Abstract: The informationethics (IE) of Floridi and Sanders is evaluated here in the light of an alternative in virtue ethics that is antifoundationalist, particularist, and relativist in contrast to Floridi's foundationalist, impartialist, and universalist commitments. Drawing from disparate traditional sources like Aristotle, Nietzsche, and Emerson, as well as contemporary advocates of virtue ethics like Nussbaum, Foot, and Williams, the essay shows that the central contentions of IE, including especially the principle of ontological equality, must either (...) express commitments grounded in the particular perspectives we already inhabit, or be without rational or ethical force for us. (shrink)
The aim of Intercultural InformationEthics (IIE), as Ess aptly puts, is to “(a) address both local and global issues evoked by ICTs / CMC, etc., (b) in a ways that both sustain local traditions / values / preference, etc. and (c) provide shared, (quasi-) universal responses to central ethical problems” (Ess 2007a, 102). This formulation of the aim of IIE, however, is not unambiguous. In this paper, I will discuss two different understandings of the aim of IIE, (...) one of which advocates “shared norms, different interpretations” and another proposes “shared norms, different justifications”. I shall argue that the first understanding is untenable, and the second understanding is acceptable only with qualification. Finally, I shall briefly suggest an alternative way to understand the aim of IIE. (shrink)
In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between (...) class='Hi'>information used for assessment and information about how students live and work are blurring. Our goal in this paper is to provide a systematic discussion of the ways in which privacy and learning analytics conflict and to provide a framework for understanding those conflicts. -/- We argue that there are five crucial issues about student privacy that we must address in order to ensure that whatever the laudable goals and gains of learning analytics, they are commensurate with respecting students’ privacy and associated rights, including (but not limited to) autonomy interests. First, we argue that we must distinguish among different entities with respect to whom students have, or lack, privacy. Second, we argue that we need clear criteria for what information may justifiably be collected in the name of learning analytics. Third, we need to address whether purported consequences of learning analytics (e.g., better learning outcomes) are justified and what the distributions of those consequences are. Fourth, we argue that regardless of how robust the benefits of learning analytics turn out to be, students have important autonomy interests in how information about them is collected. Finally, we argue that it is an open question whether the goods that justify higher education are advanced by learning analytics, or whether collection of information actually runs counter to those goods. (shrink)
This paper presents the first bibliometric mapping analysis of the field of computer and informationethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology concepts on the one hand and ethical concepts on the other hand. To produce the term map, a data set of (...) over thousand articles published in leading journals and conference proceedings in the C&IE field was constructed. With the help of various computer algorithms, key terms were identified in the titles and abstracts of the articles and co-occurrence frequencies of these key terms were calculated. Based on the co-occurrence frequencies, the term map was constructed. This was done using a computer program called VOSviewer. The term map provides a visual representation of the C&IE field and, more specifically, of the organization of the field around three main concepts, namely privacy, ethics, and the Internet. (shrink)
Current research in Intercultural InformationEthics is preoccupied, almost exclusively, by moral and political issues concerning the right and the just These issues are undeniably important, and with the continuing development and diffusion of ICTs, we can only be sure more moral and political problems of similar kinds are going to emerge in the future. Yet, as important as those problems are, I want to argue that researchers' preoccupation with the right and the just are undesirable. I shall (...) argue that IIE has thus far overlooked the issues pertaining to the good life . IIE, I claim, should also take into account these issues. Hence, I want to propose a new agenda for IIE, i.e. the good life, in the current paper. (shrink)
The following review explores Intercultural InformationEthics in terms of comparative philosophy, supporting IIE as the most relevant and significant development of the field of InformationEthics. The focus of the review is threefold. First, it will review the core presumption of the field of IIE, that being the demand for an intermission in the pursuit of a founding philosophy for IE in order to first address the philosophical biases of IE by western philosophy. Second, a (...) history of the various philosophical streams of IIE will be outlined, including its literature and pioneering contributors. Lastly, a new synthesis of comparative philosophies in IIE will be offered, looking towards a future evolution of the field. Examining the interchange between contemporary information ethicists regarding the discipline of IIE, the review first outlines the previously established presumptions of the field of IIE that posit the need for an IE as grounded in western sensibilities. The author then addresses the implications of the foregoing presumption from several non-western viewpoints, arguing that IIE does in fact find roots in non-western philosophies as established in the concluding synthesis of western and eastern philosophical traditions. (shrink)
The following review explores Intercultural InformationEthics in terms of comparative philosophy, supporting IIE as the most relevant and significant development of the field of InformationEthics. The focus of the review is threefold. First, it will review the core presumption of the field of IIE, that being the demand for an intermission in the pursuit of a founding philosophy for IE in order to first address the philosophical biases of IE by western philosophy. Second, a (...) history of the various philosophical streams of IIE will be outlined, including its literature and pioneering contributors. Lastly, a new synthesis of comparative philosophies in IIE will be offered, looking towards a future evolution of the field. Examining the interchange between contemporary information ethicists regarding the discipline of IIE, the review first outlines the previously established presumptions of the field of IIE that posit the need for an IE as grounded in western sensibilities. The author then addresses the implications of the foregoing presumption from several non-western viewpoints, arguing that IIE does in fact find roots in non-western philosophies as established in the concluding synthesis of western and eastern philosophical traditions. (shrink)
Some experts have argued that patients should routinely be told the specific magnitude and absolute probability of potential risks and benefits of screening tests. This position is motivated by the idea that framing risk information in ways that are less precise violates the ethical principle of respect for autonomy and its application in informed consent or shared decisionmaking. In this Perspective, we consider a number of problems with this view that have not been adequately addressed. The most important challenges (...) stem from the danger that patients will misunderstand the information or have irrational responses to it. Any initiative in this area should take such factors into account and should consider carefully how to apply the ethical principles of respect for autonomy and beneficence. (shrink)
The scope and reach of information, driven by the explosive growth of information technologies and content types, has expanded dramatically over the past 30 years. The consequences of these changes to records and information management (RIM) professionals are profound, necessitating not only specialized knowledge but added responsibilities. RIM professionals require a professional ethics to guide them in their daily practice and to form a basis for developing and implementing organizational policies, and Mooradian’s new book provides a (...) rigorous outline of such an ethics. Taking an authoritative principles/rules based approach to the subject, this book comprehensively addresses •the structure of ethics, outlining principles, moral rules, judgements, and exceptions; •ethical reasoning, from meaning and logic to dilemmas and decision methods; •the ethical core of RIM, discussing key topics such as organizational context, the positive value of accountability, conflicts of interest, and confidentiality; •important ethical concerns like copyright and intellectual property, whistleblowing, information leaks, disclosure, and privacy; and •the relationship between RIM ethics and information governance. -/- An essential handbook for information professionals who manage records, archives, data, and other content, this book is also an ideal teaching text for students of informationethics . (shrink)
The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it (...) is not the only one. We conceal information about ourselves and we reveal it. And since the meaning of information is not self-evident, we also work to shape how others contextualize and interpret the information about us that they have. Information privacy is thus about more than controlling information; it involves the constant work of producing and managing public identities, what I call “social self- authorship.” In the second part of the essay, I argue that thinking about information privacy in terms of social self- authorship helps us see ways that information technology threatens privacy, which the control approach misses. Namely, information technology makes social self- authorship invisible and unnecessary, by making it difficult for us to know when others are forming impressions about us, and by providing them with tools for making assumptions about who we are which obviate the need for our involvement in the process. (shrink)
The increased complexity of health information management sows the seeds of inequalities between health care stakeholders involved in the production and use of health information. Patients may thus be more vulnerable to use of their data without their consent and breaches in confidentiality. Health care providers can also be the victims of a health information system that they do not fully master. Yet, despite its possible drawbacks, the management of health information is indispensable for advancing science, (...) medical care and public health. Therefore, the central question addressed by this paper is how to manage health information ethically? This article argues that Paul Ricœur’s ‘‘little ethics’’, based on his work on hermeneutics and narrative identity, provides a suitable ethical framework to this end. This ethical theory has the merit of helping to harmonise self-esteem and solicitude amongst patients and healthcare providers, and at the same time provides an ethics of justice in public health. A matrix, derived from Ricœur’s ethics, has been developed as a solution to overcoming possible conflicts between privacy interests and the common good in the management of health information. (shrink)
