Search (102 results, page 1 of 6)

  • × language_ss:"e"
  • × theme_ss:"Informationsethik"
  1. Dane, F.C.: ¬The importance of the sources of professional obligations (2014) 0.08
    0.07668973 = product of:
      0.19172432 = sum of:
        0.1721758 = weight(_text_:philosophy in 3367) [ClassicSimilarity], result of:
          0.1721758 = score(doc=3367,freq=12.0), product of:
            0.23055021 = queryWeight, product of:
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.04177434 = queryNorm
            0.7468039 = fieldWeight in 3367, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3367)
        0.019548526 = weight(_text_:of in 3367) [ClassicSimilarity], result of:
          0.019548526 = score(doc=3367,freq=24.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.2992506 = fieldWeight in 3367, product of:
              4.8989797 = tf(freq=24.0), with freq of:
                24.0 = termFreq=24.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3367)
      0.4 = coord(2/5)
    
    Abstract
    The study of philosophy provides many general benefits to members of any field or discipline, the easiest of which to defend are an appreciation of, and experience with, critical thinking, including the ability to apply principles thoughtfully and logically in a variety of contexts; it is the discipline that, according to Plato, Socrates believed made life worth living. Today, however, most disciplines can lay claim to critical thinking - information science certainly involves a great deal of logical analysis - but only philosophy, in the Western world, can lay claim to having developed logic and critical thinking and thereby may have furthered the process more than any other discipline. Historically, philosophy is also the discipline in which one learns how to think about the most complex and important questions including questions about what is right and proper; that is, philosophy arguably lays claim to the development of ethics. Before going further, I should note that I am neither a philosopher nor an information scientist. I am a social psychologist and statistician whose interests have brought me into the realm of practical ethics primarily through ethical issues relevant to empirical research. I should also note that I am firmly in the camp of those who consider there to be an important distinction between morals and ethics; as do others, I argue that moral judgements essentially involve questions about whether or not rules, defined broadly, are followed, whereas ethical judgements essentially involve questions about whether or not a particular rule is worthwhile and, when there are incompatible rules, which rule should be granted higher priority.
    Series
    History and philosophy of technoscience; 3
    Source
    Philosophy, computing and information science. Eds.: R. Hagengruber u. U.V. Riss
  2. Behar, J.E.: Computer ethics : moral philosophy or professional propaganda? (1993) 0.07
    0.06526146 = product of:
      0.16315365 = sum of:
        0.14058095 = weight(_text_:philosophy in 8700) [ClassicSimilarity], result of:
          0.14058095 = score(doc=8700,freq=2.0), product of:
            0.23055021 = queryWeight, product of:
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.04177434 = queryNorm
            0.60976285 = fieldWeight in 8700, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.078125 = fieldNorm(doc=8700)
        0.022572692 = weight(_text_:of in 8700) [ClassicSimilarity], result of:
          0.022572692 = score(doc=8700,freq=8.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.34554482 = fieldWeight in 8700, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.078125 = fieldNorm(doc=8700)
      0.4 = coord(2/5)
    
    Abstract
    The diffuse focus of ethical discourse in computing is confusing. Clarifies the relation of computer ethics to issues of personal freedom, social control, and social inequality, seeks to provide human service workers and other professional computer specialists with a framework for identifying the social effects and moral dimensions of computerization
  3. Bawden, D.; Robinson, L.: ¬"The dearest of our possessions" : applying Floridi's information privacy concept in models of information behavior and information literacy (2020) 0.04
    0.041400857 = product of:
      0.10350214 = sum of:
        0.084348574 = weight(_text_:philosophy in 5939) [ClassicSimilarity], result of:
          0.084348574 = score(doc=5939,freq=2.0), product of:
            0.23055021 = queryWeight, product of:
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.04177434 = queryNorm
            0.36585772 = fieldWeight in 5939, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.046875 = fieldNorm(doc=5939)
        0.019153563 = weight(_text_:of in 5939) [ClassicSimilarity], result of:
          0.019153563 = score(doc=5939,freq=16.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.2932045 = fieldWeight in 5939, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.046875 = fieldNorm(doc=5939)
      0.4 = coord(2/5)
    
    Abstract
    This conceptual article argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics. This approach involves achieving informational privacy, through the features of anonymity and obscurity, through an optimal balance of ontological frictions. This approach may be used to modify models for information behavior and for information literacy, giving them a fuller and more effective coverage of privacy issues in the infosphere. For information behavior, the Information Seeking and Communication Model and the Information Grounds conception are most appropriate for this purpose. For information literacy, the metaliteracy model, using a modification a privacy literacy framework, is most suitable.
    Source
    Journal of the Association for Information Science and Technology. 71(2020) no.9, S.1030-1043
  4. Information ethics : privacy, property, and power (2005) 0.04
    0.03832009 = product of:
      0.06386682 = sum of:
        0.035145238 = weight(_text_:philosophy in 2392) [ClassicSimilarity], result of:
          0.035145238 = score(doc=2392,freq=2.0), product of:
            0.23055021 = queryWeight, product of:
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.04177434 = queryNorm
            0.15244071 = fieldWeight in 2392, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.018716287 = weight(_text_:of in 2392) [ClassicSimilarity], result of:
          0.018716287 = score(doc=2392,freq=88.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.28651062 = fieldWeight in 2392, product of:
              9.380832 = tf(freq=88.0), with freq of:
                88.0 = termFreq=88.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.01000529 = product of:
          0.02001058 = sum of:
            0.02001058 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
              0.02001058 = score(doc=2392,freq=4.0), product of:
                0.14628662 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04177434 = queryNorm
                0.13679022 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.5 = coord(1/2)
      0.6 = coord(3/5)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.302 (L.A. Ennis):"This is an important and timely anthology of articles "on the normative issues surrounding information control" (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics, intellectual property, privacy, free speech, and more, the book provides information professionals of all kinds with a valuable and thought-provoking resource. Information Ethics is divided into five parts and twenty chapters or articles. At the end of each of the five parts, the editor has included a few "discussion cases," which allows the users to apply what they just read to potential real life examples. Part I, "An Ethical Framework for Analysis," provides readers with an introduction to reasoning and ethics. This complex and philosophical section of the book contains five articles and four discussion cases. All five of the articles are really thought provoking and challenging writings on morality. For instance, in the first article, "Introduction to Moral Reasoning," Tom Regan examines how not to answer a moral question. For example, he thinks using what the majority believes as a means of determining what is and is not moral is flawed. "The Metaphysics of Morals" by Immanuel Kant looks at the reasons behind actions. According to Kant, to be moral one has to do the right thing for the right reasons. By including materials that force the reader to think more broadly and deeply about what is right and wrong, Moore has provided an important foundation and backdrop for the rest of the book. Part II, "Intellectual Property: Moral and Legal Concerns," contains five articles and three discussion cases for tackling issues like ownership, patents, copyright, and biopiracy. This section takes a probing look at intellectual and intangible property from a variety of viewpoints. For instance, in "Intellectual Property is Still Property," Judge Frank Easterbrook argues that intellectual property is no different than physical property and should not be treated any differently by law. Tom Palmer's article, "Are Patents and Copyrights Morally Justified," however, uses historical examples to show how intellectual and physical properties differ.
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
    Imprint
    Seattle, WA : University of Washington Press
    LCSH
    Freedom of information
    Privacy, Right of
    Subject
    Freedom of information
    Privacy, Right of
  5. Information cultures in the digital age : a Festschrift in Honor of Rafael Capurro (2016) 0.04
    0.03699942 = product of:
      0.09249855 = sum of:
        0.07304801 = weight(_text_:philosophy in 4127) [ClassicSimilarity], result of:
          0.07304801 = score(doc=4127,freq=6.0), product of:
            0.23055021 = queryWeight, product of:
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.04177434 = queryNorm
            0.31684208 = fieldWeight in 4127, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              5.5189433 = idf(docFreq=481, maxDocs=44218)
              0.0234375 = fieldNorm(doc=4127)
        0.019450538 = weight(_text_:of in 4127) [ClassicSimilarity], result of:
          0.019450538 = score(doc=4127,freq=66.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.2977506 = fieldWeight in 4127, product of:
              8.124039 = tf(freq=66.0), with freq of:
                66.0 = termFreq=66.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0234375 = fieldNorm(doc=4127)
      0.4 = coord(2/5)
    
    Abstract
    For several decades Rafael Capurro has been at the forefront of defining the relationship between information and modernity through both phenomenological and ethical formulations. In exploring both of these themes Capurro has re-vivified the transcultural and intercultural expressions of how we bring an understanding of information to bear on scientific knowledge production and intermediation. Capurro has long stressed the need to look deeply into how we contextualize the information problems that scientific society creates for us and to re-incorporate a pragmatic dimension into our response that provides a balance to the cognitive turn in information science. With contributions from 35 scholars from 15 countries, Information Cultures in the Digital Age focuses on the culture and philosophy of information, information ethics, the relationship of information to message, the historic and semiotic understanding of information, the relationship of information to power and the future of information education. This Festschrift seeks to celebrate Rafael Capurro's important contribution to a global dialogue on how information conceptualization, use and technology impact human culture and the ethical questions that arise from this dynamic relationship.
    Content
    Inhalt: Super-Science, Fundamental Dimension, Way of Being: Library and Information Science in an Age of Messages / Bawden, David (et al.) (S.31-43) - The "Naturalization" of the Philosophy of Rafael Capurro: Logic, Information and Ethics / Brenner, Joseph E. (S.45-64) - Turing's Cyberworld / Eldred, Michael (S.65-81) - Hermeneutics and Information Science: The Ongoing Journey From Simple Objective Interpretation to Understanding Data as a Form of Disclosure / Kelly, Matthew (S.83-110) - The Epistemological Maturity of Information Science and the Debate Around Paradigms / Ribeiro, Fernanda (et al.) (S.111-124) - A Methodology for Studying Knowledge Creation in Organizational Settings: A Phenomenological Viewpoint / Suorsa, Anna (et al.) (S.125-142) - The Significance of Digital Hermeneutics for the Philosophy of Technology / Tripathi, Arun Kumar (S.143-157) - Reconciling Social Responsibility and Neutrality in LIS Professional Ethics: A Virtue Ethics Approach / Burgess, John T F (S.161-172) - Information Ethics in the Age of Digital Labour and the Surveillance-Industrial Complex / Fuchs, Christian (S.173-190) - Intercultural Information Ethics: A Pragmatic Consideration / Hongladarom, Soraj (S.191-206) - Ethics of European Institutions as Normative Foundation of Responsible Research and Innovation in ICT / Stahl, Bernd Carsten (S.207-219) - Raphael's / Holgate, John D. (S.223-245) - Understanding the Pulse of Existence: An Examination of Capurro's Angeletics / Morador, Fernando Flores (S.247-252) - The Demon in the Gap of Language: Capurro, Ethics and language in Divided Germany / Saldanha, Gustavo Silva (S.253-268) - General Intellect, Communication and Contemporary Media Theory / Frohmann, Bernd (S.271-286) - "Data": The data / Furner, Jonathan (S.287-306) - On the Pre-History of Library Ethics: Documents and Legitimacy / Hansson, Joacim (S.307-319) -
    Ethico-Philosophical Reflection on Overly Self-Confident or Even Arrogant Humanism Applied to a Possible History-oriented Rationality of the Library and Librarianship / Suominen, Vesa (S.321-338) - Culture Clash or Transformation? Some Thoughts Concerning the Onslaught of Market economy on the Internet and its Retaliation / Hausmanninger, Thomas (S.341-358) - Magicians and Guerrillas: Transforming Time and Space / Lodge, Juliet (et al.) (.359-371) - Gramsci, Golem, Google: A Marxist Dialog with Rafael Capurro's Intercultural Information Ethics / Schneider, Marco (S.373-383) - From Culture Industry to Information Society: How Horkheimer and Adorno's Conception of the Culture Industry Can Help Us Examine Information Overload in the Capitalist Information Society / Spier, Shaked (S.385-396) - Ethical and Legal Use of Information by University Students: The Core Content of a Training Program / Fernández-Molina, Juan-Carlos (et al.) (S.399-412) - Reflections on Rafael Capurro's Thoughts in Education and Research of Information Science in Brazil / Pinheiro, Lena Vania (S.413-425) - Content Selection in Undergraduate LIS Education / Zins, Chaim (et al.) (S.427-453) - The Train Has Left the Station: Chronicles of the African Network for Information Ethics and the African Centre of Excellence for Information Ethics / Fischer, Rachel (et al.) (S.455-467).
  6. Miller, S.: Privacy, data bases and computers (1998) 0.02
    0.017131606 = product of:
      0.042829014 = sum of:
        0.02018963 = weight(_text_:of in 3027) [ClassicSimilarity], result of:
          0.02018963 = score(doc=3027,freq=10.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.3090647 = fieldWeight in 3027, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=3027)
        0.022639386 = product of:
          0.045278773 = sum of:
            0.045278773 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.045278773 = score(doc=3027,freq=2.0), product of:
                0.14628662 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04177434 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
    Source
    Journal of information ethics. 7(1998) no.1, S.42-48
  7. O'Neil, R.M.: Free speech in cyberspace (1998) 0.02
    0.016279016 = product of:
      0.040697537 = sum of:
        0.018058153 = weight(_text_:of in 248) [ClassicSimilarity], result of:
          0.018058153 = score(doc=248,freq=8.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.27643585 = fieldWeight in 248, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=248)
        0.022639386 = product of:
          0.045278773 = sum of:
            0.045278773 = weight(_text_:22 in 248) [ClassicSimilarity], result of:
              0.045278773 = score(doc=248,freq=2.0), product of:
                0.14628662 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04177434 = queryNorm
                0.30952093 = fieldWeight in 248, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=248)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    Having reached the US Supreme Court in 1997, the Communications Decency Act (1996) has strong implications for Internet service providers. How to protect children while not denying adult rights of access is an issue which has impacted successively upon motion pictures, reading materials, radio, television and cable. The case for freedom of electronic speech appears compelling. The problems of obscenity, encryption (cryptography) and provocative 'cyberspeech' on the Internet offers a field day for litigation
    Date
    22. 2.1999 15:50:50
    Source
    Journal of information ethics. 7(1998) no.1, S.15-23
  8. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.02
    0.01575466 = product of:
      0.039386652 = sum of:
        0.025237037 = weight(_text_:of in 1868) [ClassicSimilarity], result of:
          0.025237037 = score(doc=1868,freq=40.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.38633084 = fieldWeight in 1868, product of:
              6.3245554 = tf(freq=40.0), with freq of:
                40.0 = termFreq=40.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.0141496165 = product of:
          0.028299233 = sum of:
            0.028299233 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.028299233 = score(doc=1868,freq=2.0), product of:
                0.14628662 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04177434 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1134-1142
  9. Brody, R.: ¬The problem of information naïveté (2008) 0.01
    0.01416828 = product of:
      0.0354207 = sum of:
        0.0133040715 = product of:
          0.066520356 = sum of:
            0.066520356 = weight(_text_:problem in 1865) [ClassicSimilarity], result of:
              0.066520356 = score(doc=1865,freq=2.0), product of:
                0.17731056 = queryWeight, product of:
                  4.244485 = idf(docFreq=1723, maxDocs=44218)
                  0.04177434 = queryNorm
                0.375163 = fieldWeight in 1865, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.244485 = idf(docFreq=1723, maxDocs=44218)
                  0.0625 = fieldNorm(doc=1865)
          0.2 = coord(1/5)
        0.02211663 = weight(_text_:of in 1865) [ClassicSimilarity], result of:
          0.02211663 = score(doc=1865,freq=12.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.33856338 = fieldWeight in 1865, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=1865)
      0.4 = coord(2/5)
    
