首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by possession, andsurveillance by subject. The article offerssome tentative conclusions about theprogressive latency of tracking devices, aboutthe complexity created by multi-sourcing, aboutthe robustness of clickstream data, and aboutthe erosion of the distinction between themonitor and the monitored. These trendsemphasize the need to reject analysis thatframes our understanding of Internetsurveillance in terms of its impact onsociety. Rather the Internet should beregarded as a form of life whose evolvingstructure becomes embedded in humanconsciousness and social practice, and whosearchitecture embodies an inherent valence thatis gradually shifting away from the assumptionsof anonymity upon which the Internet wasoriginally designed.  相似文献   

2.
In this essay we show how certain tendencies of theself are enhanced and hindered by technologicallyorganized places. We coordinate a cognitive andbehavioral technology for the control of personalidentity with the technologically totalizedenvironments that we call synthetic sites. Weproceed by describing Mihaly Csikszentmihalyi'sstrategy for intensifying experience and organizingthe self. Walt Disney World is then considered as theexample, par excellence, of a synthetic sitethat promotes ordered experience via self-shrinkage. Finally, we reflect briefly on problems andpossibilities of human life lived in a world that canbe described with increasing accuracy as anarchipelago of synthetic sites.  相似文献   

3.
A growing literature addresses the ethicalimplications of electronic surveillance atwork, frequently assigning ethical priority tovalues such as the right to privacy. Thispaper suggests that, in practice, the issuesare sociologically more complex than someaccounts suggest. This is because manyworkplace electronic technologies not designedor deployed for surveillance purposesnevertheless embody surveillance capacity. Thiscapacity may not be immediately obvious toparticipants or lend itself to simpledeployment. Moreover, because of their primaryfunctions, such systems embody a range of otherfeatures which are potentially beneficial forthose utilising them. As a result, more complexethical dilemmas emerge as different desired goods compete for priority in thedecision-making of individuals and groups. From a sociological point of view this raisesinteresting questions about the way ethicaldilemmas arise in the context of the ongoingsocial relationships of work. The paperexplores these issues using data from a studyof the development and implementation of acomputerised instructional package in amaternity setting. This medical settingillustrates clearly how seeking to assignethical priority to a particular concern, suchas the right to privacy, cannot butoversimplify the real day to day dilemmasencountered by participants. At the same time,the example of the instructional packagedemonstrates that it is difficult to predict inadvance what ethical issues will be raised bytechnologies that almost always turn out tohave a range of capabilities beyond thoseenvisaged in their original designspecification.  相似文献   

4.
The positive qualities of the Internet--anonymity, openness, and reproducibility have added a new ethical dimension to the privacy debate. This paper describes a new and significant way in which privacy is violated. A type of personal information, called virtual information is described and the effectiveness of techniques to protect this type of information is examined. This examination includes a discussion of technical approaches and professional standards as ways to address this violation of virtual information.  相似文献   

5.
The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker's true identity put serious pressure on traditional just war doctrines that call for adherence to the principles of right purpose, duly constituted authority, and last resort. Age-old strictures about noncombatant immunity are also attenuated by the varied means of attack enabled by advanced information technologies. Therefore, the nations and societies leading the information revolution have a primary ethical obligation to constrain the circumstances under which information warfare may be used -- principally by means of a pledge of no first use of such means against noncombatants.  相似文献   

6.
Murky conceptual waters: The public and the private   总被引:1,自引:0,他引:1  
In discussions on the ethics of surveillanceand consequently surveillance policy, thepublic/private distinction is often implicitlyor explicitly invoked as a way to structure thediscussion and the arguments. In thesediscussions, the distinction public and private is often treated as a uni-dimensional,rigidly dichotomous and absolute, fixed anduniversal concept, whose meaning could bedetermined by the objective content of thebehavior. Nevertheless, if we take a closerlook at the distinction in diverse empiricalcontexts we find them to be more subtle,diffused and ambiguous than suggested. Thus,the paper argues for the treatment of thesedistinctions as multi-dimensional, continuousand relative, fluid and situational orcontextual, whose meaning lies in how they areinterpreted and framed. However, the aim ofthis paper is not to finally sort things out. The objective is rather to demonstrate thecomplexities of the distinction in variouscontexts and to suggest that those using thedistinction, when considering the ethics andpolitics of surveillance technologies, wouldbenefit from more clearly specifying whichdimensions they have in mind and how theyrelate.  相似文献   

7.
Luciano Floridi argues that every existing entity is deserving of at least minimal moral respect in virtue of having intrinsic value qua information object. In this essay, I attempt a comprehensive assessment of this important view as well as the arguments Floridi offers in support of it. I conclude both that the arguments are insufficient and that the thesis itself is substantively implausible from the standpoint of ordinary intuitions.  相似文献   

