Search (104 results, page 1 of 6)

  • × theme_ss:"Informationsethik"
  1. Huber, W.: Menschen, Götter und Maschinen : eine Ethik der Digitalisierung (2022) 0.02
    0.017591868 = product of:
      0.09382329 = sum of:
        0.027243135 = weight(_text_:wide in 752) [ClassicSimilarity], result of:
          0.027243135 = score(doc=752,freq=2.0), product of:
            0.13912784 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.031400457 = queryNorm
            0.1958137 = fieldWeight in 752, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.03125 = fieldNorm(doc=752)
        0.0147798825 = weight(_text_:web in 752) [ClassicSimilarity], result of:
          0.0147798825 = score(doc=752,freq=2.0), product of:
            0.10247572 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031400457 = queryNorm
            0.14422815 = fieldWeight in 752, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.03125 = fieldNorm(doc=752)
        0.051800273 = weight(_text_:soziale in 752) [ClassicSimilarity], result of:
          0.051800273 = score(doc=752,freq=2.0), product of:
            0.19184545 = queryWeight, product of:
              6.1096387 = idf(docFreq=266, maxDocs=44218)
              0.031400457 = queryNorm
            0.27001044 = fieldWeight in 752, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              6.1096387 = idf(docFreq=266, maxDocs=44218)
              0.03125 = fieldNorm(doc=752)
      0.1875 = coord(3/16)
    
    Abstract
    Die Digitalisierung hat unsere Privatsphäre ausgehöhlt, die Öffentlichkeit in antagonistische Teilöffentlichkeiten zerlegt, Hemmschwellen gesenkt und die Grenze zwischen Wahrheit und Lüge aufgeweicht. Wolfgang Huber beschreibt klar und pointiert diese technische und soziale Entwicklung. Er zeigt, wie sich konsensfähige ethische Prinzipien für den Umgang mit digitaler Intelligenz finden lassen und umgesetzt werden können - von der Gesetzgebung, von digitalen Anbietern und von allen Nutzern. Die Haltungen zur Digitalisierung schwanken zwischen Euphorie und Apokalypse: Die einen erwarten die Schaffung eines neuen Menschen, der sich selbst zum Gott macht. Andere befürchten den Verlust von Freiheit und Menschenwürde. Wolfgang Huber wirft demgegenüber einen realistischen Blick auf den technischen Umbruch. Das beginnt bei der Sprache: Sind die "sozialen Medien" wirklich sozial? Fährt ein mit digitaler Intelligenz ausgestattetes Auto "autonom" oder nicht eher automatisiert? Sind Algorithmen, die durch Mustererkennung lernen, deshalb "intelligent"? Eine überbordende Sprache lässt uns allzu oft vergessen, dass noch so leistungsstarke Rechner nur Maschinen sind, die von Menschen entwickelt und bedient werden. Notfalls muss man ihnen den Stecker ziehen. Das wunderbar anschaulich geschriebene Buch macht auf der Höhe der aktuellen ethischen Diskussionen bewusst, dass wir uns der Digitalisierung nicht ausliefern dürfen, sondern sie selbstbestimmt und verantwortlich gestalten können. 80. Geburtstag von Wolfgang Huber am 12.8.2022 Ein Heilmittel gegen allzu euphorische und apokalyptische Erwartungen an die Digitalisierung Wie wir unsere Haltung zur Digitalisierung ändern können, um uns nicht der Technik auszuliefern.
    Content
    Vorwort -- 1. Das digitale Zeitalter -- Zeitenwende -- Die Vorherrschaft des Buchdrucks geht zu Ende -- Wann beginnt das digitale Zeitalter? -- 2. Zwischen Euphorie und Apokalypse -- Digitalisierung. Einfach. Machen -- Euphorie -- Apokalypse -- Verantwortungsethik -- Der Mensch als Subjekt der Ethik -- Verantwortung als Prinzip -- 3. Digitalisierter Alltag in einer globalisierten Welt -- Vom World Wide Web zum Internet der Dinge -- Mobiles Internet und digitale Bildung -- Digitale Plattformen und ihre Strategien -- Big Data und informationelle Selbstbestimmung -- 4. Grenzüberschreitungen -- Die Erosion des Privaten -- Die Deformation des Öffentlichen -- Die Senkung von Hemmschwellen -- Das Verschwinden der Wirklichkeit -- Die Wahrheit in der Infosphäre -- 5. Die Zukunft der Arbeit -- Industrielle Revolutionen -- Arbeit 4.0 -- Ethik 4.0 -- 6. Digitale Intelligenz -- Können Computer dichten? -- Stärker als der Mensch? -- Maschinelles Lernen -- Ein bleibender Unterschied -- Ethische Prinzipien für den Umgang mit digitaler Intelligenz -- Medizin als Beispiel -- 7. Die Würde des Menschen im digitalen Zeitalter -- Kränkungen oder Revolutionen -- Transhumanismus und Posthumanismus -- Gibt es Empathie ohne Menschen? -- Wer ist autonom: Mensch oder Maschine? -- Humanismus der Verantwortung -- 8. Die Zukunft des Homo sapiens -- Vergöttlichung des Menschen -- Homo deus -- Gott und Mensch im digitalen Zeitalter -- Veränderung der Menschheit -- Literatur -- Personenregister.
  2. Nagenborg, M.: Privatheit - Menschenrecht oder eine Frage des Anstandes? (2008) 0.01
    0.010419341 = product of:
      0.05556982 = sum of:
        0.025864797 = weight(_text_:web in 1698) [ClassicSimilarity], result of:
          0.025864797 = score(doc=1698,freq=2.0), product of:
            0.10247572 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031400457 = queryNorm
            0.25239927 = fieldWeight in 1698, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1698)
        0.0074839313 = weight(_text_:information in 1698) [ClassicSimilarity], result of:
          0.0074839313 = score(doc=1698,freq=2.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.13576832 = fieldWeight in 1698, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1698)
        0.022221092 = weight(_text_:retrieval in 1698) [ClassicSimilarity], result of:
          0.022221092 = score(doc=1698,freq=2.0), product of:
            0.09498371 = queryWeight, product of:
              3.024915 = idf(docFreq=5836, maxDocs=44218)
              0.031400457 = queryNorm
            0.23394634 = fieldWeight in 1698, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.024915 = idf(docFreq=5836, maxDocs=44218)
              0.0546875 = fieldNorm(doc=1698)
      0.1875 = coord(3/16)
    