    Abstract
    With the rapidly changing Web-enabled world, the already existing dichotomy between knowing of and knowing about, or information naïveté, widens daily. This article explores the ethical dilemmas that can result from the lack of information literacy. The article also discusses conditions and consequences of information naïveté, media bias, possessive memory, and limited contexts and abilities. To help avoid information failure, the author recommends producers, contributors, disseminators, and aggregators of information be less information naïve.
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1124-1127
  10. Seadle, M.: Copyright in a networked world : ethics and infringement (2004) 0.01
    0.014163372 = product of:
      0.03540843 = sum of:
        0.0127690425 = weight(_text_:of in 2833) [ClassicSimilarity], result of:
          0.0127690425 = score(doc=2833,freq=4.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.19546966 = fieldWeight in 2833, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=2833)
        0.022639386 = product of:
          0.045278773 = sum of:
            0.045278773 = weight(_text_:22 in 2833) [ClassicSimilarity], result of:
              0.045278773 = score(doc=2833,freq=2.0), product of:
                0.14628662 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04177434 = queryNorm
                0.30952093 = fieldWeight in 2833, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2833)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    The statutes themselves are not the only basis for deciding whether an intellectual property rights infringement has occurred. Ethical judgments can also influence judicial rulings. This column looks at three issues of intellectual property ethics: the nature of the property, written guidelines for behavior, and enforcement mechanisms. For most active infringers digital property seems unreal, the rules ambiguous, and the enforcement statistically unlikely.
    Source
    Library hi tech. 22(2004) no.1, S.106-110
  11. Broughton, V.: ¬The respective roles of intellectual creativity and automation in representing diversity : human and machine generated bias (2019) 0.01
    0.012842399 = product of:
      0.032105997 = sum of:
        0.0117592495 = product of:
          0.058796246 = sum of:
            0.058796246 = weight(_text_:problem in 5728) [ClassicSimilarity], result of:
              0.058796246 = score(doc=5728,freq=4.0), product of:
                0.17731056 = queryWeight, product of:
                  4.244485 = idf(docFreq=1723, maxDocs=44218)
                  0.04177434 = queryNorm
                0.33160037 = fieldWeight in 5728, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  4.244485 = idf(docFreq=1723, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5728)
          0.2 = coord(1/5)
        0.02034675 = weight(_text_:of in 5728) [ClassicSimilarity], result of:
          0.02034675 = score(doc=5728,freq=26.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.31146988 = fieldWeight in 5728, product of:
              5.0990195 = tf(freq=26.0), with freq of:
                26.0 = termFreq=26.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5728)
      0.4 = coord(2/5)
    
