Search (32 results, page 1 of 2)

  • × theme_ss:"Informationsethik"
  1. Huber, W.: Menschen, Götter und Maschinen : eine Ethik der Digitalisierung (2022) 0.04
    0.042828932 = product of:
      0.085657865 = sum of:
        0.03853567 = weight(_text_:wide in 752) [ClassicSimilarity], result of:
          0.03853567 = score(doc=752,freq=2.0), product of:
            0.19679762 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.044416238 = queryNorm
            0.1958137 = fieldWeight in 752, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.03125 = fieldNorm(doc=752)
        0.020906283 = weight(_text_:web in 752) [ClassicSimilarity], result of:
          0.020906283 = score(doc=752,freq=2.0), product of:
            0.14495286 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.044416238 = queryNorm
            0.14422815 = fieldWeight in 752, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.03125 = fieldNorm(doc=752)
        0.02621591 = weight(_text_:computer in 752) [ClassicSimilarity], result of:
          0.02621591 = score(doc=752,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.16150802 = fieldWeight in 752, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.03125 = fieldNorm(doc=752)
      0.5 = coord(3/6)
    
    Content
    Vorwort -- 1. Das digitale Zeitalter -- Zeitenwende -- Die Vorherrschaft des Buchdrucks geht zu Ende -- Wann beginnt das digitale Zeitalter? -- 2. Zwischen Euphorie und Apokalypse -- Digitalisierung. Einfach. Machen -- Euphorie -- Apokalypse -- Verantwortungsethik -- Der Mensch als Subjekt der Ethik -- Verantwortung als Prinzip -- 3. Digitalisierter Alltag in einer globalisierten Welt -- Vom World Wide Web zum Internet der Dinge -- Mobiles Internet und digitale Bildung -- Digitale Plattformen und ihre Strategien -- Big Data und informationelle Selbstbestimmung -- 4. Grenzüberschreitungen -- Die Erosion des Privaten -- Die Deformation des Öffentlichen -- Die Senkung von Hemmschwellen -- Das Verschwinden der Wirklichkeit -- Die Wahrheit in der Infosphäre -- 5. Die Zukunft der Arbeit -- Industrielle Revolutionen -- Arbeit 4.0 -- Ethik 4.0 -- 6. Digitale Intelligenz -- Können Computer dichten? -- Stärker als der Mensch? -- Maschinelles Lernen -- Ein bleibender Unterschied -- Ethische Prinzipien für den Umgang mit digitaler Intelligenz -- Medizin als Beispiel -- 7. Die Würde des Menschen im digitalen Zeitalter -- Kränkungen oder Revolutionen -- Transhumanismus und Posthumanismus -- Gibt es Empathie ohne Menschen? -- Wer ist autonom: Mensch oder Maschine? -- Humanismus der Verantwortung -- 8. Die Zukunft des Homo sapiens -- Vergöttlichung des Menschen -- Homo deus -- Gott und Mensch im digitalen Zeitalter -- Veränderung der Menschheit -- Literatur -- Personenregister.
  2. Miller, S.: Privacy, data bases and computers (1998) 0.03
    0.02550099 = product of:
      0.07650297 = sum of:
        0.05243182 = weight(_text_:computer in 3027) [ClassicSimilarity], result of:
          0.05243182 = score(doc=3027,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.32301605 = fieldWeight in 3027, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.0625 = fieldNorm(doc=3027)
        0.024071148 = product of:
          0.048142295 = sum of:
            0.048142295 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.048142295 = score(doc=3027,freq=2.0), product of:
                0.1555381 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044416238 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.33333334 = coord(2/6)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
  3. Behar, J.E.: Computer ethics : moral philosophy or professional propaganda? (1993) 0.02
    0.018919704 = product of:
      0.11351822 = sum of:
        0.11351822 = weight(_text_:computer in 8700) [ClassicSimilarity], result of:
          0.11351822 = score(doc=8700,freq=6.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.69935024 = fieldWeight in 8700, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.078125 = fieldNorm(doc=8700)
      0.16666667 = coord(1/6)
    
