共查询到20条相似文献,搜索用时 31 毫秒
1.
We begin with our reasons for seeking to bring Kant to bear on contemporary information and computing ethics (ICE). We highlight
what each contributor to this special issue draws from Kant and then applies to contemporary matters in ICE. We conclude with
a summary of what these chapters individually and collectively tell us about Kant’s continuing relevance to these contemporary
matters – specifically, with regard to the issues of building trust online and regulating the Internet; how far discourse
contributing to deliberative democracy online may include storytelling and appeals to the emotions; and whether or not search
engine algorithms should be made public. We further highlight how certain chapters – especially as they incorporate more recent
philosophical traditions such as phenomenology and cognitive psychology – develop a Kantian approach (or at least one that
is both inspired by while simultaneously transforming Kant) to ethical issues in ICE, including the ethical implications of
the on-going blurring of the border between the real and the virtual; designing software in light of distributed ethical responsibility;
and trust-building in e-Science collaborations. 相似文献
2.
We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial
intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical
model of trust based on Richard Holton’s interpretation of P. F. Strawson’s writings on freedom and resentment, and we show
why this account of trust is difficult to extend to artificial agents (AAs) as well as to other non-human entities. We then
examine Margaret Urban Walker’s notions of “default trust” and “default, diffuse trust” to see how these concepts can inform
our analysis of trust in the context of AAs. In the final section, we show how ethicists can improve their understanding of
important features in the trust relationship by examining data resulting from a classic experiment involving AAs. 相似文献
3.
The tendency towards an increasing integration of the informational web into our daily physical world (in particular in so-called
Ambient Intelligent technologies which combine ideas derived from the field of Ubiquitous Computing, Intelligent User Interfaces and Ubiquitous
Communication) is likely to make the development of successful profiling and personalization algorithms, like the ones currently
used by internet companies such as Amazon, even more important than it is today. I argue that the way in which we experience ourselves necessarily goes through a moment
of technical mediation. Because of this algorithmic profiling that thrives on continuous reconfiguration of identification
should not be understood as a supplementary process which maps a pre-established identity that exists independently from the
profiling practice. In order to clarify how the experience of one’s identity can become affected by such machine-profiling
a theoretical exploration of identity is made (including Agamben’s understanding of an apparatus, Ricoeur’s distinction between idem- and ipse-identity, and Stiegler’s notion of a conjunctive–disjunctive relationship towards retentional apparatuses). Although it is clear that no specific predictions about the impact of Ambient Intelligent technologies can be made without
taking more particulars into account, the theoretical concepts are used to describe three general scenarios about the way
wherein the experience of identity might become affected. To conclude, I argue that the experience of one’s identity may affect
whether the cases of unwarranted discrimination resulting from ubiquitous differentiations and identifications within an Ambient
Intelligent environment, will become a matter of societal concern. 相似文献
4.
To overcome “digital reductionism,” a new kind of mechanical view on human beings, fundamental informatics provides some critical viewpoints. It regards information as “meaning” generated in living things which do not exist alone but are parts of ecological system. On the other hand, V. E. Frankl proposed two dimensions of humans: homo sapiens and homo patiens. The latter is the essential aspect of humans whose essence is “compassion,” while the former is the nature like a mechanical machine. As features of living things, unrestricted ability of interpretation as well as inseparable relationships between others underlies both in Frankl’s thought and fundamental informatics. This viewpoint can be applied to the concept of “information literacy.” 相似文献
5.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献
6.
Trust can be understood as a precondition for a well-functioning society or as a way to handle complexities of living in a
risk society, but also as a fundamental aspect of human morality. Interactions on the Internet pose some new challenges to
issues of trust, especially connected to disembodiedness. Mistrust may be an important obstacle to Internet use, which is
problematic as the Internet becomes a significant arena for political, social and commercial activities necessary for full
participation in a liberal democracy. The Categorical Imperative lifts up trust as a fundamental component of human ethical virtues – first of all, because deception and coercion, the antitheses of trust,
cannot be universalized. Mistrust is, according to Kant, a natural component of human nature, as we are social beings dependent
on recognition by others but also prone to deceiving others. Only in true friendships can this tendency be overcome and give
room for unconditional trust. Still we can argue that Kant must hold that trustworthy behaviour as well as trust in others
is obligatory, as expressions of respect for humanity. The Kantian approach integrates political and ethical aspects of trust, showing that protecting the external
activities of citizens is required in order to act morally. This means that security measures, combined with specific regulations
are important preconditions for building online trust, providing an environment enabling people to act morally and for trust-based
relationships. 相似文献
7.
There is a growing literature on the concept of e- trust and on the feasibility and advisability of “trusting” artificial agents. In this paper we present an object-oriented model
for thinking about trust in both face-to-face and digitally mediated environments. We review important recent contributions
to this literature regarding e-trust in conjunction with presenting our model. We identify three important types of trust
interactions and examine trust from the perspective of a software developer. Too often, the primary focus of research in this area has been on the artificial agents and the humans they may encounter
after they are deployed. We contend that the humans who design, implement, and deploy the artificial agents are crucial to
any discussion of e-trust and to understanding the distinctions among the concepts of trust, e-trust and face-to-face trust. 相似文献
8.
The paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set
of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept
of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined in such a way as to (i) discriminate specific
cases in which an individual’s GIP can be infringed without accessing the individual’s data; (ii) separate unauthorised accesses
to data that do not respect the right to GIP from access that do; and (iii) distinguish different degrees of GIP. Finally
a camera phone is used to illustrate the proposed solution. 相似文献
9.
This paper deals with forms of communication aiming at a better informed public or publics. The main idea is that democratic
societies are dependent on toleration of a plurality of publics, and simultaneously there is a need for communication between
the different publics. The ethos underlying this assumption is that democracy requires a transcendence of subjective conditions
in order for the public(s) to gain legitimacy and recognition of opinions. Validity of opinions presupposes a public aspect
that is available through communication. More specifically, the validity in question is obtained through its claim on universality
– i.e. the transcendence of purely private subjective conditions. This kind of validity is found in reflective judgment or
enlarged thinking, as displayed in Kant’s third critique. In the last part of the paper it is discussed how new information
technologies and the internet may contribute positively to facilitate modes of communication that are associated with the
particularity at work in reflective thinking. Storytelling technologies and virtual realities are of particular interest in
envisaging how this might work. 相似文献
10.
Information theorists often construe new Information and Communication Technologies (ICTs) as leveling mechanisms, regulating
power relations at a distance by arming stakeholders with information and enhanced agency. Management theorists have claimed
that transparency cultivates stakeholder trust, distinguishes a business from its competition, and attracts new clients, investors,
and employees, making it key to future growth and prosperity. Synthesizing these claims, we encounter an increasingly common
view: If corporations voluntarily adopted new ICTs in order to foster transparency, trust, and growth, while embracing the
redistributions of power they bring about, both corporations and stakeholders would benefit. The common view is short-sighted,
however. In order to realize mutual benefit, transparency can not be conceived merely as efficient or economical. The implementation
and use of new ICTs will be morally unsatisfactory unless they stably protect stakeholders. Moreover, without such protections,
transparency is unlikely to produce lasting trust and growth. More specifically, corporate disclosures ought to be guided
by a theory of stakeholder rights to know about threats or risks to stakeholders’ basic interests. Such rights are necessary
moral protections for stakeholders in any business environment. Respect for transparency rights is not simply value added
to a corporation’s line of goods and services, but a condition of a corporation’s justifiable claim to create value rather
than harm, wrong, or injustice in its dealings. 相似文献
11.
Dean Cocking and Steve Matthews’ article “Unreal Friends” (Ethics and Information Technology, 2000) argues that the formation
of purely mediated friendships via the Internet is impossible. I critique their argument and contend that mediated contexts,
including the Internet, can actually promote exceptionally strong friendships according to the very conceptual criteria utilized
by Cocking and Matthews. I first argue that offline relationships can be constrictive and insincere, distorting important
indicators and dynamics in the formation of close friends. The distance of mediated friendships mitigates this problem by promoting the courage to be candid. Next, I argue that the offline world
of largely oral exchanges is often too shallow and hasty to promote deep bonds. The deliberateness of written correspondence acts as a weight to submerge friendships to greater depths and as a brake to enhance attentiveness
to and precision about one’s own and one’s friend’s character. Nonetheless, close friendships may fail to develop on the Internet.
Insofar as this failure occurs, however, it would be for reasons other than those identified by Cocking and Matthews. 相似文献
12.
This article presents an analysis of the concept of disability in Amartya Sen’s capabilities and functionings approach in the context of Information and Communication Technologies (ICT). Following a critical review of the concept of
disability—from its traditional interpretation as an essentially medical concept to its later interpretation as a socially
constructed category—we will introduce the concept of functional diversity. The importance of human diversity in the capabilities and functionings approach calls for incorporating this concept into
the analysis of well-being and quality of life in persons with disability—aspects in which ICT currently plays a major role.
When one contemplates these technologies, it becomes clear that factors such as accessibility, design for all, and user participation
in development and implementation processes are key strategies in promoting equal rights and equal opportunity for persons
with disability in the different environments of the information society. 相似文献
13.
The paper presents, firstly, a brief review of the long history of information ethics beginning with the Greek concept of parrhesia or freedom of speech as analyzed by Michel Foucault. The recent concept of information ethics is related particularly to problems which arose in the last century with the development of computer technology and the internet. A broader concept of information ethics as dealing with the digital reconstruction of all possible phenomena leads to questions relating to digital ontology. Following Heidegger’s conception of the relation between ontology and metaphysics, the author argues that ontology has to do with Being itself and not just with the Being of beings which is the matter of metaphysics. The primary aim of an ontological foundation of information ethics is to question the metaphysical ambitions of digital ontology understood as today’s pervading understanding of Being. The author analyzes some challenges of digital technology, particularly with regard to the moral status of digital agents. The author argues that information ethics does not only deal with ethical questions relating to the infosphere. This view is contrasted with arguments presented by Luciano Floridi on the foundation of information ethics as well as on the moral status of digital agents. It is argued that a reductionist view of the human body as digital data overlooks the limits of digital ontology and gives up one basis for ethical orientation. Finally issues related to the digital divide as well as to intercultural aspects of information ethics are explored – and long and short-term agendas for appropriate responses are presented. 相似文献
14.
囿于“理论逻辑”的“学究式谬误”,实证主义科学话语体系固守“证伪主义”的科学教条,认为如果科学家信任他人,则“既置入了认识论错误,又具有道德危险”。然而,科学场域的实践逻辑表明,富有道德色彩的“情感型信任”内嵌于科学实践之中,它是科学场域内生的一种结构性资源,甚至科学知识体系本身就是一张由环环相扣的信任链条精心编织的“信任之网”。即使是科学认知层面的带有权宜性的怀疑,也依赖于道德层面的人际信任,科学信任既是怀疑的逻辑起点——即使彻底的科学怀疑主义者也基于一定的信任架构,也是怀疑的价值归宿点——科学怀疑的目的不是主张从道德尺度对科学家进行价值评判,而是提倡通过富有建设性的科学对话,增进科学家之间的信任和合作。有鉴于此,理应批判科学实证主义的话语霸权,从而在科学场域构筑一条从怀疑走向信任的科学通道。 相似文献
15.
本文主要通过有关文献的梳理,从理论上探讨在企业对企业(B2B)电子商务的环境中,买卖双方建立信任的模式问题。本文认为,制度信任,包括第三方制度信任和双方的制度信任以及结构保证、促进条件与情境规范三个维度,是在线买卖双方建立信任和促成交易的重要因素。 相似文献
16.
This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing
and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed:
freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the
potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored
as well. 相似文献
17.
This study focusses on the role of trust in knowledge sharing within the context of virtual communities of practice. Trust is widely accepted as an important enabler of knowledge management (KM) processes. We conceptualise trust across three dimensions, namely: competence, integrity and benevolence; we test hypotheses as to the effect of these facets of trust on knowledge sharing by surveying an intra-organisational global virtual community of practitioners. The results indicate that all three dimensions of trust are positively related to knowledge-sharing behaviour. Trust based on the perceived integrity of the community was found to be the strongest predictor of knowledge-sharing behaviour. Our findings suggest that the dimensions of trust buttress each other; although they are theoretically distinct, they appear to be empirically inseparable. We propose that in order for knowledge sharing to be enabled, trust must concurrently exist in all three dimensions. Implication to organisations in their recruitment policy is to include competence, integrity and benevolence in their sought-for attributes of new employees. KM practitioners also have to encourage these attributes in existing employees, who are potential members of on-line communities of practice. Knowledge sharing itself was conceptualised with three components – quantity (frequency), quality (usefulness or value) and focus (the degree to which an individual feels that they engage in knowledge sharing). Of the three components, focus exhibits the most significant relationship with trust factors. This finding makes knowledge sharing less tangible than perhaps would be expected. It suggests that establishing whether knowledge has been shared is more than counting the frequency or trying to evaluate the usefulness of the shared knowledge. These aspects are important especially to management, but to the individual who shares knowledge, her feelings of having shared knowledge appear to be more important. With the current understanding that knowledge sharing is more of a human activity than technology, it is important that any information system should be assistive in boosting users’ confidence that they are indeed sharing knowledge. If the systems do not re-enforce the users’ knowledge-sharing orientation, knowledge sharing may be discouraged. Notwithstanding the point made about knowledge-sharing focus, it is necessary to take into consideration all the components of knowledge sharing to fully capture the concept. This was well indicated when the combined variable of all (rather than individual) knowledge-sharing items had the strongest correlation with trust factors. 相似文献
18.
J. van den Hoven suggested to analyse privacy from the perspective of informational justice, whereby he referred to the concept
of distributive justice presented by M. Walzer in “ Spheres of Justice”. In “privacy as contextual integrity” Helen Nissenbaum did also point to Walzer’s approach of complex equality as well to
van den Hoven’s concept. In this article I will analyse the challenges of applying Walzer’s concept to issues of informational
privacy. I will also discuss the possibilities of framing privacy from the point of the “art of separation” by looking at
the intersection of information infrastructures and institutions. 相似文献
19.
My aim in this paper is to go some way towards showing that the maintenance of hard and fast dichotomies, like those between
mind and body, and the real and the virtual, is untenable, and that technological advance cannot occur with being cognisant
of its reciprocal ethical implications. In their place I will present a softer enactivist ontology through which I examine
the nature of our engagement with technology in general and with virtual realities in particular. This softer ontology is
one to which I will commit Kant, and from which, I will show, certain critical moral and emotional consequences arise. It
is my contention that Kant’s logical subject is necessarily embedded in the world and that Kant, himself, would be content
with this view as an expression of his inspired response to the “scandal to philosophy… that the existence of things outside
us… must be accepted merely on faith” [Bxl]. In keeping with his arguments for the a priori framing of intuition, the a priori
structuring of experience through the spontaneous application of the categories, the synthesis of the experiential manifold,
and the necessity of a unity of apperception, I will present an enactivist account of agency in the world, and argue that
it is our embodied and embedded kinaesthetic engagement in our world which makes possible the syntheses of apprehension, reproduction
and recognition, and which, in turn, make possible the activity of the reproductive or creative imagination. 相似文献
20.
This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the
current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections,
Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property.
In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and
digital information. In Section 3, it is argued that even if the labor analogy breaks down, we should not necessarily infer
that Locke’s theory has no relevance for the contemporary debate involving IPRs and the information commons. Alternatively,
I argue that much of what Locke has to say about the kinds of considerations that ought to be accorded to the physical commons
when appropriating objects from it – especially his proviso requiring that “enough and as good” be left for others – can also be applied to appropriations involving the information
commons. Based on my reading of Locke’s proviso, I further argue that Locke would presume in favor of the information commons
when competing interests (involving the rights of individual appropriators and the preservation of the commons) are at stake.
In this sense, I believe that Locke offers us an adjudicative principle for evaluating the claims advanced by rival interests
in the contemporary debate about IPRs and the information commons. In Section 4, I apply Locke’s proviso in my analysis of
two recent copyright laws: the Copyright Term Extension Act (CTEA), and the Digital Millennium Copyright Act (DMCA). I then
argue that both laws violate the spirit of Locke’s proviso because they unfairly restrict the access that ordinary individuals
have previously had to resources that comprise the information commons. Noting that Locke would not altogether reject copyright
protection for IPRs, I conclude that Locke’s classic property theory provides a useful mechanism for adjudicating between
claims about how best to ensure that individuals will be able to continue to access information in digitized form, while at
the same time also allowing for that information to enjoy some form of legal protection. 相似文献
|