Sunday, December 8, 2019

Ethics in Information Technology Philosophical Ethics

Questions: 1. Analyzing the ethical dilemma on artificial intelligence in Australian industries from the perspective of philosophical ethics. 2.Criticism of Moors Just-Consequential Framework with suitable examples.3.Comparison between IEEE and Australian Computer Society Answers: 1. The big-businesses of Australia have been embracing the AI or artificial intelligence. About two-third of them has been planning to replace the jobs or has already replaced them. The AI is that area of technology that includes intelligent machines working and reacting like the human beings. They are used for planning, problem solving and speech recognition (Burton et al., 2017). The research done by the technology consultant of Infosys has shown that large number of industries in Australia has been investing in AI on an average of eight million dollars or more per annum. In Australia, this technology has been helping in automatic ordering of driverless tractors at farms, delivering parcels, pharmaceuticals in hospitals and so on. The banks have been also utilizing it to forecast the reaction of the investors to the market shocks. The mining company has been using the predictive analysis in order to reduce the breakdown of machines and schedule maintenance. However, the firms has been also grappling regarding job security and technical skill shortages required to impose the new technology (Burton et al., 2016). Hence, the biggest problem for most of the companies going for AI has been the ethical ones. It deals with when and where it should be deployed and whether it has any impact on the humanity or not. The companies are also required to re-skill their empl oyees so that they could take part in the changing workplace. Despite all these, creation of machines incorporating the philosophical traditions of the world has not been easy. The potential dilemmas faced are that people might become unemployed due to the automation. The AI system helps the industries in becoming more efficient in production rather than replacing the employees. This has been proved by analysis and experiences that shows that it has been creating far more jobs than loosing (Singer, 2015). Another fear rose that people would get more spare times as desired. However, the difference between the leisure and work has become less evident as the tasks could be performed from anywhere in the world. The needs to stay competitive in the current market scenario have resulted in much more engagement of people than in the past. Though the AI has contributed to the continuous evolution of trends and technology, it could be also result in a hope at the same time. This hope has laid in the fact that the automated agents could take some of the jobs providing some spare time for the people. There has been a claim that the AI could be used for the tasks that are not needed and lead to destruction. Disclosures have shown that the government could leverage technology while fighting against terror and crime keeping the monitoring of the innocents at risks (Kernaghan, 2014). Again, many argue that the successful use of the technology might lead to human extinction. However, development of AI has not led to any global catastrophe so far. The AI has contributed to the continuous evolution of trends and technology. It could also result in positive hopes at the same time. The method how the AI is to be utilized does not lie on the development of its technology but on the intention of human beings. In case that it was not been developed there laid no guaranty that terrorism and destruction could be controlled. There is no further warranty that human beings would be able sustain a civilization with its ethical standards existing already without the AI. 2. James Moor was of the most renowned professor of philosophy at the Dartmouth College. His reasoning has been that the computers could be shaped to perform any task. It might include those which were not been thought of also. Moor claimed the ethics of computer and information along with other areas of applied ethics require some theories. These theories must coherently unify the consequentialist and deontological aspects for the analysis of ethics (Kimppa, Heimo Harviainen, 2016). The consequentialist theory, as proposed by Moor, has emphasized on the outcomes of policies under the compulsion of justice. Thus the consequentialism was transformed into both sounding theoretical and practical approaches to the problems of ethics of information and computers. The primary features in the framework of Moor comprises of: Deliberating over different policies from any neutral perspective in determining the criteria for meeting the ethical policies. A policy can be considered ethical if it has: Not been doing any unnecessary harms to people and groups Supporting the rights of individual, fulfilling duties and so on. Selecting the most relevant policy from the collection of policies arrived lately at the deliberation stage. It should be done by ranking the policies of ethics regarding the justifiable harms and advantages. However, it must be ensured that: Careful weighing has been done between the desired and worst outcomes in the policies of ethics Distinguishing between the disagreements about the values or principles and facts are done while deciding about the adoption of specific ethical policies (Eggleston, 2013). Thus it is seen that Moor has indicated the evolution of proper habits of the characters like truthfulness, helpfulness, honesty, justice, generosity, kindness and trustworthiness. These elements have been significant prerequisite to behave morally. Hence, in this example, if someone has not developed this, it might become tough for that person to carry out the successful steps in the consequentialist model of Moor. For such case, the elements of character based or virtue ethics has been also presupposed to be imposed in Moors framework (Hammond, 2016). As claimed by Moor, rational discussion on relevant policies has not been impossible and desirable highly, despite of disagreeing on the abilities of various polices. Moor has shown that the disagreement mainly hinges on the distinction between the facts on the case rather than that on the difference in values. In another example, the disagreement as proposed by Moor might radically change most of the debate about the necessity of securing MP3 files (Grant, 2016). Let the fact of downloading of MP3 file for previewing them, be taken. Here, the downloading has increased the sales dramatically along with declining the quality of the produced music. Thus by permitting the assessment of duties, rights and consequences, one could definitely reach at the clear idea of moral implications. Despite this, the method might leave a compelling unclear area. This is because of the difference between person to person in valuation of the duties, rights and consequences. Hence, the idea received by considering that issues from every angle has been worth the cloudy area. 3. For comparing and contrasting two professional bodies of computing the Australian Computer Society or ACS and the Association for Computing Machinery or ACM are taken. Both the Codes of Ethics has possessed a strong concentration on the ethical role throughout the profession. They both link with the owners responsibilities especially at whatever platform they have been manifested. For example the actor requires internalizing the mentioned perspective of owner. The grammatical role named Who of the information security has been represented effectively. This is done in the 3 ethical codes by aspirations such as deontology, virtue ethics and teleology. In both the cases the mentioned virtues has not been spelt out in codes usually (Aris et al., 2015). However, this could be extrapolated from the specified. The differences of the two ethics of code are shown according to the grammatical heading with its perspective. WHO: This relate to the integrity in relationship to the ultimate aim of leadership of business and the stakeholders responsibilities. In the ACM the aspect has been to contribute to the well-being of people and society. Here protection of the primary human rights and respect to the diversity of every culture is done. The minimization of the threats to the security and health are done. For ACS, the upholding and advancing the effectiveness, dignity and honor of the role of Information Technology is meant. This is done by sustaining the high levels of ethical conduct and competence. The integrity of the responsibilities is also maintained (Clarke, 2016). WHAT: It relate to the stakeholders in the hope to influence a highlighted computer project. The ACM articulates and supports policies supporting the users dignity and other areas harmed by the computer system. In ACS, the moral has been to act with professional roles and integrity while dealing with the employers, clients and employees. WHEN: It relate to the culture of work and relationship with stakeholders. The ACM refers to the respect to others and virtues of same justice (Tang, 2017). The ACS makes in taking the oath to attempt for developing the feelings towards personal competence and satisfaction. One must further not go for enhancing individual reputation in exchange of others reputations. WHY: This relate to the stakeholders in an atmosphere to change specially for those who have been obstructive. The ACM leads to involvement in specific training programs which need discipline but should not be very explicit. The ACS forces to keep professional distance from anyone whose Society membership has been closed due to the unsatisfactory conduct or unethical behavior. WHERE: It regards the needs of habitat and the quality of environment. ACM believes that the well being for human beings include a secured natural environment (Pearce, 2015). As a result of this, the professionals of computers developing and designing systems should remain alert of the potential harms to the global and local environments. They should further avoid harming others including the unwanted environmental impacts. For ACS, the conscientious objections could include imposition of the tasks of information technology on the ambience. From the above comparisons it was seen that the key aspects of difference between the ACS and ACM are found. The ACM has been consisting of the section on environment and incriminating. The ACS on the other hand has been devoid of it. References: Aris, A., Kassim, J. M., Ishak, H. Y., Salim, J., Noah, S. A. M. (2015). A Framework for Ontology Development of Information and Communication Technology Experts Using Thesaurus, Association for Computing Machinery Taxonomy and Domain Experts Approaches.Asia-Pacific Journal of Information Technology and Multimedia,4(2). Burton, E., Goldsmith, J., Mattei, N. (2016, March). Using The Machine Stops for Teaching Ethics in Artificial Intelligence and Computer Science. InWorkshops at the Thirtieth AAAI Conference on Artificial Intelligence. Burton, E., Goldsmith, J., Koenig, S., Kuipers, B., Mattei, N., Walsh, T. (2017). Ethical Considerations in Artificial Intelligence Courses.arXiv preprint arXiv:1701.07769. Clarke, R. (2016). Big data, big risks.Information Systems Journal,26(1), 77-90. Eggleston, B. (2013). Rejecting the publicity condition: The inevitability of esoteric morality.The Philosophical Quarterly,63(250), 29-57. Grant, C. (2016). Improving Business and ICT Ethics Educationthe Potential of Positive Psychology and Appreciative Inquiry. Hammond, P. J. (2016). 4 On Reconciling Arrows Theory of Social Choice with Harsanyi's.Arrow and the Foundations of the Theory of Economic Policy, 179. Kernaghan, K. (2014). Digital dilemmas: Values, ethics and information technology.Canadian Public Administration,57(2), 295-317. Kimppa, K. K., Heimo, O. I., Harviainen, J. T. (2016). First dose is always freemium.ACM SIGCAS Computers and Society,45(3), 132-137. Pearce, A. (2015). Adrian Pearce's Home Page, Department of Computing and Information Systems, The University of Melbourne. Singer, A. E. (2015). Corporate moral agency and artificial intelligence. InHuman Rights and Ethics: Concepts, Methodologies, Tools, and Applications(pp. 505-517). IGI Global. Tang, C. (2017). Community College Corner Community colleges in the United States and around the world.ACM Inroads,8(1), 21-23.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.