    Abstract
    The diffuse focus of ethical discourse in computing is confusing. Clarifies the relation of computer ethics to issues of personal freedom, social control, and social inequality, seeks to provide human service workers and other professional computer specialists with a framework for identifying the social effects and moral dimensions of computerization
  4. Weckert, J.; Adeney, D.: Computer and information ethics (1997) 0.02
    0.018537447 = product of:
      0.11122468 = sum of:
        0.11122468 = weight(_text_:computer in 2136) [ClassicSimilarity], result of:
          0.11122468 = score(doc=2136,freq=4.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.6852205 = fieldWeight in 2136, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.09375 = fieldNorm(doc=2136)
      0.16666667 = coord(1/6)
    
    Series
    Contributions to the study of computer science; no.4
  5. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.02
    0.015938118 = product of:
      0.047814354 = sum of:
        0.03276989 = weight(_text_:computer in 1868) [ClassicSimilarity], result of:
          0.03276989 = score(doc=1868,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.20188503 = fieldWeight in 1868, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.0150444675 = product of:
          0.030088935 = sum of:
            0.030088935 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.030088935 = score(doc=1868,freq=2.0), product of:
                0.1555381 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044416238 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.33333334 = coord(2/6)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
  6. Computer ethics statement (1993) 0.02
    0.015447874 = product of:
      0.09268724 = sum of:
        0.09268724 = weight(_text_:computer in 7243) [ClassicSimilarity], result of:
          0.09268724 = score(doc=7243,freq=4.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.5710171 = fieldWeight in 7243, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.078125 = fieldNorm(doc=7243)
      0.16666667 = coord(1/6)
    
    Abstract
    Describes the development of a draft statement on computer ethics developed by the library staff of Southern Methodist University to guide and direct library personnel in appropriate and acceptable use of personal computers connected to the campus networks and mainframe
  7. Homan, P.A.: Library catalog notes for "bad books" : ethics vs. responsibilities (2012) 0.01
    0.013725774 = product of:
      0.04117732 = sum of:
        0.026132854 = weight(_text_:web in 420) [ClassicSimilarity], result of:
          0.026132854 = score(doc=420,freq=2.0), product of:
            0.14495286 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.044416238 = queryNorm
            0.18028519 = fieldWeight in 420, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=420)
        0.0150444675 = product of:
          0.030088935 = sum of:
            0.030088935 = weight(_text_:22 in 420) [ClassicSimilarity], result of:
              0.030088935 = score(doc=420,freq=2.0), product of:
                0.1555381 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044416238 = queryNorm
                0.19345059 = fieldWeight in 420, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=420)
          0.5 = coord(1/2)
      0.33333334 = coord(2/6)
    
    Abstract
    The conflict between librarians' ethics and their responsibilities in the process of progressive collection management, which applies the principles of cost accounting to libraries, to call attention to the "bad books" in their collections that are compromised by age, error, abridgement, expurgation, plagiarism, copyright violation, libel, or fraud, is discussed. According to Charles Cutter, notes in catalog records should call attention to the best books but ignore the bad ones. Libraries that can afford to keep their "bad books," however, which often have a valuable second life, must call attention to their intellectual contexts in notes in the catalog records. Michael Bellesiles's Arming America, the most famous case of academic fraud at the turn of the twenty-first century, is used as a test case. Given the bias of content enhancement that automatically pulls content from the Web into library catalogs, catalog notes for "bad books" may be the only way for librarians to uphold their ethical principles regarding collection management while fulfilling their professional responsibilities to their users in calling attention to their "bad books."
    Date
    27. 9.2012 14:22:00
  8. Rötzer, F.: Grundlagen einer neurotechnologischen Ethik (1996) 0.01
    0.013107955 = product of:
      0.07864773 = sum of:
        0.07864773 = weight(_text_:computer in 1997) [ClassicSimilarity], result of:
          0.07864773 = score(doc=1997,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.48452407 = fieldWeight in 1997, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.09375 = fieldNorm(doc=1997)
      0.16666667 = coord(1/6)
    
    Source
    Die Technik auf dem Weg zu Seele: Forschungen an der Schnittstelle Gehirn / Computer. Hrsg.: C. Maar, u.a
  9. Rötzer, F.; Metzinger, T.; Linke, D.B.; Emrich, H.: Entwurf für eine Ethik der Neurotechnologie (1996) 0.01
    0.013107955 = product of:
      0.07864773 = sum of:
        0.07864773 = weight(_text_:computer in 2065) [ClassicSimilarity], result of:
          0.07864773 = score(doc=2065,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.48452407 = fieldWeight in 2065, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.09375 = fieldNorm(doc=2065)
      0.16666667 = coord(1/6)
    
    Source
    Die Technik auf dem Weg zu Seele: Forschungen an der Schnittstelle Gehirn / Computer. Hrsg.: C. Maar, u.a
  10. Metzinger, T.: Philosophische Stichworte zu einer Ethik der Neurowissenschaften und der Informatik (1996) 0.01
    0.013107955 = product of:
      0.07864773 = sum of:
        0.07864773 = weight(_text_:computer in 2447) [ClassicSimilarity], result of:
          0.07864773 = score(doc=2447,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.48452407 = fieldWeight in 2447, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.09375 = fieldNorm(doc=2447)
      0.16666667 = coord(1/6)
    
    Source
    Die Technik auf dem Weg zu Seele: Forschungen an der Schnittstelle Gehirn / Computer. Hrsg.: C. Maar, u.a
  11. Kuhlen, R.: Informationsethik - Die Entwicklung von Normen für den Umgang mit Wissen und Information in elektronischen Räumen (2005) 0.01
    0.010994123 = product of:
      0.065964736 = sum of:
        0.065964736 = product of:
          0.13192947 = sum of:
            0.13192947 = weight(_text_:programs in 3687) [ClassicSimilarity], result of:
              0.13192947 = score(doc=3687,freq=2.0), product of:
                0.25748047 = queryWeight, product of:
                  5.79699 = idf(docFreq=364, maxDocs=44218)
                  0.044416238 = queryNorm
                0.5123863 = fieldWeight in 3687, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  5.79699 = idf(docFreq=364, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3687)
          0.5 = coord(1/2)
      0.16666667 = coord(1/6)
    
    Source
    Bibliothekswissenschaft - quo vadis? Eine Disziplin zwischen Traditionen und Visionen: Programme - Modelle - Forschungsaufgaben / Library Science - quo vadis? A Discipline between Challenges and Opportunities: Programs - Models - Research Assignments. Mit einem Geleitwort von / With a Preface by Guy St. Clair Consulting Specialist for Knowledge Management and Learning, New York, NY und einem Vorwort von / and a Foreword by Georg Ruppelt Sprecher von / Speaker of BID - Bibliothek & Information Deutschland Bundesvereinigung Deutscher Bibliotheksund Informationsverbände e.V. Hrsg. von P. Hauke
  12. Smith, M.M.: Information ethics (1997) 0.01
    0.010923296 = product of:
      0.06553978 = sum of:
        0.06553978 = weight(_text_:computer in 1042) [ClassicSimilarity], result of:
          0.06553978 = score(doc=1042,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.40377006 = fieldWeight in 1042, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.078125 = fieldNorm(doc=1042)
      0.16666667 = coord(1/6)
    
    Abstract
    State of the art review of the concepts of information ethics, computer ethics, and cyberethics by explaining the emergence of applied information ethics through channels of professional practice and scholarly communication. Surveys the beginning of information ethics from 1988 through 1996
  13. Information ethics : privacy, property, and power (2005) 0.01
    0.0090076635 = product of:
      0.02702299 = sum of:
        0.016384944 = weight(_text_:computer in 2392) [ClassicSimilarity], result of:
          0.016384944 = score(doc=2392,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.100942515 = fieldWeight in 2392, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.010638045 = product of:
          0.02127609 = sum of:
            0.02127609 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
              0.02127609 = score(doc=2392,freq=4.0), product of:
                0.1555381 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.044416238 = queryNorm
                0.13679022 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.5 = coord(1/2)
      0.33333334 = coord(2/6)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
  14. Neumaier, O.: Was hat 'Künstliche Intelligenz' mit Ethik zu tun? (1994) 0.01
    0.008738637 = product of:
      0.05243182 = sum of:
        0.05243182 = weight(_text_:computer in 2456) [ClassicSimilarity], result of:
          0.05243182 = score(doc=2456,freq=2.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.32301605 = fieldWeight in 2456, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.0625 = fieldNorm(doc=2456)
      0.16666667 = coord(1/6)
    
    Abstract
    The relevance of ethical considerations for AI is discussed in 2 respects: on the one hand with regard to the consequences one has to cope with when dealing with computer systems that are considered 'intelligent' and, on the other hand had with questions of responsibility which arises when such systems are used. In what sense has Artificial Intelligence to deal with ethics?
  15. Rubel, A.; Castro, C.; Pham, A.: Algorithms and autonomy : the ethics of automated decision systems (2021) 0.01
    0.007723937 = product of:
      0.04634362 = sum of:
        0.04634362 = weight(_text_:computer in 671) [ClassicSimilarity], result of:
          0.04634362 = score(doc=671,freq=4.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.28550854 = fieldWeight in 671, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.0390625 = fieldNorm(doc=671)
      0.16666667 = coord(1/6)
    
    LCSH
    Expert systems (Computer science) / Moral and ethical aspects
    Subject
    Expert systems (Computer science) / Moral and ethical aspects
  16. San Segundo, R.; Martínez-Ávila, D.; Frías Montoya, J.A.: Ethical issues in control by algorithms : the user is the content (2023) 0.01
    0.0073914872 = product of:
      0.04434892 = sum of:
        0.04434892 = weight(_text_:web in 1132) [ClassicSimilarity], result of:
          0.04434892 = score(doc=1132,freq=4.0), product of:
            0.14495286 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.044416238 = queryNorm
            0.3059541 = fieldWeight in 1132, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.046875 = fieldNorm(doc=1132)
      0.16666667 = coord(1/6)
    
    Abstract
    In this paper we discuss some ethical issues and challenges of the use of algorithms on the web from the perspective of knowledge organization. We review some of the problems that these algorithms and the filter bubbles pose for the users. We contextualize these issues within the user-based approaches to knowledge organization in a larger sense. We review some of the technologies that have been developed to counter these problems as well as initiatives from the knowledge organization field. We conclude with the necessity of adopting a critical and ethical stance towards the use of algorithms on the web and the need for an education in knowledge organization that addresses these issues.
  17. Brody, R.: ¬The problem of information naïveté (2008) 0.01
    0.006968761 = product of:
      0.041812565 = sum of:
        0.041812565 = weight(_text_:web in 1865) [ClassicSimilarity], result of:
          0.041812565 = score(doc=1865,freq=2.0), product of:
            0.14495286 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.044416238 = queryNorm
            0.2884563 = fieldWeight in 1865, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0625 = fieldNorm(doc=1865)
      0.16666667 = coord(1/6)
    
    Abstract
    With the rapidly changing Web-enabled world, the already existing dichotomy between knowing of and knowing about, or information naïveté, widens daily. This article explores the ethical dilemmas that can result from the lack of information literacy. The article also discusses conditions and consequences of information naïveté, media bias, possessive memory, and limited contexts and abilities. To help avoid information failure, the author recommends producers, contributors, disseminators, and aggregators of information be less information naïve.
  18. Information society : new media, ethics and postmodernism (1996) 0.01
    0.006422612 = product of:
      0.03853567 = sum of:
        0.03853567 = weight(_text_:wide in 2451) [ClassicSimilarity], result of:
          0.03853567 = score(doc=2451,freq=2.0), product of:
            0.19679762 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.044416238 = queryNorm
            0.1958137 = fieldWeight in 2451, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.03125 = fieldNorm(doc=2451)
      0.16666667 = coord(1/6)
    
    Abstract
    This volume examines 3 critical debates of the post-industrial society: culture and technology, information society, and postmodernism. It aims to provide theoretical and methodological underpinnings for the analysis and design of information, communication and multimedia technologies. It is a thoroughly interdisciplinara volume, which will be of interest to students, researchers and practitioners in a wide area of disciplines including information and communication systems, education and social sciences
  19. Frohmann, B.: Subjectivity and information ethics (2008) 0.01
    0.0061791493 = product of:
      0.037074894 = sum of:
        0.037074894 = weight(_text_:computer in 1360) [ClassicSimilarity], result of:
          0.037074894 = score(doc=1360,freq=4.0), product of:
            0.16231956 = queryWeight, product of:
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.044416238 = queryNorm
            0.22840683 = fieldWeight in 1360, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.6545093 = idf(docFreq=3109, maxDocs=44218)
              0.03125 = fieldNorm(doc=1360)
      0.16666667 = coord(1/6)
    
    Abstract
    In A Brief History of Information Ethics, Thomas Froehlich (2004) quickly surveyed under several broad categories some of the many issues that constitute information ethics: under the category of librarianship - censorship, privacy, access, balance in collections, copyright, fair use, and codes of ethics; under information science, which Froehlich sees as closely related to librarianship - confidentiality, bias, and quality of information; under computer ethics - intellectual property, privacy, fair representation, nonmaleficence, computer crime, software reliability, artificial intelligence, and e-commerce; under cyberethics (issues related to the Internet, or cyberspace) - expert systems, artificial intelligence (again), and robotics; under media ethics - news, impartiality, journalistic ethics, deceit, lies, sexuality, censorship (again), and violence in the press; and under intercultural information ethics - digital divide, and the ethical role of the Internet for social, political, cultural, and economic development. Many of the debates in information ethics, on these and other issues, have to do with specific kinds of relationships between subjects. The most important subject and a familiar figure in information ethics is the ethical subject engaged in moral deliberation, whether appearing as the bearer of moral rights and obligations to other subjects, or as an agent whose actions are judged, whether by others or by oneself, according to the standards of various moral codes and ethical principles. Many debates in information ethics revolve around conflicts between those acting according to principles of unfettered access to information and those finding some information offensive or harmful. Subjectivity is at the heart of information ethics. But how is subjectivity understood? Can it be understood in ways that broaden ethical reflection to include problems that remain invisible when subjectivity is taken for granted and when how it is created remains unquestioned? This article proposes some answers by investigating the meaning and role of subjectivity in information ethics.[In an article on cyberethics (2000), I asserted that there was no information ethics in any special sense beyond the application of general ethical principles to information services. Here, I take a more expansive view.]
  20. Nagenborg, M.: Privatheit - Menschenrecht oder eine Frage des Anstandes? (2008) 0.01
    0.0060976665 = product of:
      0.036585998 = sum of:
        0.036585998 = weight(_text_:web in 1698) [ClassicSimilarity], result of:
          0.036585998 = score(doc=1698,freq=2.0), product of:
            0.14495286 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.044416238 = queryNorm
            0.25239927 = fieldWeight in 1698, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1698)
      0.16666667 = coord(1/6)
    
    Abstract
    Im ersten Teil des Beitrages wird eine kurze Zusammenfassung der Diskussion um den Schutz der Privatheit in Recht und Ethik gegeben. Der Schwerpunkt liegt dabei auf der Informationsethik. Im zweiten Teil werden einige für die Wissensorganisation relevante Beispiele für den Umgang mit personenbezogenen Daten diskutiert: u. a. Web Information Retrieval, Data Mining sowie FOAF als Beispiel für die Standardisierung von personenbezogenen Informationen.

Years

Languages

  • e 19
  • d 13
  • i 1

Types