首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Amartya Sen’s capability approach has become increasingly popular in development studies. This paper identifies controllability and operationalisability as two key stumbling blocks which prevent the capability approach from being used even more widely in development practice. It discusses the origins and application of the Choice Framework, a conceptual tool designed to help operationalise the approach. The framework can be used to deconstruct embedded ideologies and analyse the appropriateness of development goals, to map development as a systemic process, and to plan interventions which can result in increased freedom of choice for people. Three examples of the application of the Choice Framework in the field of information and communication for development (ICT4D) are given. The three technologies which are examined, telecentres (Infocentros), Chilecompra and Fair Tracing, can be placed at different places of a determinism continuum, some reducing the spectrum of choices a user has. The paper argues that while frameworks such as the Choice Framework can be developed further to increase the operationalisability of the capability approach, it is up to development funders to accept the fact that people’s choices are never fully predictable and thus Sen’s ‘development as freedom’ will inevitably be a dynamic and open-ended process.  相似文献   

2.
According to the amoralist, computer games cannot be subject to moral evaluation because morality applies to reality only, and games are not real but “just games”. This challenges our everyday moralist intuition that some games are to be met with moral criticism. I discuss and reject the two most common answers to the amoralist challenge and argue that the amoralist is right in claiming that there is nothing intrinsically wrong in simply playing a game. I go on to argue for the so-called “endorsement view” according to which there is nevertheless a sense in which games themselves can be morally problematic, viz. when they do not only represent immoral actions but endorse a morally problematic worldview. Based on the endorsement view, I argue against full blown amoralism by claiming that gamers do have a moral obligation when playing certain games even if their moral obligation is not categorically different from that of readers and moviegoers.  相似文献   

3.
4.
This case analysis considers how digital disruption is reaching beyond technology to engulf traditionally considered low-tech industries and influence conventionally viewed non-digital businesses. For incumbent firms in these low-tech industries, the disruption brings not only plenty of opportunities but also numerous threats. Firms that quickly embrace the digital era by profoundly changing their incumbent strategies, systems, operational habits, and business models have great chances to outperform their competitors and succeed within this dynamic environment. One digital strategy that might be adopted by incumbent firms in the low-tech industries to seize the opportunities brought by digital disruption is to integrate their resource orchestration actions with advanced information technologies (ITs). Given the strong connection between firms’ resource orchestration actions and their competitive advantages, as well as the increasingly vital role of ITs in contemporary business operations, it is an imperative to investigate the impacts of ITs on the resource orchestration processes of modern enterprises. Additionally, for incumbent firms operating in the low-tech industries, integrating their resource management with modern ITs might help them effectively identify and accumulate unique resources, develop their capabilities, and create value through continuous reconfiguration of resources. Therefore, low-tech firms that strive to adopt modern information technologies in their resource orchestration process are more likely to achieve improved organizational performance and competitive advantages than their competitors.  相似文献   

5.
I describe the emergence of Floridi’s philosophy of information (PI) and information ethics (IE) against the larger backdrop of Information and Computer Ethics (ICE). Among their many strengths, PI and IE offer promising metaphysical and ethical frameworks for a global ICE that holds together globally shared norms with the irreducible differences that define local cultural and ethical traditions. I then review the major defenses and critiques of PI and IE offered by contributors to this special issue, and highlight Floridi’s responses to especially two central problems – the charge of relativism and the meaning of ?entropy’ in IE. These responses, conjoined with several elaborations of PI and IE offered here by diverse contributors, including important connections with the naturalistic philosophies of Spinoza and other major Western and Eastern figures, thus issue in an expanded and more refined version of PI and IE – one still facing important questions as well as possibilities for further development.  相似文献   

6.
This paper raises three objections to the argument presented by Ostritsch in The amoralist challenge to gaming and the gamer’s moral obligation, in which the amoralist’s mantra “it’s just a game” is viewed as an illegitimate rebuttal of all moral objections to (typically violent) video games. The first objection focuses on Ostritsch’s ‘strong sense’ of player enjoyment, which I argue is too crude, given the moral work it is meant to be doing. Next, I question the legitimacy of Ostritsch’s claim that certain video games are immoral. I examine what is involved in making this claim and what would be required for a normative position to be established: none of which is addressed by Ostritsch. Finally, I challenge the legitimacy of his claim that players are obliged not to play certain video games in certain ways (i.e., games endorsing immorality as ‘fun games’). I distinguish between immoral and suberogatory actions, arguing that the latter is in fact more applicable to cases Ostritsch has in mind, and that one is not obliged not to engage in these actions.  相似文献   

7.
Young fathers, like all parents, have a range of information needs, such as learning how to introduce their babies to solid foods. Yet compared to young mothers and older parents, they have fewer resources available to them. To date, young fathers have not been identified as a priority population in need of parenting-related information and face unequal access to information resources. This inequality is in part related to gender stereotypes and social biases about young men who become parents at “too early” an age. Through interviews and field observation conducted during a longitudinal ethnographic study of young mothers, fathers, their parents, and service providers in two cities in British Columbia, Canada, we examined young fathers’ gendered experiences accessing parenting information and resources. Using an ecological model of information needs, we identified factors at different levels: micro (e.g., personal), meso (e.g., relational) and macro (e.g., access to city/provincial parenting programs and resources) that revealed information inequalities for young fathers. Our findings illustrate that young fathers often have unexpressed and unaddressed information needs due to barriers they encounter when accessing services, the stigma they experience as early age parents, and social pressures that result in avoiding asking for help in order to adhere to traditional masculine values.  相似文献   

8.
9.
Luck (2009) argues that gamers face a dilemma when it comes to performing certain virtual acts. Most gamers regularly commit acts of virtual murder, and take these acts to be morally permissible. They are permissible because unlike real murder, no one is harmed in performing them; their only victims are computer-controlled characters, and such characters are not moral patients. What Luck points out is that this justification equally applies to virtual pedophelia, but gamers intuitively think that such acts are not morally permissible. The result is a dilemma: either gamers must reject the intuition that virtual pedophelic acts are impermissible and so accept partaking in such acts, or they must reject the intuition that virtual murder acts are permissible, and so abstain from many (if not most) extant games. While the prevailing solution to this dilemma has been to try and find a morally relevant feature to distinguish the two cases, I argue that a different route should be pursued. It is neither the case that all acts of virtual murder are morally permissible, nor are all acts of virtual pedophelia impermissible. Our intuitions falter and produce this dilemma because they are not sensitive to the different contexts in which games present virtual acts.  相似文献   

10.
In our paper we present an experimental study which investigated the possibility to project the need for information specialists serving knowledge workers in knowledge industries on the basis of an average university library serving their counterparts at a university. Information management functions, i.e. functions and processes related to information evaluation, acquisition, metadata creation, etc., performed in an average university library are the starting point of this investigation. The fundamental assumption is that these functions do not only occur in libraries but also in other contexts like, for instance, in knowledge industries. As a consequence, we try to estimate the need for information professionals in knowledge industries by means of quantitative methods from library and information science (Library Planning Model) and economics (input output analysis, occupational analysis). Our study confirms the validity of our assumption. Accordingly, the number of information specialists projected on the basis of university libraries is consistent with their actual number reported in national statistics. However, in order to attain a close fit, we had to revise the original research model by dismissing the split-up of information specialists into reader services and technical services staff.  相似文献   

11.
A new plant species recently ferreted out from the fossil trove of the world-famous Jehol biota sheds fresh insight into the origin of angiosperms.  相似文献   

12.
Social networks provide individuals with diverse or redundant information depending on the network structure. Both types of information offer advantages for generating new ideas. At the same time, network structure and network content are independent. As a result, two individuals with the same network position can access diverse or redundant content from their social peers. In this study, we investigate the function of social networks in innovative endeavors given individuals’ different kinds of information accessing behavior. In accordance with previous research, we argue that individuals with a broker status access more diverse information through non-redundant network structures and develop, on average, more novel ideas. We further propose that redundancy in content complements brokers’ structural non-redundancy by providing familiar knowledge elements and therefore interpretability, while non-redundancy in both content and structure leads to information overload. Thus, we hypothesize that brokers accessing more information depth, and independently, less information breadth generate newer ideas. To test our hypotheses, we collected data from a popular online maker community containing 18,146 ideas, 19,919 profiles, and 52,663 comments. We used topic modeling (Latent Dirichlet Allocation) to extract hidden knowledge elements and social network analysis to identify brokers. In line with our hypotheses, we find that information depth (breadth) strengthens (weakens) a favorable broker position. These findings have implications for the literature on idea generation in social networks and household sector innovation.  相似文献   

13.
14.
The lack of success of information systems has been studied extensively. However, often only the implementation of an information system is studied without analysing the consequent effects on its adoption and later use. Our paper uses actor network theory to show how successful implementation and adoption can lead to a low level of later use and lack of achievement of the declarative goals. The same actors may form networks leading to a successful outcome in one particular situation but not in another. In such a way seamless implementation can hinder the subsequent use and hide problems from the management. An analysis of a case study of an information system's implementation, adoption and later use in a primary school allows a better understanding of the reasons for the subsequent low use.  相似文献   

15.
The ability of digital influencers to convert their followers into paying customers relies heavily on the followers’ “stickiness”, a topic that has not been adequately investigated in the existing literature. From a psychological perspective, this study develops a theoretical model of followers’ stickiness. Two forms of followers’ psychological responses to digital influencers are jointly considered: wishful identification and parasocial relationships. This study also categorizes and examines the moderating effects exerted by the genres of digital influencers’ revenue models, which represent a vital contextual factor for forming followers’ stickiness. A survey was conducted on Weibo, the Chinese equivalent to Twitter, with a sample of 319 followers of real digital influencers that are using different genres of revenue models. The findings indicate that both wishful identification and parasocial relationships have significant but different impacts on followers’ stickiness in different genres of influencers’ revenue models. This paper enriches our understanding of the phenomenon of followers’ stickiness toward digital influencers and provides practical guidance for digital influencers and social commerce/media platform providers.  相似文献   

16.
Farming communities in developing countries like India are victims of the information divide. Voice-based information sharing services (VISS) can bridge this divide and help farmers address a range of challenges by exchanging knowledge with their peers. An analysis of in-depth phone interviews with farmers in remote, rural Gujarat, India, reveals four stages for developing a VISS for marginalized communities in developing countries. The four stages are: identify gatekeepers to seed the VISS, expand the VISS by building on existing communities of practice, share information, and incentivize members to sustain the VISS. The VISS in this study is based on IBM’s Spoken Web platform, which enables even illiterate and semi-literate farmers to seek, share, use, and benefit from information using feature mobile phones. Research contributions and practical implications of the study are discussed at the end.  相似文献   

17.
In the current socio-economic environment, to face challenges such as the emergence of new technologies, globalisation and increasing demands from their clients it is inevitable that enterprises will collaborate with others and progressively shift their boundaries. In this context, interoperability has become a prerequisite in the jigsaw of such collaboration. By definition, it is entities’ ability to work together as an organisation. This ability spans a wide range of aspects, embracing both technical and business issues. Over the past decade, both the concept and the context of interoperability have been extended from a largely IT-focused domain to a business-focused domain and the evaluation of interoperability has become a rising concern. An increasing number of studies have concentrated on not just digital but business aspects of human behaviour in the social environment. In general, the wider application domain is the assessment of the interoperability of information systems and processes in any organisation (especially medium and large) that needs multiple processes to interact effectively.To deal with such concerns and pave the way to achievement of more effective collaborative goals in business, the concept of interoperability has been adopted to measure the efficiency and productivity of information systems’ integration. More than twenty approaches have so far been adopted to evaluate this interoperability, however most are unable to assess it at the higher levels, such as at the pragmatic, process and social levels. Hence, we have conducted a three-phase study. Phase 1 reviewed existing interoperability evaluation approaches. To prove the concept, phase 2 proposed the concept of semiotic interoperability and its application to healthcare information systems. This article reports on the third phase of the study, a proposed framework with a group of metrics to measure interoperability from a new perspective – a semiotics perspective. The framework is named the Semiotic Interoperability Evaluation Framework (the SIEF) and has the ability to analyse, measure and assess the interoperability among business processes. The metrics derive from a feasibility study to investigate several interoperability barriers at a hospital. Next, the SIEF was applied in a case study and a detailed interoperability evaluation was conducted.  相似文献   

18.
Nussbaum’s version of the capability approach is not only a helpful approach to development problems but can also be employed as a general ethical-anthropological framework in ‘advanced’ societies. This paper explores its normative force for evaluating information technologies, with a particular focus on the issue of human enhancement. It suggests that the capability approach can be a useful way of to specify a workable and adequate level of analysis in human enhancement discussions, but argues that any interpretation of what these capabilities mean is itself dependent on (interpretations of) the techno-human practices under discussion. This challenges the capability approach’s means-end dualism concerning the relation between on the one hand technology and on the other hand humans and capabilities. It is argued that instead of facing a choice between development and enhancement, we better reflect on how we want to shape human-technological practices, for instance by using the language of capabilities. For this purpose, we have to engage in a cumbersome hermeneutics that interprets dynamic relations between unstable capabilities, technologies, practices, and values. This requires us to modify the capability approach by highlighting and interpreting its interpretative dimension.  相似文献   

19.
Organizations struggle to comply with legal requirements as well as customers’ calls for better data protection. On the implementation level, incorporation of privacy protections in products and services depends on the commitment of the engineers who design them. We interviewed six senior engineers, who work for globally leading IT corporations and research institutions, to investigate their motivation and ability to comply with privacy regulations. Our findings point to a lack of perceived responsibility, control, autonomy, and frustrations with interactions with the legal world. While we increasingly call on engineers to go beyond functional requirements and be responsive to human values in our increasingly technological society, we may be facing the dilemma of asking engineers to live up to a challenge they are currently not ready to embrace.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号