Switch to: References

Add citations

You must login to add citations.
  1. Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Some ethical reflections on cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.
    The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)The challenge of applying ethics.Terrell Ward Bynum - 2001 - Science and Engineering Ethics 7 (2):219-220.
    Download  
     
    Export citation  
     
    Bookmark  
  • Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Flourishing ethics.Terrell Ward Bynum - 2006 - Ethics and Information Technology 8 (4):157-173.
    This essay describes a new ethical theory that has begun to coalesce from the works of several scholars in the international computer ethics community. I call the new theory ‚Flourishing Ethics’ because of its Aristotelian roots, though it also includes ideas suggestive of Taoism and Buddhism. In spite of its roots in ancient ethical theories, Flourishing Ethics is informed and grounded by recent scientific insights into the nature of living things, human nature and the fundamental nature of the universe – (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  • Doing the right thing: computer ethics pedagogy revisited.Simon Jones - 2016 - Journal of Information, Communication and Ethics in Society 14 (1):33-48.
    – This paper aims to critically reassess established approaches to the teaching and analysis of computer ethics, and to propose a revised methodology, drawing on the practical experience of teaching undergraduates in a culturally diverse, international learning environment., – Theoretical in scope, reviewing concepts and methods in the existing literature and developing an alternative inter-disciplinary and multi-dimensional framework., – Ethical analysis can benefit from broader, inter-disciplinary perspectives that take into account the social and economic context in which information and communication (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Cybernetic Pluralism in an Emerging Global Information and Computing Ethics.Charles Ess - 2007 - International Review of Information Ethics 7:09.
    I trace the development of an emerging global Information and Computing Ethics , arguing that ethical pluralism – as found in both Western and Asian traditions – is crucial to such an ICE. In particular, ethical pluralism – as affiliated with notions of judgment , reson-ance, and harmony – holds together shared ethical norms alongside the irreducible differences that define individual and cultural identities. I demonstrate how such pluralism is already at work in both contemporary theory and praxis, including in (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Virtual decisions: video game ethics, Just Consequentialism, and ethics on the fly.Don Gotterbarn & James Moor - 2009 - Acm Sigcas Computers and Society 39 (3):27-42.
    Video games are ethically controversial. Some video games are effective training tools for learning various skills and approaches to problem-solving, but some video games are notorious for promoting discriminatory and barbaric behavior. We consider such ethical pros and cons of video games, but we also present a more fundamental ethical issue about video games. Most video games have a bias toward self-centered decision-making. Often the decision-making driver is not the impact of the decision on society but rather the quantity of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace.Herman T. Tavani - 2000 - Acm Sigcas Computers and Society 30 (3):3-9.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Gandhigiri in cyberspace: a novel approach to information ethics.Vaibhav Garg & L. Jean Camp - 2012 - Acm Sigcas Computers and Society 42 (1):9-20.
    The interpretation of the terms 'information' and 'ethics' is often culturally situated. A common understanding is contingent to facilitating dialogue concerning the novel ethical issues we face during computer-mediated interactions. Developing a nuanced understanding of information ethics is critical at a point when the number of information and communication technology -enabled interactions may soon exceed traditional human interactions. Utilitarianism and deontology, the two major schools of ethics are based in a western perspective. We contribute to the existing discourse on information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • On teaching computer ethics within a computer science department.Michael J. Quinn - 2006 - Science and Engineering Ethics 12 (2):335-343.
    The author has surveyed a quarter of the accredited undergraduate computer science programs in the United States. More than half of these programs offer a “social and ethical implications of computing” course taught by a computer science faculty member, and there appears to be a trend toward teaching ethics classes within computer science departments. Although the decision to create an “in house” computer ethics course may sometimes be a pragmatic response to pressure from the accreditation agency, this paper argues that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Luciano Floridi’s philosophy of information and information ethics: Critical reflections and the state of the art. [REVIEW]Charles Ess - 2008 - Ethics and Information Technology 10 (2-3):89-96.
    I describe the emergence of Floridi’s philosophy of information (PI) and information ethics (IE) against the larger backdrop of Information and Computer Ethics (ICE). Among their many strengths, PI and IE offer promising metaphysical and ethical frameworks for a global ICE that holds together globally shared norms with the irreducible differences that define local cultural and ethical traditions. I then review the major defenses and critiques of PI and IE offered by contributors to this special issue, and highlight Floridi’s responses (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Discourses on information ethics: The claim to universality. [REVIEW]Bernd Carsten Stahl - 2008 - Ethics and Information Technology 10 (2-3):97-108.
    An important question one can ask of ethical theories is whether and how they aim to raise claims to universality. This refers to the subject area that they intend to describe or govern and also to the question whether they claim to be binding for all (moral) agents. This paper discusses the question of universality of Luciano Floridi’s information ethics (IE). This is done by introducing the theory and discussing its conceptual foundations and applications. The emphasis will be placed on (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The state of computer ethics as a philosophical field of inquiry: Some contemporary perspectives, future projections, and current resources. [REVIEW]Herman T. Tavani - 2001 - Ethics and Information Technology 3 (2):97-108.
    The present article focusesupon three aspects of computer ethics as aphilosophical field: contemporary perspectives,future projections, and current resources.Several topics are covered, including variouscomputer ethics methodologies, the `uniqueness'of computer ethics questions, and speculationsabout the impact of globalization and theinternet. Also examined is the suggestion thatcomputer ethics may `disappear' in the future.Finally, there is a brief description ofcomputer ethics resources, such as journals,textbooks, conferences and associations.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  • The Virtual World: a tension between global reach and local sensitivity.Simon Rogerson - 2004 - International Review of Information Ethics 2.
    Society, its citizens and its organisations are becoming more dependent upon technology and its global application as the means of providing information and obtaining services in a virtual world. This paper considers some of issues surrounding a virtual world of global reach yet still having to be locally sensitive. It challenges current thinking and concepts on the basis that we have a new dimension to our person through our Internet existence. Strategic guidance is suggested in an attempt to realise the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? [REVIEW]Kenneth Einar Himma - 2009 - Ethics and Information Technology 11 (1):19-29.
    In this essay, I describe and explain the standard accounts of agency, natural agency, artificial agency, and moral agency, as well as articulate what are widely taken to be the criteria for moral agency, supporting the contention that this is the standard account with citations from such widely used and respected professional resources as the Stanford Encyclopedia of Philosophy, Routledge Encyclopedia of Philosophy, and the Internet Encyclopedia of Philosophy. I then flesh out the implications of some of these well-settled theories (...)
    Download  
     
    Export citation  
     
    Bookmark   72 citations  
  • Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
    PurposeThe purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.Design/methodology/approachFirst, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described followed by the analysis of the Japanese socio‐cultural circumstances (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The development of the 'ethical' ICT professional: and the vision of an ethical on-line society: how far have we come and where are we going?F. S. Grodzinsky - 2000 - Acm Sigcas Computers and Society 30 (1):3-7.
    It has been a decade since Computer Ethics came into prominence within the field of computer science and engineering, changing not only the profession but the classroom as well. The commercialization and globalization of the World Wide Web has impacted us all, both producers and consumers alike. What was once the province of the few has become the virtual society of the multitudes. Ethical issues concerning security, privacy, information, identity, community and equity of access once contained and localized, have assumed (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The foundation of computer ethics.Terrell Ward Bynum - 2000 - Acm Sigcas Computers and Society 30 (2):6-13.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • The practitioner from within: revisiting the virtues.Frances Grodzinsky - 1999 - Acm Sigcas Computers and Society 29 (1):9-15.
    Traditionally the study of computer ethics involves taking students who are not philosophically trained, exposing them to action-guiding theories, presenting them with the codes of ethics of several companies and professional organizations and asking them to make ethical decisions in scenario-based cases. This approach is deliberately action-based and focuses on doing. "What would you do?" is the traditional question we ask our students. While this pedagogical methodology forces them to examine situations and argue from a particular point of view, it (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Computer ethics textbooks: a thirty-year retrospective.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (3):26-31.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The joy of sharing knowledge: But what if there is no knowledge to share? A critical reflection on human capacity building in Africa.Johannes J. Britz - 2007 - International Review of Information Ethics 7:18-28.
    This article focuses on the current trends and initiatives in human capacity building in Africa. It takes as it starting point that human capacity development is essential for Africa to become an information and know-ledge society and therefore an equal partner in the global sharing of knowledge. Four knowledge areas are identified and discussed. These are education, research and development, brain drain and information and documentation drain. The paper concludes that there is a clear understanding in Africa that its future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Tracking cyberstalkers: a cryptographic approach.Mike Burmester, Peter Henry & Leo S. Kermes - 2005 - Acm Sigcas Computers and Society 35 (3):2.
    Stalking is a pattern of behavior over time in which a stalker seeks to gain access to, or control over, an unwilling victim. Such actions range from the benign to the malicious and may cause emotional distress or harm to the victim. With the widespread adoption of new technologies, new forums of Internet-mediated discourse now exist which offer stalkers unprecedented scope to locate and exert influence over victims. Cyberstalking, the convergence of stalking and cyberspace, has created new challenges for the (...)
    Download  
     
    Export citation  
     
    Bookmark