Skip to main content

Applying “Moral Responsibility for Computing Artifacts” to PICT

  • Chapter
  • First Online:
Emerging Pervasive Information and Communication Technologies (PICT)

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 11))

  • 1367 Accesses

Abstract

“Moral Responsibility for Computing Artifacts,” nicknamed “The Rules,” is a collaborative project dedicated to continuously revising and improving a short document promoting a succinct and fundamental articulation of responsibilities that accrue to people who design, develop, deploy, or knowingly use computing artifacts. At this writing there are 50 people signed on to the project from nine countries; the current document can be found at the end of this chapter. Although The Rules are designed to be applicable to all computing artifacts, there are interesting aspects specific to pervasive devices that make The Rules particularly important for this subset of computing artifacts. This chapter explores aspects of pervasive information and communication technologies (PICT) artifacts that are most problematic ethically, and examines how the principles in The Rules can be applied to help mitigate these ethical concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Beck, Kent et al. 2001. Manifesto for agile software development. http://agilemanifesto.org/. Accessed 22 May 2012.

  • Davis, Michael. 2011. The authority of the rules: Why should anyone allow them to serve as a guide? Paper presented at the Association for Practical and Professional Ethics, Cincinnati, OH, March 5.

    Google Scholar 

  • Furnace Creek Resort. 2013. Our most frequently asked questions. http://www.furnacecreekresort.com/faq-s-531.html. Accessed 29 Jan 2013.

  • Greenfield, Adam. 2006. Everyware: The dawning age of ubiquitous computing, 11–12. Berkeley: New Riders.

    Google Scholar 

  • Gross, Michael. A declaration of cyber-war. Vanity Fair, April 2011. http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104. Accessed 24 Jan 2013.

  • Huff, Chuck. 2011. The rules similarities and differences between IT codes of ethics and the rules. Paper presented at the Association for Practical and Professional Ethics, Cincinnati, OH, March 5.

    Google Scholar 

  • Miller, Keith. 2010. A short history of the rules, 10 July 2010. https://edocs.uis.edu/kmill2/www/TheRules/history.html. Accessed 21 May 2012.

  • Nissenbaum, Helen. 1994. Computing and accountability. Communications of the ACM 37(1): 72–80.

    Article  Google Scholar 

  • Oladimeji, Ebenezer A., Lawrence Chung, Hyo Taeg Jung, and Jaehyoun Kim. 2011. Managing security and privacy in ubiquitous eHealth information interchange. In Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC ’11). ACM, New York, Article 26, 10 p.

    Google Scholar 

  • Pimple, Kenneth D. 2011. The rules: A bigger picture. Paper presented at the Association for Practical and Professional Ethics, Cincinnati, OH, March 5.

    Google Scholar 

  • Refusesmartmeters.com. 2011. Stop smart meters, refuse smart meters, remove smarter meters. http://refusesmartmeters.com/. Accessed 24 May 2012.

  • The Ad Hoc Committee for Responsible Computing. Moral responsibility for computing artifacts: Five rules. https://edocs.uis.edu/kmill2/www/TheRules/. Accessed 21 May 2012.

  • U.S. Commodity Futures Trading Commission (CFTC) and U.S. Securities & Exchange Commission (SEC). (2010). Findings regarding the market events of May 6, 2010: Report of the Staffs of the CFTC and SEC to the Joint Advisory Committee on Emerging Regulatory Issues 30 Sept 2010. http://www.sec.gov/news/studies/2010/marketevents-report.pdf. Accessed online 13 Oct 2010.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keith W. Miller Ph.D. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht.

About this chapter

Cite this chapter

Miller, K.W. (2014). Applying “Moral Responsibility for Computing Artifacts” to PICT. In: Pimple, K. (eds) Emerging Pervasive Information and Communication Technologies (PICT). Law, Governance and Technology Series, vol 11. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6833-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6833-8_10

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6832-1

  • Online ISBN: 978-94-007-6833-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics