首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical model of trust based on Richard Holton’s interpretation of P. F. Strawson’s writings on freedom and resentment, and we show why this account of trust is difficult to extend to artificial agents (AAs) as well as to other non-human entities. We then examine Margaret Urban Walker’s notions of “default trust” and “default, diffuse trust” to see how these concepts can inform our analysis of trust in the context of AAs. In the final section, we show how ethicists can improve their understanding of important features in the trust relationship by examining data resulting from a classic experiment involving AAs.  相似文献   

2.
Artificial Life (ALife) has two goals. One attempts to describe fundamental qualities of living systems through agent based computer models. And the second studies whether or not we can artificially create living things in computational mediums that can be realized either, virtually in software, or through biotechnology. The study of ALife has recently branched into two further subdivisions, one is “dry” ALife, which is the study of living systems “in silico” through the use of computer simulations, and the other is “wet” ALife that uses biological material to realize what has only been simulated on computers, effectively wet ALife uses biological material as a kind of computer. This is challenging to the field of computer ethics as it points towards a future in which computer and bioethics might have shared concerns. The emerging studies into wet ALife are likely to provide strong empirical evidence for ALife’s most challenging hypothesis: that life is a certain set of computable functions that can be duplicated in any medium. I believe this will propel ALife into the midst of the mother of all cultural battles that has been gathering around the emergence of biotechnology. Philosophers need to pay close attention to this debate and can serve a vital role in clarifying and resolving the dispute. But even if ALife is merely a computer modeling technique that sheds light on living systems, it still has a number of significant ethical implications such as its use in the modeling of moral and ethical systems, as well as in the creation of artificial moral agents.  相似文献   

3.
This paper argues that intellectual property rights are incompatible with Rawls’s principles of justice. This conclusion is based upon an analysis of the social stratification that emerges as a result of the patent mechanism which defines a marginalized group and ensure that its members remain alienated from the rights, benefits, and freedoms afforded by the patent product. This stratification is further complicated, so I argue, by the copyright mechanism that restricts and redistributes those rights already distributed by means of the patent mechanism. I argue that the positions of privilege established through both the patent and the copyright mechanisms are positions that do not “allow the most extensive liberty compatible with a like liberty for all.” They do not “benefit the least advantaged.” Nor are they “open to all under conditions of fair equality of opportunity.” In making this argument I critically assess the utilitarian defense of intellectual property rights and find it insufficient to respond to the injustices manifest in our current arrangement for the protection of intellectual property rights.  相似文献   

4.
The “free” in “free software” refers to a cluster of four specific freedoms identified by the Free Software Definition. The first freedom, termed “Freedom Zero,” intends to protect the right of the user to deploy software in whatever fashion, towards whatever end, he or she sees fit. But software may be used to achieve ethically questionable ends. This highlights a tension in the provision of software freedoms: while the definition explicitly forbids direct restrictions on users’ freedoms, it does not address other means by which software may indirectly restrict freedoms. In particular, ethically-inflected debate has featured prominently in the discussion of restrictions on digital rights management and privacy-violating code in version 3 of the GPL (GPLv3). The discussion of this proposed language revealed the spectrum of ethical positions and valuations held by members of the free software community. In our analysis, we will provide arguments for upholding Freedom Zero; we embed the problem of possible uses of software in the broader context of the uses of scientific knowledge, and go on to argue that the provision of Freedom Zero mitigates against too great a moral burden—of anticipating possible uses of software—being placed on the programmer and that, most importantly, it facilitates deliberative discourse in the free software community.  相似文献   

5.
We performed a pilot accuracy study on glucometers from three sources: “Advantage” from Boehringer Mannheim (A), “Glucometer* 4” from Bayer (B) and “One Touch Basic” from Life Scan (C) and compared these results with the results on autoanalyzers-Dimension RxL (1) and Hitachi 704 (2). Each glucometer was tested with venous blood in duplicate, from three different groups of 20 patients each, at random, on three different days, in our outpatient phlebotomy section. The rest of the sample was collected into heparinized tubes & the plasma separated within 15 minutes of sample collection & analyzed on both the analyzers in duplicates. The data were analyzed for accuracy by tabulating the number and percentage of test values that vary from the analyzer (reference) method by 10% or less, by 10% to 20%, or greater than 20% and the results tabulated on the Accuracy Study Table. This being a pilot study and the numbers being small, it may be suggested from the Accuracy Study Table alone, that the results of glucose in whole blood done with glucometer (A) were comparable with that of plasma values without applying any factor; whereas the results with glucometers (B) & (C) need to be divided by 1.11 to be comparable with plasma results; statistically though, results with glucometer (C) were comparable with or without factor. Patients using glucometers need to be alerted about the variance in their glucose results when compared to laboratory results, more clearly by the respective companies in their product inserts. An external quality control material that is glucometer method specific is needed, so that the Clinical Biochemistry laboratory in any hospital setup can more effectively monitor the performance of the glucometers in the wards periodically.  相似文献   

6.
In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This legal question has both an ontological and a moral component. The question whether or not virtual items count as “objects” that can be “stolen” is an ontological question. The question whether or not they should count as such under criminal law is of a moral nature. The purpose of this paper is to answer both the ontological question and the moral question underlying the legal question.  相似文献   

7.
Corporate dynamic transparency: the new ICT-driven ethics?   总被引:1,自引:1,他引:0  
The term “corporate transparency” is frequently used in scholarly discussions of business ethics and corporate social responsibility (CSR); however, it remains a volatile and imprecise term, often defined incompletely as “information disclosure” accomplished through standardized reporting. Based on the results of empirical studies of organizational behaviors, this paper identifies a new set of managerial practices based on the use of information and communication technologies (ICT) and particularly Internet-based tools. These practices are resulting in what can be termed “dynamic transparency.” ICT allows for an informational environment characterized by two-way exchange between corporations and their stakeholders, which fosters a more collaborative marketplace. It is proposed that such dynamic information sharing, conducted by means of ICT, drives organizations to display greater openness and accountability, and more transparent operations, which benefit both the corporations and their constituents. One of the most important outcomes that will accrue to consumers and other individuals is the “right to know,” especially about corporate strategies and activities that might directly affect their quality of life. This paper demonstrates that dynamic transparency is more desirable and more effective than the more common “static transparency” where firms’ information disclosure is one-way, usually in response to government regulation. We present three ethical arguments to justify the implementation by business firms of dynamic transparency and demonstrate that their doing so is related to CSR and to augment and complement stakeholder engagement and dialogue. The paper concludes with a summary of the possible limits to and the problems involved in the implementation of dynamic transparency for corporations, and suggests some strategies to counter them.  相似文献   

8.
In this paper, I consider a particular amoralist challenge against those who would morally criticize our single-player video play, viz., “come on, it’s only a game!” The amoralist challenge with which I engage gains strength from two facts: the activities to which the amoralist lays claim are only those that do not involve interactions with other rational or sentient creatures, and the amoralist concedes that there may be extrinsic, consequentialist considerations that support legitimate moral criticisms. I argue that the amoralist is mistaken and that there are non-consequentialist resources for morally evaluating our single-player game play. On my view, some video games contain details that anyone who has a proper understanding of and is properly sensitive to features of a shared moral reality will see as having an incorrigible social meaning that targets groups of individuals, e.g., women and minorities. I offer arguments to support the claim that there are such incorrigible social meanings and that they constrain the imaginative world so that challenges like “it’s only a game” lose their credibility. I also argue that our responses to such meanings bear on evaluations of our character, and in light of this fact video game designers have a duty to understand and work against the meanings of such imagery.  相似文献   

9.
Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many of the sites’ privacy issues. Applications, which nearly invisibly shares not just a users’, but a user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship” online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an interface that made the flows of information more transparent to users.  相似文献   

10.
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount of personal information collected. Further, recent developments in computing falling under the heading of social computing have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’ information privacy theory in light of these developments. I will argue that the increasing collection of personal data will not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information privacy theory will continue to be relevant.  相似文献   

11.
The aim of the present study was to evaluate the antihyperglycemic and antilipidperoxidative effects of ethanolic seed extract ofTephrosia purpurea (TpEt) in streptozotocin induced diabetic rats. Hyperglycemia associated with an altered hexokinase and glucose 6 phosphatase activities, elevated lipid peroxidation, disturbed enzymatic and non-enzymatic antioxidants status were observed in streptozotocin induced diabetic rats. Oral administration of “TpEt” at a dose of 300mg/kg bw showed significant antihyperglcemic and antilipidperoxidative effects as well as increased the activities of enzymatic antioxidants and levels of non enzymatic antioxidants. We also noticed that the antihyperglycemic effect of plant drug (TpEt) was comparable to that of the reference drug glibenclamide. Our results clearly indicate that “TpEt” has potent antihyperglycemic and antilipidperoxidative effects in streptozotocin induced diabetic rats and therefore further studies are warranted to isolate and characterize the bioactive antidiabetic principles from “TpEt”.  相似文献   

12.
J. van den Hoven suggested to analyse privacy from the perspective of informational justice, whereby he referred to the concept of distributive justice presented by M. Walzer in “Spheres of Justice”. In “privacy as contextual integrity” Helen Nissenbaum did also point to Walzer’s approach of complex equality as well to van den Hoven’s concept. In this article I will analyse the challenges of applying Walzer’s concept to issues of informational privacy. I will also discuss the possibilities of framing privacy from the point of the “art of separation” by looking at the intersection of information infrastructures and institutions.  相似文献   

13.
Real friends: how the Internet can foster friendship   总被引:1,自引:0,他引:1  
Dean Cocking and Steve Matthews’ article “Unreal Friends” (Ethics and Information Technology, 2000) argues that the formation of purely mediated friendships via the Internet is impossible. I critique their argument and contend that mediated contexts, including the Internet, can actually promote exceptionally strong friendships according to the very conceptual criteria utilized by Cocking and Matthews. I first argue that offline relationships can be constrictive and insincere, distorting important indicators and dynamics in the formation of close friends. The distance of mediated friendships mitigates this problem by promoting the courage to be candid. Next, I argue that the offline world of largely oral exchanges is often too shallow and hasty to promote deep bonds. The deliberateness of written correspondence acts as a weight to submerge friendships to greater depths and as a brake to enhance attentiveness to and precision about one’s own and one’s friend’s character. Nonetheless, close friendships may fail to develop on the Internet. Insofar as this failure occurs, however, it would be for reasons other than those identified by Cocking and Matthews.  相似文献   

14.
A study was undertaken for evaluating the hypoglycemic and hypolipidemic effects of an ayurvedic medicine “Rajanyamalakadi” containing Curcuma longa, Emblica officinalis and Salacia oblonga in type II diabetic patients over a period of 3 months. Ethical committee consent for the study was given by the Director, Indian Systems of Medicine, Kerala. A total of 43 patients with established diabetes mellitus as adjudged from clinical features and FBS values, appeared for the camp (Age group 35–75 yrs). An informed consent for the study was obtained from each patient. The clinical proforma was given to each patient to collect data such as height, weight, diet pattern, previous history of illness etc. The ongoing antidiabetic medications were stopped under medical supervision and the patients were provided with ‘Rajanyamalakadi’ tablets (dose 1–2 tablets each weighing 500mg). The dosage of the drug was decided by the supervising medical officer on a case to case basis, taking note of the clinical conditions and responsiveness of the patients. The patients were monitored for three months, who were divided into 6 groups based on their age and again into two groups, 5 & 6, based on their mean FBS values. ie; Normal Persons, Diabetics of age groups 35–45yrs, 46–55yrs, >55yrs and those with FBS < 145.9 mg% and > 145.9 mg%. The Ayurvedic medicine “Rajanyamalakadi” has showed significant antidiabetic, hypolipidemic and antioxidant effects. In addition to that significant ameliorating effects on the elevated serum AST and ALT activities were also demonstrated by the treatment. The nutraceuticals present in the drug like Terpenoids, Polyphenols, Curcumin etc are responsible for the medicinal effects.  相似文献   

15.
This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to a computer database. In the UK, the issues that these cases raise have resulted in legislation designed to protect children which allows for the creation of a huge database for children. Paradoxically, we have the situation where we failed to use digital data in enforcing the law to protect children, yet we may now rely heavily on digital technologies to care for children. I draw on the work of Floridi, Sanders, Collins, Kusch, Latour and Akrich, a spectrum of work stretching from philosophy to sociology of technology and the “seamless web” or “actor–network” approach to studies of technology. Intentionality is considered, but not deemed necessary for meaningful moral behaviour. Floridi’s and Sanders’ concept of “distributed morality” accords with the network of agency characterized by actor–network approaches. The paper concludes that enfranchizing non-humans, in the shape of computer databases of personal data, as moral agents is not necessarily problematic but a balance of delegation of morality must be made between human and non-human actors.  相似文献   

16.
The ageing society poses significant challenges to Europe’s economy and society. In coming to grips with these issues, we must be aware of their ethical dimensions. Values are the heart of the European Union, as Article 1a of the Lisbon Treaty makes clear: “The Union is founded on the values of respect for human dignity…”. The notion of Europe as a community of values has various important implications, including the development of inclusion policies. A special case of exclusion concerns the gap between those people with effective access to digital and information technology and those without access to it, the “digital divide”, which in Europe is chiefly age-related. Policies to overcome the digital divide and, more generally speaking, e-inclusion policies addressing the ageing population raise some ethical problems. Among younger senior citizens, say those between 65 and 80 years old, the main issues are likely to be universal access to ICT and e-participation. Among the older senior citizens, say those more than 80 years old, the main issues are mental and physical deterioration and assistive technology. An approach geared towards the protection of human rights could match the different needs of senior citizens and provide concrete guidance to evaluate information technologies for them.  相似文献   

17.
In this study, a 20-item questionnaire was used to elicit undergraduates’ (N = 93) ethical judgment and behavioral intention regarding a number of behaviors involving computers and internet usage. Machiavellianism was found to be uncorrelated with both ethical judgment and behavioral intention. Gender was found to be negatively correlated with both ethical judgment and behavioral intention, such that females judged the behaviors as being less ethical than males, and were less likely to engage in the behaviors than males. A disconnect was found between ethical judgment and behavioral intention, for both males and females, such that the ethical judgment mean for a number of issues was significantly lower (towards the “unethical” end of the continuum) than the behavioral intention mean (towards the “more likely to engage in” end of the continuum). The study raises questions regarding ethical awareness of technology-related issues, and the authors make suggestions for future research.  相似文献   

18.
To overcome “digital reductionism,” a new kind of mechanical view on human beings, fundamental informatics provides some critical viewpoints. It regards information as “meaning” generated in living things which do not exist alone but are parts of ecological system. On the other hand, V. E. Frankl proposed two dimensions of humans: homo sapiens and homo patiens. The latter is the essential aspect of humans whose essence is “compassion,” while the former is the nature like a mechanical machine. As features of living things, unrestricted ability of interpretation as well as inseparable relationships between others underlies both in Frankl’s thought and fundamental informatics. This viewpoint can be applied to the concept of “information literacy.”  相似文献   

19.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies we identify two areas where social factors compel software developers to drift away from a global set of rules constituting software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish its vulnerability.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号