Switch to: References

Add citations

You must login to add citations.
  1. Moral Luck and Computer Ethics: Gauguin in Cyberspace. [REVIEW]David Sanford Horner - 2010 - Ethics and Information Technology 12 (4):299-312.
    Issue Title: Moral Luck, Social Networking Sites, and Trust on the Web I argue that the problem of 'moral luck' is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its 'logical malleability', leads to ever greater levels of complexity, unreliability and uncertainty. The ever widening contexts of application in turn lead to greater scope for the operation of chance and the phenomenon of moral luck. Moral luck bears down most heavily (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethical Issues in Technology-Mediated Education.John Nnaji - 2012 - International Journal of Cyber Ethics in Education 2 (2):44-51.
    Contemporary system of education has been strongly revolutionised as a result of the current trends of facilitating learning and improving performance through creation, usage, and management of appropriate technological processes and resources. Manipulating technology in a way to use information correctly and realize information flow effectively has become a necessity. However, such necessity has been beclouded by variety of ethical issues that range from privacy, accuracy, accessibility to question of intellectual property rights. It is such ethical problems that this paper (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Computer Teachers’ Attitudes Toward Ethical Use of Computers in Elementary Schools.Niyazi Özer, Celal Teyyar Ugurlu & Kadir Beycioglu - 2011 - International Journal of Cyber Ethics in Education 1 (2):15-24.
    This descriptive study explores the elementary school computer teachers’ attitudes and awareness regarding ethical computer use in classrooms and the differences in teachers’ attitudes and awareness in terms of demographic variables including gender, teaching experiences, pre-service/in-service education about ethical computer use. In order to measure computer teachers’ attitudes, awareness, and teaching practices regarding computer ethics, an adopted version of Cyberethics Questionnaire, originally developed by Yamano, was used in this study. The CEQ was administered to 150 teachers working for elementary schools (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Computer Ethics and Neoplatonic Virtue.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (1):1-11.
    In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves deontological and utilitarian ethics as appropriate to computer ethics, while classical theories of ethics, such as virtue ethics, are usually neglected as anachronistic and unsuitable to the information era and ICT industry. During past decades, an Aristotelian form of virtue ethics has been revived (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  • Ethical Reflections on the Digital Divide.Herman T. Tavani - 2003 - Journal of Information, Communication and Ethics in Society 1 (2):99-108.
    During the past decade, a fairly extensive literature on the digital divide has emerged. Many reports and studies have provided statistical data pertaining to sociological aspects of ‘the divide,’ while some studies have examined policy issues involving universal service and universal access. Other studies have suggested ways in which the digital divide could be better understood if it were ‘reconceptualized’ in terms of an alternative metaphor, e.g. a ‘divide’ having to do with literacy, power, content, or the environment. However, with (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Developing Ethical Awareness in Information Systems Practice: A Foucaultavian View.José-Rodrigo Córdoba - 2006 - Journal of Information, Communication and Ethics in Society 4 (4):181-190.
    The aim of this paper is to provide insights into how information practitioners can develop further their awareness on ethical issues. In the context of the paper, awareness means able to identify and deal with issues of ethics in activities of information systems planning, development and use. The paper begins by presenting two areas which IS practitioners can initially explore to develop their ethical awareness. These areas are: IS Methodologies and Codes. The first area emphasises ethical awareness by using methodologies. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics, Finance, and Automation: A Preliminary Survey of Problems in High Frequency Trading. [REVIEW]Michael Davis, Andrew Kumiega & Ben Vliet - 2013 - Science and Engineering Ethics 19 (3):851-874.
    All of finance is now automated, most notably high frequency trading. This paper examines the ethical implications of this fact. As automation is an interdisciplinary endeavor, we argue that the interfaces between the respective disciplines can lead to conflicting ethical perspectives; we also argue that existing disciplinary standards do not pay enough attention to the ethical problems automation generates. Conflicting perspectives undermine the protection those who rely on trading should have. Ethics in finance can be expanded to include organizational and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Network Ethics: Information and Business Ethics in a Networked Society.Luciano Floridi - 2009 - Journal of Business Ethics 90 (S4):649 - 659.
    This article brings together two research fields in applied ethics - namely, information ethics and business ethics- which deal with the ethical impact of information and communication technologies but that, so far, have remained largely independent. Its goal is to articulate and defend an informational approach to the conceptual foundation of business ethics, by using ideas and methods developed in information ethics, in view of the convergence of the two fields in an increasingly networked society.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Being There Then: Ubiquitous Computing and the Anxiety of Reference.M. Curry - 2007 - International Review of Information Ethics 8:13-19.
    It is common today to see the world as increasingly unpredictable, and to see that unpredictability as a major source of anxiety. Many of the proposed cures for that anxiety, such as systems like Memex and MyLifeBits, have sought solutions in systems that collect and store a thorough record of events, at a scale from the personal to the global. There the solution to anxiety lies in the ability to play back the record, to turn back the clock and be (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Using a Social-Ethical Framework to Evaluate Location-Based Services in an Internet of Things World.Roba Abbas, Katina Michael & M. G. Michael - 2014 - International Review of Information Ethics 22:42-73.
    The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Discourses on Information Ethics: The Claim to Universality. [REVIEW]Bernd Carsten Stahl - 2008 - Ethics and Information Technology 10 (2-3):97-108.
    An important question one can ask of ethical theories is whether and how they aim to raise claims to universality. This refers to the subject area that they intend to describe or govern and also to the question whether they claim to be binding for all (moral) agents. This paper discusses the question of universality of Luciano Floridi’s information ethics (IE). This is done by introducing the theory and discussing its conceptual foundations and applications. The emphasis will be placed on (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Locke, Intellectual Property Rights, and the Information Commons.Herman T. Tavani - 2005 - Ethics and Information Technology 7 (2):87-97.
    This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections, Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property. In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and digital information. In Section (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The Ontological Interpretation of Informational Privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Download  
     
