Search (24 results, page 1 of 2)

  • × theme_ss:"Informationsethik"
  1. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.01
    0.005470008 = product of:
      0.019145027 = sum of:
        0.0068760267 = product of:
          0.034380134 = sum of:
            0.034380134 = weight(_text_:system in 1868) [ClassicSimilarity], result of:
              0.034380134 = score(doc=1868,freq=6.0), product of:
                0.11408355 = queryWeight, product of:
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.03622214 = queryNorm
                0.30135927 = fieldWeight in 1868, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.2 = coord(1/5)
        0.0122690005 = product of:
          0.024538001 = sum of:
            0.024538001 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.024538001 = score(doc=1868,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.2857143 = coord(2/7)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
  2. Kuhlen, R.: Informationsethik (2004) 0.00
    0.0035581833 = product of:
      0.024907282 = sum of:
        0.024907282 = product of:
          0.049814563 = sum of:
            0.049814563 = weight(_text_:zugriff in 2905) [ClassicSimilarity], result of:
              0.049814563 = score(doc=2905,freq=2.0), product of:
                0.2160124 = queryWeight, product of:
                  5.963546 = idf(docFreq=308, maxDocs=44218)
                  0.03622214 = queryNorm
                0.23060973 = fieldWeight in 2905, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  5.963546 = idf(docFreq=308, maxDocs=44218)
                  0.02734375 = fieldNorm(doc=2905)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Abstract
    Informationsethik ist Ethik von und für Menschen, deren Verhalten und Werte sich allerdings immer mehr in der Infosphere, in den Informationsumgebungen, entwickeln. Diese wiederum werden immer mehr von dem geprägt, was Telemediatisierung aller, auch und gerade der intellektuellen Lebenswelten genannt werden kann, also die Durchdringung dieser Lebenswelten mit Informations-, Kommunikations-, und Multi-/Hypermedia-Technologien. Daher kann in einem ersten Zugriff Informationsethik bestimmt werden als ein offenes Ensemble von Aussagen über normatives Verhalten gegenüber Wissen und Information, das sich in fortschreitend telemediatisierten Lebenswelten und in der Auseinandersetzung mit den in bisherigen Lebenswelten gültigen Werten und normativen Verhalten entwickelt. Die Abhängigkeit von dem Telemediatisierungsprozess könnte dazu verleiten, Informationsethik mit Computerethik oder Netzethik gleichzusetzen. Nicht alles, was am Thema Computer ethisch relevant sein könnte, sollte die Informationsethik für sich reklamieren - so wie die Informationswissenschaft ja auch einen spezifischeren Begriff von Information hat als die Informatik (vgl. Kap. A 1). Informationsethik ist Ethik in elektronischen Räumen. Das klingt spektakulär, ist aber doch keine Cyberethik, keine Ethik von epers(ons) (electronic personas), durch die in der virtuellen Realität z.B. Rechte und Pflichten von intelligenten Informationsassistenten (Cyborgs, Bots, Agenten) geregelt werden könnten. Solche Rechte von epers, wie z.B. "epers' rights include those of privacy, autonomy and anonymity" wurden und werden durchaus formuliert, so in einer ACM-Konferenz zum Thema Ethics in the Computer Age von 1995. Referenziert werden konnte diese Cyber-/Eper-Ethik auf die drei Asimovschen Gesetze für Roboter, die sich aber letztlich, anders als die Cyborgs and anders als die den Menschen ablösenden Maschinen von Hans Moravec, noch nicht von ihren Schöp fern, den Menschen, emanzipieren durften, sondern, im Sinne der ersten beiden Asimovschen Roboter-Gesetze, sich an den Interessen der Menschen auszurichten hatten. Erst dann, wenn diesen Interessen Genüge geleistet ist, dürften die Roboter auch an sich denken und Rechte und Freiheiten für sich reklamieren. Für Martha M. Smith in ihrem Information-Ethics-Artikel aus dem 32. Band der Annual Review of Information Science and Technology (ARIST) ist Informationsethik "concerned with the ethical conflicts and issues that arise in the use of information, information technologies, and information systems", und zwar will sie dabei vor allem professionelle Aspekte angesprochen sehen, nicht Fragen persönlicher Ethik. Letztere können wir hier im Jahr 2004 nicht mehr so deutlich ausgrenzen, zumal die Bereiche professioneller Fachinformation und informationeller Alltagswelten auf den Publikumsmärkten durch die Telemediatisierung, durch die Ubiquität des Internet ineinander übergehen. Der Universalisierung der Informationsethik haben auch die drei UNESCO-INFOethics-Konferenzen (1997, 1990 und 2000) Rechnung getragen, bei denen das Ethos der Informationsspezialisten nur am Rande eine Rolle spielte. Vielmehr spiegelten die INFOethics-Themen die ethischen (und - im Sinne einer auf Aristoteles bezogenen Trias - zugleich die politischen und ökonomischen) Herausforderungen der (globalen) Informationsgesellschaft wider - die UNESCO bevorzugt eher den Plural und Wissensgesellschaften
  3. Information ethics : privacy, property, and power (2005) 0.00
    0.0032807486 = product of:
      0.01148262 = sum of:
        0.0028071264 = product of:
          0.014035632 = sum of:
            0.014035632 = weight(_text_:system in 2392) [ClassicSimilarity], result of:
              0.014035632 = score(doc=2392,freq=4.0), product of:
                0.11408355 = queryWeight, product of:
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.03622214 = queryNorm
                0.12302941 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.2 = coord(1/5)
        0.008675493 = product of:
          0.017350987 = sum of:
            0.017350987 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
              0.017350987 = score(doc=2392,freq=4.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.13679022 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.5 = coord(1/2)
      0.2857143 = coord(2/7)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
  4. Miller, S.: Privacy, data bases and computers (1998) 0.00
    0.0028043431 = product of:
      0.0196304 = sum of:
        0.0196304 = product of:
          0.0392608 = sum of:
            0.0392608 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.0392608 = score(doc=3027,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Date
    22. 2.1999 15:57:43
  5. Seadle, M.: Copyright in a networked world : ethics and infringement (2004) 0.00
    0.0028043431 = product of:
      0.0196304 = sum of:
        0.0196304 = product of:
          0.0392608 = sum of:
            0.0392608 = weight(_text_:22 in 2833) [ClassicSimilarity], result of:
              0.0392608 = score(doc=2833,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.30952093 = fieldWeight in 2833, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2833)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Source
    Library hi tech. 22(2004) no.1, S.106-110
  6. Hammwöhner, R.: Anmerkungen zur Grundlegung der Informationsethik (2006) 0.00
    0.0028043431 = product of:
      0.0196304 = sum of:
        0.0196304 = product of:
          0.0392608 = sum of:
            0.0392608 = weight(_text_:22 in 6063) [ClassicSimilarity], result of:
              0.0392608 = score(doc=6063,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.30952093 = fieldWeight in 6063, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=6063)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Date
    13.10.2006 10:22:03
  7. O'Neil, R.M.: Free speech in cyberspace (1998) 0.00
    0.0028043431 = product of:
      0.0196304 = sum of:
        0.0196304 = product of:
          0.0392608 = sum of:
            0.0392608 = weight(_text_:22 in 248) [ClassicSimilarity], result of:
              0.0392608 = score(doc=248,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.30952093 = fieldWeight in 248, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=248)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Date
    22. 2.1999 15:50:50
  8. Helbing, D.: ¬Das große Scheitern (2019) 0.00
    0.0028043431 = product of:
      0.0196304 = sum of:
        0.0196304 = product of:
          0.0392608 = sum of:
            0.0392608 = weight(_text_:22 in 5599) [ClassicSimilarity], result of:
              0.0392608 = score(doc=5599,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.30952093 = fieldWeight in 5599, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=5599)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Date
    25.12.2019 14:19:22
  9. Aghemo, A.: Etica professionale e servizio di informazione (1993) 0.00
    0.0024538 = product of:
      0.0171766 = sum of:
        0.0171766 = product of:
          0.0343532 = sum of:
            0.0343532 = weight(_text_:22 in 2453) [ClassicSimilarity], result of:
              0.0343532 = score(doc=2453,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.2708308 = fieldWeight in 2453, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=2453)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Date
    6. 4.1996 13:22:31
  10. Lengauer, E.: Analytische Rechtsethik im Kontext säkularer Begründungsdiskurse zur Würde biologischer Entitäten (2008) 0.00
    0.0024538 = product of:
      0.0171766 = sum of:
        0.0171766 = product of:
          0.0343532 = sum of:
            0.0343532 = weight(_text_:22 in 1697) [ClassicSimilarity], result of:
              0.0343532 = score(doc=1697,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.2708308 = fieldWeight in 1697, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1697)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Date
    17. 3.2008 15:17:22
  11. Homan, P.A.: Library catalog notes for "bad books" : ethics vs. responsibilities (2012) 0.00
    0.0017527144 = product of:
      0.0122690005 = sum of:
        0.0122690005 = product of:
          0.024538001 = sum of:
            0.024538001 = weight(_text_:22 in 420) [ClassicSimilarity], result of:
              0.024538001 = score(doc=420,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.19345059 = fieldWeight in 420, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=420)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Date
    27. 9.2012 14:22:00
  12. Tenopir, C.: Ethics for online educators (1992) 0.00
    0.0016040723 = product of:
      0.0112285055 = sum of:
        0.0112285055 = product of:
          0.056142528 = sum of:
            0.056142528 = weight(_text_:system in 7334) [ClassicSimilarity], result of:
              0.056142528 = score(doc=7334,freq=4.0), product of:
                0.11408355 = queryWeight, product of:
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.03622214 = queryNorm
                0.49211764 = fieldWeight in 7334, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.078125 = fieldNorm(doc=7334)
          0.2 = coord(1/5)
      0.14285715 = coord(1/7)
    
    Abstract
    The only monitoring of educators is performed by their internal sense of right and wrong. Following the aggred terms of system contracts, selecting the most appropriate systems for students, keeping up to date with system features, and instilling ethical behaviour in students are at the core of ethics for online educators
  13. "Code of Ethics" verabschiedet (2007) 0.00
    0.0012269 = product of:
      0.0085883 = sum of:
        0.0085883 = product of:
          0.0171766 = sum of:
            0.0171766 = weight(_text_:22 in 459) [ClassicSimilarity], result of:
              0.0171766 = score(doc=459,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.1354154 = fieldWeight in 459, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.02734375 = fieldNorm(doc=459)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Abstract
    Im Rahmen des 3. Leipziger Kongresses für Information und Bibliothek 19.-22. März 2007 hat Bibliothek & Information Deutschland (BID) die im folgenden wiedergegebenen "Ethischen Grundsätze der Bibliotheks- und Informationsberufe" verabschiedet und der Presse und Fachöffentlichkeit vorgestellt. Damit folgt Deutschland den rund 40 Ländern weltweit, die bereits einen "Code of Ethics" veröffentlicht haben. Diese ethischen Richtlinien sind auf der IFLA/FAIFE-Website gesammelt unter www.ifla.org/faife/ethics/codes.htm.
  14. "Code of Ethics" verabschiedet (2007) 0.00
    0.0010516286 = product of:
      0.0073614 = sum of:
        0.0073614 = product of:
          0.0147228 = sum of:
            0.0147228 = weight(_text_:22 in 462) [ClassicSimilarity], result of:
              0.0147228 = score(doc=462,freq=2.0), product of:
                0.12684377 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03622214 = queryNorm
                0.116070345 = fieldWeight in 462, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=462)
          0.5 = coord(1/2)
      0.14285715 = coord(1/7)
    
    Abstract
    Im Rahmen des 3. Leipziger Kongresses für Information und Bibliothek 19.-22. März 2007 hat Bibliothek & Information Deutschland (BID) die im folgenden wiedergegebenen "Ethischen Grundsätze der Bibliotheks- und Informationsberufe" verabschiedet und der Presse und Fachöffentlichkeit vorgestellt. Damit folgt Deutschland den rund 40 Ländern weltweit, die bereits einen "Code of Ethics" veröffentlicht haben. Diese ethischen Richtlinien sind auf der IFLA/FAIFE-Website gesammelt unter www.ifla.org/faife/ethics/codes.htm.
  15. Misselhorn, C.: Grundfragen der Maschinenethik (2019) 0.00
    9.624433E-4 = product of:
      0.0067371028 = sum of:
        0.0067371028 = product of:
          0.033685513 = sum of:
            0.033685513 = weight(_text_:system in 5237) [ClassicSimilarity], result of:
              0.033685513 = score(doc=5237,freq=4.0), product of:
                0.11408355 = queryWeight, product of:
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.03622214 = queryNorm
                0.29527056 = fieldWeight in 5237, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.046875 = fieldNorm(doc=5237)
          0.2 = coord(1/5)
      0.14285715 = coord(1/7)
    
    RSWK
    Mensch-Maschine-System
    Subject
    Mensch-Maschine-System
  16. Weckert, J.; Ferguson, S.: Ethics, reference librarians and expert systems (1993) 0.00
    9.0740033E-4 = product of:
      0.006351802 = sum of:
        0.006351802 = product of:
          0.03175901 = sum of:
            0.03175901 = weight(_text_:system in 8156) [ClassicSimilarity], result of:
              0.03175901 = score(doc=8156,freq=2.0), product of:
                0.11408355 = queryWeight, product of:
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.03622214 = queryNorm
                0.27838376 = fieldWeight in 8156, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.0625 = fieldNorm(doc=8156)
          0.2 = coord(1/5)
      0.14285715 = coord(1/7)
    
