首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.  相似文献   

2.
Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal data, towards making transparent and controlling the profiling process by which knowledge is produced from these data. The tendency in intellectual property law to commodify information embedded in software and profiles could counteract this shift to transparency and control. These rights obstruct the access and contestation of the design of the code that impacts one’s personhood. This triggers a political discussion about the public nature of this code and forces us to rethink the relations between property, privacy and personhood in the digital age.  相似文献   

3.
Real friends: how the Internet can foster friendship   总被引:1,自引:0,他引:1  
Dean Cocking and Steve Matthews’ article “Unreal Friends” (Ethics and Information Technology, 2000) argues that the formation of purely mediated friendships via the Internet is impossible. I critique their argument and contend that mediated contexts, including the Internet, can actually promote exceptionally strong friendships according to the very conceptual criteria utilized by Cocking and Matthews. I first argue that offline relationships can be constrictive and insincere, distorting important indicators and dynamics in the formation of close friends. The distance of mediated friendships mitigates this problem by promoting the courage to be candid. Next, I argue that the offline world of largely oral exchanges is often too shallow and hasty to promote deep bonds. The deliberateness of written correspondence acts as a weight to submerge friendships to greater depths and as a brake to enhance attentiveness to and precision about one’s own and one’s friend’s character. Nonetheless, close friendships may fail to develop on the Internet. Insofar as this failure occurs, however, it would be for reasons other than those identified by Cocking and Matthews.  相似文献   

4.
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.  相似文献   

5.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches.  相似文献   

6.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but without compromising the value of one’s privacy in public. This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology, and Computer Ethics: Philosophical Enquiry.  相似文献   

7.
Locke,Intellectual Property Rights,and the Information Commons   总被引:1,自引:0,他引:1  
This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections, Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property. In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and digital information. In Section 3, it is argued that even if the labor analogy breaks down, we should not necessarily infer that Locke’s theory has no relevance for the contemporary debate involving IPRs and the information commons. Alternatively, I argue that much of what Locke has to say about the kinds of considerations that ought to be accorded to the physical commons when appropriating objects from it – especially his proviso requiring that “enough and as good” be left for others – can also be applied to appropriations involving the information commons. Based on my reading of Locke’s proviso, I further argue that Locke would presume in favor of the information commons when competing interests (involving the rights of individual appropriators and the preservation of the commons) are at stake. In this sense, I believe that Locke offers us an adjudicative principle for evaluating the claims advanced by rival interests in the contemporary debate about IPRs and the information commons. In Section 4, I apply Locke’s proviso in my analysis of two recent copyright laws: the Copyright Term Extension Act (CTEA), and the Digital Millennium Copyright Act (DMCA). I then argue that both laws violate the spirit of Locke’s proviso because they unfairly restrict the access that ordinary individuals have previously had to resources that comprise the information commons. Noting that Locke would not altogether reject copyright protection for IPRs, I conclude that Locke’s classic property theory provides a useful mechanism for adjudicating between claims about how best to ensure that individuals will be able to continue to access information in digitized form, while at the same time also allowing for that information to enjoy some form of legal protection.  相似文献   

8.
The collaborative ‹Big Science’ approach prevalent in physics during the mid- and late-20th century is becoming more common in the life sciences. Often computationally mediated, these collaborations challenge researchers’ trust practices. Focusing on the visualisations that are often at the heart of this form of scientific practice, the paper proposes that the aesthetic aspects of these visualisations are themselves a way of securing trust. Kant’s account of aesthetic judgements in the Third Critique is drawn upon in order to show that the image-building capability of imagination, and the sensus communis, both of which are integral parts of aesthetic experience, play an important role in building and sustaining community in these forms of science. Kant’s theory shows that the aesthetic appeal of scientific visualisations is not isolated from two other dimensions of the visualisations: the cognitive-epistemic, aesthetic-stylistic and interpersonal dimensions, and that in virtue of these inter-relationships, visualisations contribute to building up the intersubjectively shared framework of agreement which is basic for trust.  相似文献   

9.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies we identify two areas where social factors compel software developers to drift away from a global set of rules constituting software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish its vulnerability.  相似文献   

10.
I argue in this paper that the development and convergence of information and communication technologies (ICT) is creating a global network of surveillance capabilities which affect the traveler. These surveillance capabilities are reminiscent of 18th century philosopher Jeremy Bentham’s panopticon, and as such the emerging global surveillance network has been referred to as the travel panopticon. I argue that the travel panopticon is corrosive of personal autonomy, and in doing so I describe and analyse various philosophical approaches to personal autonomy.  相似文献   

11.
This article presents an analysis of the concept of disability in Amartya Sen’s capabilities and functionings approach in the context of Information and Communication Technologies (ICT). Following a critical review of the concept of disability—from its traditional interpretation as an essentially medical concept to its later interpretation as a socially constructed category—we will introduce the concept of functional diversity. The importance of human diversity in the capabilities and functionings approach calls for incorporating this concept into the analysis of well-being and quality of life in persons with disability—aspects in which ICT currently plays a major role. When one contemplates these technologies, it becomes clear that factors such as accessibility, design for all, and user participation in development and implementation processes are key strategies in promoting equal rights and equal opportunity for persons with disability in the different environments of the information society.  相似文献   

12.
Editorial     
Over the past decade Identity Management has become a central theme in information technology, policy, and administration in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains. Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens, and customers, there is a growing demand for systems that enable the regulation of rights, duties, responsibilities, entitlements and access of innumerable people simultaneously. ‘Identity Management’ or ‘Identity Management Systems’ have become important headings under which such systems are designed and implemented. But there is another meaning of the term ‘identity management’, which is clearly related and which has gained currency. This second construal refers to the need to manage our moral identities and our identity related information. This paper explores the relation between the management of our (moral) identities and ‘Identity Management’ as conceptualized in IT discourse.  相似文献   

13.
Although the word empathy only recently came into existence, eighteenth century philosopher, David Hume, significantly contributed to our current understanding of the term. Hume was among the first to suggest that an empathic mechanism is the central means by which we make ethical judgments and glean moral knowledge. In this paper, I explore Hume’s moral sentimentalism, and I argue that his conception of empathy provides a surprisingly apposite framework for interpreting and addressing a current issue in practical ethics: the moral significance of ultra-violent video games. Ultimately, I attempt to show that a Humean account of morality uniquely explains the dangers of ultra-violent video gaming by elucidating a direct connection between playing such games and moral harm.  相似文献   

14.
Smart cities employ information and communication technologies to improve: the quality of life for its citizens, the local economy, transport, traffic management, environment, and interaction with government. Due to the relevance of smart cities (also referred using other related terms such as Digital City, Information City, Intelligent City, Knowledge-based City, Ubiquitous City, Wired City) to various stakeholders and the benefits and challenges associated with its implementation, the concept of smart cities has attracted significant attention from researchers within multiple fields, including information systems. This study provides a valuable synthesis of the relevant literature by analysing and discussing the key findings from existing research on issues related to smart cities from an Information Systems perspective. The research analysed and discussed in this study focuses on number of aspects of smart cities: smart mobility, smart living, smart environment, smart citizens, smart government, and smart architecture as well as related technologies and concepts. The discussion also focusses on the alignment of smart cities with the UN sustainable development goals. This comprehensive review offers critical insight to the key underlying research themes within smart cities, highlighting the limitations of current developments and potential future directions.  相似文献   

15.
Ethical protocols design   总被引:1,自引:0,他引:1  
The paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined in such a way as to (i) discriminate specific cases in which an individual’s GIP can be infringed without accessing the individual’s data; (ii) separate unauthorised accesses to data that do not respect the right to GIP from access that do; and (iii) distinguish different degrees of GIP. Finally a camera phone is used to illustrate the proposed solution.  相似文献   

16.
Amartya Sen’s capability approach has become increasingly popular in development studies. This paper identifies controllability and operationalisability as two key stumbling blocks which prevent the capability approach from being used even more widely in development practice. It discusses the origins and application of the Choice Framework, a conceptual tool designed to help operationalise the approach. The framework can be used to deconstruct embedded ideologies and analyse the appropriateness of development goals, to map development as a systemic process, and to plan interventions which can result in increased freedom of choice for people. Three examples of the application of the Choice Framework in the field of information and communication for development (ICT4D) are given. The three technologies which are examined, telecentres (Infocentros), Chilecompra and Fair Tracing, can be placed at different places of a determinism continuum, some reducing the spectrum of choices a user has. The paper argues that while frameworks such as the Choice Framework can be developed further to increase the operationalisability of the capability approach, it is up to development funders to accept the fact that people’s choices are never fully predictable and thus Sen’s ‘development as freedom’ will inevitably be a dynamic and open-ended process.  相似文献   

17.
International companies expanding and competing in an increasingly global context are currently discovering the necessity of sharing knowledge across geographical and disciplinary borders. Yet, especially in such contexts, sharing knowledge is inherently complex and problematic in practice. Inspired by recent contributions in science studies, this paper argues that knowledge sharing in a global context must take into account the heterogeneous and locally embedded nature of knowledge. In this perspective, knowledge cannot easily be received through advanced information technologies, but must always be achieved in practice. Empirically, this paper draws from two contrasting initiatives in a major international oil and gas company for improving its current ways of sharing knowledge between geographically distributed sites and disciplines involved in well planning and drilling. The contrasting cases reveal that while a shared database system failed to improve knowledge sharing across contexts, a flexible arrangement supporting collaboration and use of different representation of knowledge was surprisingly successful. Based on these findings the paper underscores and conceptualizes various triangulating practices conducted in order to achieve knowledge across borders. More accurately these practices are central for individuals’ and communities’ abilities to: (i) negotiate ambiguous information, (ii) filter, combine, and integrate various heterogeneous sources of information, and (iii) judge the trustworthiness of information. Concerning the design and use of information technologies this implies that new designs need to facilitate triangulating practices of users rather than just providing advanced platforms (“digital junkyards”) for sharing information.  相似文献   

18.
This study extended the scope of previous findings in human–computer interaction research within the computers are social actors paradigm by showing that online users attribute perceptions of moral qualities to Websites and, further, that differential perceptions of morality affected the extent of persuasion. In an experiment (N = 138) that manipulated four morality conditions (universalist, relativist, egotistic, control) across worldview, a measured independent variable, users were asked to evaluate a Web site designed to aid them in making ethical decisions. Web sites offered four different types of ethical advice as participants contemplated cases involving ethical quandaries. Perceptions of the Web sites’ moral qualities varied depending on the type of advice given. Further, the Web sites’ perceived morality and participants’ worldview predicted credibility, persuasiveness, and attitudes toward the Web sites.  相似文献   

19.
I argue that the problem of ‘moral luck’ is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its ‘logical malleability’, leads to ever greater levels of complexity, unreliability and uncertainty. The ever widening contexts of application in turn lead to greater scope for the operation of chance and the phenomenon of moral luck. Moral luck bears down most heavily on notions of professional responsibility, the identification and attribution of responsibility. It is immunity from luck that conventionally marks out moral value from other kinds of values such as instrumental, technical, and use value. The paper describes the nature of moral luck and its erosion of the scope of responsibility and agency. Moral luck poses a challenge to the kinds of theoretical approaches often deployed in Computer Ethics when analyzing moral questions arising from the design and implementation of information and communication technologies. The paper considers the impact on consequentialism; virtue ethics; and duty ethics. In addressing cases of moral luck within Computer Ethics, I argue that it is important to recognise the ways in which different types of moral systems are vulnerable, or resistant, to moral luck. Different resolutions are possible depending on the moral framework adopted. Equally, resolution of cases will depend on fundamental moral assumptions. The problem of moral luck in Computer Ethics should prompt us to new ways of looking at risk, accountability and responsibility.  相似文献   

20.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号