Ethics of information by Luciano Floridi - problem of informational privacy and morality of artificial agents
The major characteristics of information ethics, to analyze the interconnection between ethics and concept of information, to consider the problems of the informational privacy and the morality of artificial agents as one of the most challenging issues.
Рубрика | Этика и эстетика |
Предмет | Ethics |
Вид | статья |
Язык | английский |
Прислал(а) | Honcharenko Valeria Anatoliivna |
Дата добавления | 16.12.2020 |
Размер файла | 22,6 K |
Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже
Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.
Подобные документы
The problem of regulation relations between morality and interests of individual and society. Basic concepts of the essence of morality: moral activity, relationships, moral consciousness. The main social function of morality and its primitive forms.
реферат [20,6 K], добавлен 10.05.2011Problem of choice basic lines of child: half, color of eyes, hair, modern possibilities of medicine. Possibility choice of design of child at artificial impregnation. Ethic problem of choice of design. Value of problem of choice of sex of child in China.
статья [15,1 K], добавлен 02.12.2010The characteristic of types of business fraud. Examples of misleading. Deceit by means of about a prize. An example of the toxic waste is Illegal dumping of chemical waste in China. Cheating is an unethical perspective, which against Islamic values.
реферат [12,6 K], добавлен 27.04.2013General characteristics, objectives and functions of medical ethics as a scientific discipline. The concept of harmlessness and its essence. Disagreement among physicians as to whether the non-maleficence principle excludes the practice of euthanasia.
презентация [887,6 K], добавлен 21.02.2016The material and technological basis of the information society are all sorts of systems based on computers and computer networks, information technology, telecommunication. The task of Ukraine in area of information and communication technologies.
реферат [29,5 K], добавлен 10.05.2011Essence, structure and basic functions of informational logistics system. Principles and the levels of information logistic system. Resources project development. Business process of logistic operations. The tariff for the transportation of cargo.
дипломная работа [3,1 M], добавлен 31.05.2013Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.
реферат [20,9 K], добавлен 19.12.2013Ability of the company to reveal and consider further action of competitive forces and their dynamics. Analysis of environment and the target market. Functional divisions and different levels in which еhe external information gets into the organization.
статья [10,7 K], добавлен 23.09.2011A database is a store where information is kept in an organized way. Data structures consist of pointers, strings, arrays, stacks, static and dynamic data structures. A list is a set of data items stored in some order. Methods of construction of a trees.
топик [19,0 K], добавлен 29.06.2009Signal is a carrier of new information for the observer. Concept and classification detector signals, their variety and functional features. The detection abilities of different detector’s types, methodology and milestones of their determination.
контрольная работа [1,1 M], добавлен 27.04.2014Information access and exchange. Cognitively Salient Relations for Multilingual Lexicography. Work in Cognitive Sciences. Transcription and Normalization. Mapping to Relation Types. Clustering by Property Types. Information about synonyms and antonyms.
реферат [24,6 K], добавлен 28.03.2011The computer systems and unique possibilities for fulfillment before unknown offenses. The main risks and threats to information systems security in the internet. Internet as a port of escape of the confidential information and its damage minimization.
контрольная работа [19,6 K], добавлен 17.02.2011Relevance of electronic document flow implementation. Description of selected companies. Pattern of ownership. Sectorial branch. Company size. Resources used. Current document flow. Major advantage of the information system implementation in the work.
курсовая работа [128,1 K], добавлен 14.02.2016Research methods are strategies or techniques to conduct a systematic research. To collect primary data four main methods are used: survey, observation, document analysis and experiment. Several problems can arise when using questionnaire. Interviewing.
реферат [16,7 K], добавлен 18.01.2009История и современный взгляд на языковую картину мира. Определение лингвокультурного концепта. Характеристика британской прессы и языковые особенности газетного текста. Языковая репрезентация концепта "Privacy" в качественных изданиях и таблоидах.
дипломная работа [168,0 K], добавлен 30.07.2017The digital nervous system. The best way to put distance between company and the crowd. Accurate information about sales. A standardized system of accounts for the entire GM organization. Achieving advantage over competitors in the information age.
анализ книги [19,8 K], добавлен 16.06.2012Web Forum - class of applications for communication site visitors. Planning of such database that to contain all information about an user is the name, last name, address, number of reports and their content, information about an user and his friends.
отчет по практике [1,4 M], добавлен 19.03.2014Presidential candidates. Learning the information of the Electoral College, to understanding the process by which the President is officially elected. The formal ceremony of presidential inauguration, including the information about its time, place.
курсовая работа [34,7 K], добавлен 09.04.2011Occurrence of new crimes in connection with development of new technologies and computerizations. The review and the characteristic of the most widespread internet crimes, ways of struggle against them. Methods of protection of the personal information.
эссе [15,3 K], добавлен 15.03.2012Consideration of a systematic approach to the identification of the organization's processes for improving management efficiency. Approaches to the identification of business processes. Architecture of an Integrated Information Systems methodology.
реферат [195,5 K], добавлен 12.02.2016