In information societies, operations, decisions and choices previously left to humans are increasingly delegated to algorithms, which may advise, if not decide, about how data should be interpreted and what actions should be taken as a result. More and more often, algorithms mediate social processes, business transactions, governmental decisions, and how we perceive, understand, and interact among ourselves and with the environment. Gaps between the design and operation of algorithms and our understanding of their ethical implications can have severe (...) consequences affecting individuals as well as groups and whole societies. This paper makes three contributions to clarify the ethical importance of algorithmic mediation. It provides a prescriptive map to organise the debate. It reviews the current discussion of ethical aspects of algorithms. And it assesses the available literature in order to identify areas requiring further work to develop the ethics of algorithms. (shrink)
Objective: There are benefits and risks of giving patients more granular control of their personal health information in electronic health record (EHR) systems. When designing EHR systems and policies, informaticists and system developers must balance these benefits and risks. Ethical considerations should be an explicit part of this balancing. Our objective was to develop a structured ethics framework to accomplish this. -/- Methods: We reviewed existing literature on the ethical and policy issues, developed an ethics framework called (...) a “Points to Consider” (P2C) document, and convened a national expert panel to review and critique the P2C. -/- Results: We developed the P2C to aid informaticists designing an advanced query tool for an electronic health record (EHR) system in Indianapolis. The P2C consists of six questions (“Points”) that frame important ethical issues, apply accepted principles of bioethics and Fair Information Practices, comment on how questions might be answered, and address implications for patient care. -/- Discussion: The P2C is intended to clarify whatis at stake when designers try to accommodate potentially competing ethical commitments and logistical realities. The P2C was developed to guide informaticists who were designing a query tool in an existing EHR that would permit patient granular control. While consideration of ethical issues is coming to the forefront of medical informatics design and development practices, more reflection is needed to facilitate optimal collaboration between designers and ethicists. This report contributes to that discussion. (shrink)
Over centuries, philosophers have theorised about what constitutes ‘the good’ regarding behavioural choice. Characteristically, these attempts have tried to decipher the nature and substantive values that link the apparent trichotomous nature of the human psyche, variously articulated in terms of human reasoning, feeling, and desiring. Of the three, most emphasis has focused on the unique human characteristic of reasoned behavioural choice in terms of its relationship to the emotions. This article determines the principle dynamics behind 'ethical' behaviour: In the nervous (...) system, efferent nerves, otherwise known as motor neurones, carry nerve impulses away from the central nervous system to effectors such as muscles. A great deal of neural activity underpins‘efferent information processing’. What follows is a categorisation of the structure of 'efferent information processing' in a manner, that enhances our understanding of the attempts of philosophers, from Plato to Russell, to explain ‘what it is to be behave well’. (shrink)
In Information and Computer Ethics (ICE), and, in fact, in normative and evaluative research of Information Technology (IT) in general, researchers have paid few attentions to the prudential values of IT. Hence, analyses of the prudential values of IT are mostly found in popular discourse. Yet, the analyses of the prudential values of IT are important for answering normative questions about people’s well-being. In this chapter, the author urges researchers in ICE to take the analyses of the (...) prudential values of IT seriously. A serious study of the analyses, he argues, will enrich the research of ICE. But, what are the analyses? The author will distinguish the analyses of the prudential values of IT, i.e. the prudential analysis, from other types of normative and evaluative analysis of IT. Then, the author will explain why prudential analyses are not taken seriously by the researchers in ICE, and argue why they deserve more attentions. After that, he will outline a framework to analyse and evaluate prudential analyses, and he will apply the framework to an actual prudential analysis. Finally, he will briefly conclude this chapter by highlighting the limits of the proposed framework and identifying the directions for future research. (shrink)
The idea of homesteading can be extended to the realm of biological entities, to the ownership of information wherein organisms perform artifactual functions as a result of human development. Can the information of biological entities be ethically “homesteaded”: should humans (or businesses) have ownership rights over this information from the basis of mere development and possession, as in Locke’s theory of private property? I offer three non-consequentialist arguments against such homesteading: the information makeup of biological entities (...) is not commonly owned, and thus is not available for homesteading; the value of the individual biological entity extends to the information whereby it is constituted, and includes inalienable rights of an entity over itself and its information; and use of life as an information artifact makes an organism an unending means to an end rather than an end itself. I conclude that the information space of biological entities is not open for homesteading, not liable to private ownership, and should not be available for perpetual exploitation. (shrink)
Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And (...) it examines the business and private ‘clouders’ using these services. The first part of the paper argues that hosting companies, services providers and clouders have mutual informational (epistemic) obligations to provide and seek information about relevant issues such as consumer privacy, reliability of services, data mining and data ownership. The concept of interlucency is developed as an epistemic virtue governing ethically effective communication. The second part considers potential forms of government restrictions on or proscriptions against the development and use of cloud computing technology. Referring to the concept of technology neutrality, it argues that interference with hosting companies and cloud services providers is hardly ever necessary or justified. It is argued, too, however, that businesses using cloud services (banks, law firms, hospitals etc. storing client data in the cloud, e.g.) will have to follow rather more stringent regulations. (shrink)
As global business operations expand, managers need more knowledge of foreign cultures, in particular, information on the ethics of doing business across borders. The purpose of this paper is twofold: to share the Islamic perspective on business ethics, little known in the west, which may stimulate further thinking and debate on the relationships between ethics and business, and to provide some knowledge of Islamic philosophy in order to help managers do business in Muslim cultures. The case (...) of Egypt illustrates some divergence between Islamic philosophy and practice in economic life. The paper concludes with managerial implications and suggestions for further research. (shrink)
Policy-makers must sometimes choose between an alternative which has somewhat lower expected value for each person, but which will substantially improve the outcomes of the worst off, or an alternative which has somewhat higher expected value for each person, but which will leave those who end up worst off substantially less well off. The popular ex ante Pareto principle requires the choice of the alternative with higher expected utility for each. We argue that ex ante Pareto ought to be rejected (...) because it conflicts with the requirement that, when possible, one ought to decide as one would with full information. We apply our argument in an analysis of US policy on screening for breast cancer. -/- . (shrink)
In recent years, the growing academic field called “Data Science” has made many promises. On closer inspection, relatively few of these promises have come to fruition. A critique of Data Science from the phenomenological tradition can take many forms. This paper addresses the promise of “participation” in Data Science, taking inspiration from Paul Majkut’s 2000 work in Glimpse, “Empathy’s Impostor: Interactivity and Intersubjectivity,” and some insights from Heidegger’s "The Question Concerning Technology." The description of Data Science provided in the scholarly (...) literature includes “the study of the generalizable extraction of knowledge from data” (Dhar 2013, 64), “data stewardship and data sharing…access to data at higher volumes and more quickly, and the potential for replication and augmentation of existing research” (Hartter et al., 2013, 1), and “personal information, health status, daily activities and shopping preferences that are recorded and used to give us instant feedback and recommendations based on previous online behavior.” (Shin 2013) United States universities have begun to offer graduate programs in “data science”, anticipating the growth of this field for marketing, national security, and health industries. These universities include New York University, Columbia University, Stanford, Northwestern, and Syracuse. (shrink)
While environmental claims are increasingly used by companies to appeal consumers, they also attract greater scrutiny from independent parties interested in consumer protection. Consumers are now able to compare corporate environmental claims against external, often disconfirming, information to form their brand attitudes and purchase intentions. What remains unclear is how the level of information specificity of both the environmental claims and external disconfirming information interact to influence consumer reactions. Two experiments address this gap in the CSR communication (...) literature. When specific claims are countered by specific external information, consumers report more negative brand attitudes and lower purchase intentions. The effect is serially mediated by skepticism toward the claims and lack of corporate credibility. We conclude by discussing strategies that firms can utilize to avoid information dilution and ensure that external disconfirming information percolates to consumers as specific. (shrink)
What is wrong with government whistleblowing and when can it be justified? In my view, ‘government whistleblowing’, i.e., the unauthorized acquisition and disclosure of classified information about the state or government, is a form of ‘political vigilantism’, which involves transgressing the boundaries around state secrets, for the purpose of challenging the allocation or use of power. It may nonetheless be justified when it is suitably constrained and exposes some information that the public ought to know and deliberate about. (...) Government whistleblowing should then be viewed, along the lines of civil disobedience, as a collective cognition- and legitimacy-enhancing device. (shrink)
Responding to Danaher et al. on self-tracking technologies, I argue that human lived experience is becoming increasingly mediated by generalized, statistical information, which I term our "infotality." Drawing on the work of Foucault, I argue that infotality is historically novel and best understood as the product of biopolitics, healthism, and informatics. I then critique the authors' "stance of cautious openness,” which misunderstands the aims of the technology in question and the fundamental ambiguity of the role information plays in (...) the achievement of human wellbeing. Self-tracking technologies are not primarily designed to change behavior; they are designed to create and sustain the desire for their use. I conclude by suggesting that infotality names a new way to fall for an old ruse: the promise that more information means more wellbeing. (shrink)
The precautionary principle (PP) aims to anticipate and minimize potentially serious or irreversible risks under conditions of scientific uncertainty. Thus it preserves the potential for future developments. It has been incorporated into many international treaties and pieces of national legislation for environmental protection and sustainable development. In this article, we outline an interpretation of the PP as a framework of orientation for a sustainable information society. Since the risks induced by future information and communication technologies (ICT) are social (...) risks for the most part, we propose to extend the PP from mainly environmental to social subjects of protection. From an ethical point of view, the PP and sustainability share the principle of intergenerational justice, which can be used as an argument to preserve free space for the decisions of future generations. Applied to technical innovation and to ICT issues in particular, the extended PP can serve as a framework of orientation to avoid socio-economically irreversible developments. We conclude that the PP is a useful approach for: (i) policy makers to reconcile information society and sustainability policies and (ii) ICT companies to formulate sustainability strategies. (shrink)
Publication ethics is an important aspect of both the research and publication enterprises. It is particularly important in the field of biomedical science because published data may directly affect human health. In this article, we examine publication ethics policies in biomedical journals published in Central and Eastern Europe. We were interested in possible differences between East European countries that are members of the European Union (Eastern EU) and South-East European countries (South-East Europe) that are not members of the (...) European Union.The most common ethical issues addressed by all journals in the region were redundant publication, peer review process, and copyright or licensing details. Image manipulation, editors’ conflicts of interest and registration of clinical trialswere the least common ethical policies. Three aspects were significantly morecommon in journals published outside the EU: statements on the endorsement of international editorial standards, contributorship policy, and image manipulation.On the other hand, copyright or licensing information were more prevalent in journals published in the Eastern EU. The existence of significant differences amongbiomedical journals’ ethical policies calls for further research and active measuresto harmonize policies across journals. On the other hand, copyright or licensing information were more prevalent in journals published in the Eastern EU. The existence of significant differences among biomedical journals’ ethical policies calls for further research and active measures to harmonize policies across journals. (shrink)
With the growing focus on prevention in medicine, studies of how to describe risk have become increasing important. Recently, some researchers have argued against giving patients “comparative risk information,” such as data about whether their baseline risk of developing a particular disease is above or below average. The concern is that giving patients this information will interfere with their consideration of more relevant data, such as the specific chance of getting the disease (the “personal risk”), the risk reduction (...) the treatment provides, and any possible side effects. I explore this view and the theories of rationality that ground it, and I argue instead that comparative risk information can play a positive role in decision-making. The criticism of disclosing this sort of information to patients, I conclude, rests on a mistakenly narrow account of the goals of prevention and the nature of rational choice in medicine. (shrink)
There is a large gap between attitude and action when it comes to consumer purchases of ethical food. Amongst the various aspects of this gap, this paper focuses on the difficulty in knowing enough about the various dimensions of food production, distribution and consumption to make an ethical food purchasing decision. There is neither one universal definition of ethical food. We suggest that it is possible to support consumers in operationalizing their own ethics of food with the use of (...) appropriate information and communication technology. We consider eggs as an example because locally produced options are available to many people on every continent. We consider the dimensions upon which food ethics may be constructed, then discuss the information required to assess it and the tools that can support it. We then present an overview of opportunities for design of a new software tool. Finally, we offer some points for discussion and future work. (shrink)
The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. H-IoT promises many (...) benefits for health and healthcare. However, it also raises a host of ethical problems stemming from the inherent risks of Internet enabled devices, the sensitivity of health-related data, and their impact on the delivery of healthcare. This paper maps the main ethical problems that have been identified by the relevant literature and identifies key themes in the on-going debate on ethical problems concerning H-IoT. (shrink)
Thanks to the advent of social media, large numbers of Americans believe outlandish falsehoods that have been widely debunked. Many of us have a tendency to fault the individuals who hold such beliefs. We naturally assume that the individuals who form and maintain such beliefs do so in virtue of having violated some epistemic obligation: perhaps they failed to scrutinize their sources, or failed to seek out the available competing evidence. I maintain that very many ordinary individuals who acquire outlandish (...) false beliefs thanks to their use of popular social media platforms (and other similar internet technologies) deserve little or no blame for believing these falsehoods. Such individuals would be fully blameworthy only if they had formed or maintained the relevant beliefs partly in virtue of violating some epistemic obligation and had no excuse for violating that obligation. However, the nature of these internet technologies provides excuses for violating the relevant epistemic obligations, and so individuals are excused for holding the resulting false beliefs. (shrink)
Digital tracing technologies are heralded as an effective way of containing SARS-CoV-2 faster than it is spreading, thereby allowing the possibility of easing draconic measures of population-wide quarantine. But existing technological proposals risk addressing the wrong problem. The proper objective is not solely to maximise the ratio of people freed from quarantine but to also ensure that the composition of the freed group is fair. We identify several factors that pose a risk for fair group composition along with an analysis (...) of general lessons for a philosophy of technology. Policymakers, epidemiologists, and developers can use these risk factors to benchmark proposal technologies, curb the pandemic, and keep public trust. (shrink)
This article summarizes the recommendations concerning robotics as issued by the Commission for the Ethics of Research in Information Sciences and Technologies (CERNA), the French advisory commission for the ethics of information and communication technology (ICT) research. Robotics has numerous applications in which its role can be overwhelming and may lead to unexpected consequences. In this rapidly evolving technological environment, CERNA does not set novel ethical standards but seeks to make ethical deliberation inseparable from scientific activity. (...) Additionally, it provides tools and guidance for researchers and research institutions. (shrink)
When agents insert technological systems into their decision-making processes, they can obscure moral responsibility for the results. This can give rise to a distinct moral wrong, which we call “agency laundering.” At root, agency laundering involves obfuscating one’s moral responsibility by enlisting a technology or process to take some action and letting it forestall others from demanding an account for bad outcomes that result. We argue that the concept of agency laundering helps in understanding important moral problems in a number (...) of recent cases involving automated, or algorithmic, decision-systems. We apply our conception of agency laundering to a series of examples, including Facebook’s automated advertising suggestions, Uber’s driver interfaces, algorithmic evaluation of K-12 teachers, and risk assessment in criminal sentencing. We distinguish agency laundering from several other critiques of information technology, including the so-called “responsibility gap,” “bias laundering,” and masking. (shrink)
If a robot sends a deceptive signal to a human user, is this always and everywhere an unethical act, or might it sometimes be ethically desirable? Building upon previous work in robot ethics, this article tries to clarify and refine our understanding of the ethics of robotic deception. It does so by making three arguments. First, it argues that we need to distinguish between three main forms of robotic deception (external state deception; superficial state deception; and hidden state (...) deception) in order to think clearly about its ethics. Second, it argues that the second type of deception – superficial state deception – is not best thought of as a form of deception, even though it is frequently criticised as such. And third, it argues that the third type of deception is best understood as a form of betrayal because doing so captures the unique ethical harm to which it gives rise, and justifies special ethical protections against its use. (shrink)
Moral reasoning is as fallible as reasoning in any other cognitive domain, but we often behave as if it were not. I argue for a form of epistemically-based moral humility, in which we downgrade our moral beliefs in the face of moral disagreement. My argument combines work in metaethics and moral intuitionism with recent developments in epistemology. I argue against any demands for deep self-sufficiency in moral reasoning. Instead, I argue that we need to take into account significant socially sourced (...)information, especially as a check for failures on our own moral intuitions and reasoning. -/- First, I argue for an epistemically plausible version of moral intuitionism, based on recent work in epistemic entitlement and epistemic warrant. Second, I argue that getting clear on the epistemic basis shows the defeasibility of moral judgment. Third, I argue the existence of moral disagreement is a reason to reduce our certainty in moral judgment. Fourth, I argue that this effect is not a violation of norms of autonomy for moral judgment. (shrink)
The COVID-19 pandemic has been accompanied on social media by an explosion of information disorders such as inaccurate, misleading and irrelevant information. Countermeasures adopted thus far to curb these informational disorders have had limited success because these did not account for the diversity of informational contexts on social media, focusing instead almost exclusively on curating the factual content of user’s posts. However, content-focused measures do not address the primary causes of the infodemic itself, namely the user’s need to (...) post content as a way of making sense of the situation and for gathering reactions of consensus from friends. This paper describes three types of informational context—weak epistemic, strong normative and strong emotional—which have not yet been taken into account by current measures to curb down the informational disorders. I show how these contexts are related to the infodemic and I propose measures for dealing with them for future global crisis situations. (shrink)