    Abstract
    Im ersten Teil des Beitrages wird eine kurze Zusammenfassung der Diskussion um den Schutz der Privatheit in Recht und Ethik gegeben. Der Schwerpunkt liegt dabei auf der Informationsethik. Im zweiten Teil werden einige für die Wissensorganisation relevante Beispiele für den Umgang mit personenbezogenen Daten diskutiert: u. a. Web Information Retrieval, Data Mining sowie FOAF als Beispiel für die Standardisierung von personenbezogenen Informationen.
  3. Reed, G.M.; Sanders, J.W.: ¬The principle of distribution (2008) 0.01
    0.00853052 = product of:
      0.045496106 = sum of:
        0.007559912 = weight(_text_:information in 1868) [ClassicSimilarity], result of:
          0.007559912 = score(doc=1868,freq=4.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.13714671 = fieldWeight in 1868, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.027300376 = weight(_text_:software in 1868) [ClassicSimilarity], result of:
          0.027300376 = score(doc=1868,freq=2.0), product of:
            0.124570385 = queryWeight, product of:
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.031400457 = queryNorm
            0.21915624 = fieldWeight in 1868, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1868)
        0.010635821 = product of:
          0.021271642 = sum of:
            0.021271642 = weight(_text_:22 in 1868) [ClassicSimilarity], result of:
              0.021271642 = score(doc=1868,freq=2.0), product of:
                0.10995905 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031400457 = queryNorm
                0.19345059 = fieldWeight in 1868, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1868)
          0.5 = coord(1/2)
      0.1875 = coord(3/16)
    
    Abstract
    This article introduces a normative principle for the behavior of contemporary computing and communication systems and considers some of its consequences. The principle, named the principle of distribution, says that in a distributed multi-agent system, control resides as much as possible with the individuals constituting the system rather than in centralized agents; and when that is unfeasible or becomes inappropriate due to environmental changes, control evolves upwards from the individuals to an appropriate intermediate level rather than being imposed from above. The setting for the work is the dynamically changing global space resulting from ubiquitous communication. Accordingly, the article begins by determining the characteristics of the distributed multi-agent space it spans. It then fleshes out the principle of distribution, with examples from daily life as well as from Computer Science. The case is made for the principle of distribution to work at various levels of abstraction of system behavior: to inform the high-level discussion that ought to precede the more low-level concerns of technology, protocols, and standardization, but also to facilitate those lower levels. Of the more substantial applications given here of the principle of distribution, a technical example concerns the design of secure ad hoc networks of mobile devices, achievable without any form of centralized authentication or identification but in a solely distributed manner. Here, the context is how the principle can be used to provide new and provably secure protocols for genuinely ubiquitous communication. A second, more managerial example concerns the distributed production and management of open-source software, and a third investigates some pertinent questions involving the dynamic restructuring of control in distributed systems, important in times of disaster or malevolence.
    Date
    1. 6.2008 12:22:41
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1134-1142
  4. Brody, R.: ¬The problem of information naïveté (2008) 0.01
    0.0070758658 = product of:
      0.056606926 = sum of:
        0.029559765 = weight(_text_:web in 1865) [ClassicSimilarity], result of:
          0.029559765 = score(doc=1865,freq=2.0), product of:
            0.10247572 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031400457 = queryNorm
            0.2884563 = fieldWeight in 1865, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0625 = fieldNorm(doc=1865)
        0.027047163 = weight(_text_:information in 1865) [ClassicSimilarity], result of:
          0.027047163 = score(doc=1865,freq=20.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.490671 = fieldWeight in 1865, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=1865)
      0.125 = coord(2/16)
    
    Abstract
    With the rapidly changing Web-enabled world, the already existing dichotomy between knowing of and knowing about, or information naïveté, widens daily. This article explores the ethical dilemmas that can result from the lack of information literacy. The article also discusses conditions and consequences of information naïveté, media bias, possessive memory, and limited contexts and abilities. To help avoid information failure, the author recommends producers, contributors, disseminators, and aggregators of information be less information naïve.
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1124-1127
    Theme
    Information
  5. Homan, P.A.: Library catalog notes for "bad books" : ethics vs. responsibilities (2012) 0.01
    0.0068757352 = product of:
      0.036670588 = sum of:
        0.018474855 = weight(_text_:web in 420) [ClassicSimilarity], result of:
          0.018474855 = score(doc=420,freq=2.0), product of:
            0.10247572 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031400457 = queryNorm
            0.18028519 = fieldWeight in 420, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=420)
        0.007559912 = weight(_text_:information in 420) [ClassicSimilarity], result of:
          0.007559912 = score(doc=420,freq=4.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.13714671 = fieldWeight in 420, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=420)
        0.010635821 = product of:
          0.021271642 = sum of:
            0.021271642 = weight(_text_:22 in 420) [ClassicSimilarity], result of:
              0.021271642 = score(doc=420,freq=2.0), product of:
                0.10995905 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031400457 = queryNorm
                0.19345059 = fieldWeight in 420, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=420)
          0.5 = coord(1/2)
      0.1875 = coord(3/16)
    
    Abstract
    The conflict between librarians' ethics and their responsibilities in the process of progressive collection management, which applies the principles of cost accounting to libraries, to call attention to the "bad books" in their collections that are compromised by age, error, abridgement, expurgation, plagiarism, copyright violation, libel, or fraud, is discussed. According to Charles Cutter, notes in catalog records should call attention to the best books but ignore the bad ones. Libraries that can afford to keep their "bad books," however, which often have a valuable second life, must call attention to their intellectual contexts in notes in the catalog records. Michael Bellesiles's Arming America, the most famous case of academic fraud at the turn of the twenty-first century, is used as a test case. Given the bias of content enhancement that automatically pulls content from the Web into library catalogs, catalog notes for "bad books" may be the only way for librarians to uphold their ethical principles regarding collection management while fulfilling their professional responsibilities to their users in calling attention to their "bad books."
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_f.pdf.
    Date
    27. 9.2012 14:22:00
  6. Smith, M.M.: Online information ethics : online searching and the searching self (1994) 0.01
    0.005441976 = product of:
      0.043535806 = sum of:
        0.022368053 = product of:
          0.044736106 = sum of:
            0.044736106 = weight(_text_:online in 8599) [ClassicSimilarity], result of:
              0.044736106 = score(doc=8599,freq=8.0), product of:
                0.09529729 = queryWeight, product of:
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.031400457 = queryNorm
                0.46943733 = fieldWeight in 8599, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=8599)
          0.5 = coord(1/2)
        0.021167753 = weight(_text_:information in 8599) [ClassicSimilarity], result of:
          0.021167753 = score(doc=8599,freq=16.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.3840108 = fieldWeight in 8599, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=8599)
      0.125 = coord(2/16)
    
