共查询到20条相似文献,搜索用时 406 毫秒
1.
Michael Nagenborg 《Ethics and Information Technology》2009,11(3):175-179
J. van den Hoven suggested to analyse privacy from the perspective of informational justice, whereby he referred to the concept
of distributive justice presented by M. Walzer in “Spheres of Justice”. In “privacy as contextual integrity” Helen Nissenbaum did also point to Walzer’s approach of complex equality as well to
van den Hoven’s concept. In this article I will analyse the challenges of applying Walzer’s concept to issues of informational
privacy. I will also discuss the possibilities of framing privacy from the point of the “art of separation” by looking at
the intersection of information infrastructures and institutions. 相似文献
2.
Norman Mooradian 《Ethics and Information Technology》2009,11(3):163-174
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy
is important in relation to mundane personal information and situations. According to the theory, privacy is important because
it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating
and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would
diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what
I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite
its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted
by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount
of personal information collected. Further, recent developments in computing falling under the heading of social computing
have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’
information privacy theory in light of these developments. I will argue that the increasing collection of personal data will
not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to
Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information
privacy theory will continue to be relevant. 相似文献
3.
Rachel Batchelor Ania Bobrowicz Robin Mackenzie Alisoun Milne 《Ethics and Information Technology》2012,14(2):99-108
Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia
to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised
decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making
capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent
to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms,
and management of digital identities and footprints. SNS uses in healthcare raise additional issues. Online materials acting
as archives of ‘the self’ bolster present and future identities for users with compromised capacity. E-health involves actual
and potential intersection of data gathered for the purpose of delivering health technological support with data used for
social networking purposes. Ethicolegal guidance is limited on the implications of SNS usage in contexts where users have
impaired/reduced capacity to understand and/or consent to sharing personal data about their health, medication or location.
Vulnerable adults and family/carers face uncertainty in regard to consent, data protection, online identity and legal liabilities.
Ethicolegal responsibilities and duties of care of technology providers, healthcare professionals, regulatory bodies and policymakers
need clarification. 相似文献
4.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed
to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios
or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing,
wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards
and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information
technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to
surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of
VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and
threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental
stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions
can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but
without compromising the value of one’s privacy in public.
This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed
without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I
am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including
Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts
were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department
of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology,
and Computer Ethics: Philosophical Enquiry. 相似文献
5.
《International Journal of Information Management》2014,34(6):761-769
The only way to be aware of the risks and threats of Facebook, the most commonly used social networking site in the world and Turkey, is to be a careful user changing the default settings or simply not to have a Facebook account. In Turkey, there is still no study in which personal information shared though social networking sites has been evaluated in terms of privacy. For this reason, the findings obtained of this study have a great importance in the general picture of the current situation and drawing attention to the risks of the issue in Turkey where there are no legal arrangements effectively protecting the users from such sites. This study aims to investigate the Facebook privacy of information professionals who are members of KUTUP-L, and to determine the sensitivity and level of awareness of information professionals in Turkey. Facebook user profiles of 400 information professionals, all KUTUP-L members, have been analyzed in a study examining 32 different privacy settings. A privacy score has been calculated for each user, and the relations between privacy results have been analyzed. The findings at the end of the study show that information professionals in Turkey do pay attention to privacy, and most of the users change the default settings in order to protect their personal information. 相似文献
6.
Knut H. Rolland 《Ethics and Information Technology》2006,8(3):143-154
International companies expanding and competing in an increasingly global context are currently discovering the necessity of sharing knowledge across geographical and disciplinary borders. Yet, especially in such contexts, sharing knowledge is inherently complex and problematic in practice. Inspired by recent contributions in science studies, this paper argues that knowledge sharing in a global context must take into account the heterogeneous and locally embedded nature of knowledge. In this perspective, knowledge cannot easily be received through advanced information technologies, but must always be achieved in practice. Empirically, this paper draws from two contrasting initiatives in a major international oil and gas company for improving its current ways of sharing knowledge between geographically distributed sites and disciplines involved in well planning and drilling. The contrasting cases reveal that while a shared database system failed to improve knowledge sharing across contexts, a flexible arrangement supporting collaboration and use of different representation of knowledge was surprisingly successful. Based on these findings the paper underscores and conceptualizes various triangulating practices conducted in order to achieve knowledge across borders. More accurately these practices are central for individuals’ and communities’ abilities to: (i) negotiate ambiguous information, (ii) filter, combine, and integrate various heterogeneous sources of information, and (iii) judge the trustworthiness of information. Concerning the design and use of information technologies this implies that new designs need to facilitate triangulating practices of users rather than just providing advanced platforms (“digital junkyards”) for sharing information. 相似文献
7.
Emilio Mordini David Wright Kush Wadhwa Paul De Hert Eugenio Mantovani Jesper Thestrup Guido Van Steendam Antonio D’Amico Ira Vater 《Ethics and Information Technology》2009,11(3):203-220
The ageing society poses significant challenges to Europe’s economy and society. In coming to grips with these issues, we
must be aware of their ethical dimensions. Values are the heart of the European Union, as Article 1a of the Lisbon Treaty
makes clear: “The Union is founded on the values of respect for human dignity…”. The notion of Europe as a community of values
has various important implications, including the development of inclusion policies. A special case of exclusion concerns
the gap between those people with effective access to digital and information technology and those without access to it, the
“digital divide”, which in Europe is chiefly age-related. Policies to overcome the digital divide and, more generally speaking,
e-inclusion policies addressing the ageing population raise some ethical problems. Among younger senior citizens, say those
between 65 and 80 years old, the main issues are likely to be universal access to ICT and e-participation. Among the older
senior citizens, say those more than 80 years old, the main issues are mental and physical deterioration and assistive technology.
An approach geared towards the protection of human rights could match the different needs of senior citizens and provide concrete
guidance to evaluate information technologies for them. 相似文献
8.
Jeroen van den Hoven 《Ethics and Information Technology》2005,7(2):51-59
It is argued that Pettit’s conception of “contestatory democracy” is superior to deliberative, direct and epistemic democracy.
The strong and weak points of these conceptions are discussed drawing upon the work of a.o Bruce Bimber. It is further argued
that ‘contestation’ and ‘information’ are highly relevant notions in thinking about, just, viable and sustainable design for
E-democracy.
*A version of this paper was presented at Ethicomp 2002, Lisbon. 相似文献
9.
Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine? 总被引:1,自引:1,他引:1
This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans
can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced
through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with
tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to a computer database.
In the UK, the issues that these cases raise have resulted in legislation designed to protect children which allows for the
creation of a huge database for children. Paradoxically, we have the situation where we failed to use digital data in enforcing
the law to protect children, yet we may now rely heavily on digital technologies to care for children. I draw on the work
of Floridi, Sanders, Collins, Kusch, Latour and Akrich, a spectrum of work stretching from philosophy to sociology of technology
and the “seamless web” or “actor–network” approach to studies of technology. Intentionality is considered, but not deemed
necessary for meaningful moral behaviour. Floridi’s and Sanders’ concept of “distributed morality” accords with the network
of agency characterized by actor–network approaches. The paper concludes that enfranchizing non-humans, in the shape of computer
databases of personal data, as moral agents is not necessarily problematic but a balance of delegation of morality must be
made between human and non-human actors. 相似文献
10.
Tadashi Takenouchi 《Ethics and Information Technology》2006,8(4):187-193
To overcome “digital reductionism,” a new kind of mechanical view on human beings, fundamental informatics provides some critical viewpoints. It regards information as “meaning” generated in living things which do not exist alone but are parts of ecological system. On the other hand, V. E. Frankl proposed two dimensions of humans: homo sapiens and homo patiens. The latter is the essential aspect of humans whose essence is “compassion,” while the former is the nature like a mechanical machine. As features of living things, unrestricted ability of interpretation as well as inseparable relationships between others underlies both in Frankl’s thought and fundamental informatics. This viewpoint can be applied to the concept of “information literacy.” 相似文献
11.
The findings of our experiments showed that social network sites (SNSs) such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her contextual integrity framework in order to answer the question of whether or not an online user’s privacy is being violated by this practice. 相似文献
12.
Lorian Leong 《The Information Society》2020,36(2):97-108
AbstractThis exploratory study investigates the encounters and everyday experiences with the Facebook algorithm of 18 informants in Yangon, Myanmar. It draws on domestication theory and research on algorithms to understand how users come to use and respond to Facebook. Findings showed that their particular perception of Facebook algorithm—Friends funnel information—informs their domestication process, wherein they add strangers as Friends to draw more information flows to their News Feeds. 相似文献
13.
Corporate dynamic transparency: the new ICT-driven ethics? 总被引:1,自引:1,他引:0
The term “corporate transparency” is frequently used in scholarly discussions of business ethics and corporate social responsibility
(CSR); however, it remains a volatile and imprecise term, often defined incompletely as “information disclosure” accomplished
through standardized reporting. Based on the results of empirical studies of organizational behaviors, this paper identifies
a new set of managerial practices based on the use of information and communication technologies (ICT) and particularly Internet-based
tools. These practices are resulting in what can be termed “dynamic transparency.” ICT allows for an informational environment
characterized by two-way exchange between corporations and their stakeholders, which fosters a more collaborative marketplace.
It is proposed that such dynamic information sharing, conducted by means of ICT, drives organizations to display greater openness
and accountability, and more transparent operations, which benefit both the corporations and their constituents. One of the
most important outcomes that will accrue to consumers and other individuals is the “right to know,” especially about corporate
strategies and activities that might directly affect their quality of life. This paper demonstrates that dynamic transparency
is more desirable and more effective than the more common “static transparency” where firms’ information disclosure is one-way,
usually in response to government regulation. We present three ethical arguments to justify the implementation by business
firms of dynamic transparency and demonstrate that their doing so is related to CSR and to augment and complement stakeholder
engagement and dialogue. The paper concludes with a summary of the possible limits to and the problems involved in the implementation
of dynamic transparency for corporations, and suggests some strategies to counter them. 相似文献
14.
Dara J. Glasser Kenneth W. Goodman Norman G. Einspruch 《Ethics and Information Technology》2007,9(2):101-109
Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to
gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises
a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges
related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention
of identifying the technology’s benefits and possible misuses. We offer an overview and discussion of the most important ethical
issues concerning RFID, and describes and examine some methods of protecting privacy.
Norman G. Einspruch serves as a consultant to several high-technology companies, one of which is in the RFID components and
systems business. 相似文献
15.
This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology.
As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses
across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’
privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some
of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current
attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that
each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this
framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information
Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural
justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual
beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context
of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries
of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing
a greater understanding of how privacy issues can be addressed with RFID technology. 相似文献
16.
Locke,Intellectual Property Rights,and the Information Commons 总被引:1,自引:0,他引:1
This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the
current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections,
Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property.
In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and
digital information. In Section 3, it is argued that even if the labor analogy breaks down, we should not necessarily infer
that Locke’s theory has no relevance for the contemporary debate involving IPRs and the information commons. Alternatively,
I argue that much of what Locke has to say about the kinds of considerations that ought to be accorded to the physical commons
when appropriating objects from it – especially his proviso requiring that “enough and as good” be left for others – can also be applied to appropriations involving the information
commons. Based on my reading of Locke’s proviso, I further argue that Locke would presume in favor of the information commons
when competing interests (involving the rights of individual appropriators and the preservation of the commons) are at stake.
In this sense, I believe that Locke offers us an adjudicative principle for evaluating the claims advanced by rival interests
in the contemporary debate about IPRs and the information commons. In Section 4, I apply Locke’s proviso in my analysis of
two recent copyright laws: the Copyright Term Extension Act (CTEA), and the Digital Millennium Copyright Act (DMCA). I then
argue that both laws violate the spirit of Locke’s proviso because they unfairly restrict the access that ordinary individuals
have previously had to resources that comprise the information commons. Noting that Locke would not altogether reject copyright
protection for IPRs, I conclude that Locke’s classic property theory provides a useful mechanism for adjudicating between
claims about how best to ensure that individuals will be able to continue to access information in digitized form, while at
the same time also allowing for that information to enjoy some form of legal protection. 相似文献
17.
In this study, a 20-item questionnaire was used to elicit undergraduates’ (N = 93) ethical judgment and behavioral intention regarding a number of behaviors involving computers and internet usage. Machiavellianism
was found to be uncorrelated with both ethical judgment and behavioral intention. Gender was found to be negatively correlated
with both ethical judgment and behavioral intention, such that females judged the behaviors as being less ethical than males,
and were less likely to engage in the behaviors than males. A disconnect was found between ethical judgment and behavioral
intention, for both males and females, such that the ethical judgment mean for a number of issues was significantly lower
(towards the “unethical” end of the continuum) than the behavioral intention mean (towards the “more likely to engage in”
end of the continuum). The study raises questions regarding ethical awareness of technology-related issues, and the authors
make suggestions for future research. 相似文献
18.
Abuse of information entrusted to organizations can result in a variety of privacy violations and trust concerns for consumers. In the event of violations, a social media brand or organization renders an apology – a form of social account – to alleviate users’ concerns and maintain user membership and engagement with the platform. To explore the link between apology offered by a social media brand or organization and the users’ trust dynamics in the brand’s services, we study how organizational integrity can contribute to reducing individuals’ privacy concerns whiles increasing or repairing their trust. Drawing on organizational behavioral integrity literature, our proposed research model suggests that the persuasiveness of an apology following a data breach affects users’ trust or spillover trust through their perceptions of the degree of alignment between the words in the apology and the actions of the violating entity. Based on a survey of Facebook users, our findings show that persuasiveness of an apology has a significant impact on users’ perceptions of the alignment between the social media brand’s (i.e. Facebook) words and subsequent actions. These perceptions impact social media brand trust (i.e. users’ trust in Facebook and allied services such as Instagram). We also find that, post data breach incidence, while integrity of the social media organization partially mediates the relationship between persuasive apology and users’ trust, it fully mediates the relationship between the persuasive apology and the privacy concerns expressed by the users. However, users’ privacy concerns do not contribute much to the repair of trust needed to maintain their membership. 相似文献
19.
Kirsten Martin 《Ethics and Information Technology》2012,14(4):267-284
Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and the mechanisms by which such a variance is produced will help organizations make such transitions. This paper examines whether and how privacy expectations change based on the technological platform of an information exchange. The results suggest that privacy expectations are significantly distinct when the information exchange is located on a novel technology as compared to a more established technology. Furthermore, this difference is best explained when modeled by a shift in privacy expectations rather than fully technology-specific privacy norms. These results suggest that privacy expectations online are connected to privacy offline with a different base privacy expectation. Surprisingly, out of the five locations tested, respondents consistently assign information on email the greatest privacy protection. In addition, while undergraduate students differ from non-undergraduates when assessing a social networking site, no difference is found when judging an exchange on email. In sum, the findings suggest that novel technology may introduce temporary conceptual muddles rather than permanent privacy vacuums. The results reported here challenge conventional views about how privacy expectations differ online versus offline. Traditionally, management scholarship examines privacy online or with a specific new technology platform in isolation and without reference to the same information exchange offline. However, in the present study, individuals appear to have a shift in their privacy expectations but retain similar factors and their relative importance??the privacy equation by which they form judgments??across technologies. These findings suggest that privacy scholarship should make use of existing privacy norms within contexts when analyzing and studying privacy in a new technological platform. 相似文献