Search (30 results, page 1 of 2)

  • × theme_ss:"Informationsethik"
  1. Huber, W.: Menschen, Götter und Maschinen : eine Ethik der Digitalisierung (2022) 0.01
    0.008945336 = product of:
      0.06709001 = sum of:
        0.052196946 = weight(_text_:soziale in 752) [ClassicSimilarity], result of:
          0.052196946 = score(doc=752,freq=2.0), product of:
            0.19331455 = queryWeight, product of:
              6.1096387 = idf(docFreq=266, maxDocs=44218)
              0.031640913 = queryNorm
            0.27001044 = fieldWeight in 752, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              6.1096387 = idf(docFreq=266, maxDocs=44218)
              0.03125 = fieldNorm(doc=752)
        0.014893063 = weight(_text_:web in 752) [ClassicSimilarity], result of:
          0.014893063 = score(doc=752,freq=2.0), product of:
            0.10326045 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031640913 = queryNorm
            0.14422815 = fieldWeight in 752, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.03125 = fieldNorm(doc=752)
      0.13333334 = coord(2/15)
    
    Abstract
    Die Digitalisierung hat unsere Privatsphäre ausgehöhlt, die Öffentlichkeit in antagonistische Teilöffentlichkeiten zerlegt, Hemmschwellen gesenkt und die Grenze zwischen Wahrheit und Lüge aufgeweicht. Wolfgang Huber beschreibt klar und pointiert diese technische und soziale Entwicklung. Er zeigt, wie sich konsensfähige ethische Prinzipien für den Umgang mit digitaler Intelligenz finden lassen und umgesetzt werden können - von der Gesetzgebung, von digitalen Anbietern und von allen Nutzern. Die Haltungen zur Digitalisierung schwanken zwischen Euphorie und Apokalypse: Die einen erwarten die Schaffung eines neuen Menschen, der sich selbst zum Gott macht. Andere befürchten den Verlust von Freiheit und Menschenwürde. Wolfgang Huber wirft demgegenüber einen realistischen Blick auf den technischen Umbruch. Das beginnt bei der Sprache: Sind die "sozialen Medien" wirklich sozial? Fährt ein mit digitaler Intelligenz ausgestattetes Auto "autonom" oder nicht eher automatisiert? Sind Algorithmen, die durch Mustererkennung lernen, deshalb "intelligent"? Eine überbordende Sprache lässt uns allzu oft vergessen, dass noch so leistungsstarke Rechner nur Maschinen sind, die von Menschen entwickelt und bedient werden. Notfalls muss man ihnen den Stecker ziehen. Das wunderbar anschaulich geschriebene Buch macht auf der Höhe der aktuellen ethischen Diskussionen bewusst, dass wir uns der Digitalisierung nicht ausliefern dürfen, sondern sie selbstbestimmt und verantwortlich gestalten können. 80. Geburtstag von Wolfgang Huber am 12.8.2022 Ein Heilmittel gegen allzu euphorische und apokalyptische Erwartungen an die Digitalisierung Wie wir unsere Haltung zur Digitalisierung ändern können, um uns nicht der Technik auszuliefern.
    Content
    Vorwort -- 1. Das digitale Zeitalter -- Zeitenwende -- Die Vorherrschaft des Buchdrucks geht zu Ende -- Wann beginnt das digitale Zeitalter? -- 2. Zwischen Euphorie und Apokalypse -- Digitalisierung. Einfach. Machen -- Euphorie -- Apokalypse -- Verantwortungsethik -- Der Mensch als Subjekt der Ethik -- Verantwortung als Prinzip -- 3. Digitalisierter Alltag in einer globalisierten Welt -- Vom World Wide Web zum Internet der Dinge -- Mobiles Internet und digitale Bildung -- Digitale Plattformen und ihre Strategien -- Big Data und informationelle Selbstbestimmung -- 4. Grenzüberschreitungen -- Die Erosion des Privaten -- Die Deformation des Öffentlichen -- Die Senkung von Hemmschwellen -- Das Verschwinden der Wirklichkeit -- Die Wahrheit in der Infosphäre -- 5. Die Zukunft der Arbeit -- Industrielle Revolutionen -- Arbeit 4.0 -- Ethik 4.0 -- 6. Digitale Intelligenz -- Können Computer dichten? -- Stärker als der Mensch? -- Maschinelles Lernen -- Ein bleibender Unterschied -- Ethische Prinzipien für den Umgang mit digitaler Intelligenz -- Medizin als Beispiel -- 7. Die Würde des Menschen im digitalen Zeitalter -- Kränkungen oder Revolutionen -- Transhumanismus und Posthumanismus -- Gibt es Empathie ohne Menschen? -- Wer ist autonom: Mensch oder Maschine? -- Humanismus der Verantwortung -- 8. Die Zukunft des Homo sapiens -- Vergöttlichung des Menschen -- Homo deus -- Gott und Mensch im digitalen Zeitalter -- Veränderung der Menschheit -- Literatur -- Personenregister.
  2. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.01
    0.0050968938 = product of:
      0.0382267 = sum of:
        0.027509436 = weight(_text_:software in 1868) [ClassicSimilarity], result of:
          0.027509436 = score(doc=1868,freq=2.0), product of:
            0.12552431 = queryWeight, product of:
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.031640913 = queryNorm
            0.21915624 = fieldWeight in 1868, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.010717267 = product of:
          0.021434534 = sum of:
            0.021434534 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.021434534 = score(doc=1868,freq=2.0), product of:
                0.110801086 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031640913 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.13333334 = coord(2/15)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
  3. Homan, P.A.: Library catalog notes for "bad books" : ethics vs. responsibilities (2012) 0.00
    0.0039111464 = product of:
      0.029333597 = sum of:
        0.01861633 = weight(_text_:web in 420) [ClassicSimilarity], result of:
          0.01861633 = score(doc=420,freq=2.0), product of:
            0.10326045 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031640913 = queryNorm
            0.18028519 = fieldWeight in 420, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=420)
        0.010717267 = product of:
          0.021434534 = sum of:
            0.021434534 = weight(_text_:22 in 420) [ClassicSimilarity], result of:
              0.021434534 = score(doc=420,freq=2.0), product of:
                0.110801086 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031640913 = queryNorm
                0.19345059 = fieldWeight in 420, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=420)
          0.5 = coord(1/2)
      0.13333334 = coord(2/15)
    
    Abstract
    The conflict between librarians' ethics and their responsibilities in the process of progressive collection management, which applies the principles of cost accounting to libraries, to call attention to the "bad books" in their collections that are compromised by age, error, abridgement, expurgation, plagiarism, copyright violation, libel, or fraud, is discussed. According to Charles Cutter, notes in catalog records should call attention to the best books but ignore the bad ones. Libraries that can afford to keep their "bad books," however, which often have a valuable second life, must call attention to their intellectual contexts in notes in the catalog records. Michael Bellesiles's Arming America, the most famous case of academic fraud at the turn of the twenty-first century, is used as a test case. Given the bias of content enhancement that automatically pulls content from the Web into library catalogs, catalog notes for "bad books" may be the only way for librarians to uphold their ethical principles regarding collection management while fulfilling their professional responsibilities to their users in calling attention to their "bad books."
    Date
    27. 9.2012 14:22:00
  4. Cronin, B.; Overfelt, K.: ¬The scholar's courtesy : a survey of acknowledgement behaviour (1994) 0.00
    0.0028705348 = product of:
      0.04305802 = sum of:
        0.04305802 = weight(_text_:evaluation in 2461) [ClassicSimilarity], result of:
          0.04305802 = score(doc=2461,freq=2.0), product of:
            0.13272417 = queryWeight, product of:
              4.1947007 = idf(docFreq=1811, maxDocs=44218)
              0.031640913 = queryNorm
            0.32441732 = fieldWeight in 2461, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.1947007 = idf(docFreq=1811, maxDocs=44218)
              0.0546875 = fieldNorm(doc=2461)
      0.06666667 = coord(1/15)
    
    Abstract
    Scholars in major US research universities were surveyed to explore the normative bases of acknowledgement behaviour. Measures of agreement and divergence were established in respect of five issue sets pertaining to acknowledgement practice: expectations, etiquette, ethics, equity and evaluation. The results confirm the substantive role played by acknowledgements in the primary communication process. Although few formal rules exist, it is clear that many scholars subscribe to the idea of a governing etiquette. The findings also suggest that acknowledgement data could be mined to lay bare the rules of engagement that define the dynamics of collaboration and interdependence among scholars
  5. San Segundo, R.; Martínez-Ávila, D.; Frías Montoya, J.A.: Ethical issues in control by algorithms : the user is the content (2023) 0.00
    0.0021061972 = product of:
      0.031592958 = sum of:
        0.031592958 = weight(_text_:web in 1132) [ClassicSimilarity], result of:
          0.031592958 = score(doc=1132,freq=4.0), product of:
            0.10326045 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031640913 = queryNorm
            0.3059541 = fieldWeight in 1132, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.046875 = fieldNorm(doc=1132)
      0.06666667 = coord(1/15)
    
    Abstract
    In this paper we discuss some ethical issues and challenges of the use of algorithms on the web from the perspective of knowledge organization. We review some of the problems that these algorithms and the filter bubbles pose for the users. We contextualize these issues within the user-based approaches to knowledge organization in a larger sense. We review some of the technologies that have been developed to counter these problems as well as initiatives from the knowledge organization field. We conclude with the necessity of adopting a critical and ethical stance towards the use of algorithms on the web and the need for an education in knowledge organization that addresses these issues.
  6. Lor, P.; Wiles, B.; Britz, J.: Re-thinking information ethics : truth, conspiracy theories, and librarians in the COVID-19 era (2021) 0.00
    0.0020503819 = product of:
      0.030755727 = sum of:
        0.030755727 = weight(_text_:evaluation in 404) [ClassicSimilarity], result of:
          0.030755727 = score(doc=404,freq=2.0), product of:
            0.13272417 = queryWeight, product of:
              4.1947007 = idf(docFreq=1811, maxDocs=44218)
              0.031640913 = queryNorm
            0.23172665 = fieldWeight in 404, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.1947007 = idf(docFreq=1811, maxDocs=44218)
              0.0390625 = fieldNorm(doc=404)
      0.06666667 = coord(1/15)
    
    Abstract
    The COVID-19 pandemic is an international public health crisis without precedent in the last century. The novelty and rapid spread of the virus have added a new urgency to the availability and distribution of reliable information to help curb its fatal potential. As seasoned and trusted purveyors of reliable public information, librarians have attempted to respond to the "infodemic" of fake news, disinformation, and propaganda with a variety of strategies, but the COVID-19 pandemic presents a unique challenge because of the deadly stakes involved. The seriousness of the current situation requires that librarians and associated professionals re-evaluate the ethical basis of their approach to information provision to counter the growing prominence of conspiracy theories in the public sphere and official decision making. This paper analyzes the conspiracy mindset and specific COVID-19 conspiracy theories in discussing how libraries might address the problems of truth and untruth in ethically sound ways. As a contribution to the re-evaluation we propose, the paper presents an ethical framework based on alethic rights-or rights to truth-as conceived by Italian philosopher Franca D'Agostini and how these might inform professional approaches that support personal safety, open knowledge, and social justice.
  7. Rubel, A.; Castro, C.; Pham, A.: Algorithms and autonomy : the ethics of automated decision systems (2021) 0.00
    0.0020503819 = product of:
      0.030755727 = sum of:
        0.030755727 = weight(_text_:evaluation in 671) [ClassicSimilarity], result of:
          0.030755727 = score(doc=671,freq=2.0), product of:
            0.13272417 = queryWeight, product of:
              4.1947007 = idf(docFreq=1811, maxDocs=44218)
              0.031640913 = queryNorm
            0.23172665 = fieldWeight in 671, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.1947007 = idf(docFreq=1811, maxDocs=44218)
              0.0390625 = fieldNorm(doc=671)
      0.06666667 = coord(1/15)
    
    Abstract
    Algorithms influence every facet of modern life: criminal justice, education, housing, entertainment, elections, social media, news feeds, work... the list goes on. Delegating important decisions to machines, however, gives rise to deep moral concerns about responsibility, transparency, freedom, fairness, and democracy. Algorithms and Autonomy connects these concerns to the core human value of autonomy in the contexts of algorithmic teacher evaluation, risk assessment in criminal sentencing, predictive policing, background checks, news feeds, ride-sharing platforms, social media, and election interference. Using these case studies, the authors provide a better understanding of machine fairness and algorithmic transparency. They explain why interventions in algorithmic systems are necessary to ensure that algorithms are not used to control citizens' participation in politics and undercut democracy. This title is also available as Open Access on Cambridge Core
  8. Brody, R.: ¬The problem of information naïveté (2008) 0.00
    0.0019857418 = product of:
      0.029786127 = sum of:
        0.029786127 = weight(_text_:web in 1865) [ClassicSimilarity], result of:
          0.029786127 = score(doc=1865,freq=2.0), product of:
            0.10326045 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031640913 = queryNorm
            0.2884563 = fieldWeight in 1865, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0625 = fieldNorm(doc=1865)
      0.06666667 = coord(1/15)
    
    Abstract
    With the rapidly changing Web-enabled world, the already existing dichotomy between knowing of and knowing about, or information naïveté, widens daily. This article explores the ethical dilemmas that can result from the lack of information literacy. The article also discusses conditions and consequences of information naïveté, media bias, possessive memory, and limited contexts and abilities. To help avoid information failure, the author recommends producers, contributors, disseminators, and aggregators of information be less information naïve.
  9. Weber, K.: Ethikcodizes für die Wissensorganisation (2008) 0.00
    0.0018339625 = product of:
      0.027509436 = sum of:
        0.027509436 = weight(_text_:software in 1699) [ClassicSimilarity], result of:
          0.027509436 = score(doc=1699,freq=2.0), product of:
            0.12552431 = queryWeight, product of:
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.031640913 = queryNorm
            0.21915624 = fieldWeight in 1699, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1699)
      0.06666667 = coord(1/15)
    
    Abstract
    In the past, many professions and scientific disciplines decided to create a code of ethics which shall guide the professional activities of their members. The rules in these codes of ethics, sometimes called ethical guidelines, shall provide guidance in situations of moral conflict. Obviously, as other professionals or scholars, persons who are involved in knowledge organization face moral conflicts, too. Therefore, ISKO decided to discuss whether it would be necessary to create ethical guidelines for ISKO. In the paper two options to formulate a code of ethics are discussed: First, it is possible to identify moral values without formulating the way they can be achieved - this option is realised in the ethical guidelines of the German Gesellschaft für Informatik (GI). Second, it is feasible to clearly define morally acceptable professional actions without formulation basic moral values - this option is realised in the ACM and IEEE-CS Software Engineering Code of Ethics and Professional Practice. It is argued that if ISKO should decide to implement an own code of ethics it will be inevitable to choose the second option while it also will be necessary to address the specific needs of knowledge organization and its moral problems, for instance, the conflict of copyright and open access. Additionally, the second option has to be completed by basic moral values that shall underlie the professional actions of knowledge organization.
  10. Nagenborg, M.: Privatheit - Menschenrecht oder eine Frage des Anstandes? (2008) 0.00
    0.0017375242 = product of:
      0.026062861 = sum of:
        0.026062861 = weight(_text_:web in 1698) [ClassicSimilarity], result of:
          0.026062861 = score(doc=1698,freq=2.0), product of:
            0.10326045 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031640913 = queryNorm
            0.25239927 = fieldWeight in 1698, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1698)
      0.06666667 = coord(1/15)
    
    Abstract
    Im ersten Teil des Beitrages wird eine kurze Zusammenfassung der Diskussion um den Schutz der Privatheit in Recht und Ethik gegeben. Der Schwerpunkt liegt dabei auf der Informationsethik. Im zweiten Teil werden einige für die Wissensorganisation relevante Beispiele für den Umgang mit personenbezogenen Daten diskutiert: u. a. Web Information Retrieval, Data Mining sowie FOAF als Beispiel für die Standardisierung von personenbezogenen Informationen.
  11. Tenopir, C.: Ethics for online educators (1992) 0.00
    0.0015178784 = product of:
      0.022768175 = sum of:
        0.022768175 = product of:
          0.04553635 = sum of:
            0.04553635 = weight(_text_:online in 7334) [ClassicSimilarity], result of:
              0.04553635 = score(doc=7334,freq=4.0), product of:
                0.096027054 = queryWeight, product of:
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.031640913 = queryNorm
                0.47420335 = fieldWeight in 7334, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.078125 = fieldNorm(doc=7334)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Abstract
    The only monitoring of educators is performed by their internal sense of right and wrong. Following the aggred terms of system contracts, selecting the most appropriate systems for students, keeping up to date with system features, and instilling ethical behaviour in students are at the core of ethics for online educators
  12. Smith, M.M.: Online information ethics : online searching and the searching self (1994) 0.00
    0.0015026229 = product of:
      0.022539342 = sum of:
        0.022539342 = product of:
          0.045078684 = sum of:
            0.045078684 = weight(_text_:online in 8599) [ClassicSimilarity], result of:
              0.045078684 = score(doc=8599,freq=8.0), product of:
                0.096027054 = queryWeight, product of:
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.031640913 = queryNorm
                0.46943733 = fieldWeight in 8599, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=8599)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Abstract
    Describes the foundations of online information ethics by combining the insights of cognitive psychologist, Ulrich Neisser, and information science professor, Rafael Capurro. Capurro contrasts rule based ethics, such as codes, and self based ethics. Rule based ethics are necessary, but self based ethics lead to life enhancing uses of information and information technology. Neisser describes the self by defining 5 aspects of self understanding. Challenges information professionals to create environments and interpersonal interactions which create success in information seeking and provide the users with life enhancing search narratives
    Source
    Proceedings of the 15th National Online Meeting 1994, New York, 10-12 May 1994. Ed. by M.E. Williams
  13. Frohmann, B.: Subjectivity and information ethics (2008) 0.00
    0.0014671701 = product of:
      0.02200755 = sum of:
        0.02200755 = weight(_text_:software in 1360) [ClassicSimilarity], result of:
          0.02200755 = score(doc=1360,freq=2.0), product of:
            0.12552431 = queryWeight, product of:
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.031640913 = queryNorm
            0.17532499 = fieldWeight in 1360, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.03125 = fieldNorm(doc=1360)
      0.06666667 = coord(1/15)
    
    Abstract
    In A Brief History of Information Ethics, Thomas Froehlich (2004) quickly surveyed under several broad categories some of the many issues that constitute information ethics: under the category of librarianship - censorship, privacy, access, balance in collections, copyright, fair use, and codes of ethics; under information science, which Froehlich sees as closely related to librarianship - confidentiality, bias, and quality of information; under computer ethics - intellectual property, privacy, fair representation, nonmaleficence, computer crime, software reliability, artificial intelligence, and e-commerce; under cyberethics (issues related to the Internet, or cyberspace) - expert systems, artificial intelligence (again), and robotics; under media ethics - news, impartiality, journalistic ethics, deceit, lies, sexuality, censorship (again), and violence in the press; and under intercultural information ethics - digital divide, and the ethical role of the Internet for social, political, cultural, and economic development. Many of the debates in information ethics, on these and other issues, have to do with specific kinds of relationships between subjects. The most important subject and a familiar figure in information ethics is the ethical subject engaged in moral deliberation, whether appearing as the bearer of moral rights and obligations to other subjects, or as an agent whose actions are judged, whether by others or by oneself, according to the standards of various moral codes and ethical principles. Many debates in information ethics revolve around conflicts between those acting according to principles of unfettered access to information and those finding some information offensive or harmful. Subjectivity is at the heart of information ethics. But how is subjectivity understood? Can it be understood in ways that broaden ethical reflection to include problems that remain invisible when subjectivity is taken for granted and when how it is created remains unquestioned? This article proposes some answers by investigating the meaning and role of subjectivity in information ethics.[In an article on cyberethics (2000), I asserted that there was no information ethics in any special sense beyond the application of general ethical principles to information services. Here, I take a more expansive view.]
  14. Informations- und Kommunikationsutopien (2008) 0.00
    0.0014041315 = product of:
      0.021061972 = sum of:
        0.021061972 = weight(_text_:web in 213) [ClassicSimilarity], result of:
          0.021061972 = score(doc=213,freq=4.0), product of:
            0.10326045 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031640913 = queryNorm
            0.2039694 = fieldWeight in 213, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.03125 = fieldNorm(doc=213)
      0.06666667 = coord(1/15)
    
    Content
    Inhalt: Rafael Capurro: Einleitung Klaus Wiegerling: Ubiquitous Computing als konkrete Utopie Michael Nagenborg: Wenn Roboter alles wissen und Kühlschränke nicht lügen Tassilo Pellegrini: Semantic Web als konkrete Utopie - Eine praktische Annäherung Falko Blask: TV kontra Web: Mythos Medien - Medienmythen Hans Kräh: Filme als Zeitreisen: Medienszenarien in Zukunftsszenarien Uwe Jochum: Zur Zeit wird hier der Raum - Die digitale Inversion des Karfreitagszaubers Thomas Nisslmüller: Der cybergnostische Imperativ: Sich lesen in Zeiten virtueller Versuchsspiele Manfred Lang: Good Night, and Good Luck! Zur Geschichte informationspolitischer Utopien
  15. Zhang, J.: Archival context, digital content, and the ethics of digital archival representation : the ethics of identification in digital library metadata (2012) 0.00
    0.0012410887 = product of:
      0.01861633 = sum of:
        0.01861633 = weight(_text_:web in 419) [ClassicSimilarity], result of:
          0.01861633 = score(doc=419,freq=2.0), product of:
            0.10326045 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031640913 = queryNorm
            0.18028519 = fieldWeight in 419, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=419)
      0.06666667 = coord(1/15)
    
    Abstract
    The findings of a recent study on digital archival representation raise some ethical concerns about how digital archival materials are organized, described, and made available for use on the Web. Archivists have a fundamental obligation to preserve and protect the authenticity and integrity of records in their holdings and, at the same time, have the responsibility to promote the use of records as a fundamental purpose of the keeping of archives (SAA 2005 Code of Ethics for Archivists V & VI). Is it an ethical practice that digital content in digital archives is deeply embedded in its contextual structure and generally underrepresented in digital archival systems? Similarly, is it ethical for archivists to detach digital items from their archival context in order to make them more "digital friendly" and more accessible to meet needs of some users? Do archivists have an obligation to bring the two representation systems together so that the context and content of digital archives can be better represented and archival materials "can be located and used by anyone, for any purpose, while still remaining authentic evidence of the work and life of the creator"? (Millar 2010, 157) This paper discusses the findings of the study and their ethical implications relating to digital archival description and representation.
  16. Bagatini, J.A.; Chaves Guimarães, J.A.: Algorithmic discriminations and their ethical impacts on knowledge organization : a thematic domain-analysis (2023) 0.00
    0.0012410887 = product of:
      0.01861633 = sum of:
        0.01861633 = weight(_text_:web in 1134) [ClassicSimilarity], result of:
          0.01861633 = score(doc=1134,freq=2.0), product of:
            0.10326045 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031640913 = queryNorm
            0.18028519 = fieldWeight in 1134, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1134)
      0.06666667 = coord(1/15)
    
    Abstract
    Personal data play a fundamental role in contemporary socioeconomic dynamics, with one of its primary aspects being the potential to facilitate discriminatory situations. This situation impacts the knowledge organization field especially because it considers personal data as elements (facets) to categorize persons under an economic and sometimes discriminatory perspective. The research corpus was collected at Scopus and Web of Science until the end of 2021, under the terms "data discrimination", "algorithmic bias", "algorithmic discrimination" and "fair algorithms". The obtained results allowed to infer that the analyzed knowledge domain predominantly incorporates personal data, whether in its behavioral dimension or in the scope of the so-called sensitive data. These data are susceptible to the action of algorithms of different orders, such as relevance, filtering, predictive, social ranking, content recommendation and random classification. Such algorithms can have discriminatory biases in their programming related to gender, sexual orientation, race, nationality, religion, age, social class, socioeconomic profile, physical appearance, and political positioning.
  17. Miller, S.: Privacy, data bases and computers (1998) 0.00
    0.0011431752 = product of:
      0.017147627 = sum of:
        0.017147627 = product of:
          0.034295253 = sum of:
            0.034295253 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.034295253 = score(doc=3027,freq=2.0), product of:
                0.110801086 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031640913 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Date
    22. 2.1999 15:57:43
  18. Seadle, M.: Copyright in a networked world : ethics and infringement (2004) 0.00
    0.0011431752 = product of:
      0.017147627 = sum of:
        0.017147627 = product of:
          0.034295253 = sum of:
            0.034295253 = weight(_text_:22 in 2833) [ClassicSimilarity], result of:
              0.034295253 = score(doc=2833,freq=2.0), product of:
                0.110801086 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031640913 = queryNorm
                0.30952093 = fieldWeight in 2833, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2833)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Source
    Library hi tech. 22(2004) no.1, S.106-110
  19. Hammwöhner, R.: Anmerkungen zur Grundlegung der Informationsethik (2006) 0.00
    0.0011431752 = product of:
      0.017147627 = sum of:
        0.017147627 = product of:
          0.034295253 = sum of:
            0.034295253 = weight(_text_:22 in 6063) [ClassicSimilarity], result of:
              0.034295253 = score(doc=6063,freq=2.0), product of:
                0.110801086 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031640913 = queryNorm
                0.30952093 = fieldWeight in 6063, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=6063)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Date
    13.10.2006 10:22:03
  20. O'Neil, R.M.: Free speech in cyberspace (1998) 0.00
    0.0011431752 = product of:
      0.017147627 = sum of:
        0.017147627 = product of:
          0.034295253 = sum of:
            0.034295253 = weight(_text_:22 in 248) [ClassicSimilarity], result of:
              0.034295253 = score(doc=248,freq=2.0), product of:
                0.110801086 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031640913 = queryNorm
                0.30952093 = fieldWeight in 248, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=248)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Date
    22. 2.1999 15:50:50

Years

Languages

  • e 20
  • d 9
  • i 1
  • More… Less…

Types