Search (5 results, page 1 of 1)

  • × subject_ss:"Information technology / Social aspects"
  1. Information ethics : privacy, property, and power (2005) 0.01
    0.007711871 = product of:
      0.026991548 = sum of:
        0.017665405 = weight(_text_:with in 2392) [ClassicSimilarity], result of:
          0.017665405 = score(doc=2392,freq=16.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.18826336 = fieldWeight in 2392, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.009326143 = product of:
          0.018652286 = sum of:
            0.018652286 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
              0.018652286 = score(doc=2392,freq=4.0), product of:
                0.13635688 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.038938753 = queryNorm
                0.13679022 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.5 = coord(1/2)
      0.2857143 = coord(2/7)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.302 (L.A. Ennis):"This is an important and timely anthology of articles "on the normative issues surrounding information control" (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics, intellectual property, privacy, free speech, and more, the book provides information professionals of all kinds with a valuable and thought-provoking resource. Information Ethics is divided into five parts and twenty chapters or articles. At the end of each of the five parts, the editor has included a few "discussion cases," which allows the users to apply what they just read to potential real life examples. Part I, "An Ethical Framework for Analysis," provides readers with an introduction to reasoning and ethics. This complex and philosophical section of the book contains five articles and four discussion cases. All five of the articles are really thought provoking and challenging writings on morality. For instance, in the first article, "Introduction to Moral Reasoning," Tom Regan examines how not to answer a moral question. For example, he thinks using what the majority believes as a means of determining what is and is not moral is flawed. "The Metaphysics of Morals" by Immanuel Kant looks at the reasons behind actions. According to Kant, to be moral one has to do the right thing for the right reasons. By including materials that force the reader to think more broadly and deeply about what is right and wrong, Moore has provided an important foundation and backdrop for the rest of the book. Part II, "Intellectual Property: Moral and Legal Concerns," contains five articles and three discussion cases for tackling issues like ownership, patents, copyright, and biopiracy. This section takes a probing look at intellectual and intangible property from a variety of viewpoints. For instance, in "Intellectual Property is Still Property," Judge Frank Easterbrook argues that intellectual property is no different than physical property and should not be treated any differently by law. Tom Palmer's article, "Are Patents and Copyrights Morally Justified," however, uses historical examples to show how intellectual and physical properties differ.
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
  2. Humphreys, L.: ¬The qualified self : social media and the accounting of everyday life (2018) 0.00
    0.0034968434 = product of:
      0.024477903 = sum of:
        0.024477903 = weight(_text_:with in 5364) [ClassicSimilarity], result of:
          0.024477903 = score(doc=5364,freq=12.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.26086536 = fieldWeight in 5364, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.03125 = fieldNorm(doc=5364)
      0.14285715 = coord(1/7)
    
    Abstract
    How sharing the mundane details of daily life did not start with Facebook, Twitter, and YouTube but with pocket diaries, photo albums, and baby books. Social critiques argue that social media have made us narcissistic, that Facebook, Twitter, Instagram, and YouTube are all vehicles for me-promotion. In The Qualified Self, Lee Humphreys offers a different view. She shows that sharing the mundane details of our lives?what we ate for lunch, where we went on vacation, who dropped in for a visit?didn't begin with mobile devices and social media. People have used media to catalog and share their lives for several centuries. Pocket diaries, photo albums, and baby books are the predigital precursors of today's digital and mobile platforms for posting text and images. The ability to take selfies has not turned us into needy narcissists; it's part of a longer story about how people account for everyday life. Humphreys refers to diaries in which eighteenth-century daily life is documented with the brevity and precision of a tweet, and cites a nineteenth-century travel diary in which a young woman complains that her breakfast didn't agree with her. Diaries, Humphreys explains, were often written to be shared with family and friends. Pocket diaries were as mobile as smartphones, allowing the diarist to record life in real time. Humphreys calls this chronicling, in both digital and nondigital forms, media accounting. The sense of self that emerges from media accounting is not the purely statistics-driven ?quantified self,? but the more well-rounded qualified self. We come to understand ourselves in a new way through the representations of ourselves that we create to be consumed.
  3. Franklin, S.: ¬The digitally disposed : racial capitalism and the informatics of value (2021) 0.00
    0.0024726419 = product of:
      0.017308492 = sum of:
        0.017308492 = weight(_text_:with in 653) [ClassicSimilarity], result of:
          0.017308492 = score(doc=653,freq=6.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.18445967 = fieldWeight in 653, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.03125 = fieldNorm(doc=653)
      0.14285715 = coord(1/7)
    
    Abstract
    Seb Franklin shows how the promises of boundless connection, flexibility, and prosperity that are often associated with digital technologies are grounded in racialized histories of dispossession and exploitation.
    Content
    Seb Franklin sets out a media theory of racial capitalism to examine digitality's racial-capitalist foundations. The Digitally Disposed shows how the promises of boundless connection, flexibility, and prosperity that are often associated with digital technologies are grounded in racialized histories of dispossession and exploitation. Reading archival and published material from the cybernetic sciences alongside nineteenth-century accounts of intellectual labor, twentieth-century sociometric experiments, and a range of literary and visual works, The Digitally Disposed locates the deep history of digitality in the development of racial capitalism. Franklin makes the groundbreaking argument that capital's apparently spontaneous synthesis of so-called free individuals into productive circuits represents an 'informatics of value'.On the one hand, understanding value as an informatic relation helps to explain why capital was able to graft so seamlessly with digitality at a moment in which it required more granular and distributed control over labor, the moment that is often glossed as the age of logistics. On the other hand, because the informatics of value sort populations into positions of higher and lower capacity, value, and status, understanding their relationship to digitality requires that we see the digital as racialized and gendered in pervasive ways. Ultimately, The Digitally Disposed questions the universalizing assumptions that are maintained, remade, and intensified by today's dominant digital technologies. Vital and far-reaching, The Digitally Disposed reshapes such fundamental concepts as cybernetics, informatics, and digitality.
  4. Warner, J.: Humanizing information technology (2004) 0.00
    0.0017844755 = product of:
      0.012491328 = sum of:
        0.012491328 = weight(_text_:with in 438) [ClassicSimilarity], result of:
          0.012491328 = score(doc=438,freq=8.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.1331223 = fieldWeight in 438, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.01953125 = fieldNorm(doc=438)
      0.14285715 = coord(1/7)
    
    Footnote
    Rez. in: JASIST. 56(2003) no.12, S.1360 (C.Tomer): "Humanizing Information Technology is a collection of essays that represent what are presumably Julian Warner's best efforts to understand the perpetually nascent discipline of information science and its relationship to information technology. It is clearly a formidable task. Warner succeeds occasionally in this endeavor; more often, he fails. Yet, it would be wrong to mark Humanizing Information Technology as a book not worth reading. On the contrary, though much fault was found and this review is far from positive, it was nevertheless a book well-worth reading. That Humanizing Information Technology succeeds at all is in some ways remarkable, because Warner's prose tends to be dense and graceless, and understanding his commentaries often relies an close readings of a wide array of sources, some of them familiar, many of them less so. The inaccessibility of Warner's prose is unfortunate; there is not a single idea in Humanizing Information Technology so complicated that it could not have been stated in a clear, straightforward manner. The failure to establish a clear, sufficiently füll context for the more obscure sources is an even more serious problem. Perhaps the most conspicuous example of this problem stems from the frequent examination of the concept of the "information society" and the related notion of information as an autonomous variable, each of them ideas drawn largely from Frank Webster's 1995 book, Theories of the Information Society. Several of Warner's essays contain passages in Humanizing Information Technology whose meaning and value are largely dependent an a familiarity with Webster's work. Yet, Warner never refers to Theories of the Information Society in more than cursory terms and never provides a context füll enough to understand the particular points of reference. Suffice it to say, Humanizing Information Technology is not a book for readers who lack patience or a thorough grounding in modern intellectual history. Warner's philosophical analyses, which frequently exhibit the meter, substance, and purpose of a carefully crafted comprehensive examination, are a large part of what is wrong with Humanizing Information Technology. Warner's successes come when he turns his attention away from Marxist scholasticism and toward historical events and trends. "Information Society or Cash Nexus?" the essay in which Warner compares the role of the United States as a "copyright haven" for most of the 19th century to modern China's similar status, is successful because it relies less an abstruse analysis and more an a sharply drawn comparison of the growth of two economies and parallel developments in the treatment of intellectual property. The essay establishes an illuminating context and cites historical precedents in the American experience suggesting that China's official positions toward intellectual property and related international conventions are likely to evolve and grow more mature as its economy expands and becomes more sophisticated. Similarly, the essay entitled "In the Catalogue Ye Go for Men" is effective because Warner comes dangerously close to pragmatism when he focuses an the possibility that aligning cataloging practice with the "paths and tracks" of discourse and its analysis may be the means by which to build more information systems that furnish a more direct basis for intellectual exploration.
    Like Daniel Bell, the author of The Coming of Post-Industrial Society (1973), who used aspects of Marx's thinking as the basis for his social forecasting models, Warner uses Marxist thought as a tool for social and historical analysis. Unlike Bell, Warner's approach to Marx tends to be doctrinaire. As a result, "An Information View of History" and "Origins of the Human Brain," two of the essays in which Warner sets out to establish the connections between information science and information technology, are less successful. Warner argues, "the classic source for an understanding of technology as a human construction is Marx," and that "a Marxian perspective an information technology could be of high marginal Utility," noting additionally that with the exception of Norbert Wiener and John Desmond Bernal, "there has only been a limited penetration of Marxism into information science" (p. 9). But Warner's efforts to persuade the reader that these views are cogent never go beyond academic protocol. Nor does his support for the assertion that the second half of the 19th century was the critical period for innovation and diffusion of modern information technologies. The closing essay, "Whither Information Science?" is particularly disappointing, in part, because the preface and opening chapters of the book promised more than was delivered at the end. Warner asserts that the theoretical framework supporting information science is negligible, and that the discipline is limited even further by the fact that many of its members do not recognize or understand the effects of such a limitation. However cogent the charges may be, none of this is news. But the essay fails most notably because Warner does not have any new directions to offer, save that information scientists should pay closer artention to what is going an in allied disciplines. Moreover, he does not seem to understand that at its heart the "information revolution" is not about the machines, but about the growing legions of men and women who can and do write programming code to exert control over and find new uses for these devices. Nor does he seem to understand that information science, in the grip of what he terms a "quasi-global crisis," suffers grievously because it is a community situated not at the center but rather an the periphery of this revolution."
  5. Weinberger, D.: Too big to know : rethinking knowledge now that the facts aren't the facts, experts are everywhere, and the smartest person in the room is the room (2011) 0.00
    0.0012491327 = product of:
      0.008743929 = sum of:
        0.008743929 = weight(_text_:with in 334) [ClassicSimilarity], result of:
          0.008743929 = score(doc=334,freq=2.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.0931856 = fieldWeight in 334, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.02734375 = fieldNorm(doc=334)
      0.14285715 = coord(1/7)
    
    Abstract
    In this title, a leading philosopher of the internet explains how knowledge and expertise can still work - and even grow stronger - in an age when the internet has made topics simply Too Big to Know. Knowing used to be so straightforward. If we wanted to know something we looked it up, asked an expert, gathered the facts, weighted the possibilities, and honed in on the best answer ourselves. But, ironically, with the advent of the internet and the limitless information it contains, we're less sure about what we know, who knows what, or even what it means to know at all. Knowledge, it would appear, is in crisis. And yet, while its very foundations seem to be collapsing, human knowledge has grown in previously unimaginable ways, and in inconceivable directions, in the Internet age. We fact-check the news media more closely and publicly than ever before. Science is advancing at an unheard of pace thanks to new collaborative techniques and new ways to find patterns in vast amounts of data. Businesses are finding expertise in every corner of their organization, and across the broad swath of their stakeholders. We are in a crisis of knowledge at the same time that we are in an epochal exaltation of knowledge. In "Too Big to Know", Internet philosopher David Weinberger explains that, rather than a systemic collapse, the Internet era represents a fundamental change in the methods we have for understanding the world around us. Weinberger argues that our notions of expertise - what it is, how it works, and how it is cultivated - are out of date, rooted in our pre-networked culture and assumptions. For thousands of years, we've relied upon a reductionist process of filtering, winnowing, and otherwise reducing the complex world to something more manageable in order to understand it. Back then, an expert was someone who had mastered a particular, well-defined domain. Now, we live in an age when topics are blown apart and stitched together by momentary interests, diverse points of view, and connections ranging from the insightful to the perverse. Weinberger shows that, while the limits of our own paper-based tools have historically prevented us from achieving our full capacity of knowledge, we can now be as smart as our new medium allows - but we will be smart differently. For the new medium is a network, and that network changes our oldest, most basic strategy of knowing. Rather than knowing-by-reducing, we are now knowing-by-including. Indeed, knowledge now is best thought of not as the content of books or even of minds, but as the way the network works. Knowledge will never be the same - not for science, not for business, not for education, not for government, not for any of us. As Weinberger makes clear, to make sense of this new system of knowledge, we need - and smart companies are developing - networks that are themselves experts. Full of rich and sometimes surprising examples from history, politics, business, philosophy, and science, "Too Big to Know" describes how the very foundations of knowledge have been overturned, and what this revolution means for our future.

Types