Search (32 results, page 1 of 2)

  • × theme_ss:"Informationsethik"
  1. Lindsay J.: Policing the Internet? (1997) 0.04
    0.040154617 = product of:
      0.080309235 = sum of:
        0.062582366 = weight(_text_:open in 2448) [ClassicSimilarity], result of:
          0.062582366 = score(doc=2448,freq=2.0), product of:
            0.20964009 = queryWeight, product of:
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.046553567 = queryNorm
            0.2985229 = fieldWeight in 2448, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.046875 = fieldNorm(doc=2448)
        0.01772687 = product of:
          0.03545374 = sum of:
            0.03545374 = weight(_text_:access in 2448) [ClassicSimilarity], result of:
              0.03545374 = score(doc=2448,freq=2.0), product of:
                0.15778996 = queryWeight, product of:
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046553567 = queryNorm
                0.22468945 = fieldWeight in 2448, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046875 = fieldNorm(doc=2448)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    The development of digital information and communication technologies will change the nature of political debate and the role of professional societies. Develops some of these issues, especially pornography, in consideration of policing the Internet. Addresses the following 4 aspects of pornography: children and access; accidentally finding; morphing; and the meaning of words. Distinguishes 5 different contexts where different professional judgements have to be made: the workplace; the university; the school; public spaces; and the home. Points to the new ethical professional considerations which arise from the development of technology. Suggests that there is a special role for professional societies in working out policies for policing the virtual society that is the Internet
    Footnote
    Based on a talk delivered at an International Group of the Library Association Open Meeting in Dec 1996 and at UmbrelLA 4 in Manchester, UK, June 1997
  2. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.03
    0.033960193 = product of:
      0.06792039 = sum of:
        0.05215197 = weight(_text_:open in 1868) [ClassicSimilarity], result of:
          0.05215197 = score(doc=1868,freq=2.0), product of:
            0.20964009 = queryWeight, product of:
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.046553567 = queryNorm
            0.24876907 = fieldWeight in 1868, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.015768414 = product of:
          0.03153683 = sum of:
            0.03153683 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.03153683 = score(doc=1868,freq=2.0), product of:
                0.16302267 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046553567 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
  3. Weber, K.: Ethikcodizes für die Wissensorganisation (2008) 0.03
    0.03346218 = product of:
      0.06692436 = sum of:
        0.05215197 = weight(_text_:open in 1699) [ClassicSimilarity], result of:
          0.05215197 = score(doc=1699,freq=2.0), product of:
            0.20964009 = queryWeight, product of:
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.046553567 = queryNorm
            0.24876907 = fieldWeight in 1699, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1699)
        0.014772392 = product of:
          0.029544784 = sum of:
            0.029544784 = weight(_text_:access in 1699) [ClassicSimilarity], result of:
              0.029544784 = score(doc=1699,freq=2.0), product of:
                0.15778996 = queryWeight, product of:
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046553567 = queryNorm
                0.18724121 = fieldWeight in 1699, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1699)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    In the past, many professions and scientific disciplines decided to create a code of ethics which shall guide the professional activities of their members. The rules in these codes of ethics, sometimes called ethical guidelines, shall provide guidance in situations of moral conflict. Obviously, as other professionals or scholars, persons who are involved in knowledge organization face moral conflicts, too. Therefore, ISKO decided to discuss whether it would be necessary to create ethical guidelines for ISKO. In the paper two options to formulate a code of ethics are discussed: First, it is possible to identify moral values without formulating the way they can be achieved - this option is realised in the ethical guidelines of the German Gesellschaft für Informatik (GI). Second, it is feasible to clearly define morally acceptable professional actions without formulation basic moral values - this option is realised in the ACM and IEEE-CS Software Engineering Code of Ethics and Professional Practice. It is argued that if ISKO should decide to implement an own code of ethics it will be inevitable to choose the second option while it also will be necessary to address the specific needs of knowledge organization and its moral problems, for instance, the conflict of copyright and open access. Additionally, the second option has to be completed by basic moral values that shall underlie the professional actions of knowledge organization.
  4. Rubel, A.; Castro, C.; Pham, A.: Algorithms and autonomy : the ethics of automated decision systems (2021) 0.03
    0.03346218 = product of:
      0.06692436 = sum of:
        0.05215197 = weight(_text_:open in 671) [ClassicSimilarity], result of:
          0.05215197 = score(doc=671,freq=2.0), product of:
            0.20964009 = queryWeight, product of:
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.046553567 = queryNorm
            0.24876907 = fieldWeight in 671, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.0390625 = fieldNorm(doc=671)
        0.014772392 = product of:
          0.029544784 = sum of:
            0.029544784 = weight(_text_:access in 671) [ClassicSimilarity], result of:
              0.029544784 = score(doc=671,freq=2.0), product of:
                0.15778996 = queryWeight, product of:
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046553567 = queryNorm
                0.18724121 = fieldWeight in 671, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=671)
          0.5 = coord(1/2)
      0.5 = coord(2/4)
    
    Abstract
    Algorithms influence every facet of modern life: criminal justice, education, housing, entertainment, elections, social media, news feeds, work... the list goes on. Delegating important decisions to machines, however, gives rise to deep moral concerns about responsibility, transparency, freedom, fairness, and democracy. Algorithms and Autonomy connects these concerns to the core human value of autonomy in the contexts of algorithmic teacher evaluation, risk assessment in criminal sentencing, predictive policing, background checks, news feeds, ride-sharing platforms, social media, and election interference. Using these case studies, the authors provide a better understanding of machine fairness and algorithmic transparency. They explain why interventions in algorithmic systems are necessary to ensure that algorithms are not used to control citizens' participation in politics and undercut democracy. This title is also available as Open Access on Cambridge Core
  5. O'Neil, R.M.: Free speech in cyberspace (1998) 0.02
    0.024432644 = product of:
      0.09773058 = sum of:
        0.09773058 = sum of:
          0.047271654 = weight(_text_:access in 248) [ClassicSimilarity], result of:
            0.047271654 = score(doc=248,freq=2.0), product of:
              0.15778996 = queryWeight, product of:
                3.389428 = idf(docFreq=4053, maxDocs=44218)
                0.046553567 = queryNorm
              0.29958594 = fieldWeight in 248, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.389428 = idf(docFreq=4053, maxDocs=44218)
                0.0625 = fieldNorm(doc=248)
          0.050458927 = weight(_text_:22 in 248) [ClassicSimilarity], result of:
            0.050458927 = score(doc=248,freq=2.0), product of:
              0.16302267 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046553567 = queryNorm
              0.30952093 = fieldWeight in 248, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0625 = fieldNorm(doc=248)
      0.25 = coord(1/4)
    
    Abstract
    Having reached the US Supreme Court in 1997, the Communications Decency Act (1996) has strong implications for Internet service providers. How to protect children while not denying adult rights of access is an issue which has impacted successively upon motion pictures, reading materials, radio, television and cable. The case for freedom of electronic speech appears compelling. The problems of obscenity, encryption (cryptography) and provocative 'cyberspeech' on the Internet offers a field day for litigation
    Date
    22. 2.1999 15:50:50
  6. Aghemo, A.: Etica professionale e servizio di informazione (1993) 0.02
    0.021378566 = product of:
      0.08551426 = sum of:
        0.08551426 = sum of:
          0.0413627 = weight(_text_:access in 2453) [ClassicSimilarity], result of:
            0.0413627 = score(doc=2453,freq=2.0), product of:
              0.15778996 = queryWeight, product of:
                3.389428 = idf(docFreq=4053, maxDocs=44218)
                0.046553567 = queryNorm
              0.2621377 = fieldWeight in 2453, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.389428 = idf(docFreq=4053, maxDocs=44218)
                0.0546875 = fieldNorm(doc=2453)
          0.04415156 = weight(_text_:22 in 2453) [ClassicSimilarity], result of:
            0.04415156 = score(doc=2453,freq=2.0), product of:
              0.16302267 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046553567 = queryNorm
              0.2708308 = fieldWeight in 2453, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0546875 = fieldNorm(doc=2453)
      0.25 = coord(1/4)
    
