ABSTRACT
G.E. Moore, in his book Principia Ethica, examines the popular view of ethics that deals with “what we ought to do” as well as using ethics to cover the general inquiry: “what is good?”
This paper utilises Moore's view of Ethics to examine computer systems performance. Moore asserts that “good” in itself is indefinable. It is argued in this report that, although we describe computer systems as good (or bad) a computer system cannot be good in itself, rather a means to good!
In terms of “what we ought to do” this paper looks at what actions (would) bring about good computer system performance according to computer science and engineering literature. In particular we look at duties, responsibilities and “to do what is right” in terms of system administration, design and usage.
We further argue that in order to first make ethical observations with respect computer system performance and then apply them, requires technical knowledge which is typically limited to industry specialists and experts.
References
- 1.Abshire G.M., Ethics Apply to Computer Specialists, Too. Computers and Society. Vol. 11, No. 2, pp. 22, Spring 1981. Google Scholar
Digital Library
- 2.Abshire G.M., The Ethical Insensitivity of Computer Specialists and What You Can Do About It. Computers and Society, Vol. 12, No. 1, pp. 10-11, Winter 1982. Google Scholar
Digital Library
- 3.Attanasio C.R., Markstein P.W. and Philips R.J., Penetrating an operating system: a study of VM/370 integrity. IBM System Journal, pp 102-116, No. 1 1976.Google Scholar
- 4.Bach M.J., Design of the Unix Operating System. Prentice-Hall International Editions, 1986. ISBN: 0- 13-201757-1 025. Google Scholar
Digital Library
- 5.Baird B.J., Baird Jr. L.L and Ranauro R.P, The Moral Cracker? Computers and Security 6, pp 471-478, 1987. Google Scholar
Digital Library
- 6.Barns W.W., Guidelines for Efficient Subscriber Usage of the Defence Data Network. The M# Corporation, MTR-90W0(E#7, January 1990.Google Scholar
- 7.Bloombecker J., Computer Security - For the People., Computers in Society, Vol. 14, No.4. pp 12-15, 1985. Google Scholar
Digital Library
- 8.Burger R., Computer Viruses a High-Tech Disease. Abacus, 1988. Google Scholar
Digital Library
- 9.Carey F.E., Code of Ethics for Persons with Privileged Access to Computers and Networks at AT&T Bell Laboratories. AT&T Bell Labs Technical Memorandum 45267-920310-01TM, March 1992.Google Scholar
- 10.Clarke R., Asimov's Laws of Robotics: Implications for Information Technology Part 1. Computer, pp 51-61, December 1993. Google Scholar
Digital Library
- 11.Clarke R., Asimov's Laws of Robotics: Implications for Information Technology Part 2. Computer, pp 57-66, January 1994. Google Scholar
Digital Library
- 12.Cohen S. and Grace D., Engineers and Social Responsibility: An Obligation to Do Good. IEEE Technology and Society Magazine, Fall 1994.Google Scholar
Cross Ref
- 13.Dewdney A.K., Computer Recreations Of worms, viruses and Core War. Scientific American pp 90-93, March 1989.Google Scholar
- 14.Dick P.K., Do Androids Dream of Electric Sheep? Grafton, 1972.Google Scholar
- 15.Eichin M.W. and Rochlis J.A, The Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. To be presented at the 1989 IEEE Symposium on Research in Security and Privacy, February 1989.Google Scholar
- 16.Frey D. and Adams R., A Directory of Electronic Mail Addressing and Networks. O'Reilly & Associates, Inc., 1990. Google Scholar
Digital Library
- 17.Frakes R., Terminator 2 Judgement Day. Sphere Books Ltd, 1991.Google Scholar
