Search (101 results, page 1 of 6)

  • × theme_ss:"Informationsethik"
  • × type_ss:"a"
  1. Miller, S.: Privacy, data bases and computers (1998) 0.02
    0.022886775 = product of:
      0.06866033 = sum of:
        0.06866033 = sum of:
          0.021173978 = weight(_text_:of in 3027) [ClassicSimilarity], result of:
            0.021173978 = score(doc=3027,freq=10.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.3090647 = fieldWeight in 3027, product of:
                3.1622777 = tf(freq=10.0), with freq of:
                  10.0 = termFreq=10.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.0625 = fieldNorm(doc=3027)
          0.047486346 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
            0.047486346 = score(doc=3027,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.30952093 = fieldWeight in 3027, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0625 = fieldNorm(doc=3027)
      0.33333334 = coord(1/3)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
    Source
    Journal of information ethics. 7(1998) no.1, S.42-48
  2. O'Neil, R.M.: Free speech in cyberspace (1998) 0.02
    0.022141643 = product of:
      0.06642493 = sum of:
        0.06642493 = sum of:
          0.018938582 = weight(_text_:of in 248) [ClassicSimilarity], result of:
            0.018938582 = score(doc=248,freq=8.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.27643585 = fieldWeight in 248, product of:
                2.828427 = tf(freq=8.0), with freq of:
                  8.0 = termFreq=8.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.0625 = fieldNorm(doc=248)
          0.047486346 = weight(_text_:22 in 248) [ClassicSimilarity], result of:
            0.047486346 = score(doc=248,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.30952093 = fieldWeight in 248, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0625 = fieldNorm(doc=248)
      0.33333334 = coord(1/3)
    
    Abstract
    Having reached the US Supreme Court in 1997, the Communications Decency Act (1996) has strong implications for Internet service providers. How to protect children while not denying adult rights of access is an issue which has impacted successively upon motion pictures, reading materials, radio, television and cable. The case for freedom of electronic speech appears compelling. The problems of obscenity, encryption (cryptography) and provocative 'cyberspeech' on the Internet offers a field day for litigation
    Date
    22. 2.1999 15:50:50
    Source
    Journal of information ethics. 7(1998) no.1, S.15-23
  3. Seadle, M.: Copyright in a networked world : ethics and infringement (2004) 0.02
    0.020292649 = product of:
      0.060877945 = sum of:
        0.060877945 = sum of:
          0.0133916 = weight(_text_:of in 2833) [ClassicSimilarity], result of:
            0.0133916 = score(doc=2833,freq=4.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.19546966 = fieldWeight in 2833, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.0625 = fieldNorm(doc=2833)
          0.047486346 = weight(_text_:22 in 2833) [ClassicSimilarity], result of:
            0.047486346 = score(doc=2833,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.30952093 = fieldWeight in 2833, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0625 = fieldNorm(doc=2833)
      0.33333334 = coord(1/3)
    
    Abstract
    The statutes themselves are not the only basis for deciding whether an intellectual property rights infringement has occurred. Ethical judgments can also influence judicial rulings. This column looks at three issues of intellectual property ethics: the nature of the property, written guidelines for behavior, and enforcement mechanisms. For most active infringers digital property seems unreal, the rules ambiguous, and the enforcement statistically unlikely.
    Source
    Library hi tech. 22(2004) no.1, S.106-110
  4. Aghemo, A.: Etica professionale e servizio di informazione (1993) 0.02
    0.02002593 = product of:
      0.060077786 = sum of:
        0.060077786 = sum of:
          0.018527232 = weight(_text_:of in 2453) [ClassicSimilarity], result of:
            0.018527232 = score(doc=2453,freq=10.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.2704316 = fieldWeight in 2453, product of:
                3.1622777 = tf(freq=10.0), with freq of:
                  10.0 = termFreq=10.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.0546875 = fieldNorm(doc=2453)
          0.041550554 = weight(_text_:22 in 2453) [ClassicSimilarity], result of:
            0.041550554 = score(doc=2453,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.2708308 = fieldWeight in 2453, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0546875 = fieldNorm(doc=2453)
      0.33333334 = coord(1/3)
    
    Abstract
    An awareness exists among Italian librarians of the need for an established code of ethics for library reference services. Considers the principles that such a code should incorporate; the US Commitment to Information services, for example, affirms users' rights of access to library books and resources, regardless of content and opinions expressed. Censoship is opposed and people are not barred from library use for ethnis, social or religious reasons. An ethical code would require library staff to be impartial, give attention and respect to users, allocate time properly, and avoid prejudice. Discusses the problems of library ethics which arise when user requests relate to sensitive topics e.g. euthansia, cocaine refining
    Date
    6. 4.1996 13:22:31
  5. Lengauer, E.: Analytische Rechtsethik im Kontext säkularer Begründungsdiskurse zur Würde biologischer Entitäten (2008) 0.02
    0.019373938 = product of:
      0.058121815 = sum of:
        0.058121815 = sum of:
          0.01657126 = weight(_text_:of in 1697) [ClassicSimilarity], result of:
            0.01657126 = score(doc=1697,freq=8.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.24188137 = fieldWeight in 1697, product of:
                2.828427 = tf(freq=8.0), with freq of:
                  8.0 = termFreq=8.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.0546875 = fieldNorm(doc=1697)
          0.041550554 = weight(_text_:22 in 1697) [ClassicSimilarity], result of:
            0.041550554 = score(doc=1697,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.2708308 = fieldWeight in 1697, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0546875 = fieldNorm(doc=1697)
      0.33333334 = coord(1/3)
    
    Date
    17. 3.2008 15:17:22
    Source
    Kompatibilität, Medien und Ethik in der Wissensorganisation - Compatibility, Media and Ethics in Knowledge Organization: Proceedings der 10. Tagung der Deutschen Sektion der Internationalen Gesellschaft für Wissensorganisation Wien, 3.-5. Juli 2006 - Proceedings of the 10th Conference of the German Section of the International Society of Knowledge Organization Vienna, 3-5 July 2006. Ed.: H.P. Ohly, S. Netscher u. K. Mitgutsch
  6. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.02
    0.01871548 = product of:
      0.05614644 = sum of:
        0.05614644 = sum of:
          0.026467472 = weight(_text_:of in 1868) [ClassicSimilarity], result of:
            0.026467472 = score(doc=1868,freq=40.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.38633084 = fieldWeight in 1868, product of:
                6.3245554 = tf(freq=40.0), with freq of:
                  40.0 = termFreq=40.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.0390625 = fieldNorm(doc=1868)
          0.029678967 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
            0.029678967 = score(doc=1868,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.19345059 = fieldWeight in 1868, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0390625 = fieldNorm(doc=1868)
      0.33333334 = coord(1/3)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1134-1142
  7. Homan, P.A.: Library catalog notes for "bad books" : ethics vs. responsibilities (2012) 0.02
    0.015472822 = product of:
      0.046418466 = sum of:
        0.046418466 = sum of:
          0.016739499 = weight(_text_:of in 420) [ClassicSimilarity], result of:
            0.016739499 = score(doc=420,freq=16.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.24433708 = fieldWeight in 420, product of:
                4.0 = tf(freq=16.0), with freq of:
                  16.0 = termFreq=16.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.0390625 = fieldNorm(doc=420)
          0.029678967 = weight(_text_:22 in 420) [ClassicSimilarity], result of:
            0.029678967 = score(doc=420,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.19345059 = fieldWeight in 420, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0390625 = fieldNorm(doc=420)
      0.33333334 = coord(1/3)
    
    Abstract
    The conflict between librarians' ethics and their responsibilities in the process of progressive collection management, which applies the principles of cost accounting to libraries, to call attention to the "bad books" in their collections that are compromised by age, error, abridgement, expurgation, plagiarism, copyright violation, libel, or fraud, is discussed. According to Charles Cutter, notes in catalog records should call attention to the best books but ignore the bad ones. Libraries that can afford to keep their "bad books," however, which often have a valuable second life, must call attention to their intellectual contexts in notes in the catalog records. Michael Bellesiles's Arming America, the most famous case of academic fraud at the turn of the twenty-first century, is used as a test case. Given the bias of content enhancement that automatically pulls content from the Web into library catalogs, catalog notes for "bad books" may be the only way for librarians to uphold their ethical principles regarding collection management while fulfilling their professional responsibilities to their users in calling attention to their "bad books."
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_f.pdf.
    Date
    27. 9.2012 14:22:00
  8. "Code of Ethics" verabschiedet (2007) 0.01
    0.008878035 = product of:
      0.026634103 = sum of:
        0.026634103 = sum of:
          0.005858825 = weight(_text_:of in 459) [ClassicSimilarity], result of:
            0.005858825 = score(doc=459,freq=4.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.08551798 = fieldWeight in 459, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.02734375 = fieldNorm(doc=459)
          0.020775277 = weight(_text_:22 in 459) [ClassicSimilarity], result of:
            0.020775277 = score(doc=459,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.1354154 = fieldWeight in 459, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.02734375 = fieldNorm(doc=459)
      0.33333334 = coord(1/3)
    
    Abstract
    Im Rahmen des 3. Leipziger Kongresses für Information und Bibliothek 19.-22. März 2007 hat Bibliothek & Information Deutschland (BID) die im folgenden wiedergegebenen "Ethischen Grundsätze der Bibliotheks- und Informationsberufe" verabschiedet und der Presse und Fachöffentlichkeit vorgestellt. Damit folgt Deutschland den rund 40 Ländern weltweit, die bereits einen "Code of Ethics" veröffentlicht haben. Diese ethischen Richtlinien sind auf der IFLA/FAIFE-Website gesammelt unter www.ifla.org/faife/ethics/codes.htm.
  9. Hammwöhner, R.: Anmerkungen zur Grundlegung der Informationsethik (2006) 0.01
    0.007914391 = product of:
      0.023743173 = sum of:
        0.023743173 = product of:
          0.047486346 = sum of:
            0.047486346 = weight(_text_:22 in 6063) [ClassicSimilarity], result of:
              0.047486346 = score(doc=6063,freq=2.0), product of:
                0.15341885 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.043811057 = queryNorm
                0.30952093 = fieldWeight in 6063, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=6063)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Date
    13.10.2006 10:22:03
  10. Helbing, D.: ¬Das große Scheitern (2019) 0.01
    0.007914391 = product of:
      0.023743173 = sum of:
        0.023743173 = product of:
          0.047486346 = sum of:
            0.047486346 = weight(_text_:22 in 5599) [ClassicSimilarity], result of:
              0.047486346 = score(doc=5599,freq=2.0), product of:
                0.15341885 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.043811057 = queryNorm
                0.30952093 = fieldWeight in 5599, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=5599)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Date
    25.12.2019 14:19:22
  11. "Code of Ethics" verabschiedet (2007) 0.01
    0.007609743 = product of:
      0.022829229 = sum of:
        0.022829229 = sum of:
          0.0050218496 = weight(_text_:of in 462) [ClassicSimilarity], result of:
            0.0050218496 = score(doc=462,freq=4.0), product of:
              0.06850986 = queryWeight, product of:
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.043811057 = queryNorm
              0.07330112 = fieldWeight in 462, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                1.5637573 = idf(docFreq=25162, maxDocs=44218)
                0.0234375 = fieldNorm(doc=462)
          0.01780738 = weight(_text_:22 in 462) [ClassicSimilarity], result of:
            0.01780738 = score(doc=462,freq=2.0), product of:
              0.15341885 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.043811057 = queryNorm
              0.116070345 = fieldWeight in 462, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0234375 = fieldNorm(doc=462)
      0.33333334 = coord(1/3)
    
    Abstract
    Im Rahmen des 3. Leipziger Kongresses für Information und Bibliothek 19.-22. März 2007 hat Bibliothek & Information Deutschland (BID) die im folgenden wiedergegebenen "Ethischen Grundsätze der Bibliotheks- und Informationsberufe" verabschiedet und der Presse und Fachöffentlichkeit vorgestellt. Damit folgt Deutschland den rund 40 Ländern weltweit, die bereits einen "Code of Ethics" veröffentlicht haben. Diese ethischen Richtlinien sind auf der IFLA/FAIFE-Website gesammelt unter www.ifla.org/faife/ethics/codes.htm.
  12. Smith, M.M.: Information ethics (1997) 0.01
    0.005219456 = product of:
      0.015658367 = sum of:
        0.015658367 = product of:
          0.031316735 = sum of:
            0.031316735 = weight(_text_:of in 1042) [ClassicSimilarity], result of:
              0.031316735 = score(doc=1042,freq=14.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.45711282 = fieldWeight in 1042, product of:
                  3.7416575 = tf(freq=14.0), with freq of:
                    14.0 = termFreq=14.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.078125 = fieldNorm(doc=1042)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    State of the art review of the concepts of information ethics, computer ethics, and cyberethics by explaining the emergence of applied information ethics through channels of professional practice and scholarly communication. Surveys the beginning of information ethics from 1988 through 1996
    Source
    Annual review of information science and technology. 32(1997), S.339-366
  13. Marco, G.A.: Ethics for librarians : a narrow view (1996) 0.00
    0.0047346456 = product of:
      0.014203936 = sum of:
        0.014203936 = product of:
          0.028407872 = sum of:
            0.028407872 = weight(_text_:of in 3706) [ClassicSimilarity], result of:
              0.028407872 = score(doc=3706,freq=18.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.41465375 = fieldWeight in 3706, product of:
                  4.2426405 = tf(freq=18.0), with freq of:
                    18.0 = termFreq=18.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3706)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    Offers a definition of ethics for librarians by recent concerns in the uSA about the Code of Ethics (1981) of the ALA and by examination of other codes of ethics, such as that produced by the Library Association, UK, and the writings of librarians and ethicists. Concludes with notes on the revision of the 1981 Code of Ethics, adopted by the ALA on 28 June 95, comparing the 2 codes and noting the differences where applicable
    Source
    Journal of librarianship and information science. 28(1996) no.1, S.33-38
  14. Cline, E.: Here comes a chopper to chop off your head : freedom of expression versus censorship in America (1995) 0.00
    0.0047346456 = product of:
      0.014203936 = sum of:
        0.014203936 = product of:
          0.028407872 = sum of:
            0.028407872 = weight(_text_:of in 2452) [ClassicSimilarity], result of:
              0.028407872 = score(doc=2452,freq=18.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.41465375 = fieldWeight in 2452, product of:
                  4.2426405 = tf(freq=18.0), with freq of:
                    18.0 = termFreq=18.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2452)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    Writer Edward Cline looks at the debate on freedom of expression versus censorship in the USA with reference to the provision of information. He challenges the idea that there is a moral obligation to provide a forum for ideas with which one disagrees, noting the problems of public libraries attempting to balance the contents of their stock. Challenges American anti-intellectualism and maintains that, because of the invlovement of the government in so many areas of life, America can no longer be considered a free country
    Source
    Journal of information ethics. 4(1995) no.2, S.18-32
  15. Keilty, P.: Tagging and sexual boundaries (2012) 0.00
    0.0045201816 = product of:
      0.013560544 = sum of:
        0.013560544 = product of:
          0.027121088 = sum of:
            0.027121088 = weight(_text_:of in 418) [ClassicSimilarity], result of:
              0.027121088 = score(doc=418,freq=42.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.39587128 = fieldWeight in 418, product of:
                  6.4807405 = tf(freq=42.0), with freq of:
                    42.0 = termFreq=42.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=418)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    The purpose of this essay is to demonstrate that the mechanisms of power around classifications of gender and sexuality are not always top-down or bottom-up. Instead, the weight of social discipline among members of sexual subcultures themselves helps to create these classifications, often reflecting the nomenclature of subjects and desires within sexual subcultures in a complex relationship to a dominant culture. Critically examining contemporary folksonomic classifications of representations of queer desire within Xtube, a database of online pornography, this paper reveals that social discipline occurs in the stabilization of nomenclature through socialization and through members' overt intervention into each others' selfunderstanding. The Xtube evidence reveals a complex social and cultural structure among members of sexual subcultures by drawing our attention to the particularity of various modes of sexual being and the relationship between those modes and particular configurations of sexual identity. In the process, this paper allows us to reassess, first, a presupposition of folksonomies as free of discipline allowing for their emancipatory potential and, second, the prevailing binary understandings of authority in the development of sexual nomenclatures and classifications as either top-down or bottom-up.
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_b.pdf.
  16. Capurro, R.: Information technology and technologies of the self (1996) 0.00
    0.004463867 = product of:
      0.0133916 = sum of:
        0.0133916 = product of:
          0.0267832 = sum of:
            0.0267832 = weight(_text_:of in 7748) [ClassicSimilarity], result of:
              0.0267832 = score(doc=7748,freq=16.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.39093933 = fieldWeight in 7748, product of:
                  4.0 = tf(freq=16.0), with freq of:
                    16.0 = termFreq=16.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.0625 = fieldNorm(doc=7748)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    Discusses how we can ensure that the benefits of information technology are distributed equitably and can be used by people to shape their lives. Examines some ethical aspects of the intersections between information technology and technologies of the self, as analyzed by some leading thinkers. The analyzes show that information technology shares the ambiguities of all technological products. The mutual dependency between moral rules and technologies of the self with regard to the social impact of information technology is also demonstrated
    Source
    Journal of information ethics. 5(1996) no.2, S.19-28
  17. Tenopir, C.: Ethics for online educators (1992) 0.00
    0.0044112457 = product of:
      0.013233736 = sum of:
        0.013233736 = product of:
          0.026467472 = sum of:
            0.026467472 = weight(_text_:of in 7334) [ClassicSimilarity], result of:
              0.026467472 = score(doc=7334,freq=10.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.38633084 = fieldWeight in 7334, product of:
                  3.1622777 = tf(freq=10.0), with freq of:
                    10.0 = termFreq=10.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.078125 = fieldNorm(doc=7334)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    The only monitoring of educators is performed by their internal sense of right and wrong. Following the aggred terms of system contracts, selecting the most appropriate systems for students, keeping up to date with system features, and instilling ethical behaviour in students are at the core of ethics for online educators
    Source
    Journal of information ethics. 1(1992), S.32-40
  18. Cope, J.: Librarianship as intellectual craft : the ethics of classification in the realms of leisure and waged labor (2012) 0.00
    0.0044112457 = product of:
      0.013233736 = sum of:
        0.013233736 = product of:
          0.026467472 = sum of:
            0.026467472 = weight(_text_:of in 421) [ClassicSimilarity], result of:
              0.026467472 = score(doc=421,freq=40.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.38633084 = fieldWeight in 421, product of:
                  6.3245554 = tf(freq=40.0), with freq of:
                    40.0 = termFreq=40.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=421)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    This paper develops an ethical conception of library labor as an intellectual craft that can serve as an alternative to a deterministic discourse of technological transformation. In this paper, the author proposes a model of librarianship as an intellectual craft that can be used as an "ideal type" in comparison to recent transformations in the practice of librarianship. This paper then examines the rise of participatory classification in the realm of leisure in user-generated classification schemes (e.g., folksonomies) as a way of examining some of the difficult ethical questions that this ideal of intellectual craft poses when applied to contemporary conditions. Marx's concept of surplus value is used to examine how donated labor adds to the general knowledge. This paper concludes by advocating for the general expansion of leisure coupled with the promotion public institutions that support the craft of those who organize information in a broadly defined public interest. In an era of dramatic change, such a framework offers a positive ethical account of librarians and information professionals' labor that is not wholly dependent on a discourse of market exchange.
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_g.pdf.
  19. Capurro, R.: Information ethics for and from Africa (2008) 0.00
    0.004184875 = product of:
      0.012554625 = sum of:
        0.012554625 = product of:
          0.02510925 = sum of:
            0.02510925 = weight(_text_:of in 1869) [ClassicSimilarity], result of:
              0.02510925 = score(doc=1869,freq=36.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.36650562 = fieldWeight in 1869, product of:
                  6.0 = tf(freq=36.0), with freq of:
                    36.0 = termFreq=36.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1869)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    The first part of this article deals with some initiatives concerning the role of information ethics for Africa, such as the New Partnership for Africa's Development, United Nations Information Communications Technology (ICT), and the African Information Society Initiative particularly since the World Summit on the Information Society. Information Ethics from Africa is a young academic field, and not much has been published so far on the impact of ICT on African societies and cultures from a philosophical perspective. The second part of the article analyzes some recent research on this matter particularly with regard to the concept of ubuntu. Finally, the article addresses some issues of the African Conference on Information Ethics held February 3-5, 2007, in Pretoria, South Africa.[The following essay is adapted from a keynote address delivered at the Africa Information Ethics Conference in Pretoria, South Africa, February 5-7, 2007. Under the patronage of UNESCO, sponsored by the South African government, and organized with assistance from the Department of Information Science at the University of Pretoria, the School of Information Studies at the University of Wisconsin-Milwaukee, and the supporters and members of the International Center for Information Ethics (ICIE), the theme of the conference was Ethical Challenges in the Information Age: The Joy of Sharing Knowledge. The full version of the address as well as selected articles from the conference were published in Vol. 7 of ICIE's online journal, International Review of Information Ethics (for more information, visit http://icie.zkm.de)]
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1162-1170
  20. Severson, R.: ¬The recovery of ethics in librarianship (1995) 0.00
    0.004175565 = product of:
      0.012526695 = sum of:
        0.012526695 = product of:
          0.02505339 = sum of:
            0.02505339 = weight(_text_:of in 4398) [ClassicSimilarity], result of:
              0.02505339 = score(doc=4398,freq=14.0), product of:
                0.06850986 = queryWeight, product of:
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.043811057 = queryNorm
                0.36569026 = fieldWeight in 4398, product of:
                  3.7416575 = tf(freq=14.0), with freq of:
                    14.0 = termFreq=14.0
                  1.5637573 = idf(docFreq=25162, maxDocs=44218)
                  0.0625 = fieldNorm(doc=4398)
          0.5 = coord(1/2)
      0.33333334 = coord(1/3)
    
    Abstract
    Looks at reasons for the renaissance of the ethical dimension in librarianship, including the need to recover the lost vocabulary of ethics in order to resolve issues of value. Considers the complexity and confusion created by automation and the shortcomings of native moral instincts in coping with these: as well as how the increasing numbers of people being employed in professional positions leading to freedom in decision making also reveals the need for guidance from an ethical code
    Source
    Journal of information ethics. 4(1995) no.1, S.11-16

Authors

Years

Languages

  • e 91
  • d 9
  • es 1
  • i 1
  • More… Less…