    Abstract
    An awareness exists among Italian librarians of the need for an established code of ethics for library reference services. Considers the principles that such a code should incorporate; the US Commitment to Information services, for example, affirms users' rights of access to library books and resources, regardless of content and opinions expressed. Censoship is opposed and people are not barred from library use for ethnis, social or religious reasons. An ethical code would require library staff to be impartial, give attention and respect to users, allocate time properly, and avoid prejudice. Discusses the problems of library ethics which arise when user requests relate to sensitive topics e.g. euthansia, cocaine refining
    Date
    6. 4.1996 13:22:31
  7. Danielson, E.S.: Ethics and reference services (1997) 0.02
    0.020860787 = product of:
      0.08344315 = sum of:
        0.08344315 = weight(_text_:open in 482) [ClassicSimilarity], result of:
          0.08344315 = score(doc=482,freq=2.0), product of:
            0.20964009 = queryWeight, product of:
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.046553567 = queryNorm
            0.39803052 = fieldWeight in 482, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.0625 = fieldNorm(doc=482)
      0.25 = coord(1/4)
    
    Abstract
    Reference archivists face challenging ethical dilemmas in the course of seemingly mundane daily tasks. While newly revised thical codes provide helpful guidelines, there are many ethical questions without clear answers. Rapidly evolving technology, changing expectations, and inconsistent privacy laws place pressures on reference work. These issues also open a window on the society whose cultural property archivists manage
  8. Dreisiebner, S.: Informationskompetenz und Demokratie : Umwälzungen der IK-Förderung im Zuge der Digitalisierung (2019) 0.02
    0.020860787 = product of:
      0.08344315 = sum of:
        0.08344315 = weight(_text_:open in 5446) [ClassicSimilarity], result of:
          0.08344315 = score(doc=5446,freq=2.0), product of:
            0.20964009 = queryWeight, product of:
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.046553567 = queryNorm
            0.39803052 = fieldWeight in 5446, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.0625 = fieldNorm(doc=5446)
      0.25 = coord(1/4)
    
    Source
    Open Password. 2019, Nr.659 vom 11.November 2019. [https://www.password-online.de/?wysija-page=1&controller=email&action=view&email_id=821&wysijap=subscriptions&user_id=1045]
  9. Lor, P.; Wiles, B.; Britz, J.: Re-thinking information ethics : truth, conspiracy theories, and librarians in the COVID-19 era (2021) 0.01
    0.013037993 = product of:
      0.05215197 = sum of:
        0.05215197 = weight(_text_:open in 404) [ClassicSimilarity], result of:
          0.05215197 = score(doc=404,freq=2.0), product of:
            0.20964009 = queryWeight, product of:
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.046553567 = queryNorm
            0.24876907 = fieldWeight in 404, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.5032015 = idf(docFreq=1330, maxDocs=44218)
              0.0390625 = fieldNorm(doc=404)
      0.25 = coord(1/4)
    
    Abstract
    The COVID-19 pandemic is an international public health crisis without precedent in the last century. The novelty and rapid spread of the virus have added a new urgency to the availability and distribution of reliable information to help curb its fatal potential. As seasoned and trusted purveyors of reliable public information, librarians have attempted to respond to the "infodemic" of fake news, disinformation, and propaganda with a variety of strategies, but the COVID-19 pandemic presents a unique challenge because of the deadly stakes involved. The seriousness of the current situation requires that librarians and associated professionals re-evaluate the ethical basis of their approach to information provision to counter the growing prominence of conspiracy theories in the public sphere and official decision making. This paper analyzes the conspiracy mindset and specific COVID-19 conspiracy theories in discussing how libraries might address the problems of truth and untruth in ethically sound ways. As a contribution to the re-evaluation we propose, the paper presents an ethical framework based on alethic rights-or rights to truth-as conceived by Italian philosopher Franca D'Agostini and how these might inform professional approaches that support personal safety, open knowledge, and social justice.
  10. Information ethics : privacy, property, and power (2005) 0.01
    0.009268074 = product of:
      0.037072297 = sum of:
        0.037072297 = sum of:
          0.014772392 = weight(_text_:access in 2392) [ClassicSimilarity], result of:
            0.014772392 = score(doc=2392,freq=2.0), product of:
              0.15778996 = queryWeight, product of:
                3.389428 = idf(docFreq=4053, maxDocs=44218)
                0.046553567 = queryNorm
              0.093620606 = fieldWeight in 2392, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.389428 = idf(docFreq=4053, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
          0.022299906 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
            0.022299906 = score(doc=2392,freq=4.0), product of:
              0.16302267 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046553567 = queryNorm
              0.13679022 = fieldWeight in 2392, product of:
                2.0 = tf(freq=4.0), with freq of:
                  4.0 = termFreq=4.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.01953125 = fieldNorm(doc=2392)
      0.25 = coord(1/4)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
  11. Miller, S.: Privacy, data bases and computers (1998) 0.01
    0.006307366 = product of:
      0.025229463 = sum of:
        0.025229463 = product of:
          0.050458927 = sum of:
            0.050458927 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.050458927 = score(doc=3027,freq=2.0), product of:
                0.16302267 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046553567 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Date
    22. 2.1999 15:57:43
  12. Seadle, M.: Copyright in a networked world : ethics and infringement (2004) 0.01
    0.006307366 = product of:
      0.025229463 = sum of:
        0.025229463 = product of:
          0.050458927 = sum of:
            0.050458927 = weight(_text_:22 in 2833) [ClassicSimilarity], result of:
              0.050458927 = score(doc=2833,freq=2.0), product of:
                0.16302267 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046553567 = queryNorm
                0.30952093 = fieldWeight in 2833, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2833)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Source
    Library hi tech. 22(2004) no.1, S.106-110
  13. Hammwöhner, R.: Anmerkungen zur Grundlegung der Informationsethik (2006) 0.01
    0.006307366 = product of:
      0.025229463 = sum of:
        0.025229463 = product of:
          0.050458927 = sum of:
            0.050458927 = weight(_text_:22 in 6063) [ClassicSimilarity], result of:
              0.050458927 = score(doc=6063,freq=2.0), product of:
                0.16302267 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046553567 = queryNorm
                0.30952093 = fieldWeight in 6063, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=6063)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Date
    13.10.2006 10:22:03
  14. Helbing, D.: ¬Das große Scheitern (2019) 0.01
    0.006307366 = product of:
      0.025229463 = sum of:
        0.025229463 = product of:
          0.050458927 = sum of:
            0.050458927 = weight(_text_:22 in 5599) [ClassicSimilarity], result of:
              0.050458927 = score(doc=5599,freq=2.0), product of:
                0.16302267 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046553567 = queryNorm
                0.30952093 = fieldWeight in 5599, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=5599)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Date
    25.12.2019 14:19:22
  15. Johnson, W.G.: ¬The need for a value-based reference policy : John Rawls at the reference desk (1994) 0.01
    0.0059089568 = product of:
      0.023635827 = sum of:
        0.023635827 = product of:
          0.047271654 = sum of:
            0.047271654 = weight(_text_:access in 2457) [ClassicSimilarity], result of:
              0.047271654 = score(doc=2457,freq=2.0), product of:
                0.15778996 = queryWeight, product of:
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046553567 = queryNorm
                0.29958594 = fieldWeight in 2457, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2457)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Abstract
    A value-based reference policy satisfies both the practical convcerns of the reference librarian and the principles stated in the Library Bill of Rights and the ALA Code of Ethics. One such value is justice, as described by John Rawls in 'A Theory of Justice'. A reference policy based on Rawls' system provides equitable service to all members of an academic community while permitting the librarian to uphold the ideal of freedom of access to information
  16. Hodson, S.S.: Ethical and legal aspects of archival services (2009) 0.01
    0.0059089568 = product of:
      0.023635827 = sum of:
        0.023635827 = product of:
          0.047271654 = sum of:
            0.047271654 = weight(_text_:access in 3774) [ClassicSimilarity], result of:
