New Frontiers for Computer Ethics: Artificial Intelligence, Virtualization, and Cyberspace

  • Joseph Migga Kizza
Part of the Undergraduate Topics in Computer Science book series (UTICS)


Artificial Intelligence discusses the new frontiers of ethics in the new artificial intelligent (AI) technologies, virtualization and virtual reality and cyberspace. The chapter explorers how these new frontiers are affecting the traditional ethical and social values. Our discussion is on based on the premise that artificial intelligence technologies create possibilities to understand and extend human knowledge to create intelligent agents perhaps with a human–value base, intended to help solve human problems. We further look at virtualization and virtual reality technologies and how they inform our behavior based on our traditional moral and ethical values through the mediation of interaction through with electronic media. Our discussion of the social and ethical implications and consequences of virtualization is centered on two issues. One is that the anticipated benefit to society of virtualization as it extends known and relatively managed humanity’s social spheres and social networks in an unprecedented way through opening up of virtual domains of social interactions. The second benefit of virtualization to society is to avail tools and make it possible for those in society who want to create new virtual social networks out of the old and dismantle old ones. Finally we discuss a global mesh of interconnected computer networks, commonly referred to as cyberspace, which makes it possible for anyone using a point of entry device like a computer, smartphone or any other internet-enabled electronic device to reach anyone else, with the potential to access the mesh, through a one-on-one, one-to-many and many-to-one communication capabilities or through broadcasting via the world wide web. Cyberspace, because of immerse and telepresence capabilities and global reach, creates a potentially dangerous environment where one can do anything with no elegance, no accountability and no to limited.


Virtual Reality Virtual Machine Autonomous Agent Ethical Implication Information Communication Technology 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    LaChat MR (1986) (The Methodist Theological School in Ohio). Artificial intelligence and ethics: an exercise in the moral imagination. AI Mag 7(2)Google Scholar
  2. 2.
  3. 3.
    Luger G, Stubblefield W (1993) Artificial intelligence, 2nd edn. Benjamin Cummings, ReadingzbMATHGoogle Scholar
  4. 4.
    Asimov I (1964) The rest of the robot. Doubleday, New YorkGoogle Scholar
  5. 5.
    Williamson J (1978) With folded hands. In: The best of Jack Williamson. Ballantine, New York, pp 154–206Google Scholar
  6. 6.
    Waldrop M (1991) A question of responsibility. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Byrd & Fraser, BostonGoogle Scholar
  7. 7.
    Beardon C (1992) The ethics of virtual reality. Intell Tutor Media 3(1):22–28MathSciNetGoogle Scholar
  8. 8.
    Minsky M, Riecken D (1994) A conversation with Marvin Minsky about agents. Commun ACM 37(7):23–29CrossRefGoogle Scholar
  9. 9.
    Carbonell J (1979) Subjective understanding: computer models of belief systems. University of Michigan Press, Ann ArborGoogle Scholar
  10. 10.
  11. 11.
    Singh G, Feiner S, Thalmann D (1996) Virtual reality: software and technology. Commun ACM 39(5):35–36CrossRefGoogle Scholar
  12. 12.
    Bryson S (1996) Virtual reality in scientific visualization. Commun ACM 39(5):62–71CrossRefGoogle Scholar
  13. 13.
    The handbook of research for educational communications and technology.
  14. 14.
    Purser RE. Virtualization of consciousness or conscious virtualization: what path will virtual reality take?
  15. 15.
    Wikipedia. Phenomenology, ethics and the virtual world. Technoethics.
  16. 16.
    Gruman G (2008) Virtualization’s secret security threats: virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers. InfoWorld, 13 March, 2008.,0
  17. 17.
  18. 18.
    Lewis P (1996) Limiting a medium without boundaries. New York Times, 15 January, 1996, D1Google Scholar
  19. 19.
    Bhimani A (1996) Securing the commercial internet. Commun ACM 39(6):29–35CrossRefGoogle Scholar
  20. 20.
    Brandt D (1993) Cyberspace wars: microprocessing vs. big brother. NameBase NewsLine 2, July–August 1993.

Further Reading

  1. Barlow J (1991) Electronic frontier: private life in cyberspace. Commun ACM 34(8):23–25CrossRefGoogle Scholar
  2. Bates J (1994) The role of emotion in believable agents. Commun ACM 37(7):122–125CrossRefGoogle Scholar
  3. Boden M (1994) Agents and creativity. Commun ACM 37(7):117–121CrossRefGoogle Scholar
  4. Cowie J, Lehner W (1996) Information extraction. Commun ACM 39(1):80–91CrossRefGoogle Scholar
  5. Green M, Halliday S (1996) A geometrical modelling and animation system for virtual reality. Commun ACM 39(5):46–53CrossRefGoogle Scholar
  6. Hayes Roth F, Jacobstein N (1994) The state of knowledge-based systems. Commun ACM 37(3):22–39CrossRefGoogle Scholar
  7. Kanade T, Read M, Weiss L (1994) New technologies and application in robots. Commun ACM 37(3):58–67CrossRefGoogle Scholar
  8. Munakato T, Jani Y (1994) Fuzzy systems: an overview. Commun ACM 37(3):69–75Google Scholar
  9. Norman D (1994) How might people react with agents? Commun ACM 37(7):68–71CrossRefGoogle Scholar
  10. Poston T, Serra L (1996) Dextrous virtual work: introduction. Commun ACM 39(5):37–45CrossRefGoogle Scholar
  11. Riecken D (1994) Intelligent agents: introduction. Commun ACM 37(7):18–21CrossRefGoogle Scholar
  12. Schoppers M (1991) Real-time knowledge-based control systems. Commun ACM 34(8):27–30CrossRefGoogle Scholar
  13. Singh G, Fisher S, Thalmann D (1996) Virtual reality software and technology: introduction. Commun ACM 39(5):35–36CrossRefGoogle Scholar
  14. Webe J, Hirst G, Horton D (1996) Language use in context. Commun ACM 39(1):102–111CrossRefGoogle Scholar
  15. Wilkes M (1992) Artificial intelligence as the year 2000 approaches. Commun ACM 35(8):17–20MathSciNetCrossRefGoogle Scholar
  16. Wilkes Y (1996) Natural language processing. Commun ACM 39(1):60–62CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations