Search (63 results, page 1 of 4)

  • × theme_ss:"Informationsethik"
  1. Smith, M.M.: Online information ethics : online searching and the searching self (1994) 0.03
    0.03492582 = product of:
      0.122240365 = sum of:
        0.1047525 = weight(_text_:interactions in 8599) [ClassicSimilarity], result of:
          0.1047525 = score(doc=8599,freq=2.0), product of:
            0.22965278 = queryWeight, product of:
              5.8977947 = idf(docFreq=329, maxDocs=44218)
              0.038938753 = queryNorm
            0.4561343 = fieldWeight in 8599, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.8977947 = idf(docFreq=329, maxDocs=44218)
              0.0546875 = fieldNorm(doc=8599)
        0.017487857 = weight(_text_:with in 8599) [ClassicSimilarity], result of:
          0.017487857 = score(doc=8599,freq=2.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.1863712 = fieldWeight in 8599, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0546875 = fieldNorm(doc=8599)
      0.2857143 = coord(2/7)
    
    Abstract
    Describes the foundations of online information ethics by combining the insights of cognitive psychologist, Ulrich Neisser, and information science professor, Rafael Capurro. Capurro contrasts rule based ethics, such as codes, and self based ethics. Rule based ethics are necessary, but self based ethics lead to life enhancing uses of information and information technology. Neisser describes the self by defining 5 aspects of self understanding. Challenges information professionals to create environments and interpersonal interactions which create success in information seeking and provide the users with life enhancing search narratives
  2. Broughton, V.: ¬The respective roles of intellectual creativity and automation in representing diversity : human and machine generated bias (2019) 0.02
    0.023358716 = product of:
      0.081755504 = sum of:
        0.012491328 = weight(_text_:with in 5728) [ClassicSimilarity], result of:
          0.012491328 = score(doc=5728,freq=2.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.1331223 = fieldWeight in 5728, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5728)
        0.06926417 = product of:
          0.13852835 = sum of:
            0.13852835 = weight(_text_:humans in 5728) [ClassicSimilarity], result of:
              0.13852835 = score(doc=5728,freq=4.0), product of:
                0.26276368 = queryWeight, product of:
                  6.7481275 = idf(docFreq=140, maxDocs=44218)
                  0.038938753 = queryNorm
                0.5271975 = fieldWeight in 5728, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  6.7481275 = idf(docFreq=140, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5728)
          0.5 = coord(1/2)
      0.2857143 = coord(2/7)
    
    Abstract
    The paper traces the development of the discussion around ethical issues in artificial intelligence, and considers the way in which humans have affected the knowledge bases used in machine learning. The phenomenon of bias or discrimination in machine ethics is seen as inherited from humans, either through the use of biased data or through the semantics inherent in intellectually- built tools sourced by intelligent agents. The kind of biases observed in AI are compared with those identified in the field of knowledge organization, using religious adherents as an example of a community potentially marginalized by bias. A practical demonstration is given of apparent religious prejudice inherited from source material in a large database deployed widely in computational linguistics and automatic indexing. Methods to address the problem of bias are discussed, including the modelling of the moral process on neuroscientific understanding of brain function. The question is posed whether it is possible to model religious belief in a similar way, so that robots of the future may have both an ethical and a religious sense and themselves address the problem of prejudice.
  3. Miller, S.: Privacy, data bases and computers (1998) 0.01
    0.011739651 = product of:
      0.041088775 = sum of:
        0.019986123 = weight(_text_:with in 3027) [ClassicSimilarity], result of:
          0.019986123 = score(doc=3027,freq=2.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.21299566 = fieldWeight in 3027, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0625 = fieldNorm(doc=3027)
        0.021102654 = product of:
          0.042205308 = sum of:
            0.042205308 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.042205308 = score(doc=3027,freq=2.0), product of:
                0.13635688 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.038938753 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.2857143 = coord(2/7)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
  4. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.01
    0.00881559 = product of:
      0.030854564 = sum of:
        0.017665405 = weight(_text_:with in 1868) [ClassicSimilarity], result of:
          0.017665405 = score(doc=1868,freq=4.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.18826336 = fieldWeight in 1868, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.013189158 = product of:
          0.026378317 = sum of:
            0.026378317 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.026378317 = score(doc=1868,freq=2.0), product of:
                0.13635688 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.038938753 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.2857143 = coord(2/7)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
  5. Information ethics : privacy, property, and power (2005) 0.01
    0.007711871 = product of:
      0.026991548 = sum of:
        0.017665405 = weight(_text_:with in 2392) [ClassicSimilarity], result of:
          0.017665405 = score(doc=2392,freq=16.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.18826336 = fieldWeight in 2392, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.009326143 = product of:
          0.018652286 = sum of:
            0.018652286 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
              0.018652286 = score(doc=2392,freq=4.0), product of:
                0.13635688 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.038938753 = queryNorm
                0.13679022 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.5 = coord(1/2)
      0.2857143 = coord(2/7)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.302 (L.A. Ennis):"This is an important and timely anthology of articles "on the normative issues surrounding information control" (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics, intellectual property, privacy, free speech, and more, the book provides information professionals of all kinds with a valuable and thought-provoking resource. Information Ethics is divided into five parts and twenty chapters or articles. At the end of each of the five parts, the editor has included a few "discussion cases," which allows the users to apply what they just read to potential real life examples. Part I, "An Ethical Framework for Analysis," provides readers with an introduction to reasoning and ethics. This complex and philosophical section of the book contains five articles and four discussion cases. All five of the articles are really thought provoking and challenging writings on morality. For instance, in the first article, "Introduction to Moral Reasoning," Tom Regan examines how not to answer a moral question. For example, he thinks using what the majority believes as a means of determining what is and is not moral is flawed. "The Metaphysics of Morals" by Immanuel Kant looks at the reasons behind actions. According to Kant, to be moral one has to do the right thing for the right reasons. By including materials that force the reader to think more broadly and deeply about what is right and wrong, Moore has provided an important foundation and backdrop for the rest of the book. Part II, "Intellectual Property: Moral and Legal Concerns," contains five articles and three discussion cases for tackling issues like ownership, patents, copyright, and biopiracy. This section takes a probing look at intellectual and intangible property from a variety of viewpoints. For instance, in "Intellectual Property is Still Property," Judge Frank Easterbrook argues that intellectual property is no different than physical property and should not be treated any differently by law. Tom Palmer's article, "Are Patents and Copyrights Morally Justified," however, uses historical examples to show how intellectual and physical properties differ.
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
  6. Neumaier, O.: Was hat 'Künstliche Intelligenz' mit Ethik zu tun? (1994) 0.01
    0.0063843336 = product of:
      0.044690333 = sum of:
        0.044690333 = weight(_text_:with in 2456) [ClassicSimilarity], result of:
          0.044690333 = score(doc=2456,freq=10.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.47627282 = fieldWeight in 2456, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0625 = fieldNorm(doc=2456)
      0.14285715 = coord(1/7)
    
    Abstract
    The relevance of ethical considerations for AI is discussed in 2 respects: on the one hand with regard to the consequences one has to cope with when dealing with computer systems that are considered 'intelligent' and, on the other hand had with questions of responsibility which arises when such systems are used. In what sense has Artificial Intelligence to deal with ethics?
  7. Wiener, P.B.: Mad bombers and ethical librarians : a dialogue with Robert Hauptman and John Swan (1987) 0.00
    0.0049965307 = product of:
      0.034975715 = sum of:
        0.034975715 = weight(_text_:with in 7484) [ClassicSimilarity], result of:
          0.034975715 = score(doc=7484,freq=2.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.3727424 = fieldWeight in 7484, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.109375 = fieldNorm(doc=7484)
      0.14285715 = coord(1/7)
    
  8. Jones, D.A.: Plays well with others, or the importance of collegiality within a reference unit (1998) 0.00
    0.004327123 = product of:
      0.03028986 = sum of:
        0.03028986 = weight(_text_:with in 2446) [ClassicSimilarity], result of:
          0.03028986 = score(doc=2446,freq=6.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.32280442 = fieldWeight in 2446, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0546875 = fieldNorm(doc=2446)
      0.14285715 = coord(1/7)
    
    Abstract
    In addition to having a ethical obligation to treat colleagues with courtesy and respect, refernce librarians must be able to interact effectively with one another in order to provide an optimal level of service to their users. A well functioning reference unit builds on the individual strengths of each reference librarian and promotes an environment conductive to consultation and sharing. The tone for setting such an atmosphere is largely dependent upon the actions of the head of the unit who must set an example of fairness, cooperation, and striving for excellence while providing encouragement to update skills
  9. Cline, E.: Here comes a chopper to chop off your head : freedom of expression versus censorship in America (1995) 0.00
    0.004037807 = product of:
      0.02826465 = sum of:
        0.02826465 = weight(_text_:with in 2452) [ClassicSimilarity], result of:
          0.02826465 = score(doc=2452,freq=4.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.30122137 = fieldWeight in 2452, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0625 = fieldNorm(doc=2452)
      0.14285715 = coord(1/7)
    
    Abstract
    Writer Edward Cline looks at the debate on freedom of expression versus censorship in the USA with reference to the provision of information. He challenges the idea that there is a moral obligation to provide a forum for ideas with which one disagrees, noting the problems of public libraries attempting to balance the contents of their stock. Challenges American anti-intellectualism and maintains that, because of the invlovement of the government in so many areas of life, America can no longer be considered a free country
  10. Hodson, S.S.: Ethical and legal aspects of archival services (2009) 0.00
    0.004037807 = product of:
      0.02826465 = sum of:
        0.02826465 = weight(_text_:with in 3774) [ClassicSimilarity], result of:
          0.02826465 = score(doc=3774,freq=4.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.30122137 = fieldWeight in 3774, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0625 = fieldNorm(doc=3774)
      0.14285715 = coord(1/7)
    
    Abstract
    Archivists deal with legal and ethical issues every day in the course of administering collections of personal papers. This entry will discuss legal and ethical aspects of archival services in three areas: acquisitions, access, and terms of use, in the context of research libraries and manuscript repositories. It will not deal with government, corporate, or institutional archives.
  11. Tenopir, C.: Ethics for online educators (1992) 0.00
    0.003568951 = product of:
      0.024982655 = sum of:
        0.024982655 = weight(_text_:with in 7334) [ClassicSimilarity], result of:
          0.024982655 = score(doc=7334,freq=2.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.2662446 = fieldWeight in 7334, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.078125 = fieldNorm(doc=7334)
      0.14285715 = coord(1/7)
    
    Abstract
    The only monitoring of educators is performed by their internal sense of right and wrong. Following the aggred terms of system contracts, selecting the most appropriate systems for students, keeping up to date with system features, and instilling ethical behaviour in students are at the core of ethics for online educators
  12. Behar, J.E.: Computer ethics : moral philosophy or professional propaganda? (1993) 0.00
    0.003568951 = product of:
      0.024982655 = sum of:
        0.024982655 = weight(_text_:with in 8700) [ClassicSimilarity], result of:
          0.024982655 = score(doc=8700,freq=2.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.2662446 = fieldWeight in 8700, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.078125 = fieldNorm(doc=8700)
      0.14285715 = coord(1/7)
    
    Abstract
    The diffuse focus of ethical discourse in computing is confusing. Clarifies the relation of computer ethics to issues of personal freedom, social control, and social inequality, seeks to provide human service workers and other professional computer specialists with a framework for identifying the social effects and moral dimensions of computerization
  13. Hannabuss, S.: Information ethics : a contemporary challenge for professionals and the community (1998) 0.00
    0.0035330812 = product of:
      0.024731567 = sum of:
        0.024731567 = weight(_text_:with in 1602) [ClassicSimilarity], result of:
          0.024731567 = score(doc=1602,freq=4.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.2635687 = fieldWeight in 1602, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1602)
      0.14285715 = coord(1/7)
    
    Abstract
    Acting ethically presents challenges to professional people in an age where there is little consensus on moral beliefs and where competitive practices are increasingly commonplace in the workplace. Professionals dealing with information face particular challenges since information is often regarded as a public good, freely available to everyone as part of a free society. However, information can also be sensitive, confidential and wrong. The dilemmas which arise in this professional area are examined with reference to the wider and deeper ethical issues involved.
  14. Brown, Y.: From the reference desk to the jail house : unauthorized practice of law and librarians (1994) 0.00
    0.0035330812 = product of:
      0.024731567 = sum of:
        0.024731567 = weight(_text_:with in 2459) [ClassicSimilarity], result of:
          0.024731567 = score(doc=2459,freq=4.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.2635687 = fieldWeight in 2459, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0546875 = fieldNorm(doc=2459)
      0.14285715 = coord(1/7)
    
    Abstract
    The American Association of Law Librarians Code of Ethics requires librarians to avoid the unauthorized practice of law while providing access to legal information. Provides guidelines and suggestions to help librarians distinguish legal advice from legal information in the context of working with the public. Defining the activities that constitute Unauthorized practice of law is difficult and an ever evolving grey area. Reference service should be confined to assisting patrons in locating legal information and instructing patrons in the use of legal materials using examples unrelated to the patron's issue and advising patrons with legal problems to consult a lawyer
  15. Capurro, R.: Information ethics for and from Africa (2008) 0.00
    0.0030908023 = product of:
      0.021635616 = sum of:
        0.021635616 = weight(_text_:with in 1869) [ClassicSimilarity], result of:
          0.021635616 = score(doc=1869,freq=6.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.2305746 = fieldWeight in 1869, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1869)
      0.14285715 = coord(1/7)
    
    Abstract
    The first part of this article deals with some initiatives concerning the role of information ethics for Africa, such as the New Partnership for Africa's Development, United Nations Information Communications Technology (ICT), and the African Information Society Initiative particularly since the World Summit on the Information Society. Information Ethics from Africa is a young academic field, and not much has been published so far on the impact of ICT on African societies and cultures from a philosophical perspective. The second part of the article analyzes some recent research on this matter particularly with regard to the concept of ubuntu. Finally, the article addresses some issues of the African Conference on Information Ethics held February 3-5, 2007, in Pretoria, South Africa.[The following essay is adapted from a keynote address delivered at the Africa Information Ethics Conference in Pretoria, South Africa, February 5-7, 2007. Under the patronage of UNESCO, sponsored by the South African government, and organized with assistance from the Department of Information Science at the University of Pretoria, the School of Information Studies at the University of Wisconsin-Milwaukee, and the supporters and members of the International Center for Information Ethics (ICIE), the theme of the conference was Ethical Challenges in the Information Age: The Joy of Sharing Knowledge. The full version of the address as well as selected articles from the conference were published in Vol. 7 of ICIE's online journal, International Review of Information Ethics (for more information, visit http://icie.zkm.de)]
  16. Himma, K.E.: Foundational issues in information ethics (2007) 0.00
    0.0030908023 = product of:
      0.021635616 = sum of:
        0.021635616 = weight(_text_:with in 2591) [ClassicSimilarity], result of:
          0.021635616 = score(doc=2591,freq=6.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.2305746 = fieldWeight in 2591, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0390625 = fieldNorm(doc=2591)
      0.14285715 = coord(1/7)
    
    Abstract
    Purpose - Information ethics, as is well known, has emerged as an independent area of ethical and philosophical inquiry. There are a number of academic journals that are devoted entirely to the numerous ethical issues that arise in connection with the new information communication technologies; these issues include a host of intellectual property, information privacy, and security issues of concern to librarians and other information professionals. In addition, there are a number of major international conferences devoted to information ethics every year. It would hardly be overstating the matter to say that information ethics is as "hot" an area of theoretical inquiry as medical ethics. The purpose of this paper is to provide an overview on these and related issues. Design/methodology/approach - The paper presents a review of relevant information ethics literature together with the author's assessment of the arguments. Findings - There are issues that are more abstract and basic than the substantive issues with which most information ethics theorizing is concerned. These issues are thought to be "foundational" in the sense that we cannot fully succeed in giving an analysis of the concrete problems of information ethics (e.g. are legal intellectual property rights justifiably protected?) until these issues are adequately addressed. Originality/value - The paper offers a needed survey of foundational issues in information ethics.
  17. Fleischmann, K.R.; Hui, C.; Wallace, W.A.: ¬The societal responsibilities of computational modelers : human values and professional codes of ethics (2017) 0.00
    0.0030908023 = product of:
      0.021635616 = sum of:
        0.021635616 = weight(_text_:with in 3424) [ClassicSimilarity], result of:
          0.021635616 = score(doc=3424,freq=6.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.2305746 = fieldWeight in 3424, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3424)
      0.14285715 = coord(1/7)
    
    Abstract
    Information and communication technology (ICT) has increasingly important implications for our everyday lives, with the potential to both solve existing social problems and create new ones. This article focuses on one particular group of ICT professionals, computational modelers, and explores how these ICT professionals perceive their own societal responsibilities. Specifically, the article uses a mixed-method approach to look at the role of professional codes of ethics and explores the relationship between modelers' experiences with, and attitudes toward, codes of ethics and their values. Statistical analysis of survey data reveals a relationship between modelers' values and their attitudes and experiences related to codes of ethics. Thematic analysis of interviews with a subset of survey participants identifies two key themes: that modelers should be faithful to the reality and values of users and that codes of ethics should be built from the bottom up. One important implication of the research is that those who value universalism and benevolence may have a particular duty to act on their values and advocate for, and work to develop, a code of ethics.
  18. Brito, M. de: Social affects engineering and ethics (2023) 0.00
    0.0030283553 = product of:
      0.021198487 = sum of:
        0.021198487 = weight(_text_:with in 1135) [ClassicSimilarity], result of:
          0.021198487 = score(doc=1135,freq=4.0), product of:
            0.09383348 = queryWeight, product of:
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.038938753 = queryNorm
            0.22591603 = fieldWeight in 1135, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.409771 = idf(docFreq=10797, maxDocs=44218)
              0.046875 = fieldNorm(doc=1135)
      0.14285715 = coord(1/7)
    
    Abstract
    This text proposes a multidisciplinary reflection on the subject of ethics, based on philosophical approaches, using Spinoza's work, Ethics, as a foundation. The power of Spinoza's geometric reasoning and deterministic logic, compatible with formal grammars and programming languages, provides a favorable framework for this purpose. In an information society characterized by an abundance of data and a diversity of perspectives, complex thinking is an essential tool for developing an ethical construct that can deal with the uncertainty and contradictions in the field. Acknowledging the natural complexity of ethics in interpersonal relationships, the use of AI techniques appears unavoidable. Artificial intelligence in KOS offers the potential for processing complex questions through the formal modeling of concepts in ethical discourse. By formalizing problems, we hope to unleash the potential of ethical analysis; by addressing complexity analysis, we propose a mechanism for understanding problems and empowering solutions.
  19. Seadle, M.: Copyright in a networked world : ethics and infringement (2004) 0.00
    0.0030146649 = product of:
      0.021102654 = sum of:
        0.021102654 = product of:
          0.042205308 = sum of:
            0.042205308 = weight(_text_:22 in 2833) [ClassicSimilarity], result of:
              0.042205308 = score(doc=2833,freq=2.0), product of:
                0.13635688 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.038938753 = queryNorm
                0.30952093 = fieldWeight in 2833, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2833)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Source
    Library hi tech. 22(2004) no.1, S.106-110
  20. Hammwöhner, R.: Anmerkungen zur Grundlegung der Informationsethik (2006) 0.00
    0.0030146649 = product of:
      0.021102654 = sum of:
        0.021102654 = product of:
          0.042205308 = sum of:
            0.042205308 = weight(_text_:22 in 6063) [ClassicSimilarity], result of:
              0.042205308 = score(doc=6063,freq=2.0), product of:
                0.13635688 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.038938753 = queryNorm
                0.30952093 = fieldWeight in 6063, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=6063)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Date
    13.10.2006 10:22:03

Years

Languages

  • e 56
  • d 7
  • i 1
  • More… Less…

Types

  • a 60
  • m 3
  • s 3
  • More… Less…