Moral and ethical implications, Computer Engineering

Assignment Help:

• Moral and Ethical Implications

o Will this be safe to have on the road
   Will the computers on board be able to handle extreme circumstances

• Hazardous conditions

o Extreme snow

o Extreme rain

o Quick reaction time in accidents
   What is a acceptable failure rate for the driving ability

• What is the current accident rate of people driving cars

• What would be the acceptable rate for the driverless car

o Will this take jobs away from people VS. how many jobs will this create
 Taxi and limo drivers
 How much service will these cars need

• Will it be cost efficient to the consumer

• Will this create another specialty field

o Is it right to allow a computer to have control over a person's life like this


This is the basic outline that I need to work off of. The project is on Google's Driverless Car and the moral and ethical implications that can/will occur when it is introduced into society. Here is a brief paragraph describing what to look for:

Moral and Ethical Considerations: Consider quality of life, human rights, codes of ethics, privacy, accountability, corporate responsibility government responsibility, individual responsibility (e.g., ways of dying and rights of dying). What ethical values are expressed implicitly or explicitly by this technology? Pride (being the first-to-get-to-the moon kind of thing)? Greed? Power? Fraud? Theft? Deception? Lies? Whose rights are violated? Whose rights are honored? Consumer rights? The rights of the general public? Freedom? Authority? Control? What are the major moral concerns associated with the creation and adoption of this technology? Remember the e-Waste example in the reading I gave you-the disposal of dangerous toxins in "poorer" countries, the not-in-my-backyard phenomenon. What do religious groups have to say (this group thing may fit better in the sociology section)? For example, contraceptives generally prevent pregnancy but for some this technology violates what they call "natural law" and their religious belief in God's command to "be fruitful and multiply." Look at corporate code of ethics, professional codes of ethics (IEEE, etc.) available through websites such as Illinois Institute of Technology's and Case Western Reserve University's (compilation) or ethicsonline.org. Look at the companies developing the technology and check out their "codes of ethics" to determine whether the technology they are developing is in keeping with their mission and values. Who is responsible if something goes wrong or if critical information is withheld from the public? Example: asbestos and cigarettes

Apply ethical theory on your own-utilitarianism, act utilitarianism, rule utilitarianism, Kant's categorical imperative, ethic of care, deontology, teleology, ethical egoism, absolutism, Fletcher's situation ethics, ethical relativism, etc. Consider an encyclopedia of ethics for terms and applicable concepts. Check out the reading in our textbook on morality and technology.


Related Discussions:- Moral and ethical implications

System analysis and design, write an algorithm on railway reservation ticke...

write an algorithm on railway reservation ticket window

Systems analyst in modern business, Many medium-to-large information servic...

Many medium-to-large information services units for modern business have reorganized to be decentralized with an emphasis on dynamic teams andempowerment. In modern business system

Difference between a null pointer and a void pointer, A NULL pointer is a p...

A NULL pointer is a pointer of any type whose value is zero. A void pointer is a pointer to an object of an unknown type, and is guaranteed to have sufficient bits to hold a pointe

Mpi communications, We have to use 3 MPI communications: Plz the code in C+...

We have to use 3 MPI communications: Plz the code in C++     1.  MPI_Scatter 2.  MPI_Alltoall 3.  MPI_Gather     **The length of the array will be determined by the user Fir

Database management system, Consider the following instance of the Students...

Consider the following instance of the Students relation, sorted by gpa. sid name login age gpa 53831 Madayan madayan@music 11 1.8 53832 Guldu guldu@music 12 2.0 53688 Smith smith

What is called network, Network with point-to-point link is known as (...

Network with point-to-point link is known as (A) Fully Connected Network        (B)  Half Connected Network (C)  Duplex Connected Network    (D)  None of these Ans:

Explain garbage collection, Explain Garbage collection In this method ...

Explain Garbage collection In this method two passes are made over the memory to identify new areas. In the first pass it traverses all pointers pointing to allocated areas an

Concept development journal, The Concept Development journal must contain: ...

The Concept Development journal must contain: An introductory paragraph detailing what conclusions you have drawn from your research and how you intend to proceed. This should b

Determining the error models that affect program execution, In critical com...

In critical computer applications the correctness of a delivered output and the continuity of the required service beside the speed of the used CPU are the most important measures

State the implementation of a security policy, State the implementation of ...

State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd