Citations of:
Add citations
You must login to add citations.
|
|
Contemporary system of education has been strongly revolutionised as a result of the current trends of facilitating learning and improving performance through creation, usage, and management of appropriate technological processes and resources. Manipulating technology in a way to use information correctly and realize information flow effectively has become a necessity. However, such necessity has been beclouded by variety of ethical issues that range from privacy, accuracy, accessibility to question of intellectual property rights. It is such ethical problems that this paper (...) |
|
The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...) |
|
This descriptive study explores the elementary school computer teachers’ attitudes and awareness regarding ethical computer use in classrooms and the differences in teachers’ attitudes and awareness in terms of demographic variables including gender, teaching experiences, pre-service/in-service education about ethical computer use. In order to measure computer teachers’ attitudes, awareness, and teaching practices regarding computer ethics, an adopted version of Cyberethics Questionnaire, originally developed by Yamano, was used in this study. The CEQ was administered to 150 teachers working for elementary schools (...) |
|
In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves deontological and utilitarian ethics as appropriate to computer ethics, while classical theories of ethics, such as virtue ethics, are usually neglected as anachronistic and unsuitable to the information era and ICT industry. During past decades, an Aristotelian form of virtue ethics has been revived (...) |
|
This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...) |
|
During the past decade, a fairly extensive literature on the digital divide has emerged. Many reports and studies have provided statistical data pertaining to sociological aspects of ‘the divide,’ while some studies have examined policy issues involving universal service and universal access. Other studies have suggested ways in which the digital divide could be better understood if it were ‘reconceptualized’ in terms of an alternative metaphor, e.g. a ‘divide’ having to do with literacy, power, content, or the environment. However, with (...) |
|
The aim of this paper is to provide insights into how information practitioners can develop further their awareness on ethical issues. In the context of the paper, awareness means able to identify and deal with issues of ethics in activities of information systems planning, development and use. The paper begins by presenting two areas which IS practitioners can initially explore to develop their ethical awareness. These areas are: IS Methodologies and Codes. The first area emphasises ethical awareness by using methodologies. (...) |
|
All of finance is now automated, most notably high frequency trading. This paper examines the ethical implications of this fact. As automation is an interdisciplinary endeavor, we argue that the interfaces between the respective disciplines can lead to conflicting ethical perspectives; we also argue that existing disciplinary standards do not pay enough attention to the ethical problems automation generates. Conflicting perspectives undermine the protection those who rely on trading should have. Ethics in finance can be expanded to include organizational and (...) |
|
This article brings together two research fields in applied ethics - namely, information ethics and business ethics- which deal with the ethical impact of information and communication technologies but that, so far, have remained largely independent. Its goal is to articulate and defend an informational approach to the conceptual foundation of business ethics, by using ideas and methods developed in information ethics, in view of the convergence of the two fields in an increasingly networked society. |
|
It is common today to see the world as increasingly unpredictable, and to see that unpredictability as a major source of anxiety. Many of the proposed cures for that anxiety, such as systems like Memex and MyLifeBits, have sought solutions in systems that collect and store a thorough record of events, at a scale from the personal to the global. There the solution to anxiety lies in the ability to play back the record, to turn back the clock and be (...) |
|
The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At (...) |
|
An important question one can ask of ethical theories is whether and how they aim to raise claims to universality. This refers to the subject area that they intend to describe or govern and also to the question whether they claim to be binding for all (moral) agents. This paper discusses the question of universality of Luciano Floridi’s information ethics (IE). This is done by introducing the theory and discussing its conceptual foundations and applications. The emphasis will be placed on (...) |
|
This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections, Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property. In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and digital information. In Section (...) |
|
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...) |
|
The paper introduces a new model of telepresence. First, it criticises the standard model of presence as epistemic failure, showing it to be inadequate. It then replaces it with a new model of presence as successful observability. It further provides reasons to distinguish between two types of presence, backward and forward. The new model is then tested against two ethical issues whose nature has been modified by the development of digital information and communication technologies, namely pornography and privacy, and shown (...) |
|
Ex-Machina and Morgan, two recent science-fiction films that deal with the creation of humanoids, also explored the relationship between artificial intelligence, spatiality and the lingering question mark regarding artificial consciousness. In both narratives, the creators of the humanoids have tried to mimic human consciousness as closely as possible, which has resulted in the imprisonment of the humanoids due to proprietary concerns in Ex-Machina and due to the violent behavior of the humanoid in Morgan. This article addresses the dilemma of whether (...) |
|
In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...) |
|
Ethical decision support procedures have an underlying difficulty in that they do not clearly distinguish the varying impacts of the constituent features of the examined ethical situation. The failure to recognize these features and their varying impacts leads to two critical problems; the risk of removing positive ethical elements as well as negative ones when mitigating the ethical problem, and missing some viable alternative actions. A modified version of line drawing is presented as a way to address these two problems (...) |
|
This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...) |
|
|
|
|
|
This paper reviews the intriguing history of information and computer ethics. Information ethics began as a branch of applied ethics concerned with the responsible management of information resources, while computer ethics was originally concerned with the training of computer professionals. Thanks to the Internet and the Web, these two fields merged together as access and communications issues became more prominent. In more recent years, responding to the ongoing debate about this discipline's structural foundations, philosophers like Floridi have given information ethics (...) |
|
|
|
I provide a philosophical analysis of the claim that ICTs are necessary preconditions for the eradication of poverty. What are the links between information and communication technologies (ICTs) and poverty? I first define technology and then give a brief depiction of ICTs. Thereafter I define poverty and give a brief explanation of its context and causes. Next I discuss the relationship between poverty and ICTs in three paradigm cases: [i] the role of ICTs in poor societies, [ii] the effect of (...) |
|
All of finance is now automated, most notably high frequency trading. This paper examines the ethical implications of this fact. As automation is an interdisciplinary endeavor, we argue that the interfaces between the respective disciplines can lead to conflicting ethical perspectives; we also argue that existing disciplinary standards do not pay enough attention to the ethical problems automation generates. Conflicting perspectives undermine the protection those who rely on trading should have. Ethics in finance can be expanded to include organizational and (...) |
|
|
|
|
|
Much attention has been given in recent years to the moral status of commercial spam. Less attention has been focused on newer, non-commercial varieties of spam, such as spam from political parties, community sector organizations and governments. This article makes a start on evaluating the moral status of these non-commercial varieties of spam, drawing on arguments used to evaluate commercial spam. |
|
|