8.
Does gender matter in computer ethics?   总被引:6,自引:0,他引:6  
Computer ethics is a relatively young discipline,hence it needs time both for reflection and forexploring alternative ethical standpoints in buildingup its own theoretical framework. Feminist ethics isoffered as one such alternative particularly to informissues of equality and power. We argue that feministethics is not narrowly confined to women's issues but is an approach with wider egalitarianapplications. The rise of feminist ethics in relationto feminist theory in general is described and withinthat the work of Gilligan and others on an ethic of care. We argue for the need to connect theory toempirical evidence. Empirical studies of gender andbusiness and computer ethics are reviewed. We noteconcerns with surveying a student audience, the issueof how far questionnaires and interviews can get tothe heart of ethical beliefs and problems ofperforming statistical analyses of quantitative data.Although we recognize them, our own small surveycannot avoid all these problems. Nevertheless byrefining our scenarios we are able to offer analternative reading of a hacking problem in terms ofan ethic of care thereby pointing a way forward forfuture research in computer ethics inspired byfeminist theory.  相似文献   

9.
This paper examines the study of computer basedperformance monitoring (CBPM) in the workplaceas an issue dominated by questions of ethics.Its central contention paper is that anyinvestigation of ethical monitoring practice isinadequate if it simply applies best practiceguidelines to any one context to indicate,whether practice is, on balance, ethical or not. The broader social dynamics of access toprocedural and distributive justice examinedthrough a fine grained approach to the study ofworkplace social relations, and workplaceidentity construction, are also important here. This has three implications, which are examinedin the paper, and are as follows: First, thatit is vital for any empirical investigation ofthe ethics of CBPM practice to take intoaccount not only its compliance withpreexisting best practice guidelines, butalso the social relations which pervade thecontext of its application. Second, that thisnecessitates a particular epistemologicaltreatment of CBPM as something whose effectsare measurable and identifiable, as well assomething which has a socially constructedmeaning and is tropic in nature. Third, thatexisting debates against which this argument isset, which regard contrasting epistemologiesand ontologies as incompatible, should beaddressed, and an alternative introduced. Introducing situated knowledges (Haraway 1991)and material semiotic ontologies as such analternative, the paper proceeds to analyse theethics of a particular case of monitoringpractice, Norco. Drawing on Marx (1998) thepaper concludes that a fine grain analysis ofthe social is vital if we are to understandfully the ethics of monitoring in theworkplace.  相似文献   

10.
This essay addresses ethical aspects of the design and use of virtual reality (VR) systems, focusing on the behavioral options made available in such systems and the manner in which reality is represented or simulated in them. An assessment is made of the morality of immoral behavior in virtual reality, and of the virtual modeling of such behavior. Thereafter, the ethical aspects of misrepresentation and biased representation in VR applications are discussed.  相似文献   

11.
Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, conservation of humanist ideals, andprudent conclusions. The ensuing dialogue examineseight counter-arguments to Geist's vision. Thearguments and Geist's replies lead to unanticipatedchanges in position that cascade to a chillingclose.  相似文献   

12.
‘Power and the digital divide’   总被引:2,自引:0,他引:2  
The ethical and political dilemmas raised byInformation and Communication Technology (ICT)have only just begun to be understood. Theimpact of centralised data collection, masscommunication technologies or the centrality ofcomputer technology as a means of accessingimportant social institutions, all poseimportant ethical and political questions. As away of capturing some of these effects I willcharacterise them in terms of the type of powerand, more particularly, the Power-over peoplethat they exercise. My choice of thisparticular nomenclature is that it allows us todescribe, firstly, how specific technologiesoperate and second, exactly what sorts ofconstraints they impose on people. The reasonfor this focus has to do with a further aim ofthe essay, which is to intervene in aparticular type of debate that is often hadaround the appropriate use and scope oftheories of power that are employed in thinkingabout ICT, especially those theories associatedwith the work of Michel Foucault. There isconsiderable use of his work in computerethics, but my claim will be that despite theproductive uses of his work in the areas ofsurveillance, for instance, it does not exhaustthe larger potential of his work on power and,in part, `government.' I will argue that inorder to properly understand the politicalimpact of some aspects of ICT, especially thedigital divide, one needs an account of howpower operates that includes more traditionaltypes of power-over. To the extent that I willdeal with these concerns, the paper is both acontribution to debates about the nature andscope of Foucault's theory of power and to theissue of the effects of the digital divide.  相似文献   

13.
14.
For the following mixed bivariate probability distribution between a discrete random variable X and a continuous random variable Λ:
where α, β > 0, 0 < p = 1 ? q < 1, x=0,1,2,...,
a canonical expansion is obtained in terms of the Laguerre and Meixner orthogonal polynomials. The chance mechanisms giving rise to this mixed bivariate distribution are also discussed.  相似文献   

15.
16.
17.
18.
Let denote the class of functions analytic in U={z:|z|<1} which satisfy for fixed M, z=reiθU and
  相似文献   

19.
20.
In this paper, the second order non-linear differential equation
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号