    Abstract
    Describes the foundations of online information ethics by combining the insights of cognitive psychologist, Ulrich Neisser, and information science professor, Rafael Capurro. Capurro contrasts rule based ethics, such as codes, and self based ethics. Rule based ethics are necessary, but self based ethics lead to life enhancing uses of information and information technology. Neisser describes the self by defining 5 aspects of self understanding. Challenges information professionals to create environments and interpersonal interactions which create success in information seeking and provide the users with life enhancing search narratives
    Imprint
    Medford, NJ : Learned Information
    Source
    Proceedings of the 15th National Online Meeting 1994, New York, 10-12 May 1994. Ed. by M.E. Williams
  7. Information society : new media, ethics and postmodernism (1996) 0.01
    0.0050958395 = product of:
      0.040766716 = sum of:
        0.027243135 = weight(_text_:wide in 2451) [ClassicSimilarity], result of:
          0.027243135 = score(doc=2451,freq=2.0), product of:
            0.13912784 = queryWeight, product of:
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.031400457 = queryNorm
            0.1958137 = fieldWeight in 2451, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              4.4307585 = idf(docFreq=1430, maxDocs=44218)
              0.03125 = fieldNorm(doc=2451)
        0.013523581 = weight(_text_:information in 2451) [ClassicSimilarity], result of:
          0.013523581 = score(doc=2451,freq=20.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.2453355 = fieldWeight in 2451, product of:
              4.472136 = tf(freq=20.0), with freq of:
                20.0 = termFreq=20.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=2451)
      0.125 = coord(2/16)
    
    Abstract
    This volume examines 3 critical debates of the post-industrial society: culture and technology, information society, and postmodernism. It aims to provide theoretical and methodological underpinnings for the analysis and design of information, communication and multimedia technologies. It is a thoroughly interdisciplinara volume, which will be of interest to students, researchers and practitioners in a wide area of disciplines including information and communication systems, education and social sciences
    Content
    Enthält die Beiträge: COOLEY, M.: Visions and problems of the post-industrial society; GILL, K.S.: Knowledge and the post-industrial society; LYTJE, I.: Media and the cultural condition: language and education; WHISTON, T.: Knowledge and sustainable development: towards the furtherance of a global communication system; SHIPLEY, P.: The keyboard blues: modern technology and the rights and risks of people at work; LEAL, F.: Ethics is fragile, goodness is not; HIROSE, L.M.: Organisational spaces and intelligent machines: a metaphorical approach to ethics; THORPE, J.: Information system design: human centres approaches; BESSELAAR, P. van den u. T. MOM: Technological change, social innovation and employment; JONES, M.: Empowerment and enslavement: business process reeingineering and the transformation of work; LEVY, P.: The role of creativity in post-industrial society: exploring the implications of non-conventional technologies for work and management organisation; JANSEN, A.: The global information society and rural economics; DAY, P.: Information communication technology and society: a community-based approach; CYSNE, F.P.: Technology transfer and development; COOPER, J.: Information, knowledge and empowerment: the role of information in rural development; CLAY, J.: Participative citizenry in the information ages: the role of science and technology towards democratic education in a multicultural society; TAYLOR, J.: New media and cultural representation; BLACK, M.T.: Consensus and authenticity in representations: simulation as participative theatre; GORAYSKA, B. u. J.L. MEY: Cognitive technology; BOYNE, C.W.: Electronic mail, IT productivity and workplace culture; Squires, P.: Deadly technology in the post-industrial society: a case study of firearms and firearms control; COLE, M. u. D. HILL: Resitance postmodernism: emancipatory politics for a new era or academic chic for a defeatist intelligentsia?; McFEE, G.: Postmodernism, dance and post-industrial society; MULLER, R.C.: Creativity constellation for innovation and cooperation
  8. Frohmann, B.: Subjectivity and information ethics (2008) 0.00
    0.004868304 = product of:
      0.03894643 = sum of:
        0.017106129 = weight(_text_:information in 1360) [ClassicSimilarity], result of:
          0.017106129 = score(doc=1360,freq=32.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.3103276 = fieldWeight in 1360, product of:
              5.656854 = tf(freq=32.0), with freq of:
                32.0 = termFreq=32.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=1360)
        0.021840302 = weight(_text_:software in 1360) [ClassicSimilarity], result of:
          0.021840302 = score(doc=1360,freq=2.0), product of:
            0.124570385 = queryWeight, product of:
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.031400457 = queryNorm
            0.17532499 = fieldWeight in 1360, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9671519 = idf(docFreq=2274, maxDocs=44218)
              0.03125 = fieldNorm(doc=1360)
      0.125 = coord(2/16)
    