- 18.Granrose J., A compilation of Anonymous FTP sites. The Internet.Google Scholar
- 19.Grant R. and Naylor D., Kryten. Red Dwarf, Episode 1, Series 2.Google Scholar
- 20.Harman G., The Nature of Morality an Introduction to Ethics. Oxford University Press, 1977.Google Scholar
- 21.Henderson H., The USENET System. UNIX Papers for UNIX Developers and Power Users, Howard W.Sams & Company, pp 42-90, 1987.Google Scholar
- 22.Henry G.J., The Fair Share Scheduler. AT&T Bell Labs Technical Journal, Vol. 63, No. 8, October 1984.Google Scholar
- 23.Henry G.J., pers. comm., 1994.Google Scholar
- 24.Holt A.G., Distributed Systems over Wide Area Networks. Research Degree Report, October 1993.Google Scholar
- 25.Interact Document, Real Progranuners Don't Use Pascal. Widely circulated Interact Document.Google Scholar
- 26.Johnson D.G., Computer Ethics. Prentice Hall.Google Scholar
- 27.Kadie C., A critique of the Iowa State University's Computer Ethics policy.Google Scholar
- 28.Kernighan B.W. and Pike B., The Unix Programming Environment, Prentice Hall, 1984. Google Scholar
Digital Library
- 29.Kroll E., The Whole lnternet User Guide & Catalog. O'Reilly & Associates, inc., 1993. Google Scholar
Digital Library
- 30.LaQuay T.L., The user's DIRECTORY of computer networks. Digital Press/Prentice Hall International Edition, 1990. Google Scholar
Digital Library
- 31.Liu P., LAN Traffic Symptoms & Problem Solving Case Studies from LAN Traffic Monitoring. AT&T Bell Laboratories Presentation.Google Scholar
- 32.Liu P., Preliminary Assessment of Wide-area File Sharing. AT&T Bell Laboratories Technical Memorandum 45262-910801-01IM, August 1991.Google Scholar
- 33.Loukides M., System Performance Tuning. O'Reilly & Associates, Inc., October 1991. Google Scholar
Digital Library
- 34.McLean F. Integrating Ethics and Design. IEEE Technology and Society Magazine, Fall 1993.Google Scholar
Cross Ref
- 35.Mitcham C., Computers: From Ethos and Ethics to Mythos and Religion. Technology in Society, Vol. 8, pp. 171-201, 1986.Google Scholar
- 36.Morningstar C. and Farmer ER., Lessons of Lucas- Film Habitat. Cyberspace First Steps, pp 273-300, The MIT Press 1991. Google Scholar
Digital Library
- 37.Moore G.E., Principia Ethica. The Cambridge University Press, 2nd edition, 1959.Google Scholar
- 38.Ritchie D.M., Unix Time-Sharing System: A Retrospective. The Bell System Technical Journal, Vol. 57, No. 6, July-August 1978.Google Scholar
- 39.Rheingold H., Virtual Reality. Secker & Warburg, 1991. Google Scholar
Digital Library
- 40.Shooting Shark, Unix Nasties, Phrack, Vol. 1, Issue 6, Phile 5, April 1986.Google Scholar
- 41.Spafford E., The Internet Worm Program: An Analysis. Purdue Technical Report CSD-TR-823 (available from Anonymous FTP sites on the Intemet), December 1988.Google Scholar
- 42.Spafford E., Some Musing on Ethics and Computer Break-ins. Purdue Technical Report (available from Anonymous Fq'P sites on the internet).Google Scholar
- 43.Stevens W.R., Unix Network Programming. Prentice Hall Inc, 1990. Google Scholar
Digital Library
- 44.Stata R., Foundation of Ethics. WWW hypertext document, http://www.vix.com/pub/objectivism/ MiT-Talks/ethics/ section3_ 1 .htmI#SECTION0001 #, May 1994.Google Scholar
- 45.Stoll C., The Cuckoo's Egg. The Bodley Head, 1989.Google Scholar
- 46.Travaglia S., The Bastard Operator From Hell (available from Internet Anonymous FTP sites).Google Scholar
- 47.Winner L., Citizen Virtues in a Technological Order. Applied Ethics: A Reader, pp 46-68, B lackwell, 1993.Google Scholar
Index Terms
Do disk drives dream of buffer cache hits?





Comments