    Abstract
    The paper traces the development of the discussion around ethical issues in artificial intelligence, and considers the way in which humans have affected the knowledge bases used in machine learning. The phenomenon of bias or discrimination in machine ethics is seen as inherited from humans, either through the use of biased data or through the semantics inherent in intellectually- built tools sourced by intelligent agents. The kind of biases observed in AI are compared with those identified in the field of knowledge organization, using religious adherents as an example of a community potentially marginalized by bias. A practical demonstration is given of apparent religious prejudice inherited from source material in a large database deployed widely in computational linguistics and automatic indexing. Methods to address the problem of bias are discussed, including the modelling of the moral process on neuroscientific understanding of brain function. The question is posed whether it is possible to model religious belief in a similar way, so that robots of the future may have both an ethical and a religious sense and themselves address the problem of prejudice.
  12. Van der Walt, M.S.: Normative ethics in knowledge organisation (2008) 0.01
    0.012068383 = product of:
      0.030170958 = sum of:
        0.008315044 = product of:
          0.041575223 = sum of:
            0.041575223 = weight(_text_:problem in 1696) [ClassicSimilarity], result of:
              0.041575223 = score(doc=1696,freq=2.0), product of:
                0.17731056 = queryWeight, product of:
                  4.244485 = idf(docFreq=1723, maxDocs=44218)
                  0.04177434 = queryNorm
                0.23447686 = fieldWeight in 1696, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.244485 = idf(docFreq=1723, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1696)
          0.2 = coord(1/5)
        0.021855915 = weight(_text_:of in 1696) [ClassicSimilarity], result of:
          0.021855915 = score(doc=1696,freq=30.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.33457235 = fieldWeight in 1696, product of:
              5.477226 = tf(freq=30.0), with freq of:
                30.0 = termFreq=30.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1696)
      0.4 = coord(2/5)
    
    Abstract
    The paper addresses the problem of whether the information profession needs ethical norms or guidelines specifically aimed at situations that may arise during knowledge organisation processes, and, if so, which specific norms should be included in codes of conduct. To explore this issue the following three specific questions are addressed: - Which forms of unethical conduct actually occur in knowledge organisation? - Which specific guidelines are required for promoting ethical practices in knowledge organisation? - To what extent does existing ethical codes make provision for knowledge organization practices? Four categories of unethical conduct in knowledge organisation are identified: - The use of terms with negative connotations - Misrepresentation of the subject - Censorship of "undesirable materials" - Bias in verbal indexing languages, classification schemes, evaluative comments in bibliographic records and subject analysis. Guidelines in codes of conduct should be aimed at encouraging information professionals to avoid these unethical practices. An examination of a number of existing ethical codes for the information profession shows that, although general ethical statements, that can be seen as applicable to knowledge organisation tasks, do occur in these codes, this is by no means a general trend. It is also clear that very few of the codes give explicit attention to knowledge organisation.
    Source
    Kompatibilität, Medien und Ethik in der Wissensorganisation - Compatibility, Media and Ethics in Knowledge Organization: Proceedings der 10. Tagung der Deutschen Sektion der Internationalen Gesellschaft für Wissensorganisation Wien, 3.-5. Juli 2006 - Proceedings of the 10th Conference of the German Section of the International Society of Knowledge Organization Vienna, 3-5 July 2006. Ed.: H.P. Ohly, S. Netscher u. K. Mitgutsch
  13. Homan, P.A.: Library catalog notes for "bad books" : ethics vs. responsibilities (2012) 0.01
    0.012044367 = product of:
      0.030110918 = sum of:
        0.015961302 = weight(_text_:of in 420) [ClassicSimilarity], result of:
          0.015961302 = score(doc=420,freq=16.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.24433708 = fieldWeight in 420, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=420)
        0.0141496165 = product of:
          0.028299233 = sum of:
            0.028299233 = weight(_text_:22 in 420) [ClassicSimilarity], result of:
              0.028299233 = score(doc=420,freq=2.0), product of:
                0.14628662 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04177434 = queryNorm
                0.19345059 = fieldWeight in 420, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=420)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    The conflict between librarians' ethics and their responsibilities in the process of progressive collection management, which applies the principles of cost accounting to libraries, to call attention to the "bad books" in their collections that are compromised by age, error, abridgement, expurgation, plagiarism, copyright violation, libel, or fraud, is discussed. According to Charles Cutter, notes in catalog records should call attention to the best books but ignore the bad ones. Libraries that can afford to keep their "bad books," however, which often have a valuable second life, must call attention to their intellectual contexts in notes in the catalog records. Michael Bellesiles's Arming America, the most famous case of academic fraud at the turn of the twenty-first century, is used as a test case. Given the bias of content enhancement that automatically pulls content from the Web into library catalogs, catalog notes for "bad books" may be the only way for librarians to uphold their ethical principles regarding collection management while fulfilling their professional responsibilities to their users in calling attention to their "bad books."
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_f.pdf.
    Date
    27. 9.2012 14:22:00
  14. Smith, M.M.: Information ethics (1997) 0.01
    0.0059721726 = product of:
      0.029860863 = sum of:
        0.029860863 = weight(_text_:of in 1042) [ClassicSimilarity], result of:
          0.029860863 = score(doc=1042,freq=14.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.45711282 = fieldWeight in 1042, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.078125 = fieldNorm(doc=1042)
      0.2 = coord(1/5)
    
    Abstract
    State of the art review of the concepts of information ethics, computer ethics, and cyberethics by explaining the emergence of applied information ethics through channels of professional practice and scholarly communication. Surveys the beginning of information ethics from 1988 through 1996
    Source
    Annual review of information science and technology. 32(1997), S.339-366
  15. Marco, G.A.: Ethics for librarians : a narrow view (1996) 0.01
    0.0054174457 = product of:
      0.027087228 = sum of:
        0.027087228 = weight(_text_:of in 3706) [ClassicSimilarity], result of:
          0.027087228 = score(doc=3706,freq=18.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.41465375 = fieldWeight in 3706, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=3706)
      0.2 = coord(1/5)
    
    Abstract
    Offers a definition of ethics for librarians by recent concerns in the uSA about the Code of Ethics (1981) of the ALA and by examination of other codes of ethics, such as that produced by the Library Association, UK, and the writings of librarians and ethicists. Concludes with notes on the revision of the 1981 Code of Ethics, adopted by the ALA on 28 June 95, comparing the 2 codes and noting the differences where applicable
    Source
    Journal of librarianship and information science. 28(1996) no.1, S.33-38
  16. Cline, E.: Here comes a chopper to chop off your head : freedom of expression versus censorship in America (1995) 0.01
    0.0054174457 = product of:
      0.027087228 = sum of:
        0.027087228 = weight(_text_:of in 2452) [ClassicSimilarity], result of:
          0.027087228 = score(doc=2452,freq=18.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.41465375 = fieldWeight in 2452, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=2452)
      0.2 = coord(1/5)
    
    Abstract
    Writer Edward Cline looks at the debate on freedom of expression versus censorship in the USA with reference to the provision of information. He challenges the idea that there is a moral obligation to provide a forum for ideas with which one disagrees, noting the problems of public libraries attempting to balance the contents of their stock. Challenges American anti-intellectualism and maintains that, because of the invlovement of the government in so many areas of life, America can no longer be considered a free country
    Source
    Journal of information ethics. 4(1995) no.2, S.18-32
  17. Keilty, P.: Tagging and sexual boundaries (2012) 0.01
    0.005172053 = product of:
      0.025860265 = sum of:
        0.025860265 = weight(_text_:of in 418) [ClassicSimilarity], result of:
          0.025860265 = score(doc=418,freq=42.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.39587128 = fieldWeight in 418, product of:
              6.4807405 = tf(freq=42.0), with freq of:
                42.0 = termFreq=42.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=418)
      0.2 = coord(1/5)
    
    Abstract
    The purpose of this essay is to demonstrate that the mechanisms of power around classifications of gender and sexuality are not always top-down or bottom-up. Instead, the weight of social discipline among members of sexual subcultures themselves helps to create these classifications, often reflecting the nomenclature of subjects and desires within sexual subcultures in a complex relationship to a dominant culture. Critically examining contemporary folksonomic classifications of representations of queer desire within Xtube, a database of online pornography, this paper reveals that social discipline occurs in the stabilization of nomenclature through socialization and through members' overt intervention into each others' selfunderstanding. The Xtube evidence reveals a complex social and cultural structure among members of sexual subcultures by drawing our attention to the particularity of various modes of sexual being and the relationship between those modes and particular configurations of sexual identity. In the process, this paper allows us to reassess, first, a presupposition of folksonomies as free of discipline allowing for their emancipatory potential and, second, the prevailing binary understandings of authority in the development of sexual nomenclatures and classifications as either top-down or bottom-up.
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_b.pdf.
  18. Capurro, R.: Information technology and technologies of the self (1996) 0.01
    0.005107617 = product of:
      0.025538085 = sum of:
        0.025538085 = weight(_text_:of in 7748) [ClassicSimilarity], result of:
          0.025538085 = score(doc=7748,freq=16.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.39093933 = fieldWeight in 7748, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=7748)
      0.2 = coord(1/5)
    
    Abstract
    Discusses how we can ensure that the benefits of information technology are distributed equitably and can be used by people to shape their lives. Examines some ethical aspects of the intersections between information technology and technologies of the self, as analyzed by some leading thinkers. The analyzes show that information technology shares the ambiguities of all technological products. The mutual dependency between moral rules and technologies of the self with regard to the social impact of information technology is also demonstrated
    Source
    Journal of information ethics. 5(1996) no.2, S.19-28
  19. Tenopir, C.: Ethics for online educators (1992) 0.01
    0.0050474075 = product of:
      0.025237037 = sum of:
        0.025237037 = weight(_text_:of in 7334) [ClassicSimilarity], result of:
          0.025237037 = score(doc=7334,freq=10.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.38633084 = fieldWeight in 7334, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.078125 = fieldNorm(doc=7334)
      0.2 = coord(1/5)
    
    Abstract
    The only monitoring of educators is performed by their internal sense of right and wrong. Following the aggred terms of system contracts, selecting the most appropriate systems for students, keeping up to date with system features, and instilling ethical behaviour in students are at the core of ethics for online educators
    Source
    Journal of information ethics. 1(1992), S.32-40
  20. Cope, J.: Librarianship as intellectual craft : the ethics of classification in the realms of leisure and waged labor (2012) 0.01
    0.0050474075 = product of:
      0.025237037 = sum of:
        0.025237037 = weight(_text_:of in 421) [ClassicSimilarity], result of:
          0.025237037 = score(doc=421,freq=40.0), product of:
            0.06532493 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04177434 = queryNorm
            0.38633084 = fieldWeight in 421, product of:
              6.3245554 = tf(freq=40.0), with freq of:
                40.0 = termFreq=40.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=421)
      0.2 = coord(1/5)
    
    Abstract
    This paper develops an ethical conception of library labor as an intellectual craft that can serve as an alternative to a deterministic discourse of technological transformation. In this paper, the author proposes a model of librarianship as an intellectual craft that can be used as an "ideal type" in comparison to recent transformations in the practice of librarianship. This paper then examines the rise of participatory classification in the realm of leisure in user-generated classification schemes (e.g., folksonomies) as a way of examining some of the difficult ethical questions that this ideal of intellectual craft poses when applied to contemporary conditions. Marx's concept of surplus value is used to examine how donated labor adds to the general knowledge. This paper concludes by advocating for the general expansion of leisure coupled with the promotion public institutions that support the craft of those who organize information in a broadly defined public interest. In an era of dramatic change, such a framework offers a positive ethical account of librarians and information professionals' labor that is not wholly dependent on a discourse of market exchange.
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_g.pdf.

Authors

Years

Types

  • a 91
  • m 9
  • s 5
  • More… Less…