This essay introduces the philosophy of legal information (PLI), which is a response to the radical changes brought about in philosophy by the information revolution. It reviews in some detail the work of Luciano Floridi, who is an influential advocate for an information turn in philosophy that he calls the philosophy of information (PI). Floridi proposes that philosophers investigate the conceptual nature of information as it currently exists across multiple disciplines. He shows how a focus (...) on the informational nature of traditional philosophical questions can be transformative for philosophy and for human self-understanding. The philosophy of legal information (PLI) proposed here views laws as a body of information that is stored, manipulated, and analyzed through multiple methods, including the computational methodologies. PLI offers resources for evaluating the ethical and political implications of legal infomatics (also known as "legal information systems"). -/- This essay introduces PLI. Parts I and II describe Floridi's philosophy of information. First, Part I introduces the transformation in the concept of information that occurred in the twentieth century through the work of Alan Turning and Claude Shannon. Part II describes Floridi's approaches to traditional questions in epistemology, ontology, and ethics. Part III applies PI to the analysis of legal positivism. It suggests that PLI is a viable project that has potential for transforming the understanding law in the information age. -/- . (shrink)
In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual, fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the case. In (...) preference to the extremes I argue in favour of partial automation in which the system integrates a human CCTV operator with some level of automation. To assess the degree to which such a system should be automated I draw on the further issues of privacy and distance. Here I argue that the privacy of the surveilled subject can benefit from automation, while the distance between the surveilled subject and the CCTV operator introduced by automation can have both positive and negative effects. I conclude that in at least the majority of cases more automation is preferable to less within a partially automated system where this does not impinge on efficacy. (shrink)
For several years, scholars have (for good reason) been largely preoccupied with worries about the use of artificial intelligence and machine learning (AI/ML) tools to make decisions about us. Only recently has significant attention turned to a potentially more alarming problem: the use of AI/ML to influence our decision-making. The contexts in which we make decisions—what behavioral economists call our choice architectures—are increasingly technologically-laden. Which is to say: algorithms increasingly determine, in a wide variety of contexts, both the sets of (...) options we choose from and the way those options are framed. Moreover, artificial intelligence and machine learning (AI/ML) makes it possible for those options and their framings—the choice architectures—to be tailored to the individual chooser. They are constructed based on information collected about our individual preferences, interests, aspirations, and vulnerabilities, with the goal of influencing our decisions. At the same time, because we are habituated to these technologies we pay them little notice. They are, as philosophers of technology put it, transparent to us—effectively invisible. I argue that this invisible layer of technological mediation, which structures and influences our decision-making, renders us deeply susceptible to manipulation. Absent a guarantee that these technologies are not being used to manipulate and exploit, individuals will have little reason to trust them. (shrink)
As opposed to a ‘one size fits all’ approach, precision medicine uses relevant biological, medical, behavioural and environmental information about a person to further personalize their healthcare. This could mean better prediction of someone’s disease risk and more effective diagnosis and treatment if they have a condition. Big data allows for far more precision and tailoring than was ever before possible by linking together diverse datasets to reveal hitherto-unknown correlations and causal pathways. But it also raises ethical issues relating (...) to the balancing of interests, viability of anonymization, familial and group implications, as well as genetic discrimination. This article analyses these issues in light of the values of public benefit, justice, harm minimization, transparency, engagement and reflexivity and applies the deliberative balancing approach found in the Ethical Framework for Big Data in Health and Research to a case study on clinical genomic data sharing. Please refer to that article for an explanation of how this framework is to be used, including a full explanation of the key values involved and the balancing approach used in the case study at the end. Our discussion is meant to be of use to those involved in the practice as well as governance and oversight of precision medicine to address ethical concerns that arise in a coherent and systematic manner. (shrink)
The background to this paper is that in our world of massively increasing personal digital data any control over the data about me seems illusionary – informational privacy seems a lost cause. On the other hand, the production of this digital data seems a necessary component of our present life in the industrialized world. A framework for a resolution of this apparent dilemma is provided if by the distinction between (meaningless) data and (meaningful) information. I argue that computational data (...) processing is necessary for many present-day processes and not a breach of privacy, while collection and processing of private information is often not necessary and a breach of privacy. The problem and the sketch of its solution are illustrated in a case-study: supermarket customer cards. (shrink)
