Skip to main content
Top

2019 | OriginalPaper | Chapter

10. Evolving Realities: Ethical and Secure Computing in the New Technological Spaces

Artificial Intelligence, Virtualization, and Cyberspace

Author : Joseph Migga Kizza

Published in: Ethical and Secure Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Artificial Intelligence discusses the new frontiers of ethics in the new artificial intelligence (AI) technologies, virtualization and virtual reality, and cyberspace. The chapter explores how these new frontiers are affecting the traditional ethical and social values. Our discussion is on based on the premise that artificial intelligence technologies create possibilities to understand and extend human knowledge to create intelligent agents perhaps with a human value base, intended to help solve human problems. We further look at virtualization and virtual reality technologies and how they inform our behavior based on our traditional moral and ethical values through the mediation of interaction through with electronic media. Our discussion of the social and ethical implications and consequences of virtualization is centered on two issues. One is that the anticipated benefit to society of virtualization as it extends known and relatively managed humanity’s social spheres and social networks in an unprecedented way through opening up of virtual domains of social interactions. The second benefit of virtualization to society is to avail tools and make it possible for those in society who want to create new virtual social networks out of the old and dismantle old ones. Finally, we discuss a global mesh of interconnected computer networks, commonly referred to as cyberspace, which makes it possible for anyone using a point-of-entry device like a computer, smartphone, or any other Internet-enabled electronic device to reach anyone else, with the potential to access the mesh, through a one-on-one, one-to-many, and many-to-one communication capabilities or through broadcasting via the World Wide Web. Cyberspace, because of immerse and telepresence capabilities and global reach, creates a potentially dangerous environment where one can do anything with no elegance, no accountability, and no to limited.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference LaChat MR (1986) Artificial intelligence and ethics: an exercise in the moral imagination. AI Mag 7(2) LaChat MR (1986) Artificial intelligence and ethics: an exercise in the moral imagination. AI Mag 7(2)
3.
go back to reference Luger G, Stubblefield W (1993) Artificial intelligence, 2nd edn. Benjamin Cummings, Reading Luger G, Stubblefield W (1993) Artificial intelligence, 2nd edn. Benjamin Cummings, Reading
4.
go back to reference Asimov I (1964) The rest of the robot. Doubleday, New York Asimov I (1964) The rest of the robot. Doubleday, New York
5.
go back to reference Williamson J (1978) With folded hands. The best of Jack Williamson. Ballantine, New York, pp 154–206 Williamson J (1978) With folded hands. The best of Jack Williamson. Ballantine, New York, pp 154–206
6.
go back to reference Waldrop M (1991) A question of responsibility. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Byrd & Fraser, Boston Waldrop M (1991) A question of responsibility. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Byrd & Fraser, Boston
7.
go back to reference Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28 Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28
8.
go back to reference Minsky M, Riecken D (1994) A conversation with Marvin Minsky about agents. Commun ACM 37(7):23–29CrossRef Minsky M, Riecken D (1994) A conversation with Marvin Minsky about agents. Commun ACM 37(7):23–29CrossRef
9.
go back to reference Carbonell J (1979) Subjective understanding: computer models of belief systems. University of Michigan Press, Ann Arbor Carbonell J (1979) Subjective understanding: computer models of belief systems. University of Michigan Press, Ann Arbor
11.
go back to reference Singh G, Feiner S, Thalmann D (1996) Virtual reality: software and technology. Commun ACM 39(5):35–36CrossRef Singh G, Feiner S, Thalmann D (1996) Virtual reality: software and technology. Commun ACM 39(5):35–36CrossRef
12.
go back to reference Bryson S (1996) Virtual reality in scientific visualization. Commun ACM 39(5):62–71CrossRef Bryson S (1996) Virtual reality in scientific visualization. Commun ACM 39(5):62–71CrossRef
14.
go back to reference Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28 Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28
17.
go back to reference Gruman G (2008) Virtualization’s secret security threats: virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers. InfoWorld, 13 Mar 2008 Gruman G (2008) Virtualization’s secret security threats: virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers. InfoWorld, 13 Mar 2008
19.
go back to reference Lewis P (1996) Limiting a medium without boundaries. New York Times, 15 Jan 1996, D1 Lewis P (1996) Limiting a medium without boundaries. New York Times, 15 Jan 1996, D1
20.
go back to reference Bhimani A (1996) Securing the commercial internet. Commun ACM 39(6):29–35CrossRef Bhimani A (1996) Securing the commercial internet. Commun ACM 39(6):29–35CrossRef
21.
go back to reference Barlow J (1991) Electronic frontier: private life in cyberspace. Commun ACM 34(8):23–25CrossRef Barlow J (1991) Electronic frontier: private life in cyberspace. Commun ACM 34(8):23–25CrossRef
22.
go back to reference Bates J (1994) The role of emotion in believable agents. Commun ACM 37(7):122–125CrossRef Bates J (1994) The role of emotion in believable agents. Commun ACM 37(7):122–125CrossRef
23.
24.
go back to reference Brandt D (1993) Cyberspace wars: microprocessing vs. big brother. NameBase NewsLine 2, July–August 1993 Brandt D (1993) Cyberspace wars: microprocessing vs. big brother. NameBase NewsLine 2, July–August 1993
25.
26.
go back to reference Green M, Halliday S (1996) A geometrical modelling and animation system for virtual reality. Commun ACM 39(5):46–53CrossRef Green M, Halliday S (1996) A geometrical modelling and animation system for virtual reality. Commun ACM 39(5):46–53CrossRef
27.
go back to reference Hayes Roth F, Jacobstein N (1994) The state of knowledge-based systems. Commun ACM 37(3):22–39CrossRef Hayes Roth F, Jacobstein N (1994) The state of knowledge-based systems. Commun ACM 37(3):22–39CrossRef
28.
go back to reference Kanade T, Read M, Weiss L (1994) New technologies and application in robots. Commun ACM 37(3):58–67CrossRef Kanade T, Read M, Weiss L (1994) New technologies and application in robots. Commun ACM 37(3):58–67CrossRef
29.
go back to reference Munakato T, Jani Y (1994) Fuzzy systems: an overview. Commun ACM 37(3):69–75 Munakato T, Jani Y (1994) Fuzzy systems: an overview. Commun ACM 37(3):69–75
30.
go back to reference Norman D (1994) How might people react with agents? Commun ACM 37(7):68–71CrossRef Norman D (1994) How might people react with agents? Commun ACM 37(7):68–71CrossRef
31.
go back to reference Poston T, Serra L (1996) Dextrous virtual work: introduction. Commun ACM 39(5):37–45CrossRef Poston T, Serra L (1996) Dextrous virtual work: introduction. Commun ACM 39(5):37–45CrossRef
32.
go back to reference Riecken D (1994) Intelligent agents: introduction. Commun ACM 37(7):18–21CrossRef Riecken D (1994) Intelligent agents: introduction. Commun ACM 37(7):18–21CrossRef
33.
go back to reference Schoppers M (1991) Real–time knowledge-based control systems. Commun ACM 34(8):27–30CrossRef Schoppers M (1991) Real–time knowledge-based control systems. Commun ACM 34(8):27–30CrossRef
34.
go back to reference Singh G, Fisher S, Thalmann D (1996) Virtual reality software and technology: introduction. Commun ACM 39(5):35–36CrossRef Singh G, Fisher S, Thalmann D (1996) Virtual reality software and technology: introduction. Commun ACM 39(5):35–36CrossRef
35.
go back to reference Webe J, Hirst G, Horton D (1996) Language use in context. Commun ACM 39(1):102–111CrossRef Webe J, Hirst G, Horton D (1996) Language use in context. Commun ACM 39(1):102–111CrossRef
36.
go back to reference Wilkes M (1992) Artificial intelligence as the year 2000 approaches. Commun ACM 35(8):17–20CrossRef Wilkes M (1992) Artificial intelligence as the year 2000 approaches. Commun ACM 35(8):17–20CrossRef
37.
Metadata
Title
Evolving Realities: Ethical and Secure Computing in the New Technological Spaces
Author
Joseph Migga Kizza
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-03937-0_10

Premium Partner