    Abstract
    In A Brief History of Information Ethics, Thomas Froehlich (2004) quickly surveyed under several broad categories some of the many issues that constitute information ethics: under the category of librarianship - censorship, privacy, access, balance in collections, copyright, fair use, and codes of ethics; under information science, which Froehlich sees as closely related to librarianship - confidentiality, bias, and quality of information; under computer ethics - intellectual property, privacy, fair representation, nonmaleficence, computer crime, software reliability, artificial intelligence, and e-commerce; under cyberethics (issues related to the Internet, or cyberspace) - expert systems, artificial intelligence (again), and robotics; under media ethics - news, impartiality, journalistic ethics, deceit, lies, sexuality, censorship (again), and violence in the press; and under intercultural information ethics - digital divide, and the ethical role of the Internet for social, political, cultural, and economic development. Many of the debates in information ethics, on these and other issues, have to do with specific kinds of relationships between subjects. The most important subject and a familiar figure in information ethics is the ethical subject engaged in moral deliberation, whether appearing as the bearer of moral rights and obligations to other subjects, or as an agent whose actions are judged, whether by others or by oneself, according to the standards of various moral codes and ethical principles. Many debates in information ethics revolve around conflicts between those acting according to principles of unfettered access to information and those finding some information offensive or harmful. Subjectivity is at the heart of information ethics. But how is subjectivity understood? Can it be understood in ways that broaden ethical reflection to include problems that remain invisible when subjectivity is taken for granted and when how it is created remains unquestioned? This article proposes some answers by investigating the meaning and role of subjectivity in information ethics.[In an article on cyberethics (2000), I asserted that there was no information ethics in any special sense beyond the application of general ethical principles to information services. Here, I take a more expansive view.]
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.2, S.267-277
  9. San Segundo, R.; Martínez-Ávila, D.; Frías Montoya, J.A.: Ethical issues in control by algorithms : the user is the content (2023) 0.00
    0.004720958 = product of:
      0.037767664 = sum of:
        0.031352866 = weight(_text_:web in 1132) [ClassicSimilarity], result of:
          0.031352866 = score(doc=1132,freq=4.0), product of:
            0.10247572 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031400457 = queryNorm
            0.3059541 = fieldWeight in 1132, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.046875 = fieldNorm(doc=1132)
        0.006414798 = weight(_text_:information in 1132) [ClassicSimilarity], result of:
          0.006414798 = score(doc=1132,freq=2.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.116372846 = fieldWeight in 1132, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.046875 = fieldNorm(doc=1132)
      0.125 = coord(2/16)
    
    Abstract
    In this paper we discuss some ethical issues and challenges of the use of algorithms on the web from the perspective of knowledge organization. We review some of the problems that these algorithms and the filter bubbles pose for the users. We contextualize these issues within the user-based approaches to knowledge organization in a larger sense. We review some of the technologies that have been developed to counter these problems as well as initiatives from the knowledge organization field. We conclude with the necessity of adopting a critical and ethical stance towards the use of algorithms on the web and the need for an education in knowledge organization that addresses these issues.
    Footnote
    Beitrag eines Themenheftes: 4th International Conference on the Ethics of Information and Knowledge Organization, June 8-9, University of Lille, France.
  10. Van der Walt, M.S.: Ethics in indexing and clssification (2006) 0.00
    0.0045747906 = product of:
      0.036598325 = sum of:
        0.018640969 = weight(_text_:information in 5876) [ClassicSimilarity], result of:
          0.018640969 = score(doc=5876,freq=38.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.33817163 = fieldWeight in 5876, product of:
              6.164414 = tf(freq=38.0), with freq of:
                38.0 = termFreq=38.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=5876)
        0.017957354 = weight(_text_:retrieval in 5876) [ClassicSimilarity], result of:
          0.017957354 = score(doc=5876,freq=4.0), product of:
            0.09498371 = queryWeight, product of:
              3.024915 = idf(docFreq=5836, maxDocs=44218)
              0.031400457 = queryNorm
            0.18905719 = fieldWeight in 5876, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.024915 = idf(docFreq=5836, maxDocs=44218)
              0.03125 = fieldNorm(doc=5876)
      0.125 = coord(2/16)
    
    Abstract
    To start off I would like to briefly address the relationship between indexing and classification, which are very technical activities performed by information professionals, and the concept of social responsibility (the focus of this conference), which refer to the human side of the profession. Although indexing and classification involve many technicalities, the basic objective of these activities is to provide access to informationbearing objects, thereby contributing to the social process of information transfer. Information transfer takes place between authors (creators of information- bearing objects) and information users. The authors have something to communicate, and the users have information needs that must be satisfied by the information professional acting as intermediary. In the process of facilitating this information transfer the indexer and classifier therefore has a responsibility towards both authors and information users. Authors can expect the information professional to represent their creations as accurately and exhaustively as possible in retrieval systems, within the constraints of time and cost. Users can expect the information professional to index and classify in such a way as to ensure that information that can satisfy their information needs will be retrievable within the shortest time and with the least effort possible. One can also see the social responsibility of indexers and classifiers in a broader context. They do not only have a responsibility towards specific authors and users, but also towards communities as a whole, e.g. the scientific community, the business community, or society at large. In the case of the scientific community effective transfer of information about advances in research can be seen as essential for the progress of science. Providing effective and suitable information retrieval systems to make this transfer possible can therefore be seen as a responsibility of information professionals. In a business enterprise the effective organization of business records and other business information sources can make a significant contribution to the smooth operation of the enterprise, may be essential for legal purposes, and can enable management to use the information for decision-making at all levels. The information manager therefore has a responsibility towards the enterprise to properly organize and index all these resources.
  11. Tenopir, C.: Ethics for online educators (1992) 0.00
    0.0041608093 = product of:
      0.033286475 = sum of:
        0.022595147 = product of:
          0.045190293 = sum of:
            0.045190293 = weight(_text_:online in 7334) [ClassicSimilarity], result of:
              0.045190293 = score(doc=7334,freq=4.0), product of:
                0.09529729 = queryWeight, product of:
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.031400457 = queryNorm
                0.47420335 = fieldWeight in 7334, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.078125 = fieldNorm(doc=7334)
          0.5 = coord(1/2)
        0.01069133 = weight(_text_:information in 7334) [ClassicSimilarity], result of:
          0.01069133 = score(doc=7334,freq=2.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.19395474 = fieldWeight in 7334, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.078125 = fieldNorm(doc=7334)
      0.125 = coord(2/16)
    
    Abstract
    The only monitoring of educators is performed by their internal sense of right and wrong. Following the aggred terms of system contracts, selecting the most appropriate systems for students, keeping up to date with system features, and instilling ethical behaviour in students are at the core of ethics for online educators
    Source
    Journal of information ethics. 1(1992), S.32-40
  12. Miller, S.: Privacy, data bases and computers (1998) 0.00
    0.003978957 = product of:
      0.031831656 = sum of:
        0.014814342 = weight(_text_:information in 3027) [ClassicSimilarity], result of:
          0.014814342 = score(doc=3027,freq=6.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.2687516 = fieldWeight in 3027, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=3027)
        0.017017314 = product of:
          0.03403463 = sum of:
            0.03403463 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
              0.03403463 = score(doc=3027,freq=2.0), product of:
                0.10995905 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031400457 = queryNorm
                0.30952093 = fieldWeight in 3027, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3027)
          0.5 = coord(1/2)
      0.125 = coord(2/16)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
    Source
    Journal of information ethics. 7(1998) no.1, S.42-48
  13. Capurro, R.: Information ethics for and from Africa (2008) 0.00
    0.0036714063 = product of:
      0.02937125 = sum of:
        0.00798859 = product of:
          0.01597718 = sum of:
            0.01597718 = weight(_text_:online in 1869) [ClassicSimilarity], result of:
              0.01597718 = score(doc=1869,freq=2.0), product of:
                0.09529729 = queryWeight, product of:
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.031400457 = queryNorm
                0.16765618 = fieldWeight in 1869, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1869)
          0.5 = coord(1/2)
        0.02138266 = weight(_text_:information in 1869) [ClassicSimilarity], result of:
          0.02138266 = score(doc=1869,freq=32.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.38790947 = fieldWeight in 1869, product of:
              5.656854 = tf(freq=32.0), with freq of:
                32.0 = termFreq=32.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1869)
      0.125 = coord(2/16)
    
    Abstract
    The first part of this article deals with some initiatives concerning the role of information ethics for Africa, such as the New Partnership for Africa's Development, United Nations Information Communications Technology (ICT), and the African Information Society Initiative particularly since the World Summit on the Information Society. Information Ethics from Africa is a young academic field, and not much has been published so far on the impact of ICT on African societies and cultures from a philosophical perspective. The second part of the article analyzes some recent research on this matter particularly with regard to the concept of ubuntu. Finally, the article addresses some issues of the African Conference on Information Ethics held February 3-5, 2007, in Pretoria, South Africa.[The following essay is adapted from a keynote address delivered at the Africa Information Ethics Conference in Pretoria, South Africa, February 5-7, 2007. Under the patronage of UNESCO, sponsored by the South African government, and organized with assistance from the Department of Information Science at the University of Pretoria, the School of Information Studies at the University of Wisconsin-Milwaukee, and the supporters and members of the International Center for Information Ethics (ICIE), the theme of the conference was Ethical Challenges in the Information Age: The Joy of Sharing Knowledge. The full version of the address as well as selected articles from the conference were published in Vol. 7 of ICIE's online journal, International Review of Information Ethics (for more information, visit http://icie.zkm.de)]
    Footnote
    Beitrag innerhalb eines Themenschwerpunkts: Perspectives on global information ethics
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.7, S.1162-1170
  14. Hammwöhner, R.: Anmerkungen zur Grundlegung der Informationsethik (2006) 0.00
    0.0036391467 = product of:
      0.029113173 = sum of:
        0.012095859 = weight(_text_:information in 6063) [ClassicSimilarity], result of:
          0.012095859 = score(doc=6063,freq=4.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.21943474 = fieldWeight in 6063, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=6063)
        0.017017314 = product of:
          0.03403463 = sum of:
            0.03403463 = weight(_text_:22 in 6063) [ClassicSimilarity], result of:
              0.03403463 = score(doc=6063,freq=2.0), product of:
                0.10995905 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031400457 = queryNorm
                0.30952093 = fieldWeight in 6063, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=6063)
          0.5 = coord(1/2)
      0.125 = coord(2/16)
    
    Abstract
    In diesem Beitrag werden verschiedene Aspekte einer Begründung einer Informationsethik betrachtet. Zunächst wird eine sinnvolle Abgrenzung zu konkurrierenden Ethiken - Netz- und Medienethik - gesucht. Aus Sicht der Generierung, Distribution und Bewahrung von Information wird die Informationsethik als umfassender und allgemeiner als die anderen angesehen. Weiterhin wird die Option einer diskursethischen und damit absoluten Begründung der Informationsethik diskutiert und zugunsten einer pragmatistischen Sichtweise zurückgewiesen.
    Date
    13.10.2006 10:22:03
    Source
    Information und Sprache: Beiträge zu Informationswissenschaft, Computerlinguistik, Bibliothekswesen und verwandten Fächern. Festschrift für Harald H. Zimmermann. Herausgegeben von Ilse Harms, Heinz-Dirk Luckhardt und Hans W. Giessen
  15. Zhang, J.: Archival context, digital content, and the ethics of digital archival representation : the ethics of identification in digital library metadata (2012) 0.00
    0.0032543459 = product of:
      0.026034767 = sum of:
        0.018474855 = weight(_text_:web in 419) [ClassicSimilarity], result of:
          0.018474855 = score(doc=419,freq=2.0), product of:
            0.10247572 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031400457 = queryNorm
            0.18028519 = fieldWeight in 419, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=419)
        0.007559912 = weight(_text_:information in 419) [ClassicSimilarity], result of:
          0.007559912 = score(doc=419,freq=4.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.13714671 = fieldWeight in 419, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=419)
      0.125 = coord(2/16)
    
