فناوری اطلاعات، دوراهی‌های اخلاقی، و تصمیم‌گیری

نوع مقاله : مقاله پژوهشی

نویسنده

پژوهشگاه علوم و فناوری اطلاعات ایران (ایرانداک)؛ تهران، ایران؛

چکیده

فناوری اطلاعات به سبب درهم‌تنیدگی روزافزون آن با زندگی اجتماعی اهمتی اخلاقی فزاینده‌ای بافته است. ازاین‌رو شرکت‌های مربوطه‌ای چون ای‌سی‌ام و آی‌تریپل‌ئی مجموعه اصول و کدهای اخلاقی‌ای برای حرفه فناوری اطلاعات تدوین و هرازگاهی آن را به‌روز کنند. این اصول و کدها گرچه به عنوان مجموعه توصیه‌هایی برای راهنمایی اخلاقی مفیدند، در برخی از موقعیت‌های پیچیده، کارایی‌شان را برای حرفه‌مندان این حرفه از دست می‌دهند. چراکه اصول و کدها ممکن است در موقعیت‌هایی باهم در تعارض بیفتند. در این مقاله تلاش خواهیم کرد الگویی هنجاری برای کمک به تصمیم‌گیری در چنین موقعیت‌هایی ارائه کنیم. برای رسیدن به این الگو از آموزه‌ها و رویکردهای متعددی چون دیدگاه دیوید راس، آموزه اثر دوگانه، و نیز رویکرد جودیث تامسون در اخلاق هنجاری و کاربردی کمک خواهیم گرفت. این الگو دارای سه شرط عمومی و یک شرط اختصاصی خواهد بود که برای پاسخ به دوراهی‌هایی با مضمون رواداشتن شر و توسل به شر در حرفه فناوری اطلاعات می‌توانند یاری‌گر عامل اخلاقی باشند. ما بر اساس این الگو علاوه بر اینکه برخی دوراهی‌های‌ مهم حوزه اخلاقاً کاربردی را تبیین خواهیم کرد و به آن‌ها پاسخ خواهیم داد، آن را در دست‌کم شش موقعیت اخلاقاً مهم در حوزه فناوری اطلاعات، ازجمله در حوزه‌های خودروهای خودران، حریم خصوصی و امنیت، جنگ‌های سایبری، باج‌افزارها، و اینترنت اشیا، به کار خواهیم بست. در هر کدام نشان خواهیم داد که شرایط چهارگانه چگونه می‌توانند به عامل اخلاق در تصمیم‌گیری‌های اخلاقی کمک کنند. بااین‌‌حال ادعا نخواهیم کرد که این الگو همچون یک منطق تصمیم‌پذیر عمل می‌کند چراکه فرایند رسیدن به تصمیم اخلاقی الگوریتم‌وار نیست و عوامل شناختی و غیرشناختی زیادی در این میان نقش بازی می‌کنند.

کلیدواژه‌ها


عنوان مقاله [English]

Information Technology, Moral Dilemmas, and Decision-Making

نویسنده [English]

  • Rahman Sharifzadeh
Iranian Research Institute for Information Science and Technology (IRANDOC); Tehran, Iran;
چکیده [English]

The ethical significance of information technology due to its increasing intertwining with social life has led associations and organizations such as ACM and I-EEE to develop ethical principles and codes for the IT profession and to update them from time to time. Although these principles and codes are helpful as general ethical guidance, in some complex situations they lose their effectiveness due to the conflict that may occur between the principles and consequently the codes. In this paper, we will attempt to suggest a normative model to help ethical decision-making in such situations. This model can help to respond to problems of allowing evil and appealing to evil in IT profession. In addition to explaining and responding to some important ethical dilemmas in the field of applied ethics, we will apply it in at least six ethically important themes in IT profession, including self-driving cars, privacy and security, cyber-attacks, ransomware, and the Internet of Things. In each we will show how the model can help the moral agent in making moral decisions. However, we will not claim that this model acts as a decision-making logic, since the process of reaching a moral decision is not algorithmic and many cognitive and non-cognitive factors play a role in it.

کلیدواژه‌ها [English]

  • Information Technology
  • Ethical Principles
  • Ethical Codes
  • ethical dilemmas
Association for Computing Machinery (ACM). 2018. Code of Ethics and Professional Conduct, Affirming our obligation to use our skills to benefit society. available at https://www.acm.org/code-of-ethics (accessed Oct. 9, 2022)
Bommer, Michael, Clarence Gratto, Jerry Gravander & Mark Tuttle. 1987. A behavioral model of ethical and unethical decision making. Journal of Business Ethics 6” 265–280.
Boyle, J. 1977. Double effect and a certain type of embryotomy. The Irish Theological Quarterly 44 (4): 303-318.
_____. 1991 a. Who is entitled to Double Effect? The Journal of Medicine and Philosophy 16 )5): 475-494.
_____. 1991 b. Further Thoughts on Double Effects: Some Preliminary Responses. The Journal of Medicine and Philosophy 16 )5(: 565-570.
Bunz, M., and g. Meikle. 2017. The Internet of Things. Cambridge: Polity.
Chen, Q., X.Su,S. Liu, K. Miao, & H. Fang. 2021. The relationship between moral sensitivity and professional values and ethical decision-making in nursing students. Nurse Educ Today. 105: 105056.
Chopra, Abhishek, & ‎Mukund Chaudhary. 2019. Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines. ?: Apress L.P.
Coughlin, Con. 2011. Stuxnet virus attack: Russia warns of ‘Iranian Chernobyl. the telegraph, available at: www.telegraph.co.uk/news/worldnews/europe/russia/8262853/Stuxnet-virus-attack-Russia-warns-of-Iranian-Chernobyl.html (accessed Jan 16, 2022)
Cronan,Timothy, and David Douglas. 2006. Information Technology Ethical Behavior: Toward a Comprehensive Ethical Behavior Model. Journal of Organizational and End User Computing 18 (1): i-xi.
Danaher, J. & Neil McArthur. 2017. Robot Sex, Social and Ethical Implications. Cambridge :The MIT Press.
Dane, Erik, and G. Pratt Michael. 2007. Exploring Intuition and its Role in Managerial Decision Making. Academy of Management Review 32 (1): 33-54.
Dimmock, Mark, and Fisher Andrew. 2017. Ethics for A-Level. Cambridge, UK: Open Book Publisher.
Donagan, A. 1991. Moral Absolutism and the Double-Effect Exception: Reflections on Joseph Boyle's ‘who is entitled to double effect?’ The Journal of Medicine and Philosophy 16 (5): 495-509.
Ermann, M., M. B. Williams, and C. Gutierrez. 1990. Computers, ethics and society. NewYork: Oxford University Press.

Ess, C., and M. Thorseth. 2008. Kant and information ethics. Ethics and Information Technology 10: 205–211.

Farwell, James P., & Rafal Rohozinski. 2011. Stuxnet and the Future of Cyber War. Survival 53 (1): 23-40Oxford
Fletcher, J. 1997. Situation ethics: The new morality. Louisville, KY: Westminster John Knox Press.
Floridi, L., and J. W. Sanders. 2002. Mapping the Foundationalist Debate in Computer Ethics. Ethics and Information Technology 4 (1): 1–9. A revised version is printed in Spinello, R. A. and Tavani, H. T. (eds.), Readings in Cyberethics (2nd edn), pp. 84–95. Sudbury, MA: Jones and Bartlett.
Frey, R. G. 2007. The Doctrine of Double Effect. In Frey R. G. and Christopher Heath Wellman (eds.) A Companion to Applied Ethics. Oxford: Blackwell 

Foot, P. 2003. Virtues and Vices: and Other Essays in Moral Philosophy. NewYork: Oxford University Press Inc.

Gensler, H.J. 2011. Ethics: A Contemporary Introduction. Oxfordshire: Routledge.

