Search (68 results, page 1 of 4)

  • × language_ss:"e"
  • × theme_ss:"Informationsethik"
  • × type_ss:"a"
  1. Behar, J.E.: Computer ethics : moral philosophy or professional propaganda? (1993) 0.09
    0.08912055 = product of:
      0.1782411 = sum of:
        0.01841403 = weight(_text_:for in 8700) [ClassicSimilarity], result of:
          0.01841403 = score(doc=8700,freq=2.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.20744109 = fieldWeight in 8700, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.078125 = fieldNorm(doc=8700)
        0.15982707 = weight(_text_:computing in 8700) [ClassicSimilarity], result of:
          0.15982707 = score(doc=8700,freq=2.0), product of:
            0.26151994 = queryWeight, product of:
              5.5314693 = idf(docFreq=475, maxDocs=44218)
              0.047278564 = queryNorm
            0.6111468 = fieldWeight in 8700, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5314693 = idf(docFreq=475, maxDocs=44218)
              0.078125 = fieldNorm(doc=8700)
      0.5 = coord(2/4)
    
    Abstract
    The diffuse focus of ethical discourse in computing is confusing. Clarifies the relation of computer ethics to issues of personal freedom, social control, and social inequality, seeks to provide human service workers and other professional computer specialists with a framework for identifying the social effects and moral dimensions of computerization
  2. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.09
    0.087386265 = product of:
      0.116515025 = sum of:
        0.020587513 = weight(_text_:for in 1868) [ClassicSimilarity], result of:
          0.020587513 = score(doc=1868,freq=10.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.2319262 = fieldWeight in 1868, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.079913534 = weight(_text_:computing in 1868) [ClassicSimilarity], result of:
          0.079913534 = score(doc=1868,freq=2.0), product of:
            0.26151994 = queryWeight, product of:
              5.5314693 = idf(docFreq=475, maxDocs=44218)
              0.047278564 = queryNorm
            0.3055734 = fieldWeight in 1868, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5314693 = idf(docFreq=475, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.016013984 = product of:
          0.032027967 = sum of:
            0.032027967 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.032027967 = score(doc=1868,freq=2.0), product of:
                0.16556148 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.047278564 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.75 = coord(3/4)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1134-1142
  3. Seadle, M.: Copyright in a networked world : ethics and infringement (2004) 0.03
    0.025568802 = product of:
      0.051137604 = sum of:
        0.02551523 = weight(_text_:for in 2833) [ClassicSimilarity], result of:
          0.02551523 = score(doc=2833,freq=6.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.28743884 = fieldWeight in 2833, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0625 = fieldNorm(doc=2833)
        0.025622372 = product of:
          0.051244743 = sum of:
            0.051244743 = weight(_text_:22 in 2833) [ClassicSimilarity], result of:
              0.051244743 = score(doc=2833,freq=2.0), product of:
                0.16556148 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.047278564 = queryNorm
                0.30952093 = fieldWeight in 2833, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2833)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    The statutes themselves are not the only basis for deciding whether an intellectual property rights infringement has occurred. Ethical judgments can also influence judicial rulings. This column looks at three issues of intellectual property ethics: the nature of the property, written guidelines for behavior, and enforcement mechanisms. For most active infringers digital property seems unreal, the rules ambiguous, and the enforcement statistically unlikely.
    Source
    Library hi tech. 22(2004) no.1, S.106-110
  4. O'Neil, R.M.: Free speech in cyberspace (1998) 0.03
    0.025568802 = product of:
      0.051137604 = sum of:
        0.02551523 = weight(_text_:for in 248) [ClassicSimilarity], result of:
          0.02551523 = score(doc=248,freq=6.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.28743884 = fieldWeight in 248, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0625 = fieldNorm(doc=248)
        0.025622372 = product of:
          0.051244743 = sum of:
            0.051244743 = weight(_text_:22 in 248) [ClassicSimilarity], result of:
              0.051244743 = score(doc=248,freq=2.0), product of:
                0.16556148 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.047278564 = queryNorm
                0.30952093 = fieldWeight in 248, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=248)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Having reached the US Supreme Court in 1997, the Communications Decency Act (1996) has strong implications for Internet service providers. How to protect children while not denying adult rights of access is an issue which has impacted successively upon motion pictures, reading materials, radio, television and cable. The case for freedom of electronic speech appears compelling. The problems of obscenity, encryption (cryptography) and provocative 'cyberspeech' on the Internet offers a field day for litigation
    Date
    22. 2.1999 15:50:50
  5. Dane, F.C.: ¬The importance of the sources of professional obligations (2014) 0.02
    0.019978384 = product of:
      0.079913534 = sum of:
        0.079913534 = weight(_text_:computing in 3367) [ClassicSimilarity], result of:
          0.079913534 = score(doc=3367,freq=2.0), product of:
            0.26151994 = queryWeight, product of:
              5.5314693 = idf(docFreq=475, maxDocs=44218)
              0.047278564 = queryNorm
            0.3055734 = fieldWeight in 3367, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5314693 = idf(docFreq=475, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3367)
      0.25 = coord(1/4)
    
    Source
    Philosophy, computing and information science. Eds.: R. Hagengruber u. U.V. Riss
  6. Homan, P.A.: Library catalog notes for "bad books" : ethics vs. responsibilities (2012) 0.02
    0.0159805 = product of:
      0.031961 = sum of:
        0.01594702 = weight(_text_:for in 420) [ClassicSimilarity], result of:
          0.01594702 = score(doc=420,freq=6.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.17964928 = fieldWeight in 420, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0390625 = fieldNorm(doc=420)
        0.016013984 = product of:
          0.032027967 = sum of:
            0.032027967 = weight(_text_:22 in 420) [ClassicSimilarity], result of:
              0.032027967 = score(doc=420,freq=2.0), product of:
                0.16556148 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.047278564 = queryNorm
                0.19345059 = fieldWeight in 420, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=420)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    The conflict between librarians' ethics and their responsibilities in the process of progressive collection management, which applies the principles of cost accounting to libraries, to call attention to the "bad books" in their collections that are compromised by age, error, abridgement, expurgation, plagiarism, copyright violation, libel, or fraud, is discussed. According to Charles Cutter, notes in catalog records should call attention to the best books but ignore the bad ones. Libraries that can afford to keep their "bad books," however, which often have a valuable second life, must call attention to their intellectual contexts in notes in the catalog records. Michael Bellesiles's Arming America, the most famous case of academic fraud at the turn of the twenty-first century, is used as a test case. Given the bias of content enhancement that automatically pulls content from the Web into library catalogs, catalog notes for "bad books" may be the only way for librarians to uphold their ethical principles regarding collection management while fulfilling their professional responsibilities to their users in calling attention to their "bad books."
    Date
    27. 9.2012 14:22:00
  7. Shoemaker, E.: No one can whistle a symphony : seeking a catalogers' code of ethics (2015) 0.01
    0.008286313 = product of:
      0.033145253 = sum of:
        0.033145253 = weight(_text_:for in 2370) [ClassicSimilarity], result of:
          0.033145253 = score(doc=2370,freq=18.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.37339395 = fieldWeight in 2370, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.046875 = fieldNorm(doc=2370)
      0.25 = coord(1/4)
    
    Abstract
    This paper examines the limited literature about ethics of cataloging in order to elucidate the kind of situations catalogers face with minimal ethical guidance, and the questions those situations raise for the profession. Existing codes of ethics for library staff offer only peripheral guidelines for catalogers, leaving them adrift when ethical issues arise. Ultimately the lack of a clear code of ethics for information organization reinforces existing mystification around the role of catalogers within the library and causes difficulty in justifying decisions to supervisors and administrators. While ALA has a professionally accepted code of ethics, and ALCTS has a supplement to it, these codes are inadequate to clarify and guide cataloging work. Two vastly different approaches to a code of ethics for catalogers are considered for both their strengths and weaknesses. The author will make recommendations about what a code of ethics for catalogers should include, and who should be responsible for creating a new code for the profession.
  8. Weckert, J.; Ferguson, S.: Ethics, reference librarians and expert systems (1993) 0.01
    0.008235005 = product of:
      0.03294002 = sum of:
        0.03294002 = weight(_text_:for in 8156) [ClassicSimilarity], result of:
          0.03294002 = score(doc=8156,freq=10.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.37108192 = fieldWeight in 8156, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0625 = fieldNorm(doc=8156)
      0.25 = coord(1/4)
    
    Abstract
    The issue of whether or not a librarian should attempt to answer all requests for information, regardless of the use to which the information may be put, is a vexed one. This paper discusses the issue in the context of expert systems in reference work, and suggests that the need for the reference librarian to use discretion has implications for expert system development. It examines the role of the reference librarian, discusses the cases for and against answering all requests for information, outlines the behaviour of expert systems in reference, and discusses possible problems and solutions
  9. Tenopir, C.: Ethics for online educators (1992) 0.01
    0.00797351 = product of:
      0.03189404 = sum of:
        0.03189404 = weight(_text_:for in 7334) [ClassicSimilarity], result of:
          0.03189404 = score(doc=7334,freq=6.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.35929856 = fieldWeight in 7334, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.078125 = fieldNorm(doc=7334)
      0.25 = coord(1/4)
    
    Abstract
    The only monitoring of educators is performed by their internal sense of right and wrong. Following the aggred terms of system contracts, selecting the most appropriate systems for students, keeping up to date with system features, and instilling ethical behaviour in students are at the core of ethics for online educators
  10. Szofran, N.: Internet etiquette and ethics (1994) 0.01
    0.0078124115 = product of:
      0.031249646 = sum of:
        0.031249646 = weight(_text_:for in 7424) [ClassicSimilarity], result of:
          0.031249646 = score(doc=7424,freq=4.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.35203922 = fieldWeight in 7424, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.09375 = fieldNorm(doc=7424)
      0.25 = coord(1/4)
    
    Abstract
    Offers advice on using the Internet network. Descusses the need for training, suggests rules for Internet use and examining ethical issues including: misuse of service, viruses and security
  11. Preer, J.: Special ethics for special librarians? (1991) 0.01
    0.0073656123 = product of:
      0.02946245 = sum of:
        0.02946245 = weight(_text_:for in 3975) [ClassicSimilarity], result of:
          0.02946245 = score(doc=3975,freq=2.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.33190575 = fieldWeight in 3975, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.125 = fieldNorm(doc=3975)
      0.25 = coord(1/4)
    
  12. Pearce, T.: Draft IIS guidelines for professional ethics for information professionals (1998) 0.01
    0.0073656123 = product of:
      0.02946245 = sum of:
        0.02946245 = weight(_text_:for in 2443) [ClassicSimilarity], result of:
          0.02946245 = score(doc=2443,freq=8.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.33190575 = fieldWeight in 2443, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0625 = fieldNorm(doc=2443)
      0.25 = coord(1/4)
    
    Abstract
    Reports the draft Institute of Information Scientists Guidelines, which are intended to provide a model of prefessional ethids for information professionals, the need for which had arisen because of changes in the information environment. Sets out: core values; definitions; standard of information provision; duties to information sources; duties to the public; duties to clients; and conflict of interest
  13. Beghtol, C.: ¬A proposed ethical warrant for global knowledge representation and organization systems (2002) 0.01
    0.007307842 = product of:
      0.029231368 = sum of:
        0.029231368 = weight(_text_:for in 4462) [ClassicSimilarity], result of:
          0.029231368 = score(doc=4462,freq=14.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.32930255 = fieldWeight in 4462, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.046875 = fieldNorm(doc=4462)
      0.25 = coord(1/4)
    
    Abstract
    New technologies have made the increased globalization of information resources and services possible. In this situation, it is ethically and intellectually beneficial to protect cultural and information diversity. This paper analyzes the problems of creating ethically based globally accessible and culturally acceptable knowledge representation and organization systems, and foundation principles for the ethical treatment of different cultures are established on the basis of the United Nations Universal Declaration of Human Rights (UDHR). The concept of "cultural hospitality", which can act as a theoretical framework for the ethical warrant of knowledge representation and organization systems, is described. This broad discussion is grounded with an extended example of one cultural universal, the concept of time and its expression in calendars. Methods of achieving cultural and user hospitality in information systems are discussed for their potential for creating ethically based systems. It is concluded that cultural hospitality is a promising concept for assessing the ethical foundations of new knowledge representation and organization systems and for planning revisions to existing systems.
  14. Bawden, D.; Robinson, L.: ¬"The dearest of our possessions" : applying Floridi's information privacy concept in models of information behavior and information literacy (2020) 0.01
    0.007307842 = product of:
      0.029231368 = sum of:
        0.029231368 = weight(_text_:for in 5939) [ClassicSimilarity], result of:
          0.029231368 = score(doc=5939,freq=14.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.32930255 = fieldWeight in 5939, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.046875 = fieldNorm(doc=5939)
      0.25 = coord(1/4)
    
    Abstract
    This conceptual article argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics. This approach involves achieving informational privacy, through the features of anonymity and obscurity, through an optimal balance of ontological frictions. This approach may be used to modify models for information behavior and for information literacy, giving them a fuller and more effective coverage of privacy issues in the infosphere. For information behavior, the Information Seeking and Communication Model and the Information Grounds conception are most appropriate for this purpose. For information literacy, the metaliteracy model, using a modification a privacy literacy framework, is most suitable.
    Source
    Journal of the Association for Information Science and Technology. 71(2020) no.9, S.1030-1043
  15. Fox, M.J.; Reece, A.: Which ethics? Whose morality? : an analysis of ethical standards for information organization (2012) 0.01
    0.0067657465 = product of:
      0.027062986 = sum of:
        0.027062986 = weight(_text_:for in 424) [ClassicSimilarity], result of:
          0.027062986 = score(doc=424,freq=12.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.3048749 = fieldWeight in 424, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.046875 = fieldNorm(doc=424)
      0.25 = coord(1/4)
    
    Abstract
    Ethical standards are required at both the individual and system levels of the information organization enterprise, but are those standards the same? For example, are the ethical responsibilities of DDC's editorial board fundamentally the same as for an individual cataloger? And, what are the consequences of decisions made using different ethical frameworks to the users of knowledge organization systems? A selection of ethical theories suitable for evaluating moral dilemmas at all levels in information organization is presented, including utilitarianism, deontology, and pragmatism, as well as the more contemporary approaches of justice, feminist, and Derridean ethics. Finally, a selection of criteria is outlined, taken from the existing ethical frameworks, to use as a starting point for development of an ethical framework specifically for information organization.
  16. Miller, S.: Privacy, data bases and computers (1998) 0.01
    0.006405593 = product of:
      0.025622372 = sum of:
        0.025622372 = product of:
          0.051244743 = sum of:
            0.051244743 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.051244743 = score(doc=3027,freq=2.0), product of:
                0.16556148 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.047278564 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Date
    22. 2.1999 15:57:43
  17. Machovec, G.S.: Internet advertising : ethics and etiquette (1994) 0.01
    0.0063788076 = product of:
      0.02551523 = sum of:
        0.02551523 = weight(_text_:for in 958) [ClassicSimilarity], result of:
          0.02551523 = score(doc=958,freq=6.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.28743884 = fieldWeight in 958, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0625 = fieldNorm(doc=958)
      0.25 = coord(1/4)
    
    Abstract
    Discusses the growth in the commercial use of the Internet, and in particular its use for advertising by commercial organizations. Gives examples of good and bad use of the Internet for advertising. Also suggests a number of recommended guidelines for Internet adverstising, while noting that there are no legal rules governing this area
  18. Capurro, R.: Information ethics for and from Africa (2008) 0.01
    0.005638122 = product of:
      0.022552488 = sum of:
        0.022552488 = weight(_text_:for in 1869) [ClassicSimilarity], result of:
          0.022552488 = score(doc=1869,freq=12.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.2540624 = fieldWeight in 1869, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1869)
      0.25 = coord(1/4)
    
    Abstract
    The first part of this article deals with some initiatives concerning the role of information ethics for Africa, such as the New Partnership for Africa's Development, United Nations Information Communications Technology (ICT), and the African Information Society Initiative particularly since the World Summit on the Information Society. Information Ethics from Africa is a young academic field, and not much has been published so far on the impact of ICT on African societies and cultures from a philosophical perspective. The second part of the article analyzes some recent research on this matter particularly with regard to the concept of ubuntu. Finally, the article addresses some issues of the African Conference on Information Ethics held February 3-5, 2007, in Pretoria, South Africa.[The following essay is adapted from a keynote address delivered at the Africa Information Ethics Conference in Pretoria, South Africa, February 5-7, 2007. Under the patronage of UNESCO, sponsored by the South African government, and organized with assistance from the Department of Information Science at the University of Pretoria, the School of Information Studies at the University of Wisconsin-Milwaukee, and the supporters and members of the International Center for Information Ethics (ICIE), the theme of the conference was Ethical Challenges in the Information Age: The Joy of Sharing Knowledge. The full version of the address as well as selected articles from the conference were published in Vol. 7 of ICIE's online journal, International Review of Information Ethics (for more information, visit http://icie.zkm.de)]
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1162-1170
  19. Himma, K.E.: ¬The justification of intellectual property : contemporary philosophical disputes (2008) 0.01
    0.0055814567 = product of:
      0.022325827 = sum of:
        0.022325827 = weight(_text_:for in 1862) [ClassicSimilarity], result of:
          0.022325827 = score(doc=1862,freq=6.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.25150898 = fieldWeight in 1862, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1862)
      0.25 = coord(1/4)
    
    Abstract
    Once taken for granted as morally legitimate, legal protection of intellectual property rights have come under fire in the last 30 years as new technologies have evolved and severed the link between expression of ideas and such traditional material-based media as books and magazines. These advances in digital technology have called attention to unique features of intellectual content that problematize intellectual property protection; any piece of intellectual content, for example, can be simultaneously appropriated by everyone in the world without thereby diminishing the supply of that content available to others. This essay provides an overview and assessment of the arguments and counterarguments on the issue of whether intellectual property should be legally protected.
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1143-1161
  20. Brito, M. de: Social affects engineering and ethics (2023) 0.01
    0.0055242092 = product of:
      0.022096837 = sum of:
        0.022096837 = weight(_text_:for in 1135) [ClassicSimilarity], result of:
          0.022096837 = score(doc=1135,freq=8.0), product of:
            0.08876751 = queryWeight, product of:
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.047278564 = queryNorm
            0.24892932 = fieldWeight in 1135, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              1.8775425 = idf(docFreq=18385, maxDocs=44218)
              0.046875 = fieldNorm(doc=1135)
      0.25 = coord(1/4)
    
    Abstract
    This text proposes a multidisciplinary reflection on the subject of ethics, based on philosophical approaches, using Spinoza's work, Ethics, as a foundation. The power of Spinoza's geometric reasoning and deterministic logic, compatible with formal grammars and programming languages, provides a favorable framework for this purpose. In an information society characterized by an abundance of data and a diversity of perspectives, complex thinking is an essential tool for developing an ethical construct that can deal with the uncertainty and contradictions in the field. Acknowledging the natural complexity of ethics in interpersonal relationships, the use of AI techniques appears unavoidable. Artificial intelligence in KOS offers the potential for processing complex questions through the formal modeling of concepts in ethical discourse. By formalizing problems, we hope to unleash the potential of ethical analysis; by addressing complexity analysis, we propose a mechanism for understanding problems and empowering solutions.

Years