首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We begin with our reasons for seeking to bring Kant to bear on contemporary information and computing ethics (ICE). We highlight what each contributor to this special issue draws from Kant and then applies to contemporary matters in ICE. We conclude with a summary of what these chapters individually and collectively tell us about Kant’s continuing relevance to these contemporary matters – specifically, with regard to the issues of building trust online and regulating the Internet; how far discourse contributing to deliberative democracy online may include storytelling and appeals to the emotions; and whether or not search engine algorithms should be made public. We further highlight how certain chapters – especially as they incorporate more recent philosophical traditions such as phenomenology and cognitive psychology – develop a Kantian approach (or at least one that is both inspired by while simultaneously transforming Kant) to ethical issues in ICE, including the ethical implications of the on-going blurring of the border between the real and the virtual; designing software in light of distributed ethical responsibility; and trust-building in e-Science collaborations.  相似文献   

2.
We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical model of trust based on Richard Holton’s interpretation of P. F. Strawson’s writings on freedom and resentment, and we show why this account of trust is difficult to extend to artificial agents (AAs) as well as to other non-human entities. We then examine Margaret Urban Walker’s notions of “default trust” and “default, diffuse trust” to see how these concepts can inform our analysis of trust in the context of AAs. In the final section, we show how ethicists can improve their understanding of important features in the trust relationship by examining data resulting from a classic experiment involving AAs.  相似文献   

3.
The tendency towards an increasing integration of the informational web into our daily physical world (in particular in so-called Ambient Intelligent technologies which combine ideas derived from the field of Ubiquitous Computing, Intelligent User Interfaces and Ubiquitous Communication) is likely to make the development of successful profiling and personalization algorithms, like the ones currently used by internet companies such as Amazon, even more important than it is today. I argue that the way in which we experience ourselves necessarily goes through a moment of technical mediation. Because of this algorithmic profiling that thrives on continuous reconfiguration of identification should not be understood as a supplementary process which maps a pre-established identity that exists independently from the profiling practice. In order to clarify how the experience of one’s identity can become affected by such machine-profiling a theoretical exploration of identity is made (including Agamben’s understanding of an apparatus, Ricoeur’s distinction between idem- and ipse-identity, and Stiegler’s notion of a conjunctive–disjunctive relationship towards retentional apparatuses). Although it is clear that no specific predictions about the impact of Ambient Intelligent technologies can be made without taking more particulars into account, the theoretical concepts are used to describe three general scenarios about the way wherein the experience of identity might become affected. To conclude, I argue that the experience of one’s identity may affect whether the cases of unwarranted discrimination resulting from ubiquitous differentiations and identifications within an Ambient Intelligent environment, will become a matter of societal concern.  相似文献   

4.
To overcome “digital reductionism,” a new kind of mechanical view on human beings, fundamental informatics provides some critical viewpoints. It regards information as “meaning” generated in living things which do not exist alone but are parts of ecological system. On the other hand, V. E. Frankl proposed two dimensions of humans: homo sapiens and homo patiens. The latter is the essential aspect of humans whose essence is “compassion,” while the former is the nature like a mechanical machine. As features of living things, unrestricted ability of interpretation as well as inseparable relationships between others underlies both in Frankl’s thought and fundamental informatics. This viewpoint can be applied to the concept of “information literacy.”  相似文献   

5.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   

6.
Trust can be understood as a precondition for a well-functioning society or as a way to handle complexities of living in a risk society, but also as a fundamental aspect of human morality. Interactions on the Internet pose some new challenges to issues of trust, especially connected to disembodiedness. Mistrust may be an important obstacle to Internet use, which is problematic as the Internet becomes a significant arena for political, social and commercial activities necessary for full participation in a liberal democracy. The Categorical Imperative lifts up trust as a fundamental component of human ethical virtues – first of all, because deception and coercion, the antitheses of trust, cannot be universalized. Mistrust is, according to Kant, a natural component of human nature, as we are social beings dependent on recognition by others but also prone to deceiving others. Only in true friendships can this tendency be overcome and give room for unconditional trust. Still we can argue that Kant must hold that trustworthy behaviour as well as trust in others is obligatory, as expressions of respect for humanity. The Kantian approach integrates political and ethical aspects of trust, showing that protecting the external activities of citizens is required in order to act morally. This means that security measures, combined with specific regulations are important preconditions for building online trust, providing an environment enabling people to act morally and for trust-based relationships.  相似文献   

7.
There is a growing literature on the concept of e-trust and on the feasibility and advisability of “trusting” artificial agents. In this paper we present an object-oriented model for thinking about trust in both face-to-face and digitally mediated environments. We review important recent contributions to this literature regarding e-trust in conjunction with presenting our model. We identify three important types of trust interactions and examine trust from the perspective of a software developer. Too often, the primary focus of research in this area has been on the artificial agents and the humans they may encounter after they are deployed. We contend that the humans who design, implement, and deploy the artificial agents are crucial to any discussion of e-trust and to understanding the distinctions among the concepts of trust, e-trust and face-to-face trust.  相似文献   

8.
Ethical protocols design   总被引:1,自引:0,他引:1  
The paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined in such a way as to (i) discriminate specific cases in which an individual’s GIP can be infringed without accessing the individual’s data; (ii) separate unauthorised accesses to data that do not respect the right to GIP from access that do; and (iii) distinguish different degrees of GIP. Finally a camera phone is used to illustrate the proposed solution.  相似文献   

9.
This paper deals with forms of communication aiming at a better informed public or publics. The main idea is that democratic societies are dependent on toleration of a plurality of publics, and simultaneously there is a need for communication between the different publics. The ethos underlying this assumption is that democracy requires a transcendence of subjective conditions in order for the public(s) to gain legitimacy and recognition of opinions. Validity of opinions presupposes a public aspect that is available through communication. More specifically, the validity in question is obtained through its claim on universality – i.e. the transcendence of purely private subjective conditions. This kind of validity is found in reflective judgment or enlarged thinking, as displayed in Kant’s third critique. In the last part of the paper it is discussed how new information technologies and the internet may contribute positively to facilitate modes of communication that are associated with the particularity at work in reflective thinking. Storytelling technologies and virtual realities are of particular interest in envisaging how this might work.  相似文献   

10.
Information theorists often construe new Information and Communication Technologies (ICTs) as leveling mechanisms, regulating power relations at a distance by arming stakeholders with information and enhanced agency. Management theorists have claimed that transparency cultivates stakeholder trust, distinguishes a business from its competition, and attracts new clients, investors, and employees, making it key to future growth and prosperity. Synthesizing these claims, we encounter an increasingly common view: If corporations voluntarily adopted new ICTs in order to foster transparency, trust, and growth, while embracing the redistributions of power they bring about, both corporations and stakeholders would benefit. The common view is short-sighted, however. In order to realize mutual benefit, transparency can not be conceived merely as efficient or economical. The implementation and use of new ICTs will be morally unsatisfactory unless they stably protect stakeholders. Moreover, without such protections, transparency is unlikely to produce lasting trust and growth. More specifically, corporate disclosures ought to be guided by a theory of stakeholder rights to know about threats or risks to stakeholders’ basic interests. Such rights are necessary moral protections for stakeholders in any business environment. Respect for transparency rights is not simply value added to a corporation’s line of goods and services, but a condition of a corporation’s justifiable claim to create value rather than harm, wrong, or injustice in its dealings.  相似文献   

11.
Real friends: how the Internet can foster friendship   总被引:1,自引:0,他引:1  
Dean Cocking and Steve Matthews’ article “Unreal Friends” (Ethics and Information Technology, 2000) argues that the formation of purely mediated friendships via the Internet is impossible. I critique their argument and contend that mediated contexts, including the Internet, can actually promote exceptionally strong friendships according to the very conceptual criteria utilized by Cocking and Matthews. I first argue that offline relationships can be constrictive and insincere, distorting important indicators and dynamics in the formation of close friends. The distance of mediated friendships mitigates this problem by promoting the courage to be candid. Next, I argue that the offline world of largely oral exchanges is often too shallow and hasty to promote deep bonds. The deliberateness of written correspondence acts as a weight to submerge friendships to greater depths and as a brake to enhance attentiveness to and precision about one’s own and one’s friend’s character. Nonetheless, close friendships may fail to develop on the Internet. Insofar as this failure occurs, however, it would be for reasons other than those identified by Cocking and Matthews.  相似文献   

12.
This article presents an analysis of the concept of disability in Amartya Sen’s capabilities and functionings approach in the context of Information and Communication Technologies (ICT). Following a critical review of the concept of disability—from its traditional interpretation as an essentially medical concept to its later interpretation as a socially constructed category—we will introduce the concept of functional diversity. The importance of human diversity in the capabilities and functionings approach calls for incorporating this concept into the analysis of well-being and quality of life in persons with disability—aspects in which ICT currently plays a major role. When one contemplates these technologies, it becomes clear that factors such as accessibility, design for all, and user participation in development and implementation processes are key strategies in promoting equal rights and equal opportunity for persons with disability in the different environments of the information society.  相似文献   

13.
The paper presents, firstly, a brief review of the long history of information ethics beginning with the Greek concept of parrhesia or freedom of speech as analyzed by Michel Foucault. The recent concept of information ethics is related particularly to problems which arose in the last century with the development of computer technology and the internet. A broader concept of information ethics as dealing with the digital reconstruction of all possible phenomena leads to questions relating to digital ontology. Following Heidegger’s conception of the relation between ontology and metaphysics, the author argues that ontology has to do with Being itself and not just with the Being of beings which is the matter of metaphysics. The primary aim of an ontological foundation of information ethics is to question the metaphysical ambitions of digital ontology understood as today’s pervading understanding of Being. The author analyzes some challenges of digital technology, particularly with regard to the moral status of digital agents. The author argues that information ethics does not only deal with ethical questions relating to the infosphere. This view is contrasted with arguments presented by Luciano Floridi on the foundation of information ethics as well as on the moral status of digital agents. It is argued that a reductionist view of the human body as digital data overlooks the limits of digital ontology and gives up one basis for ethical orientation. Finally issues related to the digital divide as well as to intercultural aspects of information ethics are explored – and long and short-term agendas for appropriate responses are presented.  相似文献   

14.
实践逻辑视域下科学秩序的信任架构   总被引:1,自引:0,他引:1       下载免费PDF全文
刘崇俊 《科学学研究》2011,29(7):978-983
 囿于“理论逻辑”的“学究式谬误”,实证主义科学话语体系固守“证伪主义”的科学教条,认为如果科学家信任他人,则“既置入了认识论错误,又具有道德危险”。然而,科学场域的实践逻辑表明,富有道德色彩的“情感型信任”内嵌于科学实践之中,它是科学场域内生的一种结构性资源,甚至科学知识体系本身就是一张由环环相扣的信任链条精心编织的“信任之网”。即使是科学认知层面的带有权宜性的怀疑,也依赖于道德层面的人际信任,科学信任既是怀疑的逻辑起点——即使彻底的科学怀疑主义者也基于一定的信任架构,也是怀疑的价值归宿点——科学怀疑的目的不是主张从道德尺度对科学家进行价值评判,而是提倡通过富有建设性的科学对话,增进科学家之间的信任和合作。有鉴于此,理应批判科学实证主义的话语霸权,从而在科学场域构筑一条从怀疑走向信任的科学通道。  相似文献   

15.
基于制度的B2B电子商务信任模式的理论研究   总被引:5,自引:0,他引:5  
本文主要通过有关文献的梳理,从理论上探讨在企业对企业(B2B)电子商务的环境中,买卖双方建立信任的模式问题。本文认为,制度信任,包括第三方制度信任和双方的制度信任以及结构保证、促进条件与情境规范三个维度,是在线买卖双方建立信任和促成交易的重要因素。  相似文献   

16.
This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.  相似文献   

17.

This study focusses on the role of trust in knowledge sharing within the context of virtual communities of practice. Trust is widely accepted as an important enabler of knowledge management (KM) processes. We conceptualise trust across three dimensions, namely: competence, integrity and benevolence; we test hypotheses as to the effect of these facets of trust on knowledge sharing by surveying an intra-organisational global virtual community of practitioners. The results indicate that all three dimensions of trust are positively related to knowledge-sharing behaviour. Trust based on the perceived integrity of the community was found to be the strongest predictor of knowledge-sharing behaviour. Our findings suggest that the dimensions of trust buttress each other; although they are theoretically distinct, they appear to be empirically inseparable. We propose that in order for knowledge sharing to be enabled, trust must concurrently exist in all three dimensions. Implication to organisations in their recruitment policy is to include competence, integrity and benevolence in their sought-for attributes of new employees. KM practitioners also have to encourage these attributes in existing employees, who are potential members of on-line communities of practice. Knowledge sharing itself was conceptualised with three components – quantity (frequency), quality (usefulness or value) and focus (the degree to which an individual feels that they engage in knowledge sharing). Of the three components, focus exhibits the most significant relationship with trust factors. This finding makes knowledge sharing less tangible than perhaps would be expected. It suggests that establishing whether knowledge has been shared is more than counting the frequency or trying to evaluate the usefulness of the shared knowledge. These aspects are important especially to management, but to the individual who shares knowledge, her feelings of having shared knowledge appear to be more important. With the current understanding that knowledge sharing is more of a human activity than technology, it is important that any information system should be assistive in boosting users’ confidence that they are indeed sharing knowledge. If the systems do not re-enforce the users’ knowledge-sharing orientation, knowledge sharing may be discouraged. Notwithstanding the point made about knowledge-sharing focus, it is necessary to take into consideration all the components of knowledge sharing to fully capture the concept. This was well indicated when the combined variable of all (rather than individual) knowledge-sharing items had the strongest correlation with trust factors.

  相似文献   

18.
J. van den Hoven suggested to analyse privacy from the perspective of informational justice, whereby he referred to the concept of distributive justice presented by M. Walzer in “Spheres of Justice”. In “privacy as contextual integrity” Helen Nissenbaum did also point to Walzer’s approach of complex equality as well to van den Hoven’s concept. In this article I will analyse the challenges of applying Walzer’s concept to issues of informational privacy. I will also discuss the possibilities of framing privacy from the point of the “art of separation” by looking at the intersection of information infrastructures and institutions.  相似文献   

19.
My aim in this paper is to go some way towards showing that the maintenance of hard and fast dichotomies, like those between mind and body, and the real and the virtual, is untenable, and that technological advance cannot occur with being cognisant of its reciprocal ethical implications. In their place I will present a softer enactivist ontology through which I examine the nature of our engagement with technology in general and with virtual realities in particular. This softer ontology is one to which I will commit Kant, and from which, I will show, certain critical moral and emotional consequences arise. It is my contention that Kant’s logical subject is necessarily embedded in the world and that Kant, himself, would be content with this view as an expression of his inspired response to the “scandal to philosophy… that the existence of things outside us… must be accepted merely on faith” [Bxl]. In keeping with his arguments for the a priori framing of intuition, the a priori structuring of experience through the spontaneous application of the categories, the synthesis of the experiential manifold, and the necessity of a unity of apperception, I will present an enactivist account of agency in the world, and argue that it is our embodied and embedded kinaesthetic engagement in our world which makes possible the syntheses of apprehension, reproduction and recognition, and which, in turn, make possible the activity of the reproductive or creative imagination.  相似文献   

20.
Locke,Intellectual Property Rights,and the Information Commons   总被引:1,自引:0,他引:1  
This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections, Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property. In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and digital information. In Section 3, it is argued that even if the labor analogy breaks down, we should not necessarily infer that Locke’s theory has no relevance for the contemporary debate involving IPRs and the information commons. Alternatively, I argue that much of what Locke has to say about the kinds of considerations that ought to be accorded to the physical commons when appropriating objects from it – especially his proviso requiring that “enough and as good” be left for others – can also be applied to appropriations involving the information commons. Based on my reading of Locke’s proviso, I further argue that Locke would presume in favor of the information commons when competing interests (involving the rights of individual appropriators and the preservation of the commons) are at stake. In this sense, I believe that Locke offers us an adjudicative principle for evaluating the claims advanced by rival interests in the contemporary debate about IPRs and the information commons. In Section 4, I apply Locke’s proviso in my analysis of two recent copyright laws: the Copyright Term Extension Act (CTEA), and the Digital Millennium Copyright Act (DMCA). I then argue that both laws violate the spirit of Locke’s proviso because they unfairly restrict the access that ordinary individuals have previously had to resources that comprise the information commons. Noting that Locke would not altogether reject copyright protection for IPRs, I conclude that Locke’s classic property theory provides a useful mechanism for adjudicating between claims about how best to ensure that individuals will be able to continue to access information in digitized form, while at the same time also allowing for that information to enjoy some form of legal protection.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号