首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Corporate dynamic transparency: the new ICT-driven ethics?   总被引:1,自引:1,他引:0  
The term “corporate transparency” is frequently used in scholarly discussions of business ethics and corporate social responsibility (CSR); however, it remains a volatile and imprecise term, often defined incompletely as “information disclosure” accomplished through standardized reporting. Based on the results of empirical studies of organizational behaviors, this paper identifies a new set of managerial practices based on the use of information and communication technologies (ICT) and particularly Internet-based tools. These practices are resulting in what can be termed “dynamic transparency.” ICT allows for an informational environment characterized by two-way exchange between corporations and their stakeholders, which fosters a more collaborative marketplace. It is proposed that such dynamic information sharing, conducted by means of ICT, drives organizations to display greater openness and accountability, and more transparent operations, which benefit both the corporations and their constituents. One of the most important outcomes that will accrue to consumers and other individuals is the “right to know,” especially about corporate strategies and activities that might directly affect their quality of life. This paper demonstrates that dynamic transparency is more desirable and more effective than the more common “static transparency” where firms’ information disclosure is one-way, usually in response to government regulation. We present three ethical arguments to justify the implementation by business firms of dynamic transparency and demonstrate that their doing so is related to CSR and to augment and complement stakeholder engagement and dialogue. The paper concludes with a summary of the possible limits to and the problems involved in the implementation of dynamic transparency for corporations, and suggests some strategies to counter them.  相似文献   

2.
Artificial Life (ALife) has two goals. One attempts to describe fundamental qualities of living systems through agent based computer models. And the second studies whether or not we can artificially create living things in computational mediums that can be realized either, virtually in software, or through biotechnology. The study of ALife has recently branched into two further subdivisions, one is “dry” ALife, which is the study of living systems “in silico” through the use of computer simulations, and the other is “wet” ALife that uses biological material to realize what has only been simulated on computers, effectively wet ALife uses biological material as a kind of computer. This is challenging to the field of computer ethics as it points towards a future in which computer and bioethics might have shared concerns. The emerging studies into wet ALife are likely to provide strong empirical evidence for ALife’s most challenging hypothesis: that life is a certain set of computable functions that can be duplicated in any medium. I believe this will propel ALife into the midst of the mother of all cultural battles that has been gathering around the emergence of biotechnology. Philosophers need to pay close attention to this debate and can serve a vital role in clarifying and resolving the dispute. But even if ALife is merely a computer modeling technique that sheds light on living systems, it still has a number of significant ethical implications such as its use in the modeling of moral and ethical systems, as well as in the creation of artificial moral agents.  相似文献   

3.
It is argued that Pettit’s conception of “contestatory democracy” is superior to deliberative, direct and epistemic democracy. The strong and weak points of these conceptions are discussed drawing upon the work of a.o Bruce Bimber. It is further argued that ‘contestation’ and ‘information’ are highly relevant notions in thinking about, just, viable and sustainable design for E-democracy. *A version of this paper was presented at Ethicomp 2002, Lisbon.  相似文献   

4.
In this study, a 20-item questionnaire was used to elicit undergraduates’ (N = 93) ethical judgment and behavioral intention regarding a number of behaviors involving computers and internet usage. Machiavellianism was found to be uncorrelated with both ethical judgment and behavioral intention. Gender was found to be negatively correlated with both ethical judgment and behavioral intention, such that females judged the behaviors as being less ethical than males, and were less likely to engage in the behaviors than males. A disconnect was found between ethical judgment and behavioral intention, for both males and females, such that the ethical judgment mean for a number of issues was significantly lower (towards the “unethical” end of the continuum) than the behavioral intention mean (towards the “more likely to engage in” end of the continuum). The study raises questions regarding ethical awareness of technology-related issues, and the authors make suggestions for future research.  相似文献   

5.
The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions. Currently, however, different practices being put in place in order to enhance the protection of individuals appear to deliberately rely on the use of ‘inaccurate’ personal information. This article explores such practices and tries to assess their potential for privacy protection, giving particular attention to their legal implications and to related ethical issues. Ultimately, it suggests that the use of ‘inaccurate’ data can potentially play a useful role to preserve the informational autonomy of the individual, and that any understandings of privacy or personal data protection that would tend to unduly limit such potential should be critically questioned.  相似文献   

6.
The “free” in “free software” refers to a cluster of four specific freedoms identified by the Free Software Definition. The first freedom, termed “Freedom Zero,” intends to protect the right of the user to deploy software in whatever fashion, towards whatever end, he or she sees fit. But software may be used to achieve ethically questionable ends. This highlights a tension in the provision of software freedoms: while the definition explicitly forbids direct restrictions on users’ freedoms, it does not address other means by which software may indirectly restrict freedoms. In particular, ethically-inflected debate has featured prominently in the discussion of restrictions on digital rights management and privacy-violating code in version 3 of the GPL (GPLv3). The discussion of this proposed language revealed the spectrum of ethical positions and valuations held by members of the free software community. In our analysis, we will provide arguments for upholding Freedom Zero; we embed the problem of possible uses of software in the broader context of the uses of scientific knowledge, and go on to argue that the provision of Freedom Zero mitigates against too great a moral burden—of anticipating possible uses of software—being placed on the programmer and that, most importantly, it facilitates deliberative discourse in the free software community.  相似文献   