Ethical issues of information and communication technologies (ICTs) are important because they can have significant effects on human liberty, happiness, their ability to lead a good life. They are also of functional interest because they can determine whether technologies are used and whether their positive potential can unfold. For these reasons policy makers are interested in finding out what these issues are and how they can be addressed. The best way of creating ICT policy that is sensitive to ethical (...) issues would be to be proactive and address such issues at early stages of the technology life cycle. The present paper uses this position as a starting point and discusses how knowledge of ethical aspects of emerging ICTs can be gained. It develops a methodology that goes beyond established futures methodologies to cater for the difficult nature of ethical issues. The paper goes on to outline some of the preliminary findings of a European research project that has applied this method. (shrink)
Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...) found that there has been few if any changes in student opinions regarding the unauthorized duplication of copy- righted materials. Students generally felt that copying commercial software and downloading music from the Internet was acceptable and found that there was no significant correlation between student attitudes and their school’s religious affiliation or lack thereof. Additionally, the study found that a small but significant percentage of respondents considered the other questionable behaviors as ethically acceptable. Finally, the reasons for these attitudes are discussed as well as what colleges can do to correct the situation. (shrink)
Patients should not always receive hard data about the risks and benefits of a medical intervention. That information should always be available to patients who expressly ask for it, but it should be part of standard disclosure only sometimes, and only for some patients. And even then, we need to think about how to offer it.
The claim is made in the book, Applied Ethics, published under the auspices of the Australian Association for Professional and Applied Ethics (AAPAE), that it can strengthen ethical behaviour. That claim, embodied in the subtitle, is based on more than a half dozen practices set out in the book. In total, they are drawn from an examination of ethical practices across fourteen different disciplines. The purpose of this paper is to outline and support that claim, drawing primarily on (...) chapters of the book, but also drawing on a small amount of additional information. The research on the ethical issues in each of these disciplines, and the writing of the chapters, were undertaken by members and associates of AAPAE. The fourteen disciplines were Marketing, Business, Accounting, Pharmacy, Nursing, Medicine, Veterinary & Animal Ethics, Engineering, Information and Communications Technology (ICT), Journalism, Policing, Politics, the Law and the Sciences. The findings have significance for the teaching of ethics by moral philosophers, for not all ethics classes follow the practices suggested by these findings. A few of the practices are even rejected by some moral philosophers. That the practices will improve ethical behaviour is the principal position taken by this paper. -/- . (shrink)
If computer ethics is to constitute a real engagement with industry and society that cultivates a genuine sensitivity to ethical concerns in the creation, development, and implementation of technologies, a genuine sensitivity that stands in marked contrast to ethics as “mere compliance,” then computer ethics will have to consist in issuing an open invitation to inquiry, since going beyond mere compliance requires a sensitivity to the importance of what we care about, and inquiry has the potential to (...) leverage what our audiences already care about to bring them to care about computer ethics. This commitment to open inquiry is apparent in the practice of computer ethics at Ethicomp and in our interfaces with various audiences beyond Ethicomp. We mentor professionals, aspiring professionals, managers, end-users, policy makers, and each other by offering an open invitation to inquiry about the broad ethical implications of the practices, professions, and institutions of computing and the design, development, and implementation of computer artifacts. (shrink)
In medical settings, machines are in close proximity with human beings: with patients who are in vulnerable states of health, who have disabilities of various kinds, with the very young or very old, and with medical professionals. Machines in these contexts are undertaking important medical tasks that require emotional sensitivity, knowledge of medical codes, human dignity, and privacy. -/- As machine technology advances, ethical concerns become more urgent: should medical machines be programmed to follow a code of medical ethics? (...) What theory or theories should constrain medical machine conduct? What design features are required? Should machines share responsibility with humans for the ethical consequences of medical actions? How ought clinical relationships involving machines to be modeled? Is a capacity for empathy and emotion detection necessary? What about consciousness? -/- The essays in this collection by researchers from both humanities and science describe various theoretical and experimental approaches to adding medical ethics to a machine, what design features are necessary in order to achieve this, philosophical and practical questions concerning justice, rights, decision-making and responsibility, and accurately modeling essential physician-machine-patient relationships. -/- This collection is the first book to address these 21st-century concerns. (shrink)
Create an account to enable off-campus access through your institution's proxy server.
Monitor this page
Be alerted of all new items appearing on this page. Choose how you want to monitor it:
Email
RSS feed
About us
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.