Search (2 results, page 1 of 1)

  • × language_ss:"e"
  • × subject_ss:"Information society"
  • × subject_ss:"Information technology / Social aspects"
  1. Information ethics : privacy, property, and power (2005) 0.05
    0.05485584 = product of:
      0.10971168 = sum of:
        0.035240363 = weight(_text_:social in 2392) [ClassicSimilarity], result of:
          0.035240363 = score(doc=2392,freq=6.0), product of:
            0.1847249 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046325076 = queryNorm
            0.19077215 = fieldWeight in 2392, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.07447132 = sum of:
          0.052280862 = weight(_text_:aspects in 2392) [ClassicSimilarity], result of:
            0.052280862 = score(doc=2392,freq=8.0), product of:
              0.20938325 = queryWeight, product of:
                4.5198684 = idf(docFreq=1308, maxDocs=44218)
                0.046325076 = queryNorm
              0.2496898 = fieldWeight in 2392, product of:
                2.828427 = tf(freq=8.0), with freq of:
                  8.0 = termFreq=8.0
                4.5198684 = idf(docFreq=1308, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
          0.022190453 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
            0.022190453 = score(doc=2392,freq=4.0), product of:
              0.16222252 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046325076 = queryNorm
              0.13679022 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
      0.5 = coord(2/4)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    LCSH
    Communication / Moral and ethical aspects
    Information technology / Social aspects
    Subject
    Communication / Moral and ethical aspects
    Information technology / Social aspects
  2. Warner, J.: Humanizing information technology (2004) 0.03
    0.031665172 = product of:
      0.063330345 = sum of:
        0.040692065 = weight(_text_:social in 438) [ClassicSimilarity], result of:
          0.040692065 = score(doc=438,freq=8.0), product of:
            0.1847249 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046325076 = queryNorm
            0.22028469 = fieldWeight in 438, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.01953125 = fieldNorm(doc=438)
        0.02263828 = product of:
          0.04527656 = sum of:
            0.04527656 = weight(_text_:aspects in 438) [ClassicSimilarity], result of:
              0.04527656 = score(doc=438,freq=6.0), product of:
                0.20938325 = queryWeight, product of:
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.046325076 = queryNorm
                0.21623774 = fieldWeight in 438, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=438)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Footnote
    Like Daniel Bell, the author of The Coming of Post-Industrial Society (1973), who used aspects of Marx's thinking as the basis for his social forecasting models, Warner uses Marxist thought as a tool for social and historical analysis. Unlike Bell, Warner's approach to Marx tends to be doctrinaire. As a result, "An Information View of History" and "Origins of the Human Brain," two of the essays in which Warner sets out to establish the connections between information science and information technology, are less successful. Warner argues, "the classic source for an understanding of technology as a human construction is Marx," and that "a Marxian perspective an information technology could be of high marginal Utility," noting additionally that with the exception of Norbert Wiener and John Desmond Bernal, "there has only been a limited penetration of Marxism into information science" (p. 9). But Warner's efforts to persuade the reader that these views are cogent never go beyond academic protocol. Nor does his support for the assertion that the second half of the 19th century was the critical period for innovation and diffusion of modern information technologies. The closing essay, "Whither Information Science?" is particularly disappointing, in part, because the preface and opening chapters of the book promised more than was delivered at the end. Warner asserts that the theoretical framework supporting information science is negligible, and that the discipline is limited even further by the fact that many of its members do not recognize or understand the effects of such a limitation. However cogent the charges may be, none of this is news. But the essay fails most notably because Warner does not have any new directions to offer, save that information scientists should pay closer artention to what is going an in allied disciplines. Moreover, he does not seem to understand that at its heart the "information revolution" is not about the machines, but about the growing legions of men and women who can and do write programming code to exert control over and find new uses for these devices. Nor does he seem to understand that information science, in the grip of what he terms a "quasi-global crisis," suffers grievously because it is a community situated not at the center but rather an the periphery of this revolution."
    LCSH
    Information technology / Social aspects
    Subject
    Information technology / Social aspects