Computer Ethics
Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences: # The individual's own personal Ethical code, [ethical] code. # Any informal code of ethical conduct that exists in the work place. # Exposure to formal codes of ethics. Foundation Computer ethics was first coined by Walter Maner, a professor at Bowling Green State University. Maner noticed ethical concerns that were brought up during his Medical Ethics course at Old Dominion University became more complex and difficult when the use of technology and computers became involved. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics promoted, amo ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Practical Philosophy
Practical philosophy concerns itself mainly with subjects that have applications in life, like the study of values, norms, politics, art, etc. The modern division of philosophy into theoretical philosophy and practical philosophyImmanuel Kant, ''Lectures on Ethics'', Cambridge University Press, 2001, p. 41 ("On Universal Practical Philosophy"). Original text: Immanuel Kant, ''Kant’s Gesammelte Schriften'', Band XXVII – Moralphilosophie, 1. Hälfte, 1974p. 243 has its origin in Aristotle's categories of natural and moral philosophy. The one has theory for its object and the other practice. Subjects of practical philosophy Examples of practical philosophy subjects are: *Ethics *Aesthetics *Decision theory *Political philosophy Philosophical counseling Practical philosophy is also the use of philosophy and philosophical techniques in everyday life. This can take a number of forms including reflective practice, personal philosophical thinking, and philosophical counseling. ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Artificial Intelligence
Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of research in computer science that develops and studies methods and software that enable machines to machine perception, perceive their environment and use machine learning, learning and intelligence to take actions that maximize their chances of achieving defined goals. High-profile applications of AI include advanced web search engines (e.g., Google Search); recommendation systems (used by YouTube, Amazon (company), Amazon, and Netflix); virtual assistants (e.g., Google Assistant, Siri, and Amazon Alexa, Alexa); autonomous vehicles (e.g., Waymo); Generative artificial intelligence, generative and Computational creativity, creative tools (e.g., ChatGPT and AI art); and Superintelligence, superhuman play and analysis in strategy games (e.g., ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Intellectual Property
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, copyrights, trademarks, and trade secrets. The modern concept of intellectual property developed in England in the 17th and 18th centuries. The term "intellectual property" began to be used in the 19th century, though it was not until the late 20th century that intellectual property became commonplace in most of the world's List of national legal systems, legal systems."property as a common descriptor of the field probably traces to the foundation of the World Intellectual Property Organization (WIPO) by the United Nations." in Mark A. Lemley''Property, Intellectual Property, and Free Riding'', Texas Law Review, 2005, Vol. 83:1031, page 1033, footnote 4. Supporters of intellectual property laws often describe their main purpose as encouragin ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Freedom
Freedom is the power or right to speak, act, and change as one wants without hindrance or restraint. Freedom is often associated with liberty and autonomy in the sense of "giving oneself one's own laws". In one definition, something is "free" if it can change and is not constrained in its present state. Physicists and chemists use the word in this sense. In its origin, the English language, English word "freedom" relates etymologically to the word "friend". Philosophy and religion sometimes associate it with free will, as an alternative to determinism or predestination. In modern Liberalism, liberty nations, freedom is considered a right, especially freedom of speech, freedom of religion, and freedom of the press. Types In political discourse, political freedom is often associated with liberty and autonomy, and a distinction is made between countries that are free of dictatorships. In the area of civil rights, a strong distinction is made between freedom and slavery and the ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Anonymity
Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person chooses to withhold their identity. There are various situations in which a person might choose to remain anonymous. Acts of charity have been performed anonymously when benefactors do not wish to be acknowledged. A person who feels threatened might attempt to mitigate that threat through anonymity. A witness to a crime might seek to avoid retribution, for example, by anonymously calling a crime tipline. In many other situations (like conversation between strangers, or buying some product or service in a shop), anonymity is traditionally accepted as natural. Some writers have argued that the term "namelessness", though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of appropriate use and Information security, protection of information. Privacy may also take the form of bodily integrity. Throughout history, there have been various conceptions of privacy. Most cultures acknowledge the right of individuals to keep aspects of their personal lives out of the public domain. The right to be free from unauthorized invasions of privacy by governments, corporations, or individuals is enshrined in the privacy laws of many countries and, in some instances, their constitutions. With the rise of technology, the debate regarding privacy has expanded from a bodily sense to include a digital sense. In most countries, the right to digital privacy is considered an extension of the original right to privacy, and many count ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cybercriminals may exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments. In 2000, the tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders classified cyber crimes into five categories: unauthorized access, damage to computer data or programs, sabotage to hinder the functioning of a computer system or network, unauthorized interception of data within a system or network, and computer espionage. Internationally, both state and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes c ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Privacy Act Of 1974
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of bodily integrity. Throughout history, there have been various conceptions of privacy. Most cultures acknowledge the right of individuals to keep aspects of their personal lives out of the public domain. The right to be free from unauthorized invasions of privacy by governments, corporations, or individuals is enshrined in the privacy laws of many countries and, in some instances, their constitutions. With the rise of technology, the debate regarding privacy has expanded from a bodily sense to include a digital sense. In most countries, the right to digital privacy is considered an extension of the original right to privacy, and many countries have passed a ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Deborah G
According to the Book of Judges, Deborah (, ''Dəḇōrā'') was a prophetess of Judaism, the fourth Judge of pre-monarchic Israel, and the only female judge mentioned in the Hebrew Bible. Many scholars contend that the phrase, "a woman of Lappidoth", as translated from biblical Hebrew in Judges 4:4 denotes her marital status as the wife of Lapidoth.Van Wijk-Bos, Johanna WH. ''The End of the Beginning: Joshua and Judges''. Wm. B. Eerdmans Publishing, 2019. Alternatively, "lappid" translates as "torch" or "lightning", therefore the phrase, "woman of Lappidoth" could be referencing Deborah as a "fiery woman." Deborah told Barak, an Israelite general from Kedesh in Naphtali, that God commanded him to lead an attack against the forces of Jabin king of Canaan and his military commander Sisera (Judges 4:6–7); the entire narrative is recounted in chapter 4. Judges 5 gives the same story in poetic form. This passage, often called ''The Song of Deborah'', may date to as early as the t ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
James Moor
James Haller Moor (1942 – September 11, 2024) was an American ethicist, moral philosopher, and is especially known for his pioneering work in computer ethics. He spent most of his career at Dartmouth College, where he was the Daniel P. Stone Professor of Intellectual and Moral Philosophy. Education and career Moor studied mathematics at the Ohio State University, where he obtained a bachelor's degree in 1965. He went on to study philosophy at the University of Chicago, where he obtained a masters' degree. He worked as a teaching fellow at Findlay College before embarking on further studies at Indiana University Bloomington, where he earned his Ph.D. in the philosophy of science in 1972. His thesis titled ''Computer Consciousness'' was supervised by Wesley C. Salmon. Moor joined Dartmouth College in the same year as an assistant professor in philosophy. He became an associate professor in 1978 and a professor in 1985. Moor's 1985 paper entitled "What is Computer Ethics?" establi ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Small Business Administration
The United States Small Business Administration (SBA) is an independent agency of the United States government that provides support to entrepreneurs and small businesses. The mission of the Small Business Administration is "to maintain and strengthen the nation's economy by enabling the establishment and viability of small businesses and by assisting in the economic recovery of communities after disasters." The agency's activities have been summarized as the "3 Cs" of capital, contracts and counseling. SBA loans are made through banks, credit unions and other lenders who partner with the SBA. The SBA provides a government-backed guarantee on part of the loan. Under the Recovery Act and the Small Business Jobs Act, SBA loans were enhanced to provide up to a 90 percent guarantee in order to strengthen access to capital for small businesses after credit froze in 2008. The agency had record lending volumes in late 2010. SBA helps lead the federal government's efforts to deliver ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Metaphilosophy (journal)
''Metaphilosophy'' is a peer-reviewed academic journal covering metaphilosophy. It is abstracted and indexed by PhilPapers and the Philosopher's Index. ''Metaphilosophy'' was established in 1970 by Terry Bynum and Richard Reese. "Metaphilosophy" was given a working definition in the first issue of the journal as "the investigation of the nature of philosophy, with the central aim of arriving at a satisfactory explanation of the absence of uncontested philosophical claims and arguments." The journal is published by John Wiley & Sons and the editor-in-chief is Armen T. Marsoobian (Southern Connecticut State University Southern Connecticut State University (Southern Connecticut, Southern Connecticut State, SCSU, or simply "Southern") is a public research university in New Haven, Connecticut, United States. Part of the Connecticut State University System, it ...). References External links * PhilPapers listing for ''Metaphilosophy'' Metaphilosophy Philosophy journals ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |