Ethical protocols design

dc.contributor.authorTurilli, Matteo
dc.contributor.editorAnderson, Susan Leigh
dc.contributor.editorAnderson, Michael
dc.contributor.rorhttps://ror.org/02jjdwm75
dc.date.accessioned2026-02-27T09:58:47Z
dc.date.issued2007-02-08
dc.description.abstractThe paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined in such a way as to (i) discriminate specific cases in which an individual’s GIP can be infringed without accessing the individual’s data; (ii) separate unauthorised accesses to data that do not respect the right to GIP from access that do; and (iii) distinguish different degrees of GIP. Finally a camera phone is used to illustrate the proposed solution.
dc.description.peerreviewedYes
dc.description.statusPublished
dc.formatapplication/msword
dc.identifier.citationTurilli, M. (2011). Ethical protocols design. In Machine Ethics (pp. 375 - 397). Cambridge University Press. https://doi.org/10.1017/CBO9780511978036.026
dc.identifier.doihttps://doi.org/10.1017/CBO9780511978036.026
dc.identifier.isbn9780511978036
dc.identifier.officialurlhttps://doi.org/10.1017/CBO9780511978036.026
dc.identifier.urihttps://hdl.handle.net/20.500.14417/4186
dc.journal.titleMachine Ethics
dc.language.isoeng
dc.page.final375
dc.page.initial397
dc.publisherCambridge University Press
dc.relation.departmentSci Tech (Data Science)
dc.relation.entityIE University
dc.relation.schoolIE School of Science & Technology
dc.rightsAttribution 4.0 International
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subject.keywordsethical protocols
dc.subject.keywordsethical requirements
dc.subject.keywordsinformational privacy
dc.subject.keywordsprotocols design
dc.subject.keywordssystem specification
dc.subject.odsODS 9 - Industria, innovación e infraestructura
dc.subject.unesco33 Ciencias Tecnológicas::3306 Ingeniería y tecnología eléctricas
dc.titleEthical protocols design
dc.typeinfo:eu-repo/semantics/bookPart
dc.version.typeinfo:eu-repo/semantics/acceptedVersion
dspace.entity.typePublication
relation.isAuthorOfPublication4c105a3d-3b6f-4801-b0a6-7593ef9017d2
relation.isAuthorOfPublication.latestForDiscovery4c105a3d-3b6f-4801-b0a6-7593ef9017d2

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
Ethical protocols design.docx
Tamaño:
365.79 KB
Formato:
Microsoft Word XML

Bloque de licencias

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
license.txt
Tamaño:
1.71 KB
Formato:
Item-specific license agreed to upon submission
Descripción: