Moral and ethical implications, Computer Engineering

Assignment Help:

• Moral and Ethical Implications

o Will this be safe to have on the road
   Will the computers on board be able to handle extreme circumstances

• Hazardous conditions

o Extreme snow

o Extreme rain

o Quick reaction time in accidents
   What is a acceptable failure rate for the driving ability

• What is the current accident rate of people driving cars

• What would be the acceptable rate for the driverless car

o Will this take jobs away from people VS. how many jobs will this create
 Taxi and limo drivers
 How much service will these cars need

• Will it be cost efficient to the consumer

• Will this create another specialty field

o Is it right to allow a computer to have control over a person's life like this


This is the basic outline that I need to work off of. The project is on Google's Driverless Car and the moral and ethical implications that can/will occur when it is introduced into society. Here is a brief paragraph describing what to look for:

Moral and Ethical Considerations: Consider quality of life, human rights, codes of ethics, privacy, accountability, corporate responsibility government responsibility, individual responsibility (e.g., ways of dying and rights of dying). What ethical values are expressed implicitly or explicitly by this technology? Pride (being the first-to-get-to-the moon kind of thing)? Greed? Power? Fraud? Theft? Deception? Lies? Whose rights are violated? Whose rights are honored? Consumer rights? The rights of the general public? Freedom? Authority? Control? What are the major moral concerns associated with the creation and adoption of this technology? Remember the e-Waste example in the reading I gave you-the disposal of dangerous toxins in "poorer" countries, the not-in-my-backyard phenomenon. What do religious groups have to say (this group thing may fit better in the sociology section)? For example, contraceptives generally prevent pregnancy but for some this technology violates what they call "natural law" and their religious belief in God's command to "be fruitful and multiply." Look at corporate code of ethics, professional codes of ethics (IEEE, etc.) available through websites such as Illinois Institute of Technology's and Case Western Reserve University's (compilation) or ethicsonline.org. Look at the companies developing the technology and check out their "codes of ethics" to determine whether the technology they are developing is in keeping with their mission and values. Who is responsible if something goes wrong or if critical information is withheld from the public? Example: asbestos and cigarettes

Apply ethical theory on your own-utilitarianism, act utilitarianism, rule utilitarianism, Kant's categorical imperative, ethic of care, deontology, teleology, ethical egoism, absolutism, Fletcher's situation ethics, ethical relativism, etc. Consider an encyclopedia of ethics for terms and applicable concepts. Check out the reading in our textbook on morality and technology.


Related Discussions:- Moral and ethical implications

What guarantees the integration of all application modules, What guarantees...

What guarantees the integration of all application modules? The R/3 basis system guarantees the integration of all application modules.  The R/3 basis s/w gives the run time e

What are advantages and drawbacks of flip-flop, What are advantages and dra...

What are advantages and drawbacks of flip-flop? Usually area of a Flip-flop for features in more than a latch. Power consumption is normally higher, because of the area and

What do you mean by linker, Q. What do you mean by Linker? For modular...

Q. What do you mean by Linker? For modularity of your programs it is better to break your program in numerous sub routines. It's even better to put common routine such as read

Add the equation by using 648 and 487 in bcd code, Add 648 and 487 in BCD c...

Add 648 and 487 in BCD code. Ans. In BCD Code, addition of 648 and 487: 6 4 8  =  0 1 1 0   0 1 0 0      1 0 0 0 4 8 7  =  0 1 0 0   1 0 0 0      0 1 1 1 ---------------------

Explain the techniques used for protection of user files, Explain the techn...

Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne

Explain about floating point representation, Q. Explain about Floating Poin...

Q. Explain about Floating Point Representation? Floating-point number representation includes two parts. The first part of number is a signed fixed-point number which is called

What is xml, XML is the Extensible Markup Language. It betters the function...

XML is the Extensible Markup Language. It betters the functionality of the Web by letting you recognize your information in a more accurate, flexible, and adaptable way. It is e

Explain the term- software, Explain the term- Software Some of the key ...

Explain the term- Software Some of the key aspects of software are considered in this section. Familiarisation with software packages is generally best achieved by carrying out

What is the best way offload responsibility, What is the best way offload r...

What is the best way offload responsibility? The best way to offload responsibilities is to purchase services through a Service Provider. ISPs, customers and Service Provide

What are privileged instructions, What are privileged instructions?  So...

What are privileged instructions?  Some of the machine instructions that might cause harm to a system are designated as privileged instructions. The hardware permits the privil

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd