首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this article I try to show in what sense Emmanuel Levinas’ ‘ethics as first philosophy’ moves our ethical thinking away from what has been called ‘centrist ethics’. Proceeding via depictions of the structure of Levinasian ethics and including references to examples as well as to some empirical research, I try to argue that human beings always already find themselves within an ethical universe, a space of meaning. Critically engaging with the writings of David Gunkel and Lucas Introna, I try to argue that these thinkers, rather than clarifying, distort our ethical understanding of how we stand in relation to artefacts. Drawing a distinction between how pervasive our ethical relationship to other human beings, and living animals, is and how the nature of artefacts is tied to us, I conclude by indicating that the aspiration to give artefacts an ethical face suggests a fantasy to avoid ethical responsibility and generates what I call a ‘compensatory logic’.  相似文献   

2.
In this paper, we argue that, under a specific set of circumstances, designing and employing certain kinds of virtual reality (VR) experiences can be unethical. After a general discussion of simulations and their ethical context, we begin our argument by distinguishing between the experiences generated by different media (text, film, computer game simulation, and VR simulation), and argue that VR experiences offer an unprecedented degree of what we call “perspectival fidelity” that prior modes of simulation lack. Additionally, we argue that when VR experiences couple this perspectival fidelity with what we call “context realism,” VR experiences have the ability to produce “virtually real experiences.” We claim that virtually real experiences generate ethical issues for VR technologies that are unique to the medium. Because subjects of these experiences treat them as if they were real, a higher degree of ethical scrutiny should be applied to any VR scenario with the potential to generate virtually real experiences. To mitigate this unique moral hazard, we propose and defend what we call “The Equivalence Principle.” This principle states that “if it would be wrong to allow subjects to have a certain experience in reality, then it would be wrong to allow subjects to have that experience in a virtually real setting.” We argue that such a principle, although limited in scope, should be part of the risk analysis conducted by any Institutional Review Boards, psychologists, empirically oriented philosophers, or game designers who are using VR technology in their work.  相似文献   

3.
Ethical pluralism and global information ethics   总被引:2,自引:1,他引:1  
A global information ethics that seeks to avoid imperialistic homogenization must conjoin shared norms while simultaneously preserving the irreducible differences between cultures and peoples. I argue that a global information ethics may fulfill these requirements by taking up an ethical pluralism – specifically Aristotle’s pros hen [“towards one”] or “focal” equivocals. These ethical pluralisms figure centrally in both classical and contemporary Western ethics: they further offer important connections with the major Eastern ethical tradition of Confucian thought. Both traditions understand ethical judgment to lead to and thus require ethical pluralism – i.e., an acceptance of more than one judgment regarding the interpretation and application of a shared ethical norm. Both traditions invoke notions of resonance and harmony to articulate pluralistic structures of connection alongside irreducible differences. Specific examples within Western computer and information ethics demonstrate these pluralisms in fact working in praxis. After reviewing further resonances and radical differences between Western and Eastern views, I then argue that emerging conceptions of privacy and data privacy protection laws in China, Hong Kong, Japan, and Thailand in fact constitute a robust, pros hen pluralism with Western conceptions. In both theory and in praxis, then, this pluralism thus fulfills the requirement for a global information ethics that holds shared norms alongside the irreducible differences between cultures and peoples.  相似文献   

4.
Social network sites (SNS) and micro-blogging sites are popular yet distinctive social media. Previous studies have focused on one type of social media and thus overlook how the distinctive features of SNS and micro-blogging sites may affect underlying motivational mechanisms. To address this research gap, we draw from the self-regulation framework and propose a research model to explain how different appraisal factors (i.e., self-image and peer influence) affect continuance use through emotional responses (i.e., a sense of belonging and satisfaction). Furthermore, we argue that the effects of these appraisal and emotional factors are different across types of social media. We tested our research model by survey data collected from SNS and micro-blogging sites. The results confirm our hypotheses: First, self-image is a more significant factor in increasing SNS users’ sense of belonging and satisfaction, while peer influence has a greater effect on micro-blogging sites users’ sense of belonging and satisfaction. Second, the sense of belonging explains the greater variance of continuance intention in SNS as compared with satisfaction. A few theoretical and practical implications are discussed related to our findings on different motivational mechanisms.  相似文献   

