共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing
and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed:
freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the
potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored
as well. 相似文献
2.
Niels van Dijk 《Ethics and Information Technology》2010,12(1):57-69
Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are
connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences
without us being aware of it. These technological practices have considerable impact on the process by which our personhood
takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away
from a focus on entitlements to personal data, towards making transparent and controlling the profiling process by which knowledge
is produced from these data. The tendency in intellectual property law to commodify information embedded in software and profiles
could counteract this shift to transparency and control. These rights obstruct the access and contestation of the design of
the code that impacts one’s personhood. This triggers a political discussion about the public nature of this code and forces
us to rethink the relations between property, privacy and personhood in the digital age. 相似文献
3.
Real friends: how the Internet can foster friendship 总被引:1,自引:0,他引:1
Adam Briggle 《Ethics and Information Technology》2008,10(1):71-79
Dean Cocking and Steve Matthews’ article “Unreal Friends” (Ethics and Information Technology, 2000) argues that the formation
of purely mediated friendships via the Internet is impossible. I critique their argument and contend that mediated contexts,
including the Internet, can actually promote exceptionally strong friendships according to the very conceptual criteria utilized
by Cocking and Matthews. I first argue that offline relationships can be constrictive and insincere, distorting important
indicators and dynamics in the formation of close friends. The distance of mediated friendships mitigates this problem by promoting the courage to be candid. Next, I argue that the offline world
of largely oral exchanges is often too shallow and hasty to promote deep bonds. The deliberateness of written correspondence acts as a weight to submerge friendships to greater depths and as a brake to enhance attentiveness
to and precision about one’s own and one’s friend’s character. Nonetheless, close friendships may fail to develop on the Internet.
Insofar as this failure occurs, however, it would be for reasons other than those identified by Cocking and Matthews. 相似文献
4.
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a)
informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the
information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the
ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease
and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation
of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being
constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression
towards one’s personal identity. 相似文献
5.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but
more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become
more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these
changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional
Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the
right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review
of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this
work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures
of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches. 相似文献
6.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed
to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios
or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing,
wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards
and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information
technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to
surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of
VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and
threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental
stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions
can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but
without compromising the value of one’s privacy in public.
This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed
without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I
am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including
Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts
were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department
of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology,
and Computer Ethics: Philosophical Enquiry. 相似文献
7.
Locke,Intellectual Property Rights,and the Information Commons 总被引:1,自引:0,他引:1
This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the
current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections,
Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property.
In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and
digital information. In Section 3, it is argued that even if the labor analogy breaks down, we should not necessarily infer
that Locke’s theory has no relevance for the contemporary debate involving IPRs and the information commons. Alternatively,
I argue that much of what Locke has to say about the kinds of considerations that ought to be accorded to the physical commons
when appropriating objects from it – especially his proviso requiring that “enough and as good” be left for others – can also be applied to appropriations involving the information
commons. Based on my reading of Locke’s proviso, I further argue that Locke would presume in favor of the information commons
when competing interests (involving the rights of individual appropriators and the preservation of the commons) are at stake.
In this sense, I believe that Locke offers us an adjudicative principle for evaluating the claims advanced by rival interests
in the contemporary debate about IPRs and the information commons. In Section 4, I apply Locke’s proviso in my analysis of
two recent copyright laws: the Copyright Term Extension Act (CTEA), and the Digital Millennium Copyright Act (DMCA). I then
argue that both laws violate the spirit of Locke’s proviso because they unfairly restrict the access that ordinary individuals
have previously had to resources that comprise the information commons. Noting that Locke would not altogether reject copyright
protection for IPRs, I conclude that Locke’s classic property theory provides a useful mechanism for adjudicating between
claims about how best to ensure that individuals will be able to continue to access information in digitized form, while at
the same time also allowing for that information to enjoy some form of legal protection. 相似文献
8.
Annamaria Carusi 《Ethics and Information Technology》2008,10(4):243-254
The collaborative ‹Big Science’ approach prevalent in physics during the mid- and late-20th century is becoming more common
in the life sciences. Often computationally mediated, these collaborations challenge researchers’ trust practices. Focusing
on the visualisations that are often at the heart of this form of scientific practice, the paper proposes that the aesthetic
aspects of these visualisations are themselves a way of securing trust. Kant’s account of aesthetic judgements in the Third
Critique is drawn upon in order to show that the image-building capability of imagination, and the sensus communis, both of which are integral parts of aesthetic experience, play an important role in building and sustaining community in
these forms of science. Kant’s theory shows that the aesthetic appeal of scientific visualisations is not isolated from two
other dimensions of the visualisations: the cognitive-epistemic, aesthetic-stylistic and interpersonal dimensions, and that
in virtue of these inter-relationships, visualisations contribute to building up the intersubjectively shared framework of
agreement which is basic for trust. 相似文献
9.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges
as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly
entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the
risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional
software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines
some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors
affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military
organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed
to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies
we identify two areas where social factors compel software developers to drift away from a global set of rules constituting
software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish
its vulnerability. 相似文献
10.
Eamon Daly 《Ethics and Information Technology》2010,12(2):97-108
I argue in this paper that the development and convergence of information and communication technologies (ICT) is creating
a global network of surveillance capabilities which affect the traveler. These surveillance capabilities are reminiscent of
18th century philosopher Jeremy Bentham’s panopticon, and as such the emerging global surveillance network has been referred
to as the travel panopticon. I argue that the travel panopticon is corrosive of personal autonomy, and in doing so I describe
and analyse various philosophical approaches to personal autonomy. 相似文献
11.
This article presents an analysis of the concept of disability in Amartya Sen’s capabilities and functionings approach in the context of Information and Communication Technologies (ICT). Following a critical review of the concept of
disability—from its traditional interpretation as an essentially medical concept to its later interpretation as a socially
constructed category—we will introduce the concept of functional diversity. The importance of human diversity in the capabilities and functionings approach calls for incorporating this concept into
the analysis of well-being and quality of life in persons with disability—aspects in which ICT currently plays a major role.
When one contemplates these technologies, it becomes clear that factors such as accessibility, design for all, and user participation
in development and implementation processes are key strategies in promoting equal rights and equal opportunity for persons
with disability in the different environments of the information society. 相似文献
12.
Noëmi Manders-Huits 《Ethics and Information Technology》2010,12(1):1-2
Over the past decade Identity Management has become a central theme in information technology, policy, and administration
in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and
methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains.
Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens,
and customers, there is a growing demand for systems that enable the regulation of rights, duties, responsibilities, entitlements
and access of innumerable people simultaneously. ‘Identity Management’ or ‘Identity Management Systems’ have become important
headings under which such systems are designed and implemented. But there is another meaning of the term ‘identity management’,
which is clearly related and which has gained currency. This second construal refers to the need to manage our moral identities
and our identity related information. This paper explores the relation between the management of our (moral) identities and
‘Identity Management’ as conceptualized in IT discourse. 相似文献
13.
Monique Wonderly 《Ethics and Information Technology》2008,10(1):1-10
Although the word empathy only recently came into existence, eighteenth century philosopher, David Hume, significantly contributed to our current understanding
of the term. Hume was among the first to suggest that an empathic mechanism is the central means by which we make ethical
judgments and glean moral knowledge. In this paper, I explore Hume’s moral sentimentalism, and I argue that his conception
of empathy provides a surprisingly apposite framework for interpreting and addressing a current issue in practical ethics:
the moral significance of ultra-violent video games. Ultimately, I attempt to show that a Humean account of morality uniquely
explains the dangers of ultra-violent video gaming by elucidating a direct connection between playing such games and moral
harm. 相似文献
14.
Smart cities employ information and communication technologies to improve: the quality of life for its citizens, the local economy, transport, traffic management, environment, and interaction with government. Due to the relevance of smart cities (also referred using other related terms such as Digital City, Information City, Intelligent City, Knowledge-based City, Ubiquitous City, Wired City) to various stakeholders and the benefits and challenges associated with its implementation, the concept of smart cities has attracted significant attention from researchers within multiple fields, including information systems. This study provides a valuable synthesis of the relevant literature by analysing and discussing the key findings from existing research on issues related to smart cities from an Information Systems perspective. The research analysed and discussed in this study focuses on number of aspects of smart cities: smart mobility, smart living, smart environment, smart citizens, smart government, and smart architecture as well as related technologies and concepts. The discussion also focusses on the alignment of smart cities with the UN sustainable development goals. This comprehensive review offers critical insight to the key underlying research themes within smart cities, highlighting the limitations of current developments and potential future directions. 相似文献
15.
Ethical protocols design 总被引:1,自引:0,他引:1
Matteo Turilli 《Ethics and Information Technology》2007,9(1):49-62
The paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set
of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept
of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined in such a way as to (i) discriminate specific
cases in which an individual’s GIP can be infringed without accessing the individual’s data; (ii) separate unauthorised accesses
to data that do not respect the right to GIP from access that do; and (iii) distinguish different degrees of GIP. Finally
a camera phone is used to illustrate the proposed solution. 相似文献
16.
Dorothea Kleine 《Ethics and Information Technology》2011,13(2):119-130
Amartya Sen’s capability approach has become increasingly popular in development studies. This paper identifies controllability
and operationalisability as two key stumbling blocks which prevent the capability approach from being used even more widely
in development practice. It discusses the origins and application of the Choice Framework, a conceptual tool designed to help
operationalise the approach. The framework can be used to deconstruct embedded ideologies and analyse the appropriateness
of development goals, to map development as a systemic process, and to plan interventions which can result in increased freedom
of choice for people. Three examples of the application of the Choice Framework in the field of information and communication
for development (ICT4D) are given. The three technologies which are examined, telecentres (Infocentros), Chilecompra and Fair
Tracing, can be placed at different places of a determinism continuum, some reducing the spectrum of choices a user has. The
paper argues that while frameworks such as the Choice Framework can be developed further to increase the operationalisability
of the capability approach, it is up to development funders to accept the fact that people’s choices are never fully predictable
and thus Sen’s ‘development as freedom’ will inevitably be a dynamic and open-ended process. 相似文献
17.
Knut H. Rolland 《Ethics and Information Technology》2006,8(3):143-154
International companies expanding and competing in an increasingly global context are currently discovering the necessity of sharing knowledge across geographical and disciplinary borders. Yet, especially in such contexts, sharing knowledge is inherently complex and problematic in practice. Inspired by recent contributions in science studies, this paper argues that knowledge sharing in a global context must take into account the heterogeneous and locally embedded nature of knowledge. In this perspective, knowledge cannot easily be received through advanced information technologies, but must always be achieved in practice. Empirically, this paper draws from two contrasting initiatives in a major international oil and gas company for improving its current ways of sharing knowledge between geographically distributed sites and disciplines involved in well planning and drilling. The contrasting cases reveal that while a shared database system failed to improve knowledge sharing across contexts, a flexible arrangement supporting collaboration and use of different representation of knowledge was surprisingly successful. Based on these findings the paper underscores and conceptualizes various triangulating practices conducted in order to achieve knowledge across borders. More accurately these practices are central for individuals’ and communities’ abilities to: (i) negotiate ambiguous information, (ii) filter, combine, and integrate various heterogeneous sources of information, and (iii) judge the trustworthiness of information. Concerning the design and use of information technologies this implies that new designs need to facilitate triangulating practices of users rather than just providing advanced platforms (“digital junkyards”) for sharing information. 相似文献
18.
This study extended the scope of previous findings in human–computer interaction research within the computers are social
actors paradigm by showing that online users attribute perceptions of moral qualities to Websites and, further, that differential
perceptions of morality affected the extent of persuasion. In an experiment (N = 138) that manipulated four morality conditions (universalist, relativist, egotistic, control) across worldview, a measured
independent variable, users were asked to evaluate a Web site designed to aid them in making ethical decisions. Web sites
offered four different types of ethical advice as participants contemplated cases involving ethical quandaries. Perceptions
of the Web sites’ moral qualities varied depending on the type of advice given. Further, the Web sites’ perceived morality
and participants’ worldview predicted credibility, persuasiveness, and attitudes toward the Web sites. 相似文献
19.
David Sanford Horner 《Ethics and Information Technology》2010,12(4):299-312
I argue that the problem of ‘moral luck’ is an unjustly neglected topic within Computer Ethics. This is unfortunate given
that the very nature of computer technology, its ‘logical malleability’, leads to ever greater levels of complexity, unreliability
and uncertainty. The ever widening contexts of application in turn lead to greater scope for the operation of chance and the
phenomenon of moral luck. Moral luck bears down most heavily on notions of professional responsibility, the identification
and attribution of responsibility. It is immunity from luck that conventionally marks out moral value from other kinds of
values such as instrumental, technical, and use value. The paper describes the nature of moral luck and its erosion of the
scope of responsibility and agency. Moral luck poses a challenge to the kinds of theoretical approaches often deployed in
Computer Ethics when analyzing moral questions arising from the design and implementation of information and communication
technologies. The paper considers the impact on consequentialism; virtue ethics; and duty ethics. In addressing cases of moral
luck within Computer Ethics, I argue that it is important to recognise the ways in which different types of moral systems
are vulnerable, or resistant, to moral luck. Different resolutions are possible depending on the moral framework adopted.
Equally, resolution of cases will depend on fundamental moral assumptions. The problem of moral luck in Computer Ethics should
prompt us to new ways of looking at risk, accountability and responsibility. 相似文献
20.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献