Evolving Realities: Ethical and Secure Computing in the New Technological Spaces

Artificial Intelligence, Virtualization, and Cyberspace
  • Joseph Migga KizzaEmail author
Part of the Undergraduate Topics in Computer Science book series (UTICS)


Artificial Intelligence discusses the new frontiers of ethics in the new artificial intelligence (AI) technologies, virtualization and virtual reality, and cyberspace. The chapter explores how these new frontiers are affecting the traditional ethical and social values. Our discussion is on based on the premise that artificial intelligence technologies create possibilities to understand and extend human knowledge to create intelligent agents perhaps with a human value base, intended to help solve human problems. We further look at virtualization and virtual reality technologies and how they inform our behavior based on our traditional moral and ethical values through the mediation of interaction through with electronic media. Our discussion of the social and ethical implications and consequences of virtualization is centered on two issues. One is that the anticipated benefit to society of virtualization as it extends known and relatively managed humanity’s social spheres and social networks in an unprecedented way through opening up of virtual domains of social interactions. The second benefit of virtualization to society is to avail tools and make it possible for those in society who want to create new virtual social networks out of the old and dismantle old ones. Finally, we discuss a global mesh of interconnected computer networks, commonly referred to as cyberspace, which makes it possible for anyone using a point-of-entry device like a computer, smartphone, or any other Internet-enabled electronic device to reach anyone else, with the potential to access the mesh, through a one-on-one, one-to-many, and many-to-one communication capabilities or through broadcasting via the World Wide Web. Cyberspace, because of immerse and telepresence capabilities and global reach, creates a potentially dangerous environment where one can do anything with no elegance, no accountability, and no to limited.


  1. 1.
    LaChat MR (1986) Artificial intelligence and ethics: an exercise in the moral imagination. AI Mag 7(2)Google Scholar
  2. 2.
  3. 3.
    Luger G, Stubblefield W (1993) Artificial intelligence, 2nd edn. Benjamin Cummings, ReadingGoogle Scholar
  4. 4.
    Asimov I (1964) The rest of the robot. Doubleday, New YorkGoogle Scholar
  5. 5.
    Williamson J (1978) With folded hands. The best of Jack Williamson. Ballantine, New York, pp 154–206Google Scholar
  6. 6.
    Waldrop M (1991) A question of responsibility. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Byrd & Fraser, BostonGoogle Scholar
  7. 7.
    Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28Google Scholar
  8. 8.
    Minsky M, Riecken D (1994) A conversation with Marvin Minsky about agents. Commun ACM 37(7):23–29CrossRefGoogle Scholar
  9. 9.
    Carbonell J (1979) Subjective understanding: computer models of belief systems. University of Michigan Press, Ann ArborGoogle Scholar
  10. 10.
    VMware.comGoogle Scholar
  11. 11.
    Singh G, Feiner S, Thalmann D (1996) Virtual reality: software and technology. Commun ACM 39(5):35–36CrossRefGoogle Scholar
  12. 12.
    Bryson S (1996) Virtual reality in scientific visualization. Commun ACM 39(5):62–71CrossRefGoogle Scholar
  13. 13.
    The handbook of research for educational communications and technology.
  14. 14.
    Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28Google Scholar
  15. 15.
    Purser RE. Virtualization of consciousness or conscious virtualization: what path will virtual reality take?
  16. 16.
    Wikipedia. Phenomenology, ethics and the virtual world. Technoethics.
  17. 17.
    Gruman G (2008) Virtualization’s secret security threats: virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers. InfoWorld, 13 Mar 2008Google Scholar
  18. 18.
  19. 19.
    Lewis P (1996) Limiting a medium without boundaries. New York Times, 15 Jan 1996, D1Google Scholar
  20. 20.
    Bhimani A (1996) Securing the commercial internet. Commun ACM 39(6):29–35CrossRefGoogle Scholar

Further Reading

  1. 21.
    Barlow J (1991) Electronic frontier: private life in cyberspace. Commun ACM 34(8):23–25CrossRefGoogle Scholar
  2. 22.
    Bates J (1994) The role of emotion in believable agents. Commun ACM 37(7):122–125CrossRefGoogle Scholar
  3. 23.
    Boden M (1994) Agents and creativity. Commun ACM 37(7):117–121CrossRefGoogle Scholar
  4. 24.
    Brandt D (1993) Cyberspace wars: microprocessing vs. big brother. NameBase NewsLine 2, July–August 1993Google Scholar
  5. 25.
    Cowie J, Lehner W (1996) Information extraction. Commun ACM 39(1):80–91CrossRefGoogle Scholar
  6. 26.
    Green M, Halliday S (1996) A geometrical modelling and animation system for virtual reality. Commun ACM 39(5):46–53CrossRefGoogle Scholar
  7. 27.
    Hayes Roth F, Jacobstein N (1994) The state of knowledge-based systems. Commun ACM 37(3):22–39CrossRefGoogle Scholar
  8. 28.
    Kanade T, Read M, Weiss L (1994) New technologies and application in robots. Commun ACM 37(3):58–67CrossRefGoogle Scholar
  9. 29.
    Munakato T, Jani Y (1994) Fuzzy systems: an overview. Commun ACM 37(3):69–75Google Scholar
  10. 30.
    Norman D (1994) How might people react with agents? Commun ACM 37(7):68–71CrossRefGoogle Scholar
  11. 31.
    Poston T, Serra L (1996) Dextrous virtual work: introduction. Commun ACM 39(5):37–45CrossRefGoogle Scholar
  12. 32.
    Riecken D (1994) Intelligent agents: introduction. Commun ACM 37(7):18–21CrossRefGoogle Scholar
  13. 33.
    Schoppers M (1991) Real–time knowledge-based control systems. Commun ACM 34(8):27–30CrossRefGoogle Scholar
  14. 34.
    Singh G, Fisher S, Thalmann D (1996) Virtual reality software and technology: introduction. Commun ACM 39(5):35–36CrossRefGoogle Scholar
  15. 35.
    Webe J, Hirst G, Horton D (1996) Language use in context. Commun ACM 39(1):102–111CrossRefGoogle Scholar
  16. 36.
    Wilkes M (1992) Artificial intelligence as the year 2000 approaches. Commun ACM 35(8):17–20CrossRefGoogle Scholar
  17. 37.
    Wilkes Y (1996) Natural language processing. Commun ACM 39(1):60–62CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Engineering and Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations