ; ;%%N ;x X
.%062
wE .%062E EwE ;vx 0 9* Q w
;2 ‘ x X 8B 7 C> Q ;B K .%0x rI @62B 1 ,7% 1x B 2x S7
0
QP ; 7 ;J6 ;E
Q 7 .% ,2
K 7 %" ;wK 7 8'9 ; 1 1%8 EwE
,NP > . P7 ;vx ;E& ,2
1 E= ;6# 7 C62B x ®# ‡ ; ˆ Q
;E" Eƒ ,=# ,F ,0xx ;2 6/0
K «,4O7x» D+ .%0 B EC62B «O7x»
cK ,4x 60 ,a# E24 E2v I
=8 7 %B ;Ex& ,0@& 7 ;< Kƒ ,/% .%%& QP ;vx ;E& 6:" ... 7 ;%
,EQ .%00x / ; ;E;<  67
”'x7 ,w&
" =V JJ*6 60B -i7 ;2 6>
1w %% ;h N0 1 1x %8% B ; ®@4K
7 ( # 1 7 ,B0&,7 7 ,%2> ,@/
@E 1 1/P ; /0 60 9* ,x '
.4 X Evx $B
.(¦¤¤§IvB) .%
'
ˆ V .2 4 CE ,%0F x jh %C:F P7 $B ;70 ‘B 1x +: Ca8 C> 1 ,
*B ,B%0N .x & %< %%" ;vx ;E1Kx
EB)7 ,4%B EC62B ,4=# X ,B%0N
;1@ ... 7 vx ,4%0&7 8'9 ;70 ,@/
1
- logical security
1489
a 1 P7 .%,% ;70 ®% ,7 =+:
;rK 7 -/h ^*& 6K% X 1 C27 %* Z' U[4 .h,d
.(¦¤¤¤ X72 7 §¨¨¦Gx) B %& B ;
X@8 1P 1x vx k'K _# 62* %
w< 7 ¦¤¬¨ ‘E . JK C> ‘`2 4 ;w ;E
%& 3K ;< ;E) JK 8'9 ; Q"
‘`2 vx k'K 1:0 =# 8h Q w
,%7N& (... 7 6K" 62
N ;E10
E ;B %K X
/ .B X w $ ;w ;E k>
E ,< 0 1x %& 1H ;1#R w< ®Q0x .x a0 .& 162 X w % 1x %7 @ 1x %& K J*& B0& ®@& %P7 ;%7N&
7 B ,x vx ;N E1 @ 7 < % 8'9
16K0& ID @& fB %7N& ,< ® 67 ;E
Q E74 .(¦¤¤­@6B) %& 7 e' 7 1/
«‹
X 7 » 1m< ® @8 ž68 .%&
7 , % ,21 7 ;
X ;Ex& 1x %%6/
G 7 3Q 0x e9 &7 Q0x 4 X
7 O7 1x %00x E
X L ;1a>' = ‘B
JK C> , N0:" ; E16@x %E* N@P
/0 7 .(¦¤¤§,2P)4@ O1B ‘0
E
JK C> ¦¤¢¨ ‘E =7 .%E =w:
;1a>' = W* O R %0F X
JK C> %%N ,0x , ,< .%& DJ ;vx
1x %8% ;
X ;Ex& 7 ˜%E =w& NP J6
vx k'K ®> @8 ;E1+%+ ,0m@E ;vx
B» ) E
X + vx ‘B R E, 1B E
;vx ;E1w& 7 Evx I6B x7 NB .B
1x %7 X ;2 .%0E B («
X
‡6& 7 12 62P ;BKr ;7<S@P @/ 7 @B + vx %& % E
X w
6BK 1x 2x ; ;vx ;70 J*& 8'9
1w0 A> .%& % ,6B7 ; K ;E
X
7 (w&
" 8'9 a) «f2>» 8'9 j ;%NQ
‘B R E, ˆ I 1x %8% ;
X ;Ex&
.B X@ :F %062E ,4%00x%%N 7 X@8 f6B
‘`2 w ‘`2 .%0E B 16B7 ;Evx @E
1P ,< Q@:F %& 7 60 6 ; 1P7 16&34 ‘E X -6* P7 ^JK w 1x F B ;%m"
WEx 7 ˜ O
Evx O" % 7 ;%02"x 1
k> :x e , w 14 1B 7 B e9 =
®> ;%%P 8h W%" DP ;vx ;70 @
.j6K ;J# !> 7 ; B -Ҡ
;E(» ( « ! » «;7x » =V JK C>
.(¦¤¤¤ 7) %& ... 7 1w& ;7 «ƒx
.B 21 ;E, I6B ;EC6Q Ÿ w
, X0@4 JK C> I> S0 1x < ƒ ƒ J# EC6Q h ;EA %%6/ ;2
60 , X0@4 1 c =H2 B D6 60
J# %8% ,%0@: 7 ,h = .B C6Q
C> =H2 1x 4 _# B ,@E 4
7 %0x X7# h :* X@8 EC6Q w
I6B A 1 2x 4 '
ˆ V .%& e9 JK
7'81 .& @& 1 C8 ‘/B ; ;%%# 3QE =H2 %& 60 !9 6K0&,7 7 w&
" ;E7:
6/ ˆ BB ;J# !> 3K 7 1 ƒ B7
C> I> DP 0@4 %E _# B2> 2
;
X ‹
;Ex& N0 16 .B 47 7 10
E"
C> I> CE 7 0@4 CE 7 . %EK z*&
;Ex& ;2 L3> DB 7 %!9 9 1 0 a 2 ;EO Cw# DP 60 JK
.& E
X j0 7 ƒFx
1IB6 .%& %EK 0Er W< 7 w& K 7 'B
=N2 BDB % JK C> I> 7 0@4
kF &A" =V ;vx 2& 7 ) ;E/
1490
The Second Conference on Electronic City
;J# !> Ÿ 8h Q1:0 w 7
# 7 NP 0 ;Bl0E@E .%WK ‘8h 7
6. 67/p1 .n,d
Q0E Vw 7 %/ .B > ;E1+%+ ;10 7
ˆ + % 1x ;s7 zJ* ‘B71 vx ,JJ*6
;QE A60x =V =H2 ;2 B a L'6K :0
,NP % E,< = @E 1 .% rI" 7 X6# j@6P
.B %&... 7 B% 1 E JK C> 1 7
 B %0@& X 1x E
F ;2 7 K ,"
" E`2 S9 1 .%3Q ;Q@:F
B ; NP 806 ;1> $7 -6* vx ,JJ*6 .
C> I> W*% ,% 8'9 ;E;70 1 6B
.%
ƒ76w R X ; 660 0 7 JK
ž/ CE 4 1x % ;%/6 S0 $7 ;E;70 K ;E:x ˆ 6/9 , .B
1 1x %062E 2x 3"`2 ,JJ*6 7 %4 %0 1R/ 7 %& %0N 6KB
.%00x )06P ,< 7 %-7 %" .%0P x& B ; ,NP ;J6 R
%0 %#6 R ;6/ ;Ex& %& DB ;E:x , 6: 1FE ;
Ÿ J6 Lw& /h7 C62
7 k ,B%0N ‘2B 7 (ACM)1 ;vx ;E& @
< 1x BP A†B .B ;7< N 7 %0N
%E ; E=@/6B 7 E=JB (IEEE)ƒ76w
0+ 7 ;E:x , Lw& ,%& !@8 1 ;%7 0F
%x N0:" 7 Sh7 vx ,JJ*6 'K ;E`2
%E* a 6> 7 BB ;Ej
ˆ /6 7 ; '6K
.& %04 vx X8 B0&x ®7 B ‘ 1x
–%
6;#-kD q,d
NP O<
;B 1 A# A> 8B 1 vx k'K 7
7 ; NP 8'9 ‘w& 1 , 6B 1m0F
NP k'K» ,< 1x B 7 B CN 7 SB7 ;10
E ˆ 1x B y 62* %& CE ,2w 1 0+
X 60 %0 NP ;E1w& .C0 «8'9
(< 7 ‡% 7 ,6 17 K 1 ;7 ;
K C8 1 7 .%00x =J6 Q%w 1 ,NP BB
7 0 7 BB ;EW0x 7 ,NP ‹
;E 7 E1*6x
CE @h 4 NP &' 62* ;
1x %B" , . B6B ,NP BB X 8@6P
7 % 2 ;EO 3" 1@E @8 ;E/ ,7<
-6* SP Q0E ;E4s7 NP O< (
7 k'K 1x B y 62* Q *B 1 .& I>
" &< ;E/ ; ;EO< < –B 1QF
P ;E7%# 7 1 7 NP 6>B EO
.B EWB" 7 –7<@
7 %4 !@/ 7 _# Q0E E3 @
The Second Conference on Electronic City
CN w %& .%& A# 7 O*6B 21F
8'9 ;0+ 7 =H2 K .%& ,< 8@6P > R#
;E:x 0+ 7 ,%7N& 6> 7 E , Lw&
:%
7 & ;E .B Q@:F 7 Lw& ,0xCE 6/0
4% 7h Q ;2 7 w&
" %K ;
NP ; ; @B 1 6: 7 6: &< ;E %01
‘8@ B NP 7 X8 ;%%" 60 1x > !@8 7 0+ ;ELw& I4 , < ,0x .%7 %8 S 7 l0E %P7 ƒ E ,< %0N :x 27
–B %&
1
- Association for Computing Machinery
- Institute of Electrical and Electronic Engineers
3
- global information ethics
2
1491
: *; '(% :; ' :8C`8T BU$ `8T &
S83; :21 :1 ‰A8; .(egkf) . -$R 8 :J% .&( J$ s(% (L y>)'+$
.:$; `0
Wiener, N. (1964), God & Golem, Inc.: A Comment on
Certain Points Where Cybernetics Impinges on Religion,
Cambridge, MA: MIT Press.
:;<
*
Bohman, James (2008), “The Transformation of the Public
Sphere: Political Authority, Communicative Freedom,
and Internet Publics,” in J. van den Hoven and J. Weckert
(eds.), Information Technology and Moral Philosophy,
Cambridge: Cambridge University Press, 66-92.
Floridi, L. (1999), Philosophy and Computing An
introduction, London and New York, Routledge.
................ (1999), “Information Ethics: On the Theoretical
Foundations of Computer Ethics”, Ethics and
Information Technology, 1(1): 37-56 .
Floridi, L. (ed.) (2004), The Blackwell Guide to the
Philosophy of Computing and Information, Oxford:
Blackwell .
Floridi, L. (2005b), “Internet Ethics: The Constructionist
Values of Homo Poieticus,” in R. Cavalier (ed.), The
Impact of the Internet on our Moral Lives, Albany:
SUNY Press, 195-214 .
Floridi, L. (2006a), “Information Ethics: Its Nature and
Scope,” Computers and Society, 36(3): 21-36 .
Floridi, L. (2006b), “Information Technologies and the
Tragedy of the Good Will,” Ethics and Information
Technology, 8(4): 253-262 .
Floridi, L. (2008), “Information Ethics: Its Nature and
Scope,” in J. van den Hoven and J. Weckert (eds.),
Information Technology and Moral Philosophy,
Cambridge: Cambridge University Press, 40-65 .
Floridi, L. and J. Sanders (2004), “The Foundationalist
Debate in Computer Ethics,” in R. Spinello and H.
Tavani (eds.), Readings in CyberEthics, 2nd edition,
Sudbury, MA: Jones and Bartlett, 81-95 .
Fodor, J. and T. Bynum (1992), What Is Computer Ethics? (a
video program), Kingston, NY: Educational Media
Resources, Inc.
Johnson, D. (1985), Computer Ethics, First Edition,
Englewood Cliffs, NJ: Prentice-Hall; Second Edition,
Englewood Cliffs, NJ: Prentice-Hall, 1994; Third Edition
Upper Saddle River, NJ: Prentice-Hall, 2001.
Johnson, D. (2004), “Computer Ethics,” in L. Floridi (ed.),
The Blackwell Guide to the Philosophy of Computing
and Information, Oxford: Blackwell, 65-75.
Maner, W. (1980), Starter Kit in Computer Ethics, Hyde
Park, NY: Helvetia Press and the National Information
and Resource Center for Teaching Philosophy.
Maner, W. (1996), “Unique Ethical Problems in Information
Technology,” in T. Bynum and S. Rogerson (eds.),
Science and Engineering Ethics (Special Issue: Global
Information Ethics), 2(2): 137-154.
Moor, J. (1985) “What Is Computer Ethics?”
Metaphilosophy, 16(4): 266-75.
Moor, J. (1997), “Towards a Theory of Privacy in the
Information Age,” Computers and Society, 27(3): 27-32.
Moor, J. (1999), “Just Consequentialism and Computing,”
Ethics and Information Technology, 1(1): 65-69.
Moor, J. (2008) “Why We Need Better Ethics for Emerging
Technologies,” in J. van den Hoven and J. Weckert
(eds.), Information Technology and Moral Philosophy,
Cambridge: Cambridge University Press, 26-39.
Nissenbaum, H. (1999), “The Meaning of Anonymity in an
Information Age,” The Information Society, 15: 141-144.
Spafford, E., K. Heaphy, and D. Ferbrache (eds.) (1989),
Computer Viruses: Dealing with Electronic Vandalism
1492
The Second Conference on Electronic City
and Programmed Threats, Arlington, VA: ADAPSO
(now ITAA).
Spafford, E. (1992), “Are Computer Hacker Break-Ins
Ethical?” Journal of Systems and Software, 17: 41-47.
Wiener, N. (1948), Cybernetics: or Control and
Communication in the Animal and the Machine, New
York: Technology Press/John Wiley & Sons.
Wiener, N. (1950), The Human Use of Human Beings:
Cybernetics and Society, Boston: Houghton Mifflin;
Second Edition Revised, New York, NY: Doubleday
Anchor 1954.