Switch to: Citations

Add references

You must login to add references.
  1. Discourses on information ethics: The claim to universality. [REVIEW]Bernd Carsten Stahl - 2008 - Ethics and Information Technology 10 (2-3):97-108.
    An important question one can ask of ethical theories is whether and how they aim to raise claims to universality. This refers to the subject area that they intend to describe or govern and also to the question whether they claim to be binding for all (moral) agents. This paper discusses the question of universality of Luciano Floridi’s information ethics (IE). This is done by introducing the theory and discussing its conceptual foundations and applications. The emphasis will be placed on (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Islamic ethics and the implications for business.Gillian Rice - 1999 - Journal of Business Ethics 18 (4):345 - 358.
    As global business operations expand, managers need more knowledge of foreign cultures, in particular, information on the ethics of doing business across borders. The purpose of this paper is twofold: to share the Islamic perspective on business ethics, little known in the west, which may stimulate further thinking and debate on the relationships between ethics and business, and to provide some knowledge of Islamic philosophy in order to help managers do business in Muslim cultures. The case of Egypt illustrates some (...)
    Download  
     
    Export citation  
     
    Bookmark   80 citations  
  • Computer ethics: The role of personal, informal, and formal codes. [REVIEW]Margaret Anne Pierce & John W. Henry - 1996 - Journal of Business Ethics 15 (4):425 - 437.
    Ethical decisions related to computer technology and computer use are subject to three primary influences: (1) the individual's own personal code (2) any informal code of ethical behavior that exists in the work place, and (3) exposure to formal codes of ethics. The relative importance of these codes, as well as factors influencing these codes, was explored in a nationwide survey of information system (IS) professionals. The implications of the findings are important to educators and employers in the development of (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • Religiousness and business ethics.Ellen J. Kennedy & Leigh Lawton - 1998 - Journal of Business Ethics 17 (2):163-175.
    There is strong theoretical support for a relationship between various characteristics of religiousness and attitudes towards business ethics. This paper examines three frequently- studied dimensions of religiousness (fundamentalism, conservatism, and intrinsic religiousness) and their ability to predict students' willingness to behave unethically. Because prior research indicated a possible relationship between the religious affiliation of an institution and its members' ethical orientation, we studied students at universities with three different types of religious affiliation: evangelical, Catholic, and none.Results of the study lend (...)
    Download  
     
    Export citation  
     
    Bookmark   87 citations  
  • (1 other version)Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is the ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   121 citations  
  • Computer ethics for the computer professional from an Islamic point of view.Mansoor Al-A'ali - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):28-45.
    PurposeThe purpose of this paper is to study the ethical behaviour of Muslim IT professionals in an attempt to stop many unethical practices such as software piracy, software intellectual property violations and general software development.Design/methodology/approachThis study examines the computer ethical principles presented in the Association for Computing Machinery code of conduct from an Islamic point of view through studying some relevant verses of The Holy Quran and Hadiths of Prophet Mohammed. An evaluation of the benefits of this newly proposed Islamic (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • An ethical decision-making process for computing professionals.Edward J. O'Boyle - 2002 - Ethics and Information Technology 4 (4):267-277.
    Our comments focus on the ACMCode of Ethics and situate the Code within ageneral ethical decision-making process tospecify the five steps which logically precedehuman action in ethical matters and determinethat action, and the individual differencetraits in these five steps which bear upon theresolution of an ethical problem and lead tomorally responsible action. Our main purpose isto present a cognitive moral processing modelwhich computing professionals can use to betterunderstand their professional rights andduties. It is clear that the Code providessubstantial guidance in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • ʿIlla and Qiyās in Early Islamic Legal TheoryIlla and Qiyas in Early Islamic Legal Theory.Nabil Shehaby - 1982 - Journal of the American Oriental Society 102 (1):27.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Computer ethics: Future directions. [REVIEW]John Weckert - 2001 - Ethics and Information Technology 3 (2):93-96.
    Changes in information technologylead to new topics and new emphases in computerethics. The present article examines a varietyof such issues, and argues that computer ethicsmust become more rigorous and develop astronger theoretical base. The articleconcludes with a discussion of ways to makecomputer ethics more effective in bringinghelpful changes to the world.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   74 citations  
  • Targeting the innocent: Active defense and the moral immunity of innocent persons from aggression.Kenneth Einar Himma - 2004 - Journal of Information, Communication and Ethics in Society 2 (1):31-40.
    Private persons and entities are increasingly adopting aggressive “active defense” measures against Internet‐based attacks that can infringe the rights of innocent persons. In this paper, I argue that aggressive active defense cannot be justified by the Necessity Principle, which defines a moral liberty to infringe the right of an innocent person if necessary to achieve a significantly greater moral good. It is a necessary condition for justifiably acting under an ethical principle that we have adequate reason to believe its application‐conditions (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Personal religiousness and ethical judgements: An empirical analysis. [REVIEW]James W. Clark & Lyndon E. Dawson - 1996 - Journal of Business Ethics 15 (3):359 - 372.
    It has been acknowledged on numerous occasions that personal religiousness is a potential source of ethical norms, and consequently, an influence in ethical evaluations. An extensive literature review provides little in the way of empirical investigation of this recognized affect. This investigation conceptualizes religiousness as a motivation for ethical action, and discovers significant differences in ethical judgements among respondents categorized by personal religious motivation. Suggestions as to the source of these differences, and the implications which they offer to managers are (...)
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  • The foundation of computer ethics.Terrell Ward Bynum - 2000 - Acm Sigcas Computers and Society 30 (2):6-13.
    Download  
     
    Export citation  
     
    Bookmark   6 citations