Moral and ethical implications, Computer Engineering

Assignment Help:

• Moral and Ethical Implications

o Will this be safe to have on the road
   Will the computers on board be able to handle extreme circumstances

• Hazardous conditions

o Extreme snow

o Extreme rain

o Quick reaction time in accidents
   What is a acceptable failure rate for the driving ability

• What is the current accident rate of people driving cars

• What would be the acceptable rate for the driverless car

o Will this take jobs away from people VS. how many jobs will this create
 Taxi and limo drivers
 How much service will these cars need

• Will it be cost efficient to the consumer

• Will this create another specialty field

o Is it right to allow a computer to have control over a person's life like this


This is the basic outline that I need to work off of. The project is on Google's Driverless Car and the moral and ethical implications that can/will occur when it is introduced into society. Here is a brief paragraph describing what to look for:

Moral and Ethical Considerations: Consider quality of life, human rights, codes of ethics, privacy, accountability, corporate responsibility government responsibility, individual responsibility (e.g., ways of dying and rights of dying). What ethical values are expressed implicitly or explicitly by this technology? Pride (being the first-to-get-to-the moon kind of thing)? Greed? Power? Fraud? Theft? Deception? Lies? Whose rights are violated? Whose rights are honored? Consumer rights? The rights of the general public? Freedom? Authority? Control? What are the major moral concerns associated with the creation and adoption of this technology? Remember the e-Waste example in the reading I gave you-the disposal of dangerous toxins in "poorer" countries, the not-in-my-backyard phenomenon. What do religious groups have to say (this group thing may fit better in the sociology section)? For example, contraceptives generally prevent pregnancy but for some this technology violates what they call "natural law" and their religious belief in God's command to "be fruitful and multiply." Look at corporate code of ethics, professional codes of ethics (IEEE, etc.) available through websites such as Illinois Institute of Technology's and Case Western Reserve University's (compilation) or ethicsonline.org. Look at the companies developing the technology and check out their "codes of ethics" to determine whether the technology they are developing is in keeping with their mission and values. Who is responsible if something goes wrong or if critical information is withheld from the public? Example: asbestos and cigarettes

Apply ethical theory on your own-utilitarianism, act utilitarianism, rule utilitarianism, Kant's categorical imperative, ethic of care, deontology, teleology, ethical egoism, absolutism, Fletcher's situation ethics, ethical relativism, etc. Consider an encyclopedia of ethics for terms and applicable concepts. Check out the reading in our textbook on morality and technology.


Related Discussions:- Moral and ethical implications

Implementation for the prime machine, Write an implementation for the Prime...

Write an implementation for the Prime machine (de?ned at the end of the assignment sheet). Provide a suitable invariant and variant for any loop you use. Provide comments in your m

Define structural classification, Structural Classification Flynn's cla...

Structural Classification Flynn's classification explains the behavioural idea and doesn't take concern into the computer's structure. Parallel computers can be categorized bas

Rules for calling assembly subroutines from, Q. Rules for calling assembly ...

Q. Rules for calling assembly subroutines from? The rules for calling assembly subroutines from C are: (i)  Memory model: The calling program and called assembly programs sh

When the get cursor command used in interactive lists, When the get cursor ...

When the get cursor command used in interactive lists? If the hidden information is not enough to uniquely recognize the selected line, the command GET CURSOR is used.  The GET

Describe briefly how firewalls prevent network, Describe briefly how firewa...

Describe briefly how firewalls prevent network. A firewall is only a program or hardware device which filters the information coming via the Internet connection within your pr

Main memory location, Poor Richard's cache as explained in Conference Topic...

Poor Richard's cache as explained in Conference Topic 2. Suppose that a 7th word (gggg gggg) from main memory location 011110 is read and stored in cache. a) Determine the cach

Form an 8 bit adder using 2 four bit adder IC's 7483, How will you form an ...

How will you form an 8 bit adder using 2 four bit adder IC's 7483? Ans: 4 bit adder IC is IC 7483. This has two four bit data inputs and output carry, 4 bit data output carr

Show list files by dir command, Q. Show list files by Dir command? The ...

Q. Show list files by Dir command? The Dir command can also be used to list files from the exacting directory. For example, the list of files present in the WORD directory in d

Explain optimizing transformations, Explain optimizing transformations? ...

Explain optimizing transformations? Optimizing transformations: It is a rule for rewriting a segment of a program to enhance its execution efficiency without influencing i

Explain the system design of object oriented modelling, Explain the System ...

Explain the System Design of Object oriented modelling System Design : At this stage, the whole system model is designed. This is the phase where the complete system is divi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd