Ethical protocols design

被引:26
作者
Turilli M. [1 ]
机构
[1] Oxford University Computing Laboratory, University of Oxford, Oxford OX1 3QD, Wolfson Building
关键词
Ethical protocols; Ethical requirements; Informational privacy; Protocols design; Systems pecification;
D O I
10.1007/s10676-006-9128-9
中图分类号
学科分类号
摘要
The paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined in such a way as to (i) discriminate specific cases in which an individual's GIP can be infringed without accessing the individual's data; (ii) separate unauthorised accesses to data that do not respect the right to GIP from access that do; and (iii) distinguish different degrees of GIP. Finally a camera phone is used to illustrate the proposed solution. © Springer Science+Business Media B.V. 2007.
引用
收藏
页码:49 / 62
页数:13
相关论文
共 28 条
  • [1] van der Aalst W.M.P., Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management, Lecture Notes in Computer Science, 3098, pp. 1-65, (2004)
  • [2] Adam A., Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine?, Ethics and Information Technology, 7, 4, pp. 233-242, (2005)
  • [3] Allen C., Smit I., Wallach W., Artificial Morality: Top-Down, Bottom-up, and Hybrid Approaches, Ethics and Information Technology, 7, 3, pp. 149-155, (2005)
  • [4] Arbel A., Kaff A.E., Crash: Ten Days in October. Will It Strike Again?, (1989)
  • [5] Bickerton M., Siddiqi J., The Classification of Requirements Engineering Methods, Requirements Engineering, 93, pp. 182-186, (1993)
  • [6] Coulouris G., Dollimore J., Kindberg T., Distributed Systems: Concepts and Design, (2005)
  • [7] Cunha J.C., Rana O., Grid Computing: Software Environments and Tools, (2006)
  • [8] DeCew J., Privacy, Stanford Encyclopedia of Philosophy, (2006)
  • [9] Fitzpatrick R., Cooke P., Southall C., Kauldhar K., Waters P., Evaluation of an Automated Dispensing System in a Hospital Pharmacy Dispensary, The Pharmaceutical Journal, 274, pp. 763-765, (2005)
  • [10] Floridi L., Is Semantic Information Meaningful Data?, Philosophy and Phenomenological Research, 70, 2, pp. 351-370, (2005)