    Export citation  
     
    Bookmark   52 citations  
  • The Philosophy of Presence: From Epistemic Failure to Successful Observability.Luciano Floridi - 2005 - Presence Teleoperators and Virtual Environments 14 (6):656–667.
    The paper introduces a new model of telepresence. First, it criticises the standard model of presence as epistemic failure, showing it to be inadequate. It then replaces it with a new model of presence as successful observability. It further provides reasons to distinguish between two types of presence, backward and forward. The new model is then tested against two ethical issues whose nature has been modified by the development of digital information and communication technologies, namely pornography and privacy, and shown (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Do robots dream of escaping? Narrativity and ethics in Alex Garland’s Ex-Machina and Luke Scott’s Morgan.Inbar Kaminsky - 2021 - AI and Society 36 (1):349-359.
    Ex-Machina and Morgan, two recent science-fiction films that deal with the creation of humanoids, also explored the relationship between artificial intelligence, spatiality and the lingering question mark regarding artificial consciousness. In both narratives, the creators of the humanoids have tried to mimic human consciousness as closely as possible, which has resulted in the imprisonment of the humanoids due to proprietary concerns in Ex-Machina and due to the violent behavior of the humanoid in Morgan. This article addresses the dilemma of whether (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  • P2p Networks and the Verizon V. RIAA Case: Implications for Personal Privacy and Intellectual Property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Enhancing Ethical Decision Support Methods: Clarifying the Solution Space with Line Drawing.D. Gotterbarn - 2007 - Acm Sigcas Computers and Society 37 (2):53-63.
    Ethical decision support procedures have an underlying difficulty in that they do not clearly distinguish the varying impacts of the constituent features of the examined ethical situation. The failure to recognize these features and their varying impacts leads to two critical problems; the risk of removing positive ethical elements as well as negative ones when mitigating the ethical problem, and missing some viable alternative actions. A modified version of line drawing is presented as a way to address these two problems (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Online File Sharing: Resolving the Tensions Between Privacy and Property Interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Cyberethics as an Interdisciplinary Field of Applied Ethics: Key Concepts, Perspectives, and Methodological Frameworks.Herman Tavani - 2006 - Journal of Information Ethics 15 (2):18-36.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy From a Saudi Arabian Perspective.Yeslam Al-Saggaf & John Weckert - 2011 - Journal of Information Ethics 20 (1):34-53.
    Download  
     