7.
The ageing society poses significant challenges to Europe’s economy and society. In coming to grips with these issues, we must be aware of their ethical dimensions. Values are the heart of the European Union, as Article 1a of the Lisbon Treaty makes clear: “The Union is founded on the values of respect for human dignity…”. The notion of Europe as a community of values has various important implications, including the development of inclusion policies. A special case of exclusion concerns the gap between those people with effective access to digital and information technology and those without access to it, the “digital divide”, which in Europe is chiefly age-related. Policies to overcome the digital divide and, more generally speaking, e-inclusion policies addressing the ageing population raise some ethical problems. Among younger senior citizens, say those between 65 and 80 years old, the main issues are likely to be universal access to ICT and e-participation. Among the older senior citizens, say those more than 80 years old, the main issues are mental and physical deterioration and assistive technology. An approach geared towards the protection of human rights could match the different needs of senior citizens and provide concrete guidance to evaluate information technologies for them.  相似文献   

8.
To overcome “digital reductionism,” a new kind of mechanical view on human beings, fundamental informatics provides some critical viewpoints. It regards information as “meaning” generated in living things which do not exist alone but are parts of ecological system. On the other hand, V. E. Frankl proposed two dimensions of humans: homo sapiens and homo patiens. The latter is the essential aspect of humans whose essence is “compassion,” while the former is the nature like a mechanical machine. As features of living things, unrestricted ability of interpretation as well as inseparable relationships between others underlies both in Frankl’s thought and fundamental informatics. This viewpoint can be applied to the concept of “information literacy.”  相似文献   

9.
This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues, within the transparency practices of nongovernmental organizations (NGOs). Based upon a one-year study of a European NGO, the Italian Association of Blind People, it presents compelling empirical evidence concerning the main ethical, social and economic challenges that NGOs face in the development of more transparent relationships with the public and the related role of ICTs, in particular, the organization’s website. This study shows that, although the attempt to be completely transparent has great ethical value, ICT-enabled information disclosure is limited by privacy and security concerns and by pressure from financial supporters and benefactors and potential NGO competitors who vie for grants and donations. The paper provides some implications and suggestions for managers of NGOs and policy makers.  相似文献   

10.
How should the policies of search engines and other information intermediaries be ethically evaluated? It is argued that Kant’s principles for the public use of reason are useful starting points for the formulation of criteria for such an evaluation. The suggestion is, furthermore, that a search engine can be seen to provide a testimony to the user concerning what information that is most relevant to her query. This suggestion is used as the basis for the development of a broadly Kantian account of a rational searcher. It is argued that the search engine companies are morally required to publish their information policies and act in accordance with them but given the threat of search engine spam they can have no obligation to publish the details of their algorithms.  相似文献   

11.
12.
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount of personal information collected. Further, recent developments in computing falling under the heading of social computing have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’ information privacy theory in light of these developments. I will argue that the increasing collection of personal data will not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information privacy theory will continue to be relevant.  相似文献   

13.
Beginning with the initial premise that as the Internet has a global character, the paper will argue that the normative evaluation of digital information on the Internet necessitates an evaluative model that is itself universal and global in character (I agree, therefore, with Gorniak- Kocikowska’s claim that because of its global nature “computer ethics has to be regarded as global ethics”. (Gorniak-Kocikowska, Science and Engineering Ethics, 1996). The paper will show that information has a dual normative structure that commits all disseminators of information to both epistemological and ethical norms that are in principle universal and thus global in application. Based on this dual normative characterization of information the paper will seek to demonstrate: (1) that information and internet information (interformation) specifically, as a process and product of communication, has an inherent normative structure that commits its producers, disseminators, communicators and users, everyone in fact that deals with information, to certain mandatory epistemological and ethical commitments; and (2) that the negligent or purposeful abuse of information in violation of the epistemological and ethical commitments to which its inherent normative structure gives rise is also a violation of universal rights to freedom and wellbeing to which all agents are entitled by virtue of being agents, and in particular informational agents.  相似文献   

14.
In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This legal question has both an ontological and a moral component. The question whether or not virtual items count as “objects” that can be “stolen” is an ontological question. The question whether or not they should count as such under criminal law is of a moral nature. The purpose of this paper is to answer both the ontological question and the moral question underlying the legal question.  相似文献   

15.
In recent years, organizations have made significant IT investments, including digital transformation programs, with the aim of enhancing the quality and delivery of services, and creating greater value for stakeholders. However, deriving value from IT investments and digital transformation necessitates, among other factors, a solid mastery of the IT function. In light of this, IT Service Management (ITSM) has emerged as a crucial and widely implemented approach to managing an organization's IT function, with the goal of achieving both operational and strategic benefits. Yet, despite its wide adoption, this approach has been undertheorized by academics, and there is limited understanding of the impacts that ITSM can generate for organizations as well as the mechanisms through which these impacts are achieved. In order to address this problem, this paper performs a systematic literature review examining research published on ITSM between 2012 and 2021 in order to understand what has occurred rather than what could or should be expected. Based on the findings, the paper advances that ITSM should be considered a Management Control System that includes a variety of control practices to achieve greater performance, transparency, and customer-focus within the IT function. It is also argued that these outcomes in turn increase client satisfaction and business/IT alignment. A model of the organizational impacts of ITSM is developed and ITSM is suggested as a subject for further, richer research into IS controls.  相似文献   

16.
Nussbaum’s version of the capability approach is not only a helpful approach to development problems but can also be employed as a general ethical-anthropological framework in ‘advanced’ societies. This paper explores its normative force for evaluating information technologies, with a particular focus on the issue of human enhancement. It suggests that the capability approach can be a useful way of to specify a workable and adequate level of analysis in human enhancement discussions, but argues that any interpretation of what these capabilities mean is itself dependent on (interpretations of) the techno-human practices under discussion. This challenges the capability approach’s means-end dualism concerning the relation between on the one hand technology and on the other hand humans and capabilities. It is argued that instead of facing a choice between development and enhancement, we better reflect on how we want to shape human-technological practices, for instance by using the language of capabilities. For this purpose, we have to engage in a cumbersome hermeneutics that interprets dynamic relations between unstable capabilities, technologies, practices, and values. This requires us to modify the capability approach by highlighting and interpreting its interpretative dimension.  相似文献   

17.
Locke,Intellectual Property Rights,and the Information Commons   总被引:1,自引:0,他引:1  
This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections, Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property. In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and digital information. In Section 3, it is argued that even if the labor analogy breaks down, we should not necessarily infer that Locke’s theory has no relevance for the contemporary debate involving IPRs and the information commons. Alternatively, I argue that much of what Locke has to say about the kinds of considerations that ought to be accorded to the physical commons when appropriating objects from it – especially his proviso requiring that “enough and as good” be left for others – can also be applied to appropriations involving the information commons. Based on my reading of Locke’s proviso, I further argue that Locke would presume in favor of the information commons when competing interests (involving the rights of individual appropriators and the preservation of the commons) are at stake. In this sense, I believe that Locke offers us an adjudicative principle for evaluating the claims advanced by rival interests in the contemporary debate about IPRs and the information commons. In Section 4, I apply Locke’s proviso in my analysis of two recent copyright laws: the Copyright Term Extension Act (CTEA), and the Digital Millennium Copyright Act (DMCA). I then argue that both laws violate the spirit of Locke’s proviso because they unfairly restrict the access that ordinary individuals have previously had to resources that comprise the information commons. Noting that Locke would not altogether reject copyright protection for IPRs, I conclude that Locke’s classic property theory provides a useful mechanism for adjudicating between claims about how best to ensure that individuals will be able to continue to access information in digitized form, while at the same time also allowing for that information to enjoy some form of legal protection.  相似文献   

18.
In this paper we discuss expected and reported effects on care provider-patient relations of the introduction of electronic patient records (EPRs) in consultation settings by reviewing exemplary studies and literature on the subject from the past decade. We argue that in order for such assessments to be meaningful, talk of effects of “the” EPR needs to be replaced by an “unpacking” of EPR systems into their constituent parts and functionalities, the effects of which need to be assessed individually. Following from this principle, the paper discusses EPR systems ranging from simple data entry and retrieval systems to more sophisticated multi-user and multifunctional on-line systems. On a second level, our analysis of the literature is informed by the question which model of ideal patienthood underlies the assessment of effects of EPRs. To this end, we identify three “models of patienthood” implicit in writing about benefits and drawbacks of EPRs for patients: the autonomy, the consumer, and the holistic models, and argue that assumptions concerning these models need to be reflected upon more critically to improve understanding of what exactly EPR use does to the doctor-patient relationship.  相似文献   

19.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies we identify two areas where social factors compel software developers to drift away from a global set of rules constituting software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish its vulnerability.  相似文献   

20.
It is a truism that the design and deployment of information and communication technologies is vital to everyday life, the conduct of work and to social order. But how are individual, organisational and societal choices made? What might it mean to invoke a politics and an ethics of information technology design and use? This editorial paper situates these questions within the trajectory of preoccupations and approaches to the design and deployment of information technology since computerisation began in the 1940s. Focusing upon the dominant concerns over the last three decades, the paper delineates an interest in design and use in relation to socio-technical theories, situated practices and actor-network theory. It is argued that each of these approaches is concerned with a particular form of politics that does not explicitly engage with ethics. In order to introduce ethics into contemporary debates about information technology, and to frame the papers in the special issue, it is argued that Levinas’ ethics is particularly valuable in problematising the relationship between politics and ethics. Levinas provides a critique of modernity’s emphasis on politics and the egocentric self. It is from a Levinasian concern with the Other and the primacy of the ethical that a general rethinking of the relationship between politics, ethics and justice in relation to information and communication technologies can be invoked.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号