共查询到20条相似文献,搜索用时 31 毫秒
1.
Corporate dynamic transparency: the new ICT-driven ethics? 总被引:1,自引:1,他引:0
The term “corporate transparency” is frequently used in scholarly discussions of business ethics and corporate social responsibility
(CSR); however, it remains a volatile and imprecise term, often defined incompletely as “information disclosure” accomplished
through standardized reporting. Based on the results of empirical studies of organizational behaviors, this paper identifies
a new set of managerial practices based on the use of information and communication technologies (ICT) and particularly Internet-based
tools. These practices are resulting in what can be termed “dynamic transparency.” ICT allows for an informational environment
characterized by two-way exchange between corporations and their stakeholders, which fosters a more collaborative marketplace.
It is proposed that such dynamic information sharing, conducted by means of ICT, drives organizations to display greater openness
and accountability, and more transparent operations, which benefit both the corporations and their constituents. One of the
most important outcomes that will accrue to consumers and other individuals is the “right to know,” especially about corporate
strategies and activities that might directly affect their quality of life. This paper demonstrates that dynamic transparency
is more desirable and more effective than the more common “static transparency” where firms’ information disclosure is one-way,
usually in response to government regulation. We present three ethical arguments to justify the implementation by business
firms of dynamic transparency and demonstrate that their doing so is related to CSR and to augment and complement stakeholder
engagement and dialogue. The paper concludes with a summary of the possible limits to and the problems involved in the implementation
of dynamic transparency for corporations, and suggests some strategies to counter them. 相似文献
2.
Artificial Life (ALife) has two goals. One attempts to describe fundamental qualities of living systems through agent based
computer models. And the second studies whether or not we can artificially create living things in computational mediums that
can be realized either, virtually in software, or through biotechnology. The study of ALife has recently branched into two
further subdivisions, one is “dry” ALife, which is the study of living systems “in silico” through the use of computer simulations,
and the other is “wet” ALife that uses biological material to realize what has only been simulated on computers, effectively
wet ALife uses biological material as a kind of computer. This is challenging to the field of computer ethics as it points
towards a future in which computer and bioethics might have shared concerns. The emerging studies into wet ALife are likely
to provide strong empirical evidence for ALife’s most challenging hypothesis: that life is a certain set of computable functions
that can be duplicated in any medium. I believe this will propel ALife into the midst of the mother of all cultural battles
that has been gathering around the emergence of biotechnology. Philosophers need to pay close attention to this debate and
can serve a vital role in clarifying and resolving the dispute. But even if ALife is merely a computer modeling technique
that sheds light on living systems, it still has a number of significant ethical implications such as its use in the modeling
of moral and ethical systems, as well as in the creation of artificial moral agents. 相似文献
3.
Jeroen van den Hoven 《Ethics and Information Technology》2005,7(2):51-59
It is argued that Pettit’s conception of “contestatory democracy” is superior to deliberative, direct and epistemic democracy.
The strong and weak points of these conceptions are discussed drawing upon the work of a.o Bruce Bimber. It is further argued
that ‘contestation’ and ‘information’ are highly relevant notions in thinking about, just, viable and sustainable design for
E-democracy.
*A version of this paper was presented at Ethicomp 2002, Lisbon. 相似文献
4.
In this study, a 20-item questionnaire was used to elicit undergraduates’ (N = 93) ethical judgment and behavioral intention regarding a number of behaviors involving computers and internet usage. Machiavellianism
was found to be uncorrelated with both ethical judgment and behavioral intention. Gender was found to be negatively correlated
with both ethical judgment and behavioral intention, such that females judged the behaviors as being less ethical than males,
and were less likely to engage in the behaviors than males. A disconnect was found between ethical judgment and behavioral
intention, for both males and females, such that the ethical judgment mean for a number of issues was significantly lower
(towards the “unethical” end of the continuum) than the behavioral intention mean (towards the “more likely to engage in”
end of the continuum). The study raises questions regarding ethical awareness of technology-related issues, and the authors
make suggestions for future research. 相似文献
5.
Gloria González Fuster 《Ethics and Information Technology》2010,12(1):87-95
The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing
personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions.
Currently, however, different practices being put in place in order to enhance the protection of individuals appear to deliberately
rely on the use of ‘inaccurate’ personal information. This article explores such practices and tries to assess their potential
for privacy protection, giving particular attention to their legal implications and to related ethical issues. Ultimately,
it suggests that the use of ‘inaccurate’ data can potentially play a useful role to preserve the informational autonomy of
the individual, and that any understandings of privacy or personal data protection that would tend to unduly limit such potential
should be critically questioned. 相似文献
6.
The “free” in “free software” refers to a cluster of four specific freedoms identified by the Free Software Definition. The
first freedom, termed “Freedom Zero,” intends to protect the right of the user to deploy software in whatever fashion, towards
whatever end, he or she sees fit. But software may be used to achieve ethically questionable ends. This highlights a tension
in the provision of software freedoms: while the definition explicitly forbids direct restrictions on users’ freedoms, it
does not address other means by which software may indirectly restrict freedoms. In particular, ethically-inflected debate
has featured prominently in the discussion of restrictions on digital rights management and privacy-violating code in version
3 of the GPL (GPLv3). The discussion of this proposed language revealed the spectrum of ethical positions and valuations held
by members of the free software community. In our analysis, we will provide arguments for upholding Freedom Zero; we embed
the problem of possible uses of software in the broader context of the uses of scientific knowledge, and go on to argue that
the provision of Freedom Zero mitigates against too great a moral burden—of anticipating possible uses of software—being placed
on the programmer and that, most importantly, it facilitates deliberative discourse in the free software community. 相似文献
7.
Emilio Mordini David Wright Kush Wadhwa Paul De Hert Eugenio Mantovani Jesper Thestrup Guido Van Steendam Antonio D’Amico Ira Vater 《Ethics and Information Technology》2009,11(3):203-220
The ageing society poses significant challenges to Europe’s economy and society. In coming to grips with these issues, we
must be aware of their ethical dimensions. Values are the heart of the European Union, as Article 1a of the Lisbon Treaty
makes clear: “The Union is founded on the values of respect for human dignity…”. The notion of Europe as a community of values
has various important implications, including the development of inclusion policies. A special case of exclusion concerns
the gap between those people with effective access to digital and information technology and those without access to it, the
“digital divide”, which in Europe is chiefly age-related. Policies to overcome the digital divide and, more generally speaking,
e-inclusion policies addressing the ageing population raise some ethical problems. Among younger senior citizens, say those
between 65 and 80 years old, the main issues are likely to be universal access to ICT and e-participation. Among the older
senior citizens, say those more than 80 years old, the main issues are mental and physical deterioration and assistive technology.
An approach geared towards the protection of human rights could match the different needs of senior citizens and provide concrete
guidance to evaluate information technologies for them. 相似文献
8.
Tadashi Takenouchi 《Ethics and Information Technology》2006,8(4):187-193
To overcome “digital reductionism,” a new kind of mechanical view on human beings, fundamental informatics provides some critical viewpoints. It regards information as “meaning” generated in living things which do not exist alone but are parts of ecological system. On the other hand, V. E. Frankl proposed two dimensions of humans: homo sapiens and homo patiens. The latter is the essential aspect of humans whose essence is “compassion,” while the former is the nature like a mechanical machine. As features of living things, unrestricted ability of interpretation as well as inseparable relationships between others underlies both in Frankl’s thought and fundamental informatics. This viewpoint can be applied to the concept of “information literacy.” 相似文献
9.
This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical
issues, within the transparency practices of nongovernmental organizations (NGOs). Based upon a one-year study of a European
NGO, the Italian Association of Blind People, it presents compelling empirical evidence concerning the main ethical, social
and economic challenges that NGOs face in the development of more transparent relationships with the public and the related
role of ICTs, in particular, the organization’s website. This study shows that, although the attempt to be completely transparent
has great ethical value, ICT-enabled information disclosure is limited by privacy and security concerns and by pressure from
financial supporters and benefactors and potential NGO competitors who vie for grants and donations. The paper provides some
implications and suggestions for managers of NGOs and policy makers. 相似文献
10.
Dag Elgesem 《Ethics and Information Technology》2008,10(4):233-242
How should the policies of search engines and other information intermediaries be ethically evaluated? It is argued that Kant’s principles for the public use of reason are useful starting points for the formulation of criteria for such an evaluation. The suggestion is, furthermore, that a search engine can be seen to provide a testimony to the user concerning what information that is most relevant to her query. This suggestion is used as the basis for the development of a broadly Kantian account of a rational searcher. It is argued that the search engine companies are morally required to publish their information policies and act in accordance with them but given the threat of search engine spam they can have no obligation to publish the details of their algorithms. 相似文献
11.
12.
Norman Mooradian 《Ethics and Information Technology》2009,11(3):163-174
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy
is important in relation to mundane personal information and situations. According to the theory, privacy is important because
it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating
and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would
diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what
I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite
its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted
by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount
of personal information collected. Further, recent developments in computing falling under the heading of social computing
have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’
information privacy theory in light of these developments. I will argue that the increasing collection of personal data will
not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to
Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information
privacy theory will continue to be relevant. 相似文献
13.
Edward H. Spence 《Ethics and Information Technology》2009,11(4):243-253
Beginning with the initial premise that as the Internet has a global character, the paper will argue that the normative evaluation
of digital information on the Internet necessitates an evaluative model that is itself universal and global in character (I
agree, therefore, with Gorniak- Kocikowska’s claim that because of its global nature “computer ethics has to be regarded as
global ethics”. (Gorniak-Kocikowska, Science and Engineering Ethics, 1996). The paper will show that information has a dual normative structure that commits all disseminators of information to both
epistemological and ethical norms that are in principle universal and thus global in application. Based on this dual normative
characterization of information the paper will seek to demonstrate: (1) that information and internet information (interformation) specifically, as a process and product of communication, has an inherent normative structure that commits its producers,
disseminators, communicators and users, everyone in fact that deals with information, to certain mandatory epistemological
and ethical commitments; and (2) that the negligent or purposeful abuse of information in violation of the epistemological
and ethical commitments to which its inherent normative structure gives rise is also a violation of universal rights to freedom
and wellbeing to which all agents are entitled by virtue of being agents, and in particular informational agents. 相似文献
14.
Litska Strikwerda 《Ethics and Information Technology》2012,14(2):89-97
In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer
games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects”
that can be “stolen” under criminal law. This legal question has both an ontological and a moral component. The question whether
or not virtual items count as “objects” that can be “stolen” is an ontological question. The question whether or not they
should count as such under criminal law is of a moral nature. The purpose of this paper is to answer both the ontological
question and the moral question underlying the legal question. 相似文献
15.
In recent years, organizations have made significant IT investments, including digital transformation programs, with the aim of enhancing the quality and delivery of services, and creating greater value for stakeholders. However, deriving value from IT investments and digital transformation necessitates, among other factors, a solid mastery of the IT function. In light of this, IT Service Management (ITSM) has emerged as a crucial and widely implemented approach to managing an organization's IT function, with the goal of achieving both operational and strategic benefits. Yet, despite its wide adoption, this approach has been undertheorized by academics, and there is limited understanding of the impacts that ITSM can generate for organizations as well as the mechanisms through which these impacts are achieved. In order to address this problem, this paper performs a systematic literature review examining research published on ITSM between 2012 and 2021 in order to understand what has occurred rather than what could or should be expected. Based on the findings, the paper advances that ITSM should be considered a Management Control System that includes a variety of control practices to achieve greater performance, transparency, and customer-focus within the IT function. It is also argued that these outcomes in turn increase client satisfaction and business/IT alignment. A model of the organizational impacts of ITSM is developed and ITSM is suggested as a subject for further, richer research into IS controls. 相似文献
16.
Mark Coeckelbergh 《Ethics and Information Technology》2011,13(2):81-92
Nussbaum’s version of the capability approach is not only a helpful approach to development problems but can also be employed
as a general ethical-anthropological framework in ‘advanced’ societies. This paper explores its normative force for evaluating
information technologies, with a particular focus on the issue of human enhancement. It suggests that the capability approach
can be a useful way of to specify a workable and adequate level of analysis in human enhancement discussions, but argues that
any interpretation of what these capabilities mean is itself dependent on (interpretations of) the techno-human practices
under discussion. This challenges the capability approach’s means-end dualism concerning the relation between on the one hand
technology and on the other hand humans and capabilities. It is argued that instead of facing a choice between development
and enhancement, we better reflect on how we want to shape human-technological practices, for instance by using the language
of capabilities. For this purpose, we have to engage in a cumbersome hermeneutics that interprets dynamic relations between
unstable capabilities, technologies, practices, and values. This requires us to modify the capability approach by highlighting
and interpreting its interpretative dimension. 相似文献
17.
