Skip to main content

Evolving Realities: Ethical and Secure Computing in the New Technological Spaces

Artificial Intelligence, Virtualization, and Cyberspace

  • Chapter
  • First Online:
Ethical and Secure Computing

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

  • 1650 Accesses

Abstract

Artificial Intelligence discusses the new frontiers of ethics in the new artificial intelligence (AI) technologies, virtualization and virtual reality, and cyberspace. The chapter explores how these new frontiers are affecting the traditional ethical and social values. Our discussion is on based on the premise that artificial intelligence technologies create possibilities to understand and extend human knowledge to create intelligent agents perhaps with a human value base, intended to help solve human problems. We further look at virtualization and virtual reality technologies and how they inform our behavior based on our traditional moral and ethical values through the mediation of interaction through with electronic media. Our discussion of the social and ethical implications and consequences of virtualization is centered on two issues. One is that the anticipated benefit to society of virtualization as it extends known and relatively managed humanity’s social spheres and social networks in an unprecedented way through opening up of virtual domains of social interactions. The second benefit of virtualization to society is to avail tools and make it possible for those in society who want to create new virtual social networks out of the old and dismantle old ones. Finally, we discuss a global mesh of interconnected computer networks, commonly referred to as cyberspace, which makes it possible for anyone using a point-of-entry device like a computer, smartphone, or any other Internet-enabled electronic device to reach anyone else, with the potential to access the mesh, through a one-on-one, one-to-many, and many-to-one communication capabilities or through broadcasting via the World Wide Web. Cyberspace, because of immerse and telepresence capabilities and global reach, creates a potentially dangerous environment where one can do anything with no elegance, no accountability, and no to limited.

Although it is obvious that machines can perform some activities at a higher level than persons can, these tasks remain, by and large, highly specialized and therefore remote from the capacity of human intelligence for multipurpose activities.

—Michael R. LaChat, The Methodist Theological School in Ohio

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. LaChat MR (1986) Artificial intelligence and ethics: an exercise in the moral imagination. AI Mag 7(2)

    Google Scholar 

  2. Wikipedia. http://en.wikipedia.org/wiki/Virtualization

  3. Luger G, Stubblefield W (1993) Artificial intelligence, 2nd edn. Benjamin Cummings, Reading

    Google Scholar 

  4. Asimov I (1964) The rest of the robot. Doubleday, New York

    Google Scholar 

  5. Williamson J (1978) With folded hands. The best of Jack Williamson. Ballantine, New York, pp 154–206

    Google Scholar 

  6. Waldrop M (1991) A question of responsibility. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Byrd & Fraser, Boston

    Google Scholar 

  7. Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28

    Google Scholar 

  8. Minsky M, Riecken D (1994) A conversation with Marvin Minsky about agents. Commun ACM 37(7):23–29

    Article  Google Scholar 

  9. Carbonell J (1979) Subjective understanding: computer models of belief systems. University of Michigan Press, Ann Arbor

    Google Scholar 

  10. VMware.com

    Google Scholar 

  11. Singh G, Feiner S, Thalmann D (1996) Virtual reality: software and technology. Commun ACM 39(5):35–36

    Article  Google Scholar 

  12. Bryson S (1996) Virtual reality in scientific visualization. Commun ACM 39(5):62–71

    Article  Google Scholar 

  13. The handbook of research for educational communications and technology. http://members.aect.org/edtech/ed1/15/

  14. Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28

    Google Scholar 

  15. Purser RE. Virtualization of consciousness or conscious virtualization: what path will virtual reality take? http://online.sfsu.edu/~rpurser/revised/pages/iabddoc.htm

  16. Wikipedia. Phenomenology, ethics and the virtual world. Technoethics. http://en.wikipedia.org/wiki/Technoethics#Phenomenology.2C_Ethics_and_the_Virtual_World

  17. Gruman G (2008) Virtualization’s secret security threats: virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers. InfoWorld, 13 Mar 2008

    Google Scholar 

  18. Wikipedia. Telepresence. http://en.wikipedia.org/wiki/Telepresence

  19. Lewis P (1996) Limiting a medium without boundaries. New York Times, 15 Jan 1996, D1

    Google Scholar 

  20. Bhimani A (1996) Securing the commercial internet. Commun ACM 39(6):29–35

    Article  Google Scholar 

Further Reading

  1. Barlow J (1991) Electronic frontier: private life in cyberspace. Commun ACM 34(8):23–25

    Article  Google Scholar 

  2. Bates J (1994) The role of emotion in believable agents. Commun ACM 37(7):122–125

    Article  Google Scholar 

  3. Boden M (1994) Agents and creativity. Commun ACM 37(7):117–121

    Article  Google Scholar 

  4. Brandt D (1993) Cyberspace wars: microprocessing vs. big brother. NameBase NewsLine 2, July–August 1993

    Google Scholar 

  5. Cowie J, Lehner W (1996) Information extraction. Commun ACM 39(1):80–91

    Article  Google Scholar 

  6. Green M, Halliday S (1996) A geometrical modelling and animation system for virtual reality. Commun ACM 39(5):46–53

    Article  Google Scholar 

  7. Hayes Roth F, Jacobstein N (1994) The state of knowledge-based systems. Commun ACM 37(3):22–39

    Article  Google Scholar 

  8. Kanade T, Read M, Weiss L (1994) New technologies and application in robots. Commun ACM 37(3):58–67

    Article  Google Scholar 

  9. Munakato T, Jani Y (1994) Fuzzy systems: an overview. Commun ACM 37(3):69–75

    Google Scholar 

  10. Norman D (1994) How might people react with agents? Commun ACM 37(7):68–71

    Article  Google Scholar 

  11. Poston T, Serra L (1996) Dextrous virtual work: introduction. Commun ACM 39(5):37–45

    Article  Google Scholar 

  12. Riecken D (1994) Intelligent agents: introduction. Commun ACM 37(7):18–21

    Article  Google Scholar 

  13. Schoppers M (1991) Real–time knowledge-based control systems. Commun ACM 34(8):27–30

    Article  Google Scholar 

  14. Singh G, Fisher S, Thalmann D (1996) Virtual reality software and technology: introduction. Commun ACM 39(5):35–36

    Article  Google Scholar 

  15. Webe J, Hirst G, Horton D (1996) Language use in context. Commun ACM 39(1):102–111

    Article  Google Scholar 

  16. Wilkes M (1992) Artificial intelligence as the year 2000 approaches. Commun ACM 35(8):17–20

    Article  Google Scholar 

  17. Wilkes Y (1996) Natural language processing. Commun ACM 39(1):60–62

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kizza, J.M. (2019). Evolving Realities: Ethical and Secure Computing in the New Technological Spaces. In: Ethical and Secure Computing. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-03937-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03937-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03936-3

  • Online ISBN: 978-3-030-03937-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics