Search (102 results, page 1 of 6)

  • × theme_ss:"Informationsethik"
  1. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.04
    0.03833617 = product of:
      0.07667234 = sum of:
        0.011456838 = weight(_text_:information in 1868) [ClassicSimilarity], result of:
          0.011456838 = score(doc=1868,freq=4.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.13714671 = fieldWeight in 1868, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.0652155 = sum of:
          0.03297891 = weight(_text_:technology in 1868) [ClassicSimilarity], result of:
            0.03297891 = score(doc=1868,freq=4.0), product of:
              0.1417311 = queryWeight, product of:
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.047586527 = queryNorm
              0.23268649 = fieldWeight in 1868, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.0390625 = fieldNorm(doc=1868)
          0.032236587 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
            0.032236587 = score(doc=1868,freq=2.0), product of:
              0.16663991 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.047586527 = queryNorm
              0.19345059 = fieldWeight in 1868, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0390625 = fieldNorm(doc=1868)
      0.5 = coord(2/4)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1134-1142
  2. Capurro, R.: Information technology and technologies of the self (1996) 0.04
    0.036732756 = product of:
      0.07346551 = sum of:
        0.03175012 = weight(_text_:information in 7748) [ClassicSimilarity], result of:
          0.03175012 = score(doc=7748,freq=12.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.38007212 = fieldWeight in 7748, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=7748)
        0.041715395 = product of:
          0.08343079 = sum of:
            0.08343079 = weight(_text_:technology in 7748) [ClassicSimilarity], result of:
              0.08343079 = score(doc=7748,freq=10.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.5886555 = fieldWeight in 7748, product of:
                  3.1622777 = tf(freq=10.0), with freq of:
                    10.0 = termFreq=10.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0625 = fieldNorm(doc=7748)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Discusses how we can ensure that the benefits of information technology are distributed equitably and can be used by people to shape their lives. Examines some ethical aspects of the intersections between information technology and technologies of the self, as analyzed by some leading thinkers. The analyzes show that information technology shares the ambiguities of all technological products. The mutual dependency between moral rules and technologies of the self with regard to the social impact of information technology is also demonstrated
    Source
    Journal of information ethics. 5(1996) no.2, S.19-28
  3. Froehlich, T.J.: Ethical considerations of information professionals (1992) 0.04
    0.035968114 = product of:
      0.07193623 = sum of:
        0.03928877 = weight(_text_:information in 6741) [ClassicSimilarity], result of:
          0.03928877 = score(doc=6741,freq=6.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.47031528 = fieldWeight in 6741, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.109375 = fieldNorm(doc=6741)
        0.032647457 = product of:
          0.065294914 = sum of:
            0.065294914 = weight(_text_:technology in 6741) [ClassicSimilarity], result of:
              0.065294914 = score(doc=6741,freq=2.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.46069574 = fieldWeight in 6741, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.109375 = fieldNorm(doc=6741)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Imprint
    Medford, NJ : Learned Information
    Source
    Annual review of information science and technology. 27(1992), S.291-324
  4. Brody, R.: ¬The problem of information naïveté (2008) 0.03
    0.029822461 = product of:
      0.059644923 = sum of:
        0.04098923 = weight(_text_:information in 1865) [ClassicSimilarity], result of:
          0.04098923 = score(doc=1865,freq=20.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.490671 = fieldWeight in 1865, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=1865)
        0.01865569 = product of:
          0.03731138 = sum of:
            0.03731138 = weight(_text_:technology in 1865) [ClassicSimilarity], result of:
              0.03731138 = score(doc=1865,freq=2.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.2632547 = fieldWeight in 1865, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0625 = fieldNorm(doc=1865)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    With the rapidly changing Web-enabled world, the already existing dichotomy between knowing of and knowing about, or information naïveté, widens daily. This article explores the ethical dilemmas that can result from the lack of information literacy. The article also discusses conditions and consequences of information naïveté, media bias, possessive memory, and limited contexts and abilities. To help avoid information failure, the author recommends producers, contributors, disseminators, and aggregators of information be less information naïve.
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1124-1127
    Theme
    Information
  5. Smith, M.M.: Information ethics (1997) 0.03
    0.029774655 = product of:
      0.05954931 = sum of:
        0.0362297 = weight(_text_:information in 1042) [ClassicSimilarity], result of:
          0.0362297 = score(doc=1042,freq=10.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.43369597 = fieldWeight in 1042, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.078125 = fieldNorm(doc=1042)
        0.02331961 = product of:
          0.04663922 = sum of:
            0.04663922 = weight(_text_:technology in 1042) [ClassicSimilarity], result of:
              0.04663922 = score(doc=1042,freq=2.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.32906836 = fieldWeight in 1042, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.078125 = fieldNorm(doc=1042)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    State of the art review of the concepts of information ethics, computer ethics, and cyberethics by explaining the emergence of applied information ethics through channels of professional practice and scholarly communication. Surveys the beginning of information ethics from 1988 through 1996
    Source
    Annual review of information science and technology. 32(1997), S.339-366
  6. Information ethics : privacy, property, and power (2005) 0.03
    0.02914159 = product of:
      0.05828318 = sum of:
        0.018999018 = weight(_text_:information in 2392) [ClassicSimilarity], result of:
          0.018999018 = score(doc=2392,freq=44.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.2274321 = fieldWeight in 2392, product of:
              6.6332498 = tf(freq=44.0), with freq of:
                44.0 = termFreq=44.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.039284162 = sum of:
          0.016489455 = weight(_text_:technology in 2392) [ClassicSimilarity], result of:
            0.016489455 = score(doc=2392,freq=4.0), product of:
              0.1417311 = queryWeight, product of:
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.047586527 = queryNorm
              0.116343245 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                2.978387 = idf(docFreq=6114, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
          0.022794709 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
            0.022794709 = score(doc=2392,freq=4.0), product of:
              0.16663991 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.047586527 = queryNorm
              0.13679022 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
      0.5 = coord(2/4)
    
    BK
    06.00 / Information und Dokumentation: Allgemeines
    Classification
    323.44/5 22 (GBV;LoC)
    06.00 / Information und Dokumentation: Allgemeines
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.302 (L.A. Ennis):"This is an important and timely anthology of articles "on the normative issues surrounding information control" (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics, intellectual property, privacy, free speech, and more, the book provides information professionals of all kinds with a valuable and thought-provoking resource. Information Ethics is divided into five parts and twenty chapters or articles. At the end of each of the five parts, the editor has included a few "discussion cases," which allows the users to apply what they just read to potential real life examples. Part I, "An Ethical Framework for Analysis," provides readers with an introduction to reasoning and ethics. This complex and philosophical section of the book contains five articles and four discussion cases. All five of the articles are really thought provoking and challenging writings on morality. For instance, in the first article, "Introduction to Moral Reasoning," Tom Regan examines how not to answer a moral question. For example, he thinks using what the majority believes as a means of determining what is and is not moral is flawed. "The Metaphysics of Morals" by Immanuel Kant looks at the reasons behind actions. According to Kant, to be moral one has to do the right thing for the right reasons. By including materials that force the reader to think more broadly and deeply about what is right and wrong, Moore has provided an important foundation and backdrop for the rest of the book. Part II, "Intellectual Property: Moral and Legal Concerns," contains five articles and three discussion cases for tackling issues like ownership, patents, copyright, and biopiracy. This section takes a probing look at intellectual and intangible property from a variety of viewpoints. For instance, in "Intellectual Property is Still Property," Judge Frank Easterbrook argues that intellectual property is no different than physical property and should not be treated any differently by law. Tom Palmer's article, "Are Patents and Copyrights Morally Justified," however, uses historical examples to show how intellectual and physical properties differ.
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
    LCSH
    Freedom of information
    Information society
    Information technology / Social aspects
    Subject
    Freedom of information
    Information society
    Information technology / Social aspects
  7. Buchanan, E.A.: Ethical transformations in a global information age (1996) 0.03
    0.028027441 = product of:
      0.056054883 = sum of:
        0.027781356 = weight(_text_:information in 2449) [ClassicSimilarity], result of:
          0.027781356 = score(doc=2449,freq=12.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.3325631 = fieldWeight in 2449, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=2449)
        0.028273528 = product of:
          0.056547057 = sum of:
            0.056547057 = weight(_text_:technology in 2449) [ClassicSimilarity], result of:
              0.056547057 = score(doc=2449,freq=6.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.39897424 = fieldWeight in 2449, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=2449)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Discusses various ethical issues which are germane to the global information age. Argues that such profuse and rapid technological change demands a reexamination of how society is defined and understood in this increasingly global environment where technology bridges temporal and spatial boundaries. Alongside the comes the necessity for a reevaluation of societal and informational values. Discusses cross-cultural problems associated with the information age; philosophical aspects of technology; and problems of social equity arising from the concept of information rich versus the information poor. Considers the ethical role of libraries in the information age concluding that libraries can dissolve the lines that have been drawn between the have and the have-nots. Librarians must understand and adhere to their traditional ethical guidelines while also moving forward and readjusting wit - not to - technology
  8. Carbo, T.; Smith, M.M.: Global information ethics : intercultural perspectives on past and future research (2008) 0.03
    0.02569151 = product of:
      0.05138302 = sum of:
        0.028063409 = weight(_text_:information in 669) [ClassicSimilarity], result of:
          0.028063409 = score(doc=669,freq=6.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.3359395 = fieldWeight in 669, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.078125 = fieldNorm(doc=669)
        0.02331961 = product of:
          0.04663922 = sum of:
            0.04663922 = weight(_text_:technology in 669) [ClassicSimilarity], result of:
              0.04663922 = score(doc=669,freq=2.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.32906836 = fieldWeight in 669, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.078125 = fieldNorm(doc=669)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1111-1123
  9. Zwass, V.: Ethical issues in information systems (2009) 0.03
    0.025433298 = product of:
      0.050866596 = sum of:
        0.027781356 = weight(_text_:information in 3779) [ClassicSimilarity], result of:
          0.027781356 = score(doc=3779,freq=12.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.3325631 = fieldWeight in 3779, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=3779)
        0.023085238 = product of:
          0.046170477 = sum of:
            0.046170477 = weight(_text_:technology in 3779) [ClassicSimilarity], result of:
              0.046170477 = score(doc=3779,freq=4.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.32576108 = fieldWeight in 3779, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=3779)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Information technology and information systems built around its artifacts can have powerful effects on individuals, both in their private life and in the workplace. As professionals and users, we should use ethical principles and codes of ethics to avoid and prevent deleterious effects of technology. Infoethics is the application of ethical theories to the development and use of information systems. The principal infoethical issues are privacy, accuracy, property (in particular, the intangible intellectual property), and access. Ethical decisions in the information-related domains are made by identifying the issues involved and applying ethical theories-classified as consequentalist and deontological-in the decision-making process.
    Source
    Encyclopedia of library and information sciences. 3rd ed. Ed.: M.J. Bates
  10. Bawden, D.; Robinson, L.: ¬"The dearest of our possessions" : applying Floridi's information privacy concept in models of information behavior and information literacy (2020) 0.03
    0.025183048 = product of:
      0.050366096 = sum of:
        0.03637433 = weight(_text_:information in 5939) [ClassicSimilarity], result of:
          0.03637433 = score(doc=5939,freq=28.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.4354273 = fieldWeight in 5939, product of:
              5.2915025 = tf(freq=28.0), with freq of:
                28.0 = termFreq=28.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.046875 = fieldNorm(doc=5939)
        0.013991767 = product of:
          0.027983533 = sum of:
            0.027983533 = weight(_text_:technology in 5939) [ClassicSimilarity], result of:
              0.027983533 = score(doc=5939,freq=2.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.19744103 = fieldWeight in 5939, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.046875 = fieldNorm(doc=5939)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    This conceptual article argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics. This approach involves achieving informational privacy, through the features of anonymity and obscurity, through an optimal balance of ontological frictions. This approach may be used to modify models for information behavior and for information literacy, giving them a fuller and more effective coverage of privacy issues in the infosphere. For information behavior, the Information Seeking and Communication Model and the Information Grounds conception are most appropriate for this purpose. For information literacy, the metaliteracy model, using a modification a privacy literacy framework, is most suitable.
    Series
    Special issue: Information privacy in the digital age
    Source
    Journal of the Association for Information Science and Technology. 71(2020) no.9, S.1030-1043
  11. Informationsethik (1995) 0.02
    0.024977494 = product of:
      0.049954988 = sum of:
        0.025720537 = weight(_text_:information in 2455) [ClassicSimilarity], result of:
          0.025720537 = score(doc=2455,freq=14.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.3078936 = fieldWeight in 2455, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.046875 = fieldNorm(doc=2455)
        0.024234453 = product of:
          0.048468906 = sum of:
            0.048468906 = weight(_text_:technology in 2455) [ClassicSimilarity], result of:
              0.048468906 = score(doc=2455,freq=6.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.34197792 = fieldWeight in 2455, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.046875 = fieldNorm(doc=2455)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Content
    Enthält die Beiträge u. Kapitel: HENRICHS, N.: Menschsein im Informationszeitalter; WIEGERLING, K.: Medium und Verhalten; BOUGNOUX, D.: Qui a peur de l'information?; CAPURRO, R.: Moral issues in information science; FROEHLICH, T.J.: Ethical considerations in technology transfer; DOCTOR, R.D.: Information technologies and social equity: confronting the revolution; BARBES, R.F.: Ethical and legal issues raised by information technology: the professional producer-product mix; FROEHLICH, T.J.: Ethics, ideologies, and practices of information technology and systems; Du MONT, R.R.: Ethics in librarianship: a management model; HAUPTMANN, R.: Ethical concerns in librarianship: an overview; SWAN, J.: Ethics inside and out: the case of Guidoriccio; SMITH, M.M.: Infoethics for leaders: models of moral agency in the information environment; KOSTREWSKI, B.J. u. C. OPPENHEIM: Ethics in information science; FROHMANN, B.: Knowledge and power in information science: a discourse analysis of the cognitive viewpoint 'Ein- u. weiterführende Bibliographie'; 'Ethik-Kodizes'
  12. Capurro, R.: Information ethics for and from Africa (2008) 0.02
    0.024447143 = product of:
      0.048894286 = sum of:
        0.03240483 = weight(_text_:information in 1869) [ClassicSimilarity], result of:
          0.03240483 = score(doc=1869,freq=32.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.38790947 = fieldWeight in 1869, product of:
              5.656854 = tf(freq=32.0), with freq of:
                32.0 = termFreq=32.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1869)
        0.016489455 = product of:
          0.03297891 = sum of:
            0.03297891 = weight(_text_:technology in 1869) [ClassicSimilarity], result of:
              0.03297891 = score(doc=1869,freq=4.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.23268649 = fieldWeight in 1869, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1869)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    The first part of this article deals with some initiatives concerning the role of information ethics for Africa, such as the New Partnership for Africa's Development, United Nations Information Communications Technology (ICT), and the African Information Society Initiative particularly since the World Summit on the Information Society. Information Ethics from Africa is a young academic field, and not much has been published so far on the impact of ICT on African societies and cultures from a philosophical perspective. The second part of the article analyzes some recent research on this matter particularly with regard to the concept of ubuntu. Finally, the article addresses some issues of the African Conference on Information Ethics held February 3-5, 2007, in Pretoria, South Africa.[The following essay is adapted from a keynote address delivered at the Africa Information Ethics Conference in Pretoria, South Africa, February 5-7, 2007. Under the patronage of UNESCO, sponsored by the South African government, and organized with assistance from the Department of Information Science at the University of Pretoria, the School of Information Studies at the University of Wisconsin-Milwaukee, and the supporters and members of the International Center for Information Ethics (ICIE), the theme of the conference was Ethical Challenges in the Information Age: The Joy of Sharing Knowledge. The full version of the address as well as selected articles from the conference were published in Vol. 7 of ICIE's online journal, International Review of Information Ethics (for more information, visit http://icie.zkm.de)]
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1162-1170
  13. Smith, M.M.: Online information ethics : online searching and the searching self (1994) 0.02
    0.024201438 = product of:
      0.048402876 = sum of:
        0.032079145 = weight(_text_:information in 8599) [ClassicSimilarity], result of:
          0.032079145 = score(doc=8599,freq=16.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.3840108 = fieldWeight in 8599, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=8599)
        0.016323728 = product of:
          0.032647457 = sum of:
            0.032647457 = weight(_text_:technology in 8599) [ClassicSimilarity], result of:
              0.032647457 = score(doc=8599,freq=2.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.23034787 = fieldWeight in 8599, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=8599)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Describes the foundations of online information ethics by combining the insights of cognitive psychologist, Ulrich Neisser, and information science professor, Rafael Capurro. Capurro contrasts rule based ethics, such as codes, and self based ethics. Rule based ethics are necessary, but self based ethics lead to life enhancing uses of information and information technology. Neisser describes the self by defining 5 aspects of self understanding. Challenges information professionals to create environments and interpersonal interactions which create success in information seeking and provide the users with life enhancing search narratives
    Imprint
    Medford, NJ : Learned Information
  14. Miller, S.: Privacy, data bases and computers (1998) 0.02
    0.02412 = product of:
      0.04824 = sum of:
        0.022450726 = weight(_text_:information in 3027) [ClassicSimilarity], result of:
          0.022450726 = score(doc=3027,freq=6.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.2687516 = fieldWeight in 3027, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=3027)
        0.02578927 = product of:
          0.05157854 = sum of:
            0.05157854 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.05157854 = score(doc=3027,freq=2.0), product of:
                0.16663991 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.047586527 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
    Source
    Journal of information ethics. 7(1998) no.1, S.42-48
  15. Ethics, information and technology : readings (1998) 0.02
    0.023713216 = product of:
      0.047426432 = sum of:
        0.0194429 = weight(_text_:information in 3776) [ClassicSimilarity], result of:
          0.0194429 = score(doc=3776,freq=2.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.23274569 = fieldWeight in 3776, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.09375 = fieldNorm(doc=3776)
        0.027983533 = product of:
          0.055967066 = sum of:
            0.055967066 = weight(_text_:technology in 3776) [ClassicSimilarity], result of:
              0.055967066 = score(doc=3776,freq=2.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.39488205 = fieldWeight in 3776, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.09375 = fieldNorm(doc=3776)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
  16. Information society : new media, ethics and postmodernism (1996) 0.02
    0.022586888 = product of:
      0.045173775 = sum of:
        0.020494616 = weight(_text_:information in 2451) [ClassicSimilarity], result of:
          0.020494616 = score(doc=2451,freq=20.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.2453355 = fieldWeight in 2451, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=2451)
        0.02467916 = product of:
          0.04935832 = sum of:
            0.04935832 = weight(_text_:technology in 2451) [ClassicSimilarity], result of:
              0.04935832 = score(doc=2451,freq=14.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.34825328 = fieldWeight in 2451, product of:
                  3.7416575 = tf(freq=14.0), with freq of:
                    14.0 = termFreq=14.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.03125 = fieldNorm(doc=2451)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    This volume examines 3 critical debates of the post-industrial society: culture and technology, information society, and postmodernism. It aims to provide theoretical and methodological underpinnings for the analysis and design of information, communication and multimedia technologies. It is a thoroughly interdisciplinara volume, which will be of interest to students, researchers and practitioners in a wide area of disciplines including information and communication systems, education and social sciences
    Content
    Enthält die Beiträge: COOLEY, M.: Visions and problems of the post-industrial society; GILL, K.S.: Knowledge and the post-industrial society; LYTJE, I.: Media and the cultural condition: language and education; WHISTON, T.: Knowledge and sustainable development: towards the furtherance of a global communication system; SHIPLEY, P.: The keyboard blues: modern technology and the rights and risks of people at work; LEAL, F.: Ethics is fragile, goodness is not; HIROSE, L.M.: Organisational spaces and intelligent machines: a metaphorical approach to ethics; THORPE, J.: Information system design: human centres approaches; BESSELAAR, P. van den u. T. MOM: Technological change, social innovation and employment; JONES, M.: Empowerment and enslavement: business process reeingineering and the transformation of work; LEVY, P.: The role of creativity in post-industrial society: exploring the implications of non-conventional technologies for work and management organisation; JANSEN, A.: The global information society and rural economics; DAY, P.: Information communication technology and society: a community-based approach; CYSNE, F.P.: Technology transfer and development; COOPER, J.: Information, knowledge and empowerment: the role of information in rural development; CLAY, J.: Participative citizenry in the information ages: the role of science and technology towards democratic education in a multicultural society; TAYLOR, J.: New media and cultural representation; BLACK, M.T.: Consensus and authenticity in representations: simulation as participative theatre; GORAYSKA, B. u. J.L. MEY: Cognitive technology; BOYNE, C.W.: Electronic mail, IT productivity and workplace culture; Squires, P.: Deadly technology in the post-industrial society: a case study of firearms and firearms control; COLE, M. u. D. HILL: Resitance postmodernism: emancipatory politics for a new era or academic chic for a defeatist intelligentsia?; McFEE, G.: Postmodernism, dance and post-industrial society; MULLER, R.C.: Creativity constellation for innovation and cooperation
  17. Britz, J.J.: Making the global information society good : A social justice perspective on the ethical dimensions of the global information society (2008) 0.02
    0.022366844 = product of:
      0.04473369 = sum of:
        0.030741923 = weight(_text_:information in 1870) [ClassicSimilarity], result of:
          0.030741923 = score(doc=1870,freq=20.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.36800325 = fieldWeight in 1870, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.046875 = fieldNorm(doc=1870)
        0.013991767 = product of:
          0.027983533 = sum of:
            0.027983533 = weight(_text_:technology in 1870) [ClassicSimilarity], result of:
              0.027983533 = score(doc=1870,freq=2.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.19744103 = fieldWeight in 1870, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.046875 = fieldNorm(doc=1870)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    This article discusses social justice as a moral norm that can be used to address the ethical challenges facing us in the global Information Society. The global Information Society is seen as a continuation of relationships which have been altered by the use of modern information and communication technologies (ICTs). Four interrelated characteristics of the global Information Society also are identified. After a brief overview of the main socioethical issues facing the global Information Society, the article discusses the application of social justice as a moral tool that has universal moral validity and which can be used to address these ethical challenges. It is illustrated that the scope of justice is no longer limited to domestic issues. Three core principles of justice are furthermore distinguished, and based on these three principles, seven categories of justice are introduced. It is illustrated how these categories of justice can be applied to address the main ethical challenges of the Information Society.
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1171-1183
  18. Hammwöhner, R.: Anmerkungen zur Grundlegung der Informationsethik (2006) 0.02
    0.022060106 = product of:
      0.04412021 = sum of:
        0.018330941 = weight(_text_:information in 6063) [ClassicSimilarity], result of:
          0.018330941 = score(doc=6063,freq=4.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.21943474 = fieldWeight in 6063, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=6063)
        0.02578927 = product of:
          0.05157854 = sum of:
            0.05157854 = weight(_text_:22 in 6063) [ClassicSimilarity], result of:
              0.05157854 = score(doc=6063,freq=2.0), product of:
                0.16663991 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.047586527 = queryNorm
                0.30952093 = fieldWeight in 6063, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=6063)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    In diesem Beitrag werden verschiedene Aspekte einer Begründung einer Informationsethik betrachtet. Zunächst wird eine sinnvolle Abgrenzung zu konkurrierenden Ethiken - Netz- und Medienethik - gesucht. Aus Sicht der Generierung, Distribution und Bewahrung von Information wird die Informationsethik als umfassender und allgemeiner als die anderen angesehen. Weiterhin wird die Option einer diskursethischen und damit absoluten Begründung der Informationsethik diskutiert und zugunsten einer pragmatistischen Sichtweise zurückgewiesen.
    Date
    13.10.2006 10:22:03
    Source
    Information und Sprache: Beiträge zu Informationswissenschaft, Computerlinguistik, Bibliothekswesen und verwandten Fächern. Festschrift für Harald H. Zimmermann. Herausgegeben von Ilse Harms, Heinz-Dirk Luckhardt und Hans W. Giessen
  19. Himma, K.E.: ¬The justification of intellectual property : contemporary philosophical disputes (2008) 0.02
    0.019562405 = product of:
      0.03912481 = sum of:
        0.016039573 = weight(_text_:information in 1862) [ClassicSimilarity], result of:
          0.016039573 = score(doc=1862,freq=4.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.1920054 = fieldWeight in 1862, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1862)
        0.023085238 = product of:
          0.046170477 = sum of:
            0.046170477 = weight(_text_:technology in 1862) [ClassicSimilarity], result of:
              0.046170477 = score(doc=1862,freq=4.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.32576108 = fieldWeight in 1862, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1862)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Once taken for granted as morally legitimate, legal protection of intellectual property rights have come under fire in the last 30 years as new technologies have evolved and severed the link between expression of ideas and such traditional material-based media as books and magazines. These advances in digital technology have called attention to unique features of intellectual content that problematize intellectual property protection; any piece of intellectual content, for example, can be simultaneously appropriated by everyone in the world without thereby diminishing the supply of that content available to others. This essay provides an overview and assessment of the arguments and counterarguments on the issue of whether intellectual property should be legally protected.
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1143-1161
  20. Foundations of information ethics (2019) 0.02
    0.019557714 = product of:
      0.03911543 = sum of:
        0.025923865 = weight(_text_:information in 5878) [ClassicSimilarity], result of:
          0.025923865 = score(doc=5878,freq=32.0), product of:
            0.083537094 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.047586527 = queryNorm
            0.3103276 = fieldWeight in 5878, product of:
              5.656854 = tf(freq=32.0), with freq of:
                32.0 = termFreq=32.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=5878)
        0.013191565 = product of:
          0.02638313 = sum of:
            0.02638313 = weight(_text_:technology in 5878) [ClassicSimilarity], result of:
              0.02638313 = score(doc=5878,freq=4.0), product of:
                0.1417311 = queryWeight, product of:
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.047586527 = queryNorm
                0.1861492 = fieldWeight in 5878, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  2.978387 = idf(docFreq=6114, maxDocs=44218)
                  0.03125 = fieldNorm(doc=5878)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    As discussions about the roles played by information in economic, political, and social arenas continue to evolve, the need for an intellectual primer on information ethics that also functions as a solid working casebook for LIS students and professionals has never been more urgent. This text, written by a stellar group of ethics scholars and contributors from around the globe, expertly fills that need. Organized into twelve chapters, making it ideal for use by instructors, this volume from editors Burgess and Knox thoroughly covers principles and concepts in information ethics, as well as the history of ethics in the information professions; examines human rights, information access, privacy, discourse, intellectual property, censorship, data and cybersecurity ethics, intercultural Information ethics, and global digital citizenship and responsibility; synthesizes the philosophical underpinnings of these key subjects with abundant primary source material to provide historical context along with timely and relevant case studies; features contributions from John M. Budd, Paul T. Jaeger, Rachel Fischer, Margaret Zimmerman, Kathrine A. Henderson, Peter Darch, Michael Zimmer, and Masooda Bashir, among others; and offers a special concluding chapter by Amelia Gibson that explores emerging issues in information ethics, including discussions ranging from the ethics of social media and social movements to AI decision making. This important survey will be a key text for LIS students and an essential reference work for practitioners.
    Content
    Inhalt: Principles and concepts in information ethics / John T.F. Burgess -- Human rights and information ethics / Paul T. Jaeger, Ursula Gorham, and Natalie Greene Taylor -- History of ethics in the information professions / John T.F. Burgess -- Information access / Emily J.M. Knox -- Privacy / Michael Zimmer -- Ethics of discourse / John M. Budd -- Intellectual property ethics / Kathrine Andrews Henderson -- Data ethics / Peter Darch -- Cybersecurity ethics / Jane Blanken-Webb, Imani Palmer, Roy H. Campbell, Nicholas C. Burbules, and Masooda Bashir -- Cognitive justice and intercultural communication ethics / Rachel Fischer and Erin Klazar -- Global digital citizenship / Margaret Zimmerman -- Emerging issues / Amelia Gibson.
    LCSH
    Information technology / Moral and ethical aspects
    Information science / Moral and ethical aspects
    Subject
    Information technology / Moral and ethical aspects
    Information science / Moral and ethical aspects

Authors

Years

Languages

  • e 87
  • d 13
  • m 2
  • i 1
  • More… Less…

Types

  • a 87
  • m 11
  • s 7
  • More… Less…