Switch to: Citations

Add references

You must login to add references.
  1. Ethical reflections on the digital divide.Herman T. Tavani - 2003 - Journal of Information, Communication and Ethics in Society 1 (2):99-108.
    During the past decade, a fairly extensive literature on the digital divide has emerged. Many reports and studies have provided statistical data pertaining to sociological aspects of ‘the divide,’ while some studies have examined policy issues involving universal service and universal access. Other studies have suggested ways in which the digital divide could be better understood if it were ‘reconceptualized’ in terms of an alternative metaphor, e.g. a ‘divide’ having to do with literacy, power, content, or the environment. However, with (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Alternatives for protecting privacy while respecting patient care and public health needs.Judith Wagner DeCew - 1999 - Ethics and Information Technology 1 (4):249-255.
    This paper begins with a discussion of the value of privacy,especially for medical records in an age of advancing technology.I then examine three alternative approaches to protection ofmedical records: reliance on governmental guidelines, the useof corporate self-regulation, and my own third hybrid view onhow to maintain a presumption in favor of privacy with respectto medical information, safeguarding privacy as vigorously andcomprehensively as possible, without sacrificing the benefitsof new information technology in medicine. None of the threemodels I examine are unproblematic, yet (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A foundation for understanding online trust in electronic commerce.Beverly Kracher, Cynthia L. Corritore & Susan Wiedenbeck - 2005 - Journal of Information, Communication and Ethics in Society 3 (3):131-141.
    Trust is a key concept in business, particularly in electronic commerce. In order to understand online trust, one must first study trust research conducted in the offline world. The findings of such studies, dating from the 1950’s to the present, provide a foundation for online trust theory in e‐commerce. This paper provides an overview of the existing trust literature from the fields of philosophy, psychology, sociology, management, and marketing. Based on these bodies of work, online trust is briefly explored. The (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Agents of responsibility in software vulnerability processes.Ari Takanen, Petri Vuorijärvi, Marko Laakso & Juha Röning - 2004 - Ethics and Information Technology 6 (2):93-110.
    Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the light of ethical codes (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Digital nominalism. Notes on the ethics of information society in view of the ontology of the digital.Tere Vadén - 2004 - Ethics and Information Technology 6 (4):223-231.
    The commodification of code demands two preconditions: a belief if the existence of code and a system of ownership for the code. An examination of these preconditions is helpful for resisting the further widening of digital divides. The ontological belief in the relatively independent existence of code is dependent on our understanding of what the “digital” is. Here it is claimed that the digital is not a natural kind, but a concept that is relative to our practices of interpretation. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Rethinking the ownership of information in the 21st century: Ethical implications. [REVIEW]Tomas A. Lipinski & Johannes Britz - 2000 - Ethics and Information Technology 2 (1):49-71.
    This paper discusses basic concepts and recentdevelopments in intellectual property ownership in theUnited States. Various philosophical arguments havepreviously been put forward to support the creation andmaintenance of intellectual property systems. However, in an age of information, access toinformation is a critical need and should beguaranteed for every citizen. Any right of controlover the information, adopted as an incentive toencourage creation and distribution of intellectualproperty, should be subservient to an overriding needto ensure access to the information. The principlesunderlying intellectual property regimes (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • The illegal body: `Eurodac' and the politics of biometric identification. [REVIEW]Irma van der Ploeg - 1999 - Ethics and Information Technology 1 (4):295-302.
    Biometrics is often described as `the next big thingin information technology'. Rather than IT renderingthe body irrelevant to identity – a mistaken idea tobegin with – the coupling of biometrics with ITunequivocally puts the body center stage. The questions to be raised about biometrics is howbodies will become related to identity, and what thenormative and political ramifications of this couplingwill be. Unlike the body rendered knowable in thebiomedical sciences, biometrics generates a readable body: it transforms the body's surfaces andcharacteristics into (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations