Search (113 results, page 1 of 6)

  • × theme_ss:"Informationsethik"
  1. Rubel, A.; Castro, C.; Pham, A.: Algorithms and autonomy : the ethics of automated decision systems (2021) 0.03
    0.03472756 = product of:
      0.086818896 = sum of:
        0.07213905 = weight(_text_:list in 671) [ClassicSimilarity], result of:
          0.07213905 = score(doc=671,freq=2.0), product of:
            0.25191793 = queryWeight, product of:
              5.183657 = idf(docFreq=673, maxDocs=44218)
              0.04859849 = queryNorm
            0.2863593 = fieldWeight in 671, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.183657 = idf(docFreq=673, maxDocs=44218)
              0.0390625 = fieldNorm(doc=671)
        0.014679846 = weight(_text_:of in 671) [ClassicSimilarity], result of:
          0.014679846 = score(doc=671,freq=10.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.19316542 = fieldWeight in 671, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=671)
      0.4 = coord(2/5)
    
    Abstract
    Algorithms influence every facet of modern life: criminal justice, education, housing, entertainment, elections, social media, news feeds, work... the list goes on. Delegating important decisions to machines, however, gives rise to deep moral concerns about responsibility, transparency, freedom, fairness, and democracy. Algorithms and Autonomy connects these concerns to the core human value of autonomy in the contexts of algorithmic teacher evaluation, risk assessment in criminal sentencing, predictive policing, background checks, news feeds, ride-sharing platforms, social media, and election interference. Using these case studies, the authors provide a better understanding of machine fairness and algorithmic transparency. They explain why interventions in algorithmic systems are necessary to ensure that algorithms are not used to control citizens' participation in politics and undercut democracy. This title is also available as Open Access on Cambridge Core
  2. Alfino, M.: Information ethics in the workplace : do expert systems have a moral cost? (1993) 0.03
    0.030382723 = product of:
      0.07595681 = sum of:
        0.021008085 = weight(_text_:of in 8571) [ClassicSimilarity], result of:
          0.021008085 = score(doc=8571,freq=8.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.27643585 = fieldWeight in 8571, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=8571)
        0.05494872 = weight(_text_:subject in 8571) [ClassicSimilarity], result of:
          0.05494872 = score(doc=8571,freq=2.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.31612942 = fieldWeight in 8571, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.0625 = fieldNorm(doc=8571)
      0.4 = coord(2/5)
    
    Abstract
    Criticises the arguments of Danial Dennett: that technology can pose a significant moral threat to people; with specific reference to expert systems. Refutes Dennett's arguments that expert systems pose a particular threat to people's ability to enjoy the life by removing important elements of personal judgement which are the subject of specific human virtues and make life interesting
    Source
    Journal of information ethics. 2(1993) no.2, S.15-19
  3. Information ethics : privacy, property, and power (2005) 0.03
    0.030350963 = product of:
      0.050584935 = sum of:
        0.02177373 = weight(_text_:of in 2392) [ClassicSimilarity], result of:
          0.02177373 = score(doc=2392,freq=88.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.28651062 = fieldWeight in 2392, product of:
              9.380832 = tf(freq=88.0), with freq of:
                88.0 = termFreq=88.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.017171476 = weight(_text_:subject in 2392) [ClassicSimilarity], result of:
          0.017171476 = score(doc=2392,freq=2.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.098790444 = fieldWeight in 2392, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.011639727 = product of:
          0.023279455 = sum of:
            0.023279455 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
              0.023279455 = score(doc=2392,freq=4.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.13679022 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.5 = coord(1/2)
      0.6 = coord(3/5)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.302 (L.A. Ennis):"This is an important and timely anthology of articles "on the normative issues surrounding information control" (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics, intellectual property, privacy, free speech, and more, the book provides information professionals of all kinds with a valuable and thought-provoking resource. Information Ethics is divided into five parts and twenty chapters or articles. At the end of each of the five parts, the editor has included a few "discussion cases," which allows the users to apply what they just read to potential real life examples. Part I, "An Ethical Framework for Analysis," provides readers with an introduction to reasoning and ethics. This complex and philosophical section of the book contains five articles and four discussion cases. All five of the articles are really thought provoking and challenging writings on morality. For instance, in the first article, "Introduction to Moral Reasoning," Tom Regan examines how not to answer a moral question. For example, he thinks using what the majority believes as a means of determining what is and is not moral is flawed. "The Metaphysics of Morals" by Immanuel Kant looks at the reasons behind actions. According to Kant, to be moral one has to do the right thing for the right reasons. By including materials that force the reader to think more broadly and deeply about what is right and wrong, Moore has provided an important foundation and backdrop for the rest of the book. Part II, "Intellectual Property: Moral and Legal Concerns," contains five articles and three discussion cases for tackling issues like ownership, patents, copyright, and biopiracy. This section takes a probing look at intellectual and intangible property from a variety of viewpoints. For instance, in "Intellectual Property is Still Property," Judge Frank Easterbrook argues that intellectual property is no different than physical property and should not be treated any differently by law. Tom Palmer's article, "Are Patents and Copyrights Morally Justified," however, uses historical examples to show how intellectual and physical properties differ.
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
    Imprint
    Seattle, WA : University of Washington Press
    LCSH
    Freedom of information
    Privacy, Right of
    Subject
    Freedom of information
    Privacy, Right of
  4. Van der Walt, M.S.: Normative ethics in knowledge organisation (2008) 0.03
    0.029597804 = product of:
      0.07399451 = sum of:
        0.02542624 = weight(_text_:of in 1696) [ClassicSimilarity], result of:
          0.02542624 = score(doc=1696,freq=30.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.33457235 = fieldWeight in 1696, product of:
              5.477226 = tf(freq=30.0), with freq of:
                30.0 = termFreq=30.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1696)
        0.048568267 = weight(_text_:subject in 1696) [ClassicSimilarity], result of:
          0.048568267 = score(doc=1696,freq=4.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.27942157 = fieldWeight in 1696, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1696)
      0.4 = coord(2/5)
    
    Abstract
    The paper addresses the problem of whether the information profession needs ethical norms or guidelines specifically aimed at situations that may arise during knowledge organisation processes, and, if so, which specific norms should be included in codes of conduct. To explore this issue the following three specific questions are addressed: - Which forms of unethical conduct actually occur in knowledge organisation? - Which specific guidelines are required for promoting ethical practices in knowledge organisation? - To what extent does existing ethical codes make provision for knowledge organization practices? Four categories of unethical conduct in knowledge organisation are identified: - The use of terms with negative connotations - Misrepresentation of the subject - Censorship of "undesirable materials" - Bias in verbal indexing languages, classification schemes, evaluative comments in bibliographic records and subject analysis. Guidelines in codes of conduct should be aimed at encouraging information professionals to avoid these unethical practices. An examination of a number of existing ethical codes for the information profession shows that, although general ethical statements, that can be seen as applicable to knowledge organisation tasks, do occur in these codes, this is by no means a general trend. It is also clear that very few of the codes give explicit attention to knowledge organisation.
    Source
    Kompatibilität, Medien und Ethik in der Wissensorganisation - Compatibility, Media and Ethics in Knowledge Organization: Proceedings der 10. Tagung der Deutschen Sektion der Internationalen Gesellschaft für Wissensorganisation Wien, 3.-5. Juli 2006 - Proceedings of the 10th Conference of the German Section of the International Society of Knowledge Organization Vienna, 3-5 July 2006. Ed.: H.P. Ohly, S. Netscher u. K. Mitgutsch
  5. Pinho, F.A.; Chaves Guimaraes, J.A.: Male homosexuality in Brazilian indexing languages : some ethical questions (2012) 0.03
    0.028895525 = product of:
      0.07223881 = sum of:
        0.023670541 = weight(_text_:of in 417) [ClassicSimilarity], result of:
          0.023670541 = score(doc=417,freq=26.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.31146988 = fieldWeight in 417, product of:
              5.0990195 = tf(freq=26.0), with freq of:
                26.0 = termFreq=26.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=417)
        0.048568267 = weight(_text_:subject in 417) [ClassicSimilarity], result of:
          0.048568267 = score(doc=417,freq=4.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.27942157 = fieldWeight in 417, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.0390625 = fieldNorm(doc=417)
      0.4 = coord(2/5)
    
    Abstract
    Studies on ethics in information organization have deeply contributed to the recognition of the social dimension of Information Science. The subject approach to information is linked to an ethical dimension because one of its major concerns is related to its reliability and usefulness in a specific discursive community or knowledge domain. In this direction, we propose, through an exploratory research design with qualitative and inductive characteristics, to identify the specific terminology that Brazilian indexing languages allow for terms relating to male homosexuality. We also analyzed the terms assigned to papers published in the Journal of Homosexuality, Sexualities and Journal of Gay & Lesbian Mental Health between the years 2005 to 2009. From this analysis of terms and the Brazilian indexing languages, we see (1) the Brazilian context, (2) imprecision in the terminology, (3) indications of prejudices disseminated by political correctness, (4) biased representation of the subject matter, (5) and the presence of figures of speech.
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_h.pdf.
  6. Brandt, M.B.: Ethical aspects in the organization of legislative lnformation (2018) 0.03
    0.028895525 = product of:
      0.07223881 = sum of:
        0.023670541 = weight(_text_:of in 4149) [ClassicSimilarity], result of:
          0.023670541 = score(doc=4149,freq=26.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.31146988 = fieldWeight in 4149, product of:
              5.0990195 = tf(freq=26.0), with freq of:
                26.0 = termFreq=26.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4149)
        0.048568267 = weight(_text_:subject in 4149) [ClassicSimilarity], result of:
          0.048568267 = score(doc=4149,freq=4.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.27942157 = fieldWeight in 4149, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4149)
      0.4 = coord(2/5)
    
    Abstract
    The goal of this research is to analyze ethical questions related to the organization of legislative information (bills, laws, and speeches) within the scope of the Brazilian Federal legislature (Chamber of Deputies and Federal Senate). Field research including interviews was used to collect data in order to investigate the development of knowledge representation tools, such as thesauri and taxonomies , and subject indexing for organization of legislative information (bills, legislation, and speeches). The heads of all sectors responsible for the chosen activities were interviewed in person, and the answers were compared to common ethical problems described in knowledge organization (KO) literature. The results, in part, show a lack of clarity on ethical issues in the treatment of legislative information, pointing to ethical dilemmas and identifying problems such as informational directness, misrepresentation, and ambiguity, among others. The indexers in the Brazilian Congress found ambiguity the ethical aspect faced most often in their jobs. The next most frequent issue was professional inefficiency and in third place was a tie between informational directness and lack of cultural warrant. The research also describes solutions used for various ethical dilemmas. It was found that some indexing terms used to describe bills in the Brazilian Chamber of Deputies have been subject to censorship and censored, or censurable, indexing terms have to be hidden in metadata so documents can be retrieved by users. It concludes that a greater ethical awareness of technical aspects is needed for Brazilian Federal legislative information professionals.
  7. Brito, M. de: Social affects engineering and ethics (2023) 0.03
    0.026449626 = product of:
      0.06612407 = sum of:
        0.024912525 = weight(_text_:of in 1135) [ClassicSimilarity], result of:
          0.024912525 = score(doc=1135,freq=20.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.32781258 = fieldWeight in 1135, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.046875 = fieldNorm(doc=1135)
        0.041211538 = weight(_text_:subject in 1135) [ClassicSimilarity], result of:
          0.041211538 = score(doc=1135,freq=2.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.23709705 = fieldWeight in 1135, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.046875 = fieldNorm(doc=1135)
      0.4 = coord(2/5)
    
    Abstract
    This text proposes a multidisciplinary reflection on the subject of ethics, based on philosophical approaches, using Spinoza's work, Ethics, as a foundation. The power of Spinoza's geometric reasoning and deterministic logic, compatible with formal grammars and programming languages, provides a favorable framework for this purpose. In an information society characterized by an abundance of data and a diversity of perspectives, complex thinking is an essential tool for developing an ethical construct that can deal with the uncertainty and contradictions in the field. Acknowledging the natural complexity of ethics in interpersonal relationships, the use of AI techniques appears unavoidable. Artificial intelligence in KOS offers the potential for processing complex questions through the formal modeling of concepts in ethical discourse. By formalizing problems, we hope to unleash the potential of ethical analysis; by addressing complexity analysis, we propose a mechanism for understanding problems and empowering solutions.
    Footnote
    Beitrag eines Themenheftes: 4th International Conference on the Ethics of Information and Knowledge Organization, June 8-9, University of Lille, France.
  8. Martin, J.M.: Records, responsibility, and power : an overview of cataloging ethics (2021) 0.03
    0.025938256 = product of:
      0.06484564 = sum of:
        0.023634095 = weight(_text_:of in 708) [ClassicSimilarity], result of:
          0.023634095 = score(doc=708,freq=18.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.3109903 = fieldWeight in 708, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.046875 = fieldNorm(doc=708)
        0.041211538 = weight(_text_:subject in 708) [ClassicSimilarity], result of:
          0.041211538 = score(doc=708,freq=2.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.23709705 = fieldWeight in 708, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.046875 = fieldNorm(doc=708)
      0.4 = coord(2/5)
    
    Abstract
    Ethics are principles which provide a framework for making decisions that best reflect a set of values. Cataloging carries power, so ethical decision-making is crucial. Because cataloging requires decision-making in areas that differ from other library work, cataloging ethics are a distinct subset of library ethics. Cataloging ethics draw on the primary values of serving the needs of users and providing access to materials. Cataloging ethics are not new, but they have received increased attention since the 1970s. Major current issues in cataloging ethics include the creation of a code of ethics; ongoing debate on the appropriate role of neutrality in cataloging misleading materials and in subject heading lists and classification schemes; how and to what degree considerations of privacy and self-determination should shape authority work; and whether or not our current cataloging codes are sufficiently user-focused.
  9. Budd, J.M.: Information, analysis, and ideology : a case study of science and the public interest (2007) 0.03
    0.02539759 = product of:
      0.063493975 = sum of:
        0.022282438 = weight(_text_:of in 1328) [ClassicSimilarity], result of:
          0.022282438 = score(doc=1328,freq=16.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.2932045 = fieldWeight in 1328, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.046875 = fieldNorm(doc=1328)
        0.041211538 = weight(_text_:subject in 1328) [ClassicSimilarity], result of:
          0.041211538 = score(doc=1328,freq=2.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.23709705 = fieldWeight in 1328, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.046875 = fieldNorm(doc=1328)
      0.4 = coord(2/5)
    
    Abstract
    The politicization of science is not a new phenomenon, but the disputes surrounding global climate change have been particularly subject to ideological positioning. The work conducted by researchers on the description of, and possible causes for, climate change is reflected in the formal record of scientific discourse. The political and ideological claims about climate change are themselves reflected in the governmental and popular records. With regard to the particular work by Michael Mann and his colleagues, the three records (scientific, governmental, and popular) collide. Close examination of the totality of the record demonstrates the background, nature, and bases of claims made on all sides. The examination further demonstrates that the governmental and popular records are informed not by scientific research and communication but by ideological stances.
    Source
    Journal of the American Society for Information Science and Technology. 58(2007) no.14, S.2366-2371
  10. Frohmann, B.: Subjectivity and information ethics (2008) 0.02
    0.023678243 = product of:
      0.059195608 = sum of:
        0.020340992 = weight(_text_:of in 1360) [ClassicSimilarity], result of:
          0.020340992 = score(doc=1360,freq=30.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.26765788 = fieldWeight in 1360, product of:
              5.477226 = tf(freq=30.0), with freq of:
                30.0 = termFreq=30.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.03125 = fieldNorm(doc=1360)
        0.038854614 = weight(_text_:subject in 1360) [ClassicSimilarity], result of:
          0.038854614 = score(doc=1360,freq=4.0), product of:
            0.17381717 = queryWeight, product of:
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.04859849 = queryNorm
            0.22353725 = fieldWeight in 1360, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.576596 = idf(docFreq=3361, maxDocs=44218)
              0.03125 = fieldNorm(doc=1360)
      0.4 = coord(2/5)
    
    Abstract
    In A Brief History of Information Ethics, Thomas Froehlich (2004) quickly surveyed under several broad categories some of the many issues that constitute information ethics: under the category of librarianship - censorship, privacy, access, balance in collections, copyright, fair use, and codes of ethics; under information science, which Froehlich sees as closely related to librarianship - confidentiality, bias, and quality of information; under computer ethics - intellectual property, privacy, fair representation, nonmaleficence, computer crime, software reliability, artificial intelligence, and e-commerce; under cyberethics (issues related to the Internet, or cyberspace) - expert systems, artificial intelligence (again), and robotics; under media ethics - news, impartiality, journalistic ethics, deceit, lies, sexuality, censorship (again), and violence in the press; and under intercultural information ethics - digital divide, and the ethical role of the Internet for social, political, cultural, and economic development. Many of the debates in information ethics, on these and other issues, have to do with specific kinds of relationships between subjects. The most important subject and a familiar figure in information ethics is the ethical subject engaged in moral deliberation, whether appearing as the bearer of moral rights and obligations to other subjects, or as an agent whose actions are judged, whether by others or by oneself, according to the standards of various moral codes and ethical principles. Many debates in information ethics revolve around conflicts between those acting according to principles of unfettered access to information and those finding some information offensive or harmful. Subjectivity is at the heart of information ethics. But how is subjectivity understood? Can it be understood in ways that broaden ethical reflection to include problems that remain invisible when subjectivity is taken for granted and when how it is created remains unquestioned? This article proposes some answers by investigating the meaning and role of subjectivity in information ethics.[In an article on cyberethics (2000), I asserted that there was no information ethics in any special sense beyond the application of general ethical principles to information services. Here, I take a more expansive view.]
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.2, S.267-277
  11. Miller, S.: Privacy, data bases and computers (1998) 0.02
    0.019930182 = product of:
      0.049825452 = sum of:
        0.023487754 = weight(_text_:of in 3027) [ClassicSimilarity], result of:
          0.023487754 = score(doc=3027,freq=10.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.3090647 = fieldWeight in 3027, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=3027)
        0.026337698 = product of:
          0.052675396 = sum of:
            0.052675396 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.052675396 = score(doc=3027,freq=2.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
    Source
    Journal of information ethics. 7(1998) no.1, S.42-48
  12. O'Neil, R.M.: Free speech in cyberspace (1998) 0.02
    0.018938314 = product of:
      0.047345784 = sum of:
        0.021008085 = weight(_text_:of in 248) [ClassicSimilarity], result of:
          0.021008085 = score(doc=248,freq=8.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.27643585 = fieldWeight in 248, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=248)
        0.026337698 = product of:
          0.052675396 = sum of:
            0.052675396 = weight(_text_:22 in 248) [ClassicSimilarity], result of:
              0.052675396 = score(doc=248,freq=2.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.30952093 = fieldWeight in 248, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=248)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    Having reached the US Supreme Court in 1997, the Communications Decency Act (1996) has strong implications for Internet service providers. How to protect children while not denying adult rights of access is an issue which has impacted successively upon motion pictures, reading materials, radio, television and cable. The case for freedom of electronic speech appears compelling. The problems of obscenity, encryption (cryptography) and provocative 'cyberspeech' on the Internet offers a field day for litigation
    Date
    22. 2.1999 15:50:50
    Source
    Journal of information ethics. 7(1998) no.1, S.15-23
  13. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.02
    0.018328302 = product of:
      0.045820754 = sum of:
        0.029359693 = weight(_text_:of in 1868) [ClassicSimilarity], result of:
          0.029359693 = score(doc=1868,freq=40.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.38633084 = fieldWeight in 1868, product of:
              6.3245554 = tf(freq=40.0), with freq of:
                40.0 = termFreq=40.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.016461061 = product of:
          0.032922123 = sum of:
            0.032922123 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.032922123 = score(doc=1868,freq=2.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1134-1142
  14. Aghemo, A.: Etica professionale e servizio di informazione (1993) 0.02
    0.017438909 = product of:
      0.043597274 = sum of:
        0.020551786 = weight(_text_:of in 2453) [ClassicSimilarity], result of:
          0.020551786 = score(doc=2453,freq=10.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.2704316 = fieldWeight in 2453, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0546875 = fieldNorm(doc=2453)
        0.023045486 = product of:
          0.04609097 = sum of:
            0.04609097 = weight(_text_:22 in 2453) [ClassicSimilarity], result of:
              0.04609097 = score(doc=2453,freq=2.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.2708308 = fieldWeight in 2453, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=2453)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    An awareness exists among Italian librarians of the need for an established code of ethics for library reference services. Considers the principles that such a code should incorporate; the US Commitment to Information services, for example, affirms users' rights of access to library books and resources, regardless of content and opinions expressed. Censoship is opposed and people are not barred from library use for ethnis, social or religious reasons. An ethical code would require library staff to be impartial, give attention and respect to users, allocate time properly, and avoid prejudice. Discusses the problems of library ethics which arise when user requests relate to sensitive topics e.g. euthansia, cocaine refining
    Date
    6. 4.1996 13:22:31
  15. Lengauer, E.: Analytische Rechtsethik im Kontext säkularer Begründungsdiskurse zur Würde biologischer Entitäten (2008) 0.02
    0.016571024 = product of:
      0.04142756 = sum of:
        0.018382076 = weight(_text_:of in 1697) [ClassicSimilarity], result of:
          0.018382076 = score(doc=1697,freq=8.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.24188137 = fieldWeight in 1697, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1697)
        0.023045486 = product of:
          0.04609097 = sum of:
            0.04609097 = weight(_text_:22 in 1697) [ClassicSimilarity], result of:
              0.04609097 = score(doc=1697,freq=2.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.2708308 = fieldWeight in 1697, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1697)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Date
    17. 3.2008 15:17:22
    Source
    Kompatibilität, Medien und Ethik in der Wissensorganisation - Compatibility, Media and Ethics in Knowledge Organization: Proceedings der 10. Tagung der Deutschen Sektion der Internationalen Gesellschaft für Wissensorganisation Wien, 3.-5. Juli 2006 - Proceedings of the 10th Conference of the German Section of the International Society of Knowledge Organization Vienna, 3-5 July 2006. Ed.: H.P. Ohly, S. Netscher u. K. Mitgutsch
  16. Seadle, M.: Copyright in a networked world : ethics and infringement (2004) 0.02
    0.016477063 = product of:
      0.04119266 = sum of:
        0.01485496 = weight(_text_:of in 2833) [ClassicSimilarity], result of:
          0.01485496 = score(doc=2833,freq=4.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.19546966 = fieldWeight in 2833, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=2833)
        0.026337698 = product of:
          0.052675396 = sum of:
            0.052675396 = weight(_text_:22 in 2833) [ClassicSimilarity], result of:
              0.052675396 = score(doc=2833,freq=2.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.30952093 = fieldWeight in 2833, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2833)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    The statutes themselves are not the only basis for deciding whether an intellectual property rights infringement has occurred. Ethical judgments can also influence judicial rulings. This column looks at three issues of intellectual property ethics: the nature of the property, written guidelines for behavior, and enforcement mechanisms. For most active infringers digital property seems unreal, the rules ambiguous, and the enforcement statistically unlikely.
    Source
    Library hi tech. 22(2004) no.1, S.106-110
  17. Homan, P.A.: Library catalog notes for "bad books" : ethics vs. responsibilities (2012) 0.01
    0.014011905 = product of:
      0.03502976 = sum of:
        0.0185687 = weight(_text_:of in 420) [ClassicSimilarity], result of:
          0.0185687 = score(doc=420,freq=16.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.24433708 = fieldWeight in 420, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0390625 = fieldNorm(doc=420)
        0.016461061 = product of:
          0.032922123 = sum of:
            0.032922123 = weight(_text_:22 in 420) [ClassicSimilarity], result of:
              0.032922123 = score(doc=420,freq=2.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.19345059 = fieldWeight in 420, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=420)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    The conflict between librarians' ethics and their responsibilities in the process of progressive collection management, which applies the principles of cost accounting to libraries, to call attention to the "bad books" in their collections that are compromised by age, error, abridgement, expurgation, plagiarism, copyright violation, libel, or fraud, is discussed. According to Charles Cutter, notes in catalog records should call attention to the best books but ignore the bad ones. Libraries that can afford to keep their "bad books," however, which often have a valuable second life, must call attention to their intellectual contexts in notes in the catalog records. Michael Bellesiles's Arming America, the most famous case of academic fraud at the turn of the twenty-first century, is used as a test case. Given the bias of content enhancement that automatically pulls content from the Web into library catalogs, catalog notes for "bad books" may be the only way for librarians to uphold their ethical principles regarding collection management while fulfilling their professional responsibilities to their users in calling attention to their "bad books."
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_f.pdf.
    Date
    27. 9.2012 14:22:00
  18. "Code of Ethics" verabschiedet (2007) 0.01
    0.0072087157 = product of:
      0.018021788 = sum of:
        0.006499045 = weight(_text_:of in 459) [ClassicSimilarity], result of:
          0.006499045 = score(doc=459,freq=4.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.08551798 = fieldWeight in 459, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.02734375 = fieldNorm(doc=459)
        0.011522743 = product of:
          0.023045486 = sum of:
            0.023045486 = weight(_text_:22 in 459) [ClassicSimilarity], result of:
              0.023045486 = score(doc=459,freq=2.0), product of:
                0.17018363 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04859849 = queryNorm
                0.1354154 = fieldWeight in 459, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.02734375 = fieldNorm(doc=459)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    Im Rahmen des 3. Leipziger Kongresses für Information und Bibliothek 19.-22. März 2007 hat Bibliothek & Information Deutschland (BID) die im folgenden wiedergegebenen "Ethischen Grundsätze der Bibliotheks- und Informationsberufe" verabschiedet und der Presse und Fachöffentlichkeit vorgestellt. Damit folgt Deutschland den rund 40 Ländern weltweit, die bereits einen "Code of Ethics" veröffentlicht haben. Diese ethischen Richtlinien sind auf der IFLA/FAIFE-Website gesammelt unter www.ifla.org/faife/ethics/codes.htm.
  19. Smith, M.M.: Information ethics (1997) 0.01
    0.0069477716 = product of:
      0.034738857 = sum of:
        0.034738857 = weight(_text_:of in 1042) [ClassicSimilarity], result of:
          0.034738857 = score(doc=1042,freq=14.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.45711282 = fieldWeight in 1042, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.078125 = fieldNorm(doc=1042)
      0.2 = coord(1/5)
    
    Abstract
    State of the art review of the concepts of information ethics, computer ethics, and cyberethics by explaining the emergence of applied information ethics through channels of professional practice and scholarly communication. Surveys the beginning of information ethics from 1988 through 1996
    Source
    Annual review of information science and technology. 32(1997), S.339-366
  20. Marco, G.A.: Ethics for librarians : a narrow view (1996) 0.01
    0.006302425 = product of:
      0.031512126 = sum of:
        0.031512126 = weight(_text_:of in 3706) [ClassicSimilarity], result of:
          0.031512126 = score(doc=3706,freq=18.0), product of:
            0.07599624 = queryWeight, product of:
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.04859849 = queryNorm
            0.41465375 = fieldWeight in 3706, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              1.5637573 = idf(docFreq=25162, maxDocs=44218)
              0.0625 = fieldNorm(doc=3706)
      0.2 = coord(1/5)
    
    Abstract
    Offers a definition of ethics for librarians by recent concerns in the uSA about the Code of Ethics (1981) of the ALA and by examination of other codes of ethics, such as that produced by the Library Association, UK, and the writings of librarians and ethicists. Concludes with notes on the revision of the 1981 Code of Ethics, adopted by the ALA on 28 June 95, comparing the 2 codes and noting the differences where applicable
    Source
    Journal of librarianship and information science. 28(1996) no.1, S.33-38

Authors

Years

Languages

  • e 102
  • d 9
  • es 1
  • i 1
  • m 1
  • More… Less…

Types

  • a 101
  • m 9
  • s 6
  • More… Less…