Gotterbarn Donald, Keith Miller, Simon Rogerson, Steve Barber, Peter Barnes, et al. 2001. Software Engineering Code of Ethics and Professional Practice. Science and Engineering Ethics. 7 (2): 231-238.
Hartshorne, Charles. 1974. Beyond Enlightened Self-Interest: A Metaphysics of Ethics. Ethics 84 (3): 201-216.
Hofmann, Tom. 2020. How organisations can ethically negotiate ransomware payments. Network Security? (10): 13–17.
van den Hoven, J. 1997. Computer Ethics and Moral Methodology. Metaphilosophy 28 (3): 234–248.
Kohlberg, Lawrence. 1981. Essays on Moral Development, Vol. I: The Philosophy of Moral Development. San Francisco, CA: Harper & Row.
Lyons, D. 1970. The Correlativity of Rights and Duties. Noûs 4 (1): 45-55.
_____. 1965. Forms and Limits of Utilitarianism. Oxford: Clarendon Press.
Maner, W. 1996. Unique ethical problems in information technology. Science and Engineering Ethics 2 (2): 137-154.
Mangan, J.: 1949. An historical analysis of the principle of double effect. Theological Studies 10” 41-6.
Marquis, D.B. 1991. Four Versions of double effect. The Journal of Medicine and Philosophy 16 (5): 515-544.
Murnighan, Keith, and Wang Long. 2018. Emotions, Intuition, and Reasoning in Moral Decision Making. Academy of Management Annual Meeting Proceedings? (1). 13413-13413
Murphy, T. F. 2013. Double-effect reasoning and the conception of human embryos. Journal of Medical Ethics 39 (8): 529–32.
Myers, M.D., and M. Leigh. 1996. Ethical Dilemmas in the Use of Information Technology: An Aristotelian Perspective. Ethics & Behavior 6 (2): 153–16.
Northcutt, S. 2004. IT Ethics Handbook; Right and Wrong for IT Professional. Oxford: Syngress Publishing, Inc.
Northouse, C. 2006. Protecting What Matters: Technology, Security, and Liberty Since 9/ 11. Brookings: Institution Press.
Olson, J. M. 2006. Fair play: the moral dilemmas of spying, Washington. D.C.: Potomac Books.
Prinz, Jesse J., and Nichols Shaun. 2010. ‘\Moral emotions. In John Michael Doris, eds. The Moral Psychology Handbook. Oxford: Oxford University Press.
Quinn, W. 1989. Actions, Intentions, and Consequences: The Doctrine of Doing and Allowing. Philosophical Review 98 (3): 287-312.
Rest, J. R. 1986. Moral development: Advances in research and theory. NewYork, NY: Praeger.
Reynolds, George W. 2014. Ethics in Information Technology. Massachusetts: Cengage Learning.
Ross, W. D. 1930. The Right and the Good. Reprinted with an introduction by Philip Stratton-Lake. Oxford, Oxford University Press.
_____. 1954. Kant’s Ethical Theory: A Commentary on the Grundlegung zur Metaphysik der Sitten. Oxford: Clarendon Press.
Rovie, Eric. 2006. Reevaluating The Historical Evolution of Double Effect: Anscombe, Aquinas, and The Principle of Side-Effects. Studies in the History of Ethics. Available at: https://www.historyofethics.org/022006/022006Rovie.shtml (accessed Oct. 9, 2022)
Schultz, R. 2005. Contemporary issues in ethics and information technology. ?: IRM press.
Simpson, D. L. 2020. William David Ross. Internet encyclopedia of philosophy, available at: https://www.iep.utm.edu/ross-wd/#H5 (accessed Oct. 9, 2022)
Singer, P. W. 2009. Wired for War: The Robotics Revolution and Conflict in the Twenty-first Century. London: Penguin Press.
Sparrow, R. 2007. Killer Robots. Journal of Applied Philosophy 24 (1): 62-77.
Thomson, J. J. 1976. Killing, Letting Die, and the Trolley Problem. The Monist: the international quarterly journal of general philosophical inquiry 59 (2): 204-217.

Upton, C. L. 2009. Virtue Ethics and Moral Psychology: The Situationism Debate. The Journal of Ethics 13 (2–3):103–115.

Verweij, M. 2007. Moral Principles and Justification in Applied Ethics. Göran C., ed. Perspectives on Applied Ethics. Linköping: Centre for Applied Ethics.
Wiener, N. 1948. Cybernetics: Or Control and Communication in the Animal and the Machine. Paris: Hermann & Cie & Camb. Mass. MIT Press.
_____. 1954. The Human use of human beings: Cybernetics and society. NewYork, Houghton Mifflin, Doubleday Anchor.
Wittmer, Dennis Paul. 1992. Ethical sensitivity and managerial decision-making: An experimentPublic Administration - Dissertations. 43. https://surface.syr.edu/ppa_etd/43 (accessed Oct. 9, 2022)