Locke,Intellectual Property Rights,and the Information Commons 总被引:1,自引:0,他引:1
This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the
current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections,
Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property.
In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and
digital information. In Section 3, it is argued that even if the labor analogy breaks down, we should not necessarily infer
that Locke’s theory has no relevance for the contemporary debate involving IPRs and the information commons. Alternatively,
I argue that much of what Locke has to say about the kinds of considerations that ought to be accorded to the physical commons
when appropriating objects from it – especially his proviso requiring that “enough and as good” be left for others – can also be applied to appropriations involving the information
commons. Based on my reading of Locke’s proviso, I further argue that Locke would presume in favor of the information commons
when competing interests (involving the rights of individual appropriators and the preservation of the commons) are at stake.
In this sense, I believe that Locke offers us an adjudicative principle for evaluating the claims advanced by rival interests
in the contemporary debate about IPRs and the information commons. In Section 4, I apply Locke’s proviso in my analysis of
two recent copyright laws: the Copyright Term Extension Act (CTEA), and the Digital Millennium Copyright Act (DMCA). I then
argue that both laws violate the spirit of Locke’s proviso because they unfairly restrict the access that ordinary individuals
have previously had to resources that comprise the information commons. Noting that Locke would not altogether reject copyright
protection for IPRs, I conclude that Locke’s classic property theory provides a useful mechanism for adjudicating between
claims about how best to ensure that individuals will be able to continue to access information in digitized form, while at
the same time also allowing for that information to enjoy some form of legal protection. 相似文献
18.
Irma van der Ploeg Brit Ross Winthereik Roland Bal 《Ethics and Information Technology》2006,8(2):73-83
In this paper we discuss expected and reported effects on care provider-patient relations of the introduction of electronic
patient records (EPRs) in consultation settings by reviewing exemplary studies and literature on the subject from the past
decade. We argue that in order for such assessments to be meaningful, talk of effects of “the” EPR needs to be replaced by
an “unpacking” of EPR systems into their constituent parts and functionalities, the effects of which need to be assessed individually.
Following from this principle, the paper discusses EPR systems ranging from simple data entry and retrieval systems to more
sophisticated multi-user and multifunctional on-line systems. On a second level, our analysis of the literature is informed
by the question which model of ideal patienthood underlies the assessment of effects of EPRs. To this end, we identify three
“models of patienthood” implicit in writing about benefits and drawbacks of EPRs for patients: the autonomy, the consumer,
and the holistic models, and argue that assumptions concerning these models need to be reflected upon more critically to improve
understanding of what exactly EPR use does to the doctor-patient relationship. 相似文献
19.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges
as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly
entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the
risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional
software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines
some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors
affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military
organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed
to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies
we identify two areas where social factors compel software developers to drift away from a global set of rules constituting
software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish
its vulnerability. 相似文献
20.
Invoking politics and ethics in the design of information technology: undesigning the design 总被引:1,自引:0,他引:1
It is a truism that the design and deployment of information and communication technologies is vital to everyday life, the conduct of work and to social order. But how are individual, organisational and societal choices made? What might it mean to invoke a politics and an ethics of information technology design and use? This editorial paper situates these questions within the trajectory of preoccupations and approaches to the design and deployment of information technology since computerisation began in the 1940s. Focusing upon the dominant concerns over the last three decades, the paper delineates an interest in design and use in relation to socio-technical theories, situated practices and actor-network theory. It is argued that each of these approaches is concerned with a particular form of politics that does not explicitly engage with ethics. In order to introduce ethics into contemporary debates about information technology, and to frame the papers in the special issue, it is argued that Levinas’ ethics is particularly valuable in problematising the relationship between politics and ethics. Levinas provides a critique of modernity’s emphasis on politics and the egocentric self. It is from a Levinasian concern with the Other and the primacy of the ethical that a general rethinking of the relationship between politics, ethics and justice in relation to information and communication technologies can be invoked. 相似文献