5.
In this paper I wish to show that, although traditional notions of genderand sex break down in cyberspace, a revised Beauvoirian understanding ofsexual secondariness is applicable and useful in coming to terms with thepossible ethical and philosophical ramifications of this relatively newcommunication medium. To this end, I argue that persons who enter intocommunication in online chat rooms necessarily deny the bodily aspectsof their own identity. In so doing, these persons make themselvesinessential, or secondary, in Beauvior's sense. For Beauvoir, this isa denial of one's own freedom, and thus commmunication in cyberspacebecomes an instance of self-oppression. Yet, if self-oppression canbe avoided, the self-oppressor is morally responsible for her or hisown oppression. Ultimately, I argue, cyberspatial communication is aninstance of such self-oppression.  相似文献   

6.
Telehealth can be used to develop innovative healthcare services for promoting medical quality and efficiency. Despite previous research on users’ adoption intention of telehealth, users’ acceptance and resistance have rarely been considered at the same time. This study used a research model based on the dual-factor concepts of “enablers” and “inhibitors” to explain users’ intentions to utilize telehealth. We extended the Technology Acceptance Model and Status Quo Bias with the technology anxiety concept to explain why patients accept or reject the use of telehealth from the perceived enablers and inhibitors of intentions. The experimental results demonstrated users’ ambiguous and indecisive intentions of adopting telehealth. It was also found that availability and perceived usefulness are the main factors that encourage individuals to adopt telehealth services. Technology anxiety and transition costs are the key factors in discouraging people from using telehealth. Technology anxiety could be overcome through the perceived usefulness to promote the adoption of telehealth.  相似文献   

7.
Abstract

At present, the politics of digital tools are predominantly discussed in terms of the data they collect, analyze, and circulate. Through my analysis of electronic ankle monitors’ visual characteristics, I widen the scope of investigation to consider how the visuality of digital tools’ form factor – the size and shape of computing hardware – also contributes to their politics. I discuss five major impacts the visuality of electronic ankle monitors’ physical form has upon their wearers’ lives: (1) lack of differentiation in the aesthetics of monitors across different types of wearers (spanning from criminal justice to immigration detention) leads wearers to be considered “dangerous criminals,” by default; (2) monitors limit wearers’ ability to “pass” in society; (3) monitors expand the set of surveillors beyond government officials to also include the public; (4) monitors compromise wearers’ privacy; (5) monitors associate wearers with older practices of visually marking people normative society has labeled dangerous. Based on this analysis, I argue two points. First, that the visuality of electronic ankle monitors’ form factor expands the harms wearers experience beyond those engendered by the device’s primary use as a remote geo-temporal tracking tool used by government organizations. Second, the case study of electronic ankle monitors evidences the need to develop laws and policies that seek to regulate the visual properties of digital tools as well as the data they generate.  相似文献   

8.
What do Social Networking Sites (SNS) ‘do to us’: are they a damning threat or an emancipating force? Recent publications on the impact of “Web 2.0” proclaim very opposite evaluative positions. With the aim of finding a middle ground, this paper develops a pragmatist approach to SNS based on the work of Richard Rorty. The argument proceeds in three steps. First, we analyze SNS as conversational practices. Second, we outline, in the form of an imaginary conversation between Rorty and Heidegger, a positive and negative ‘conversational’ view on SNS. Third, we deploy a reflection, again using Rortian notions, on that evaluation, starting from the concept of ‘self-reflectivity.’ Finally, the relations between these three steps are more detailedly investigated. By way of the sketched technique, we can interrelate the two opposing sides of the recent debates—hope and threat—and judge SNS in all their ambiguity.  相似文献   

9.
10.
In the mid-1990s, the Internet rapidly changedfrom a venue used by a small number ofscientists to a popular phenomena affecting allaspects of life in industrialized nations. Scholars from diverse disciplines have taken aninterest in trying to understand the Internetand Internet users. However, as a variety ofresearchers have noted, guidelines for ethicalresearch on human subjects written before theInternet's growth can be difficult to extend toresearch on Internet users.In this paper, I focus on one ethicalissue: whether and to what extent to disguisematerial collected online in publishedaccounts. While some people argue thatvulnerable human subjects must always be madeanonymous in publications for their ownprotection, others argue that Internet usersdeserve credit for their creative andintellectual work. Still others argue thatmuch material available online should betreated as ``published.' To attempt to resolvethese issues, I first review my own experiencesof disguising material in research accountsfrom 1992 to 2002. Some of the thorniestissues emerge at the boundaries betweenresearch disciplines. Furthermore, manyhumanities disciplines have not historicallyviewed what they do as human subjects research. Next, I explore what it means to do humansubjects research in the humanities. Inspiredby issues raised by colleagues in thehumanities, I argue that the traditional notionof a ``human subject' does not adequatelycharacterize Internet users. A useful alternatemental model is proposed: Internet users areamateur artists. The Internet can be seen as aplayground for amateur artists creatingsemi-published work. I argue that thisapproach helps make some ethical dilemmaseasier to reason about, because it highlightskey novel aspects of the situation,particularly with regard to disguisingmaterial. Finally, I conclude by proposing aset of practical guidelines regardingdisguising material gathered on the Internet inpublished accounts, on a continuum from nodisguise, light disguise, moderate disguise, toheavy disguise.  相似文献   

11.
12.
The need for quick, timely, and accurate information is critical in emergency events. During mass emergencies, people assemble information from both official and unofficial sources. As digital access expands, people will increasingly incorporate information from digital sources into decision making and assess it against the local circumstances they experience. If we extrapolate what such behavior means for the future, we can see that information management under emergency conditions will need to become increasingly socially distributed. The key question then is how to assess the quality of information: how “good” or “bad” it is; whether it is “misinformation” or “disinformation.” Borrowing from Simon's notion of satisficing, the authors argue that people's assessment of information helpfulness and credibility is a function of the “everyday analytic” skills they employ during mass emergencies. To facilitate the critical work of “everyday analysts,” we outline a research agenda for the development of analytical support tools.  相似文献   

13.
Is cybernetics good, bad, or indifferent? SherryTurkle enlists deconstructive theory to celebrate thecomputer age as the embodiment of “difference.” Nolonger just a theory, one can now live a “virtual” life. Within a differential but ontologically detachedfield of signifiers, one can construct and reconstructegos and environments from the bottom up andendlessly. Lucas Introna, in contrast, enlists theethical philosophy of Emmanuel Levinas to condemn thesame computer age for increasing the distance betweenflesh and blood people. Mediating the face-to-facerelation between real people, allowing and encouragingcommunication at a distance, information technologywould alienate individuals from the social immediacyproductive of moral obligations and responsibilities. In this paper I argue against both of thesepositions, and for similar reasons. Turkle'scelebration and Introna's condemnation of informationtechnology both depend, so I will argue, on the samemistaken meta-interpretation of it. Like Introna,however, but to achieve a different end, I will enlistLevinas's ethical philosophy to make this case.  相似文献   

14.
Search engine optimization allows for users’ needs to be directly met by result snippets or a “knowledge map” without clicking any results. This behavior is called “good abandonment” and is found to frequently occur during mobile searching. Users exhibit such a behavior when they trust the result that addresses their information need without bothering to click it. Therefore, this study examines how users judge a result's credibility without clicking. This study proposes a model for assessing the credibility of good abandonment results, making a hypothesis about the measures that may affect credibility assessments in mobile searches. A credibility assessment experiment was conducted to collect users’ eye movements, perceived credibility and feedback on different credibility measures. Users’ search behaviors were recorded by a screen recorder, in order to see whether a search was good abandonment. Then the initially proposed model was validated in terms of users’ perceived credibility, search behaviors and feedback, and further improved. The revised model found that the credibility assessment of good abandonment results in mobile searching is determined by six credibility measures distributed across three aspects of content, operator and design. Content-related measures show that users tend to believe the results if there is detailed and updated context information and the content is neutral. Operator-related measures indicate the impact of trust in the search engine on the credibility assessment. Design-related measures indicate that users tend to trust results with interactive functions and optimal layouts. How each of the six measures influence users’ assessment of credibility is discussed in this paper.  相似文献   

15.
As social network services become more pervasive, social media advertising emerges as an attractive vehicle for augmenting advertising effectiveness. To leverage this new means of marketing, one must understand what engages SNS users in a favorable online behavior (i.e., overtly indicating personal interest in, or support for, the exposed message by clicking the Like or Share button in Facebook), thereby resulting in an effective advertising campaign. This research conceptualizes SNS ad effectiveness as a concept encompassing emotional appeal, informativeness and creativity that all have a potential to contribute to a positive online behavior. It empirically investigates the antecedents of positive user behavior for a SNS ad based on the theory of reasoned action, the social influence theory, and a persuasion theory. It proposes and tests a conceptual model of the formation of online user’s behavioral responses with regards to SNS advertising. The results of our empirical tests of the model reveal that informativeness and advertising creativity were key drivers of favorable behavioral responses to an SNS ad and that intention to engage in favorable user responses was positively associated with purchase intention. Based on these findings, the paper suggests further research directions and offers implications for harnessing the full potential of the new SNS advertising platform.  相似文献   

16.
This paper describes the application of Carroll’s scenario-based design and claims analysis as a means of refinement to the initial design of a digital library of geographical resources (GeogDL) to prepare Singapore students to take a national examination in geography. GeogDL is built on top of G-Portal, a digital library providing services over geospatial and georeferenced Web content.Beyond improving the initial design of GeogDL, a main contribution of the paper is making explicit the use of Carroll’s strong theory-based but undercapitalized scenario-based design and claims analysis that inspired recommendations for the refinement of GeogDL.The paper concludes with an overview of the implementation of some of the recommendations identified in the study to address “usability” and “usefulness” design issues in GeogDL, and discusses implications of the findings in relation to geospatial digital libraries in general.  相似文献   

17.
In social networking services (SNSs), users’ unclear understanding of the large and invisible audience increases the chances of online turbulence, which is a key source of SNS-induced stress. This growing phenomenon has gained increasing attention in academia and industry due to the undesirable consequences for users and SNS platforms. In this study, we draw from the transactional model of stress to examine how audience management strategies impact online turbulence and lead to neglected unintended audience concern and lurking. We also investigate the role of self-monitoring as a stress inhibitor. We test our model with data collected from 301 SNS users. The results show that the four types of audience management strategies have different effects on online turbulence, which significantly impacts neglected unintended audience concern especially when users have high self-monitoring skills. We believe that this work contributes, both from scientific and practical standpoints, to the understanding of the interventions and stressful responses of online turbulence in SNSs.  相似文献   

18.
According to the amoralist, computer games cannot be subject to moral evaluation because morality applies to reality only, and games are not real but “just games”. This challenges our everyday moralist intuition that some games are to be met with moral criticism. I discuss and reject the two most common answers to the amoralist challenge and argue that the amoralist is right in claiming that there is nothing intrinsically wrong in simply playing a game. I go on to argue for the so-called “endorsement view” according to which there is nevertheless a sense in which games themselves can be morally problematic, viz. when they do not only represent immoral actions but endorse a morally problematic worldview. Based on the endorsement view, I argue against full blown amoralism by claiming that gamers do have a moral obligation when playing certain games even if their moral obligation is not categorically different from that of readers and moviegoers.  相似文献   

19.
The findings of our experiments showed that social network sites (SNSs) such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her contextual integrity framework in order to answer the question of whether or not an online user’s privacy is being violated by this practice.  相似文献   

20.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号