              0.047271654 = score(doc=3774,freq=2.0), product of:
                0.15778996 = queryWeight, product of:
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046553567 = queryNorm
                0.29958594 = fieldWeight in 3774, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3774)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Abstract
    Archivists deal with legal and ethical issues every day in the course of administering collections of personal papers. This entry will discuss legal and ethical aspects of archival services in three areas: acquisitions, access, and terms of use, in the context of research libraries and manuscript repositories. It will not deal with government, corporate, or institutional archives.
  17. Lengauer, E.: Analytische Rechtsethik im Kontext säkularer Begründungsdiskurse zur Würde biologischer Entitäten (2008) 0.01
    0.005518945 = product of:
      0.02207578 = sum of:
        0.02207578 = product of:
          0.04415156 = sum of:
            0.04415156 = weight(_text_:22 in 1697) [ClassicSimilarity], result of:
              0.04415156 = score(doc=1697,freq=2.0), product of:
                0.16302267 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046553567 = queryNorm
                0.2708308 = fieldWeight in 1697, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1697)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Date
    17. 3.2008 15:17:22
  18. Pachú da Silva, A.; Chaves Guimarães, J.A.; Bolfarini Tognoli, N.: Ethical values in archival arrangement and description : an analysis of professional codes of ethics (2015) 0.01
    0.005222829 = product of:
      0.020891316 = sum of:
        0.020891316 = product of:
          0.041782632 = sum of:
            0.041782632 = weight(_text_:access in 2363) [ClassicSimilarity], result of:
              0.041782632 = score(doc=2363,freq=4.0), product of:
                0.15778996 = queryWeight, product of:
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046553567 = queryNorm
                0.26479906 = fieldWeight in 2363, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=2363)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Abstract
    The international literature on information science has devoted attention to ethical studies in information, especially due to the development of information technologies. However, the information organization activities have incipient ethical studies that are mostly focused on libraries. Thus, the area of archival science still lacks studies of this nature, which leads to question how the codes of ethics for archivists address issues related to ethical dilemmas of information organization activities, especially in core activities of arrangement and document description. Thus, this study aims to identify and analyze ethical values related to those aforementioned activities, by analyzing the codes of the following countries: Brazil, Portugal, France, Spain, Australia, Canada, USA, New Zealand, United Kingdom and Switzerland and the ICA codes of ethics. Applying a content analysis, the following values were found: access and use, authenticity, confidentiality, conservation, custody, impartiality, information access, information security, physical preservation of the record, reliability, respect for provenance, respect for the original order, respect for the preservation of the archival value of the record.
  19. Cornish, G.: ¬The ethics of information (1997) 0.01
    0.0051703374 = product of:
      0.02068135 = sum of:
        0.02068135 = product of:
          0.0413627 = sum of:
            0.0413627 = weight(_text_:access in 84) [ClassicSimilarity], result of:
              0.0413627 = score(doc=84,freq=2.0), product of:
                0.15778996 = queryWeight, product of:
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046553567 = queryNorm
                0.2621377 = fieldWeight in 84, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=84)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Abstract
    Reports on 'Info-Ethics', the 1st International Congress on Ethical, Legal and Societal Aspects of Digital Information' held at Monte Carlo in MAr 1997. Some 200 delegates from many countries attended: topics covered included the Internet and its control, and the problems of access to it for developing countries with inadequate telecommunications infrastructure. 2 main themes of the conference were the problems of multilingual information provision, and preservation and conservation in the digital environment. Discussions on the nature of ethics and the ethics of cyberspace led to consideration of whether a 'right to communicate' should be added to the International Convention on Human Rights: there may also be pressure for Unesco to establish a Commission on information ethics
  20. Etzioni, A.: ¬The First Amendment is not an absolute even on the Internet (1997) 0.01
    0.0051703374 = product of:
      0.02068135 = sum of:
        0.02068135 = product of:
          0.0413627 = sum of:
            0.0413627 = weight(_text_:access in 1580) [ClassicSimilarity], result of:
              0.0413627 = score(doc=1580,freq=2.0), product of:
                0.15778996 = queryWeight, product of:
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.046553567 = queryNorm
                0.2621377 = fieldWeight in 1580, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.389428 = idf(docFreq=4053, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1580)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Abstract
    Taking the Oklahoma bombing as a base, the author argues that although social scientists differ about the effects of pornography, there are no parallel arguments that bomb manuals on the Internet give safe vent to potential bombers. While instructions for making bombs are available in books, the procedures involved in accessing such literature in libraries may deter would be bombers. In contrast, easy access through the Internet will encourage them. It is argued that materials that endanger lives should be banned from the Internet on the basis that every right, even free speech, needs to be balanced with others, especially the right to live

Years

Languages

  • e 24
  • d 7
  • i 1
  • More… Less…

Types

  • a 29
  • m 3
  • s 2
  • el 1
  • More… Less…