Abstract
This essay considers methodological aspects ofcomputer ethics and argues for a multi-levelinterdisciplinary approach with a central role forwhat is called disclosive computer ethics. Disclosivecomputer ethics is concerned with the moraldeciphering of embedded values and norms in computersystems, applications and practices. In themethodology for computer ethics research proposed inthe essay, research takes place at three levels: thedisclosure level, in which ideally philosophers,computer scientists and social scientists collaborateto disclose embedded normativity in computer systemsand practices, the theoretical level, in whichphilosophers develop and modify moral theory, and theapplication level, that draws from research performedat the other two levels, and at which normativeevaluations of computer systems and practices takesplace.
Similar content being viewed by others
References
P. Agre and C. Mailloux. Social Choice about Privacy: Intelligent Vehicle-Highway Systems in the United States. In B. Friedman, editor, Human Values and the Design of Computer Technology, Cambridge University Press, 1997.
M. Akrich. The Description of Technical Objects. In W. Bijker and J. Law, editors, Shaping Technology/Building Society: Studies in Sociotechnical Change. MIT Press, 1992.
J. Blanchette. On the Social Discourse of Cryptology, Paper presented at CEPE'98, London School of Economics and Political Science, 14–15 December, 1998.
P. Brey. New Media and the Quality of Life. Techné: Journal of the Society for Philosophy and Technology, 3: 1–23, 1997.
P. Brey. The Politics of Computer Systems and the Ethics of Design. In J. van den Hoven, editor, Computer Ethics: Philosophical Enquiry. Rotterdam University Press, 1998.
P. Brey. Worker Autonomy and the Drama of Digital Networks in Organizations. Journal of Business Ethics, 22: 15–25, 1999.
Dworkin. The Theory and Practice of Autonomy. Cambridge University Press, Cambridge, 1988.
B. Friedman and H. Nissenbaum. Bias in Computer Systems. In B. Friedman, editor, Human Values and the Design of Computer Technology. Cambridge University Press, 1997.
T. Hill. Autonomy and Self-Respect. Cambridge University Press, 1991.
J. van den Hoven. Computer Ethics and Moral Methodology. Metaphilosophy, 28: 234–248, 1997.
L. Introna and H. Nissenbaum. The Public Good Vision of the Internet and the Politics of Search Engines. In R. Rogers, editor, Preferred Placement. Knowledge Politics on the Web.
Jan van Eyck Akademie Editions, Maastricht, 2000.
J. Moor. What is Computer Ethics? Metaphilosophy, 16: 266–275, 1985.
H. Nissenbaum. Can We Protect Privacy in Public? In J. van den Hoven, editor, Computer Ethics: Philosophical Enquiry. Rotterdam University Press, 1998.
B. Pfaffenberger. Technological Dramas. Science, Technology, and Human Values, 17: 282–312, 1992.
J. Rawls. A Theory of Justice. Harvard University Press, 1971.
R. Sclove. Democracy and Technology. Guilford Press, New York, 1995.
H. Tavani. Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology, 1: 137–145, 1999.
L. Winner. Do Artifacts have Politics? Daedalus, 109: 121–136, 1980.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Brey, P. Method in computer ethics: Towards a multi-level interdisciplinary approach. Ethics and Information Technology 2, 125–129 (2000). https://doi.org/10.1023/A:1010076000182
Issue Date:
DOI: https://doi.org/10.1023/A:1010076000182