Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

2009 | OriginalPaper | Chapter

47. Automation and Ethics

Authors : Srinivasan Ramaswamy, Dr, Hemant Joshi, PhD

Published in: Springer Handbook of Automation

Publisher: Springer Berlin Heidelberg

Abstract

Should we trust automation? Can automation cause harm to individuals and to society? Can individuals apply automation to harm other individuals? The answers are yes; hence, ethical issues are deeply associated with automation. The purpose of this chapter is to provide some ethical background and guidance to automation professionals and students. Governmental action and economic factors are increasingly resulting in more global interactions and competition for jobs requiring lower-end skills as well as those that are higher-end endeavors such as research. Moreover, as the Internet continually eliminates geographic boundaries, the concept of doing business within a single country is giving way to companies and organizations focusing on serving and competing in international frameworks and a global marketplace. Coupled with the superfluous nature of an Internet-driven social culture, the globally-distributed digitalization of work, services and products, and the reorganization of work processes across many organizations have resulted in ethically challenging questions that are not just economically, or socially sensitive, but also highly culturally sensitive. Like the shifting of commodity manufacturing jobs in the late 1900s, standardization of information technology and engineering jobs have also accelerated the prospect of services and jobs more easily moved across the globe, thereby driving a need for innovation in design, and in the creation of higher-skill jobs. In this chapter, we review the fundamental concepts of ethics as it relates to automation, and then focus on the impacts of automation and their significance in both education and research.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
47.1.
go back to reference G. Reynolds: Ethics in Information Technology, 2nd edn. (Cengage Learning, Florence 2006) G. Reynolds: Ethics in Information Technology, 2nd edn. (Cengage Learning, Florence 2006)
47.2.
go back to reference H.T. Tavani: Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology (Wiley, New York 2006) H.T. Tavani: Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology (Wiley, New York 2006)
47.3.
go back to reference D.M. Hester, P.J. Ford: Computers and Ethics in the Cyberage (Prentice Hall, Englewood Cliffs 2000) D.M. Hester, P.J. Ford: Computers and Ethics in the Cyberage (Prentice Hall, Englewood Cliffs 2000)
47.4.
go back to reference R.K. Rainer, E. Turban: Ethics, privacy, and information security. In: Introduction to Information Systems, 2nd edn. (Wiley, New York 2009), Chap. 3 R.K. Rainer, E. Turban: Ethics, privacy, and information security. In: Introduction to Information Systems, 2nd edn. (Wiley, New York 2009), Chap. 3
47.5.
go back to reference D.G. Johnson: Computer Ethics, 3rd edn. (Prentice Hall, Englewood Cliffs 2000) D.G. Johnson: Computer Ethics, 3rd edn. (Prentice Hall, Englewood Cliffs 2000)
47.6.
go back to reference S. Baase: A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet, 2nd edn. (Prentice Hall, Englewood Cliffs 2002) S. Baase: A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet, 2nd edn. (Prentice Hall, Englewood Cliffs 2002)
47.7.
go back to reference J.M. Kizza: Computer Network Security and Cyber Ethics, 2nd edn. (McFarland, Jefferson 2006) J.M. Kizza: Computer Network Security and Cyber Ethics, 2nd edn. (McFarland, Jefferson 2006)
47.8.
go back to reference R. Spinello: Cyber Ethics: Morality and Law in Cyberspace, 3rd edn. (Jones Bartlett, Boston 2006) R. Spinello: Cyber Ethics: Morality and Law in Cyberspace, 3rd edn. (Jones Bartlett, Boston 2006)
47.9.
go back to reference P.M. Asaro: Robots and responsibility from a legal perspective, Proc. IEEE ICRA (2007) P.M. Asaro: Robots and responsibility from a legal perspective, Proc. IEEE ICRA (2007)
47.10.
go back to reference J.M. Kizza: Ethical and Social Issues in the Information Age, 3rd edn. (McFarland, Jefferson 2007) J.M. Kizza: Ethical and Social Issues in the Information Age, 3rd edn. (McFarland, Jefferson 2007)
47.11.
go back to reference S. Bringsjord, K. Arkoudas, P. Bello: Toward a general logicist methodology for engineering ethically correct robots, IEEE Intell. Syst. 21, 38–44 (2006) CrossRef S. Bringsjord, K. Arkoudas, P. Bello: Toward a general logicist methodology for engineering ethically correct robots, IEEE Intell. Syst. 21, 38–44 (2006) CrossRef
47.12.
go back to reference D. Dennett: When HAL kills, whoʼs to blame?. In: HALʼs Legacy: 2001ʼs Computer as Dream and Reality, ed. by D. Stork (MIT Press, Cambridge 1996) D. Dennett: When HAL kills, whoʼs to blame?. In: HALʼs Legacy: 2001ʼs Computer as Dream and Reality, ed. by D. Stork (MIT Press, Cambridge 1996)
47.13.
go back to reference G. Veruggio, F. Operto: Roboethics: Social and ethical implications of robotics. In: Springer Handbook of Robotics, ed. by B. Siciliano, O. Khatib (Springer, Berlin Heidelberg 2007), Chap. 64 G. Veruggio, F. Operto: Roboethics: Social and ethical implications of robotics. In: Springer Handbook of Robotics, ed. by B. Siciliano, O. Khatib (Springer, Berlin Heidelberg 2007), Chap. 64
47.14.
go back to reference R. Spinello: Readings in CyberEthics, 2nd edn. (Jones Bartlett, Boston 2004) R. Spinello: Readings in CyberEthics, 2nd edn. (Jones Bartlett, Boston 2004)
47.15.
go back to reference S. Helmers, U. Hoffmann, J.-B. Stamos-Kaschke: (How) Can software agents become good net citizens?, CMC Magazine 3, 1–9 (1997) S. Helmers, U. Hoffmann, J.-B. Stamos-Kaschke: (How) Can software agents become good net citizens?, CMC Magazine 3, 1–9 (1997)
47.16.
go back to reference V. Perri: Ethics, regulation and the new artificial intelligence, part II: autonomy and liability, Inf. Commun. Soc. 4, 406–434 (2001) CrossRef V. Perri: Ethics, regulation and the new artificial intelligence, part II: autonomy and liability, Inf. Commun. Soc. 4, 406–434 (2001) CrossRef
47.17.
go back to reference J. Sullins: When is a robot a moral agent?, Int. J. Inf. Ethics 6, 12 (2006) J. Sullins: When is a robot a moral agent?, Int. J. Inf. Ethics 6, 12 (2006)
47.18.
go back to reference K. Himma: Artificial agency, consciousness, and the criteria for moral agency: what properties must an artificial agent have to be a moral agent?, 7th Int. Comput. Ethics Conf. (San Diego 2007) K. Himma: Artificial agency, consciousness, and the criteria for moral agency: what properties must an artificial agent have to be a moral agent?, 7th Int. Comput. Ethics Conf. (San Diego 2007)
47.19.
go back to reference R. Lucas: Moral theories for autonomous software agents, ACM SIGCAS Comput. Soc. Arch. 34, 4 (2004) CrossRef R. Lucas: Moral theories for autonomous software agents, ACM SIGCAS Comput. Soc. Arch. 34, 4 (2004) CrossRef
47.20.
go back to reference R.C. Arkin: Governing lethal behavior: embedding ethics in a hybrid deliberative/reactive robot architecture, Proc. 3rd ACM/IEEE Int. Conf. Human–Robot Interact. (Amsterdam 2008) pp. 121–128 R.C. Arkin: Governing lethal behavior: embedding ethics in a hybrid deliberative/reactive robot architecture, Proc. 3rd ACM/IEEE Int. Conf. Human–Robot Interact. (Amsterdam 2008) pp. 121–128
47.22.
go back to reference T.W. Bynum, S. Rogerson (Eds.): Computer Ethics and Professional Responsibility (Blackwell, New York 2004) T.W. Bynum, S. Rogerson (Eds.): Computer Ethics and Professional Responsibility (Blackwell, New York 2004)
47.23.
go back to reference G. Stamatellos: Computer Ethics: A Global Perspective (Jones Bartlett, Sudbury 2007) G. Stamatellos: Computer Ethics: A Global Perspective (Jones Bartlett, Sudbury 2007)
47.24.
go back to reference P. Lucas: Why bother? Ethical computers - thatʼs why!, ACM Int. Conf. Proc. Ser. 7, 33–38 (2000) P. Lucas: Why bother? Ethical computers - thatʼs why!, ACM Int. Conf. Proc. Ser. 7, 33–38 (2000)
47.25.
go back to reference J. Berge: Software for Automation: Architecture, Integration, and Security (ISA, New York 2005) J. Berge: Software for Automation: Architecture, Integration, and Security (ISA, New York 2005)
47.26.
go back to reference T. Macaulay: Industrial Automation and Process Control Security: SCADA, DCS, PLC, HMI (Auerbach, London 2009) T. Macaulay: Industrial Automation and Process Control Security: SCADA, DCS, PLC, HMI (Auerbach, London 2009)
47.27.
go back to reference E. Cayirci, A. Levi, C. Rong: Security in Wireless Ad Hoc and Sensor Networks (Wiley, New York 2009) CrossRef E. Cayirci, A. Levi, C. Rong: Security in Wireless Ad Hoc and Sensor Networks (Wiley, New York 2009) CrossRef
47.28.
go back to reference J. Dubin: The Little Black Book of Computer Security, 2nd edn. (Penton Media, New York 2008) J. Dubin: The Little Black Book of Computer Security, 2nd edn. (Penton Media, New York 2008)
47.29.
go back to reference C. Easttom: Computer Security Fundamentals (Prentice Hall, Englewood Cliffs 2005) C. Easttom: Computer Security Fundamentals (Prentice Hall, Englewood Cliffs 2005)
47.30.
go back to reference D. Gollmann: Computer Security (Wiley, New York 2006) D. Gollmann: Computer Security (Wiley, New York 2006)
47.32.
go back to reference T. Brignall, S. Ramaswamy: A Framework for Integrating Ethical and Values-Based Instruction into the ACM Computing Curricula 2001, Workshop Prot. Inf. Comput. Beyond (CERIAS, Purdue 2001) T. Brignall, S. Ramaswamy: A Framework for Integrating Ethical and Values-Based Instruction into the ACM Computing Curricula 2001, Workshop Prot. Inf. Comput. Beyond (CERIAS, Purdue 2001)
47.33.
go back to reference I. Asimov: I, Robot (Gnome Press, New York 1950) I. Asimov: I, Robot (Gnome Press, New York 1950)
47.34.
go back to reference S.Y. Nof (Ed.): Handbook of Industrial Robotics (Wiley, New York 1985) S.Y. Nof (Ed.): Handbook of Industrial Robotics (Wiley, New York 1985)
47.36.
go back to reference P. James: Transformative learning: promoting change across cultural worlds, J. Vocat. Educ. Train. 49, 197–219 (1997) CrossRef P. James: Transformative learning: promoting change across cultural worlds, J. Vocat. Educ. Train. 49, 197–219 (1997) CrossRef
47.37.
go back to reference M. Dark, N. Harter, L. Morales, M.A. Garcia: An information security ethics education model, J. Comput. Sci. Coll. 23, 82–88 (2008) M. Dark, N. Harter, L. Morales, M.A. Garcia: An information security ethics education model, J. Comput. Sci. Coll. 23, 82–88 (2008)
47.38.
go back to reference T.L. Beauchamp: Case Studies in Business, Society and Ethics (Prentice Hall, Englewood Cliffs 1998) T.L. Beauchamp: Case Studies in Business, Society and Ethics (Prentice Hall, Englewood Cliffs 1998)
47.39.
go back to reference R. Spinello: Case Studies in Information Technology Ethics, 2nd edn. (Prentice Hall, New York 2003) R. Spinello: Case Studies in Information Technology Ethics, 2nd edn. (Prentice Hall, New York 2003)
47.40.
go back to reference B.B. Levin: Using the case method in teacher education: the role of discussion and experience in teachersʼ thinking about cases, J. Teach. Teach. Educ. 10, 2 (1996) B.B. Levin: Using the case method in teacher education: the role of discussion and experience in teachersʼ thinking about cases, J. Teach. Teach. Educ. 10, 2 (1996)
47.41.
go back to reference J. Kleinfeld: Changes in problem solving abilities of students taught through case methods, 1991 Annu. Meet. Am. Educ. Res. Assoc. (Chicago 1991) J. Kleinfeld: Changes in problem solving abilities of students taught through case methods, 1991 Annu. Meet. Am. Educ. Res. Assoc. (Chicago 1991)
47.42.
go back to reference J. Cossom: Teaching from cases: Education for critical thinking, J. Teach. Soc. Work 5, 139–155 (1991) CrossRef J. Cossom: Teaching from cases: Education for critical thinking, J. Teach. Soc. Work 5, 139–155 (1991) CrossRef
47.43.
go back to reference D.W. Ewing: Inside the Harvard Business School (Random House, New York 1990) D.W. Ewing: Inside the Harvard Business School (Random House, New York 1990)
47.44.
go back to reference M.J. Julian, M.B. Kinzie, V.A. Larsen: Compelling case experiences: performance, practice, and application for emerging instructional designers, Perform. Improv. Q. 13, 164–201 (2000) CrossRef M.J. Julian, M.B. Kinzie, V.A. Larsen: Compelling case experiences: performance, practice, and application for emerging instructional designers, Perform. Improv. Q. 13, 164–201 (2000) CrossRef
47.45.
go back to reference L. Wilkerson, W.H. Gijselaers: Bringing Problem-Based Learning to Higher Education: Theory and Practice (Jossey-Bass, New York 1996) L. Wilkerson, W.H. Gijselaers: Bringing Problem-Based Learning to Higher Education: Theory and Practice (Jossey-Bass, New York 1996)
47.46.
go back to reference J. Lave: The culture of acquisition and the practice of understanding. In: Cultural Psychology: Essays on Comparative Human Development, ed. by J.W. Stigler, R.A. Schweder, G. Herdt (Cambridge Univ. Press, Boston 1990) pp. 309–327 J. Lave: The culture of acquisition and the practice of understanding. In: Cultural Psychology: Essays on Comparative Human Development, ed. by J.W. Stigler, R.A. Schweder, G. Herdt (Cambridge Univ. Press, Boston 1990) pp. 309–327
47.47.
go back to reference J.M. Cohoon: Recruiting and retaining women in undergraduate computing majors, ACME SIGCSE Bulletin 34, 48–52 (2002) CrossRef J.M. Cohoon: Recruiting and retaining women in undergraduate computing majors, ACME SIGCSE Bulletin 34, 48–52 (2002) CrossRef
47.48.
go back to reference K. Treu, A. Skinner: Ten Suggestions for a gender-equitable CS classroom, ACME SIGCSE Bulletin 34, 165–167 (2002) CrossRef K. Treu, A. Skinner: Ten Suggestions for a gender-equitable CS classroom, ACME SIGCSE Bulletin 34, 165–167 (2002) CrossRef
47.49.
go back to reference S. Ramaswamy: Societal-consciousness in the computing curricula: a time for serious introspection, Int. Symp. Technol. Soc.: Risk, Vulnerability, Uncertainty, Technology and Society (Las Vegas 2007) S. Ramaswamy: Societal-consciousness in the computing curricula: a time for serious introspection, Int. Symp. Technol. Soc.: Risk, Vulnerability, Uncertainty, Technology and Society (Las Vegas 2007)
47.55.
go back to reference L.D. Catledge, J.E. Pitkow: Characterizing browsing strategies in the world wide web, Comput. Netw. ISDN Syst. 27 (Elsevier Science, Amsterdam 1995) L.D. Catledge, J.E. Pitkow: Characterizing browsing strategies in the world wide web, Comput. Netw. ISDN Syst. 27 (Elsevier Science, Amsterdam 1995)
47.56.
go back to reference H. Joshi, S. Ito, S. Kanala, S. Hebbar, C. Bayrak: Concept set extraction with user session context, Proc. 45th ACM South East Conf. (Winston-Salem 2007) H. Joshi, S. Ito, S. Kanala, S. Hebbar, C. Bayrak: Concept set extraction with user session context, Proc. 45th ACM South East Conf. (Winston-Salem 2007)
47.57.
go back to reference C. Silverstein, H. Marais, M. Henzinger, M. Moricz: Analysis of a very large web search engine query log, ACM Special Interest Group on Information Retrieval (SIGIR) Conference (1999) pp. 6–12 C. Silverstein, H. Marais, M. Henzinger, M. Moricz: Analysis of a very large web search engine query log, ACM Special Interest Group on Information Retrieval (SIGIR) Conference (1999) pp. 6–12
47.58.
go back to reference A. Goker, D. He: Analyzing web search log to determine session boundaries for user-oriented learning, Proc. Adapt. Hypermedia Adapt. Web Based Syst. Int. Conf. AH 2000 (Trento 2000) pp. 319–322 A. Goker, D. He: Analyzing web search log to determine session boundaries for user-oriented learning, Proc. Adapt. Hypermedia Adapt. Web Based Syst. Int. Conf. AH 2000 (Trento 2000) pp. 319–322
47.59.
go back to reference D. Downey, S. Dumais, E. Horvitz: Models of searching and browsing: languages, studies, and application, Int. Conf. Artificial Intell. IJCAI (2007) D. Downey, S. Dumais, E. Horvitz: Models of searching and browsing: languages, studies, and application, Int. Conf. Artificial Intell. IJCAI (2007)
47.60.
go back to reference J. Bar-Ilan: Access to query logs — An academic researcherʼs point of view, Position paper at Query Log Anal. Workshop at WWW 2007 Conf. (Banff 2007) J. Bar-Ilan: Access to query logs — An academic researcherʼs point of view, Position paper at Query Log Anal. Workshop at WWW 2007 Conf. (Banff 2007)
47.61.
go back to reference X. Li, E. Agichtein: Towards privacy-preserving query log publishing, Position paper at Query Log Anal. Workshop at WWW 2007 Conf. (Banff 2007) X. Li, E. Agichtein: Towards privacy-preserving query log publishing, Position paper at Query Log Anal. Workshop at WWW 2007 Conf. (Banff 2007)
47.62.
go back to reference E. Adar: User 4XXXXX9: Anonymizing query logs, Query Log Anal. workshop at WWW 2007 Conf. (Banff 2007) E. Adar: User 4XXXXX9: Anonymizing query logs, Query Log Anal. workshop at WWW 2007 Conf. (Banff 2007)
47.64.
go back to reference J. Waldo, H.S. Lin, L.I. Millett (Eds.): Engaging Privacy and Information Technology in a Digital Age (The National Academies Press, Washington 2007) J. Waldo, H.S. Lin, L.I. Millett (Eds.): Engaging Privacy and Information Technology in a Digital Age (The National Academies Press, Washington 2007)
47.65.
go back to reference Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, National Research Council: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment (The National Academies Press, Washington 2008) Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, National Research Council: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment (The National Academies Press, Washington 2008)
Metadata
Title
Automation and Ethics
Authors
Srinivasan Ramaswamy, Dr
Hemant Joshi, PhD
Copyright Year
2009
DOI
https://doi.org/10.1007/978-3-540-78831-7_47