    Abstract
    The issue of whether or not a librarian should attempt to answer all requests for information, regardless of the use to which the information may be put, is a vexed one. This paper discusses the issue in the context of expert systems in reference work, and suggests that the need for the reference librarian to use discretion has implications for expert system development. It examines the role of the reference librarian, discusses the cases for and against answering all requests for information, outlines the behaviour of expert systems in reference, and discusses possible problems and solutions
  17. Johnson, W.G.: ¬The need for a value-based reference policy : John Rawls at the reference desk (1994) 0.00
    9.0740033E-4 = product of:
      0.006351802 = sum of:
        0.006351802 = product of:
          0.03175901 = sum of:
            0.03175901 = weight(_text_:system in 2457) [ClassicSimilarity], result of:
              0.03175901 = score(doc=2457,freq=2.0), product of:
                0.11408355 = queryWeight, product of:
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.03622214 = queryNorm
                0.27838376 = fieldWeight in 2457, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2457)
          0.2 = coord(1/5)
      0.14285715 = coord(1/7)
    
    Abstract
    A value-based reference policy satisfies both the practical convcerns of the reference librarian and the principles stated in the Library Bill of Rights and the ALA Code of Ethics. One such value is justice, as described by John Rawls in 'A Theory of Justice'. A reference policy based on Rawls' system provides equitable service to all members of an academic community while permitting the librarian to uphold the ideal of freedom of access to information
  18. Nagenborg, M.: Privatheit - Menschenrecht oder eine Frage des Anstandes? (2008) 0.00
    7.323784E-4 = product of:
      0.0051266486 = sum of:
        0.0051266486 = product of:
          0.025633242 = sum of:
            0.025633242 = weight(_text_:retrieval in 1698) [ClassicSimilarity], result of:
              0.025633242 = score(doc=1698,freq=2.0), product of:
                0.109568894 = queryWeight, product of:
                  3.024915 = idf(docFreq=5836, maxDocs=44218)
                  0.03622214 = queryNorm
                0.23394634 = fieldWeight in 1698, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.024915 = idf(docFreq=5836, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1698)
          0.2 = coord(1/5)
      0.14285715 = coord(1/7)
    
    Abstract
    Im ersten Teil des Beitrages wird eine kurze Zusammenfassung der Diskussion um den Schutz der Privatheit in Recht und Ethik gegeben. Der Schwerpunkt liegt dabei auf der Informationsethik. Im zweiten Teil werden einige für die Wissensorganisation relevante Beispiele für den Umgang mit personenbezogenen Daten diskutiert: u. a. Web Information Retrieval, Data Mining sowie FOAF als Beispiel für die Standardisierung von personenbezogenen Informationen.
  19. Benedetto, C. di; Leone, L.; Seta, M. Della: Semantic approach to bioethics in the Ethicsweb project : building a semantic architecture for a European documentation system 0.00
    6.8055023E-4 = product of:
      0.0047638514 = sum of:
        0.0047638514 = product of:
          0.023819257 = sum of:
            0.023819257 = weight(_text_:system in 3548) [ClassicSimilarity], result of:
              0.023819257 = score(doc=3548,freq=2.0), product of:
                0.11408355 = queryWeight, product of:
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.03622214 = queryNorm
                0.20878783 = fieldWeight in 3548, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.046875 = fieldNorm(doc=3548)
          0.2 = coord(1/5)
      0.14285715 = coord(1/7)
    
  20. Fox, M.J.; Reece, A.: Which ethics? Whose morality? : an analysis of ethical standards for information organization (2012) 0.00
    6.8055023E-4 = product of:
      0.0047638514 = sum of:
        0.0047638514 = product of:
          0.023819257 = sum of:
            0.023819257 = weight(_text_:system in 424) [ClassicSimilarity], result of:
              0.023819257 = score(doc=424,freq=2.0), product of:
                0.11408355 = queryWeight, product of:
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.03622214 = queryNorm
                0.20878783 = fieldWeight in 424, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.1495528 = idf(docFreq=5152, maxDocs=44218)
                  0.046875 = fieldNorm(doc=424)
          0.2 = coord(1/5)
      0.14285715 = coord(1/7)
    
    Abstract
    Ethical standards are required at both the individual and system levels of the information organization enterprise, but are those standards the same? For example, are the ethical responsibilities of DDC's editorial board fundamentally the same as for an individual cataloger? And, what are the consequences of decisions made using different ethical frameworks to the users of knowledge organization systems? A selection of ethical theories suitable for evaluating moral dilemmas at all levels in information organization is presented, including utilitarianism, deontology, and pragmatism, as well as the more contemporary approaches of justice, feminist, and Derridean ethics. Finally, a selection of criteria is outlined, taken from the existing ethical frameworks, to use as a starting point for development of an ethical framework specifically for information organization.