    Export citation  
     
    Bookmark  
  • Information and Computer Ethics.Richard A. Spinello - 2012 - Journal of Information Ethics 21 (2):17-32.
    This paper reviews the intriguing history of information and computer ethics. Information ethics began as a branch of applied ethics concerned with the responsible management of information resources, while computer ethics was originally concerned with the training of computer professionals. Thanks to the Internet and the Web, these two fields merged together as access and communications issues became more prominent. In more recent years, responding to the ongoing debate about this discipline's structural foundations, philosophers like Floridi have given information ethics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Digital Divide in Asia.Tanveer Zia, Yeslam Al-Saggaf, Md Zahidul Islam, Lihong Zheng & John Weckert - 2009 - Journal of Information Ethics 18 (2):50-76.
    Download  
     
    Export citation  
     
    Bookmark  
  • Are ICTs Prerequisites for the Eradication of Poverty?H. P. P. Lotter - 2007 - International Review of Information Ethics 7:09.
    I provide a philosophical analysis of the claim that ICTs are necessary preconditions for the eradication of poverty. What are the links between information and communication technologies (ICTs) and poverty? I first define technology and then give a brief depiction of ICTs. Thereafter I define poverty and give a brief explanation of its context and causes. Next I discuss the relationship between poverty and ICTs in three paradigm cases: [i] the role of ICTs in poor societies, [ii] the effect of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics, Finance, and Automation: A Preliminary Survey of Problems in High Frequency Trading. [REVIEW]Michael Davis, Andrew Kumiega & Ben Van Vliet - 2013 - Science and Engineering Ethics 19 (3):851-874.
    All of finance is now automated, most notably high frequency trading. This paper examines the ethical implications of this fact. As automation is an interdisciplinary endeavor, we argue that the interfaces between the respective disciplines can lead to conflicting ethical perspectives; we also argue that existing disciplinary standards do not pay enough attention to the ethical problems automation generates. Conflicting perspectives undermine the protection those who rely on trading should have. Ethics in finance can be expanded to include organizational and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • ‘Once More Unto the Breach’: Professional Responsibility and Computer Ethics”: A Response To: “A Critique of Positive Responsibility in Computing.Don Gotterbarn - 2008 - Science and Engineering Ethics 14 (2):235-239.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Giannis Stamatellos: Computer Ethics—A Global Perspective: Jones and Bartlett Publishers, Sudbury, MA, 2007, 141 Pp, ISBN: -13: 978-0-7637-4084-9, -10: 0-7637-4084-5. [REVIEW]Mark H. Rosenbaum - 2010 - Ethics and Information Technology 12 (4):371-373.
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethical Status of Non-Commercial Spam.Emma Rooksby - 2007 - Ethics and Information Technology 9 (2):141-152.
    Much attention has been given in recent years to the moral status of commercial spam. Less attention has been focused on newer, non-commercial varieties of spam, such as spam from political parties, community sector organizations and governments. This article makes a start on evaluating the moral status of these non-commercial varieties of spam, drawing on arguments used to evaluate commercial spam.
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics in Library and Information Science. What Are We Teaching?Elizabeth Buchanan - 2004 - Journal of Information Ethics 13 (1):51-60.
    Download  
     
    Export citation  
     
    Bookmark   4 citations