    Abstract
    The findings of a recent study on digital archival representation raise some ethical concerns about how digital archival materials are organized, described, and made available for use on the Web. Archivists have a fundamental obligation to preserve and protect the authenticity and integrity of records in their holdings and, at the same time, have the responsibility to promote the use of records as a fundamental purpose of the keeping of archives (SAA 2005 Code of Ethics for Archivists V & VI). Is it an ethical practice that digital content in digital archives is deeply embedded in its contextual structure and generally underrepresented in digital archival systems? Similarly, is it ethical for archivists to detach digital items from their archival context in order to make them more "digital friendly" and more accessible to meet needs of some users? Do archivists have an obligation to bring the two representation systems together so that the context and content of digital archives can be better represented and archival materials "can be located and used by anyone, for any purpose, while still remaining authentic evidence of the work and life of the creator"? (Millar 2010, 157) This paper discusses the findings of the study and their ethical implications relating to digital archival description and representation.
    Content
    Beitrag aus einem Themenheft zu den Proceedings of the 2nd Milwaukee Conference on Ethics in Information Organization, June 15-16, 2012, School of Information Studies, University of Wisconsin-Milwaukee. Hope A. Olson, Conference Chair. Vgl.: http://www.ergon-verlag.de/isko_ko/downloads/ko_39_2012_5_d.pdf.
  16. O'Neil, R.M.: Free speech in cyberspace (1998) 0.00
    0.0031962972 = product of:
      0.025570378 = sum of:
        0.008553064 = weight(_text_:information in 248) [ClassicSimilarity], result of:
          0.008553064 = score(doc=248,freq=2.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.1551638 = fieldWeight in 248, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=248)
        0.017017314 = product of:
          0.03403463 = sum of:
            0.03403463 = weight(_text_:22 in 248) [ClassicSimilarity], result of:
              0.03403463 = score(doc=248,freq=2.0), product of:
                0.10995905 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031400457 = queryNorm
                0.30952093 = fieldWeight in 248, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0625 = fieldNorm(doc=248)
          0.5 = coord(1/2)
      0.125 = coord(2/16)
    
    Date
    22. 2.1999 15:50:50
    Source
    Journal of information ethics. 7(1998) no.1, S.15-23
  17. Bagatini, J.A.; Chaves Guimarães, J.A.: Algorithmic discriminations and their ethical impacts on knowledge organization : a thematic domain-analysis (2023) 0.00
    0.002977565 = product of:
      0.02382052 = sum of:
        0.018474855 = weight(_text_:web in 1134) [ClassicSimilarity], result of:
          0.018474855 = score(doc=1134,freq=2.0), product of:
            0.10247572 = queryWeight, product of:
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.031400457 = queryNorm
            0.18028519 = fieldWeight in 1134, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.2635105 = idf(docFreq=4597, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1134)
        0.005345665 = weight(_text_:information in 1134) [ClassicSimilarity], result of:
          0.005345665 = score(doc=1134,freq=2.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.09697737 = fieldWeight in 1134, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1134)
      0.125 = coord(2/16)
    
    Abstract
    Personal data play a fundamental role in contemporary socioeconomic dynamics, with one of its primary aspects being the potential to facilitate discriminatory situations. This situation impacts the knowledge organization field especially because it considers personal data as elements (facets) to categorize persons under an economic and sometimes discriminatory perspective. The research corpus was collected at Scopus and Web of Science until the end of 2021, under the terms "data discrimination", "algorithmic bias", "algorithmic discrimination" and "fair algorithms". The obtained results allowed to infer that the analyzed knowledge domain predominantly incorporates personal data, whether in its behavioral dimension or in the scope of the so-called sensitive data. These data are susceptible to the action of algorithms of different orders, such as relevance, filtering, predictive, social ranking, content recommendation and random classification. Such algorithms can have discriminatory biases in their programming related to gender, sexual orientation, race, nationality, religion, age, social class, socioeconomic profile, physical appearance, and political positioning.
    Footnote
    Beitrag eines Themenheftes: 4th International Conference on the Ethics of Information and Knowledge Organization, June 8-9, University of Lille, France.
  18. Aghemo, A.: Etica professionale e servizio di informazione (1993) 0.00
    0.00279676 = product of:
      0.02237408 = sum of:
        0.0074839313 = weight(_text_:information in 2453) [ClassicSimilarity], result of:
          0.0074839313 = score(doc=2453,freq=2.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.13576832 = fieldWeight in 2453, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0546875 = fieldNorm(doc=2453)
        0.014890149 = product of:
          0.029780298 = sum of:
            0.029780298 = weight(_text_:22 in 2453) [ClassicSimilarity], result of:
              0.029780298 = score(doc=2453,freq=2.0), product of:
                0.10995905 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031400457 = queryNorm
                0.2708308 = fieldWeight in 2453, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=2453)
          0.5 = coord(1/2)
      0.125 = coord(2/16)
    
    Abstract
    An awareness exists among Italian librarians of the need for an established code of ethics for library reference services. Considers the principles that such a code should incorporate; the US Commitment to Information services, for example, affirms users' rights of access to library books and resources, regardless of content and opinions expressed. Censoship is opposed and people are not barred from library use for ethnis, social or religious reasons. An ethical code would require library staff to be impartial, give attention and respect to users, allocate time properly, and avoid prejudice. Discusses the problems of library ethics which arise when user requests relate to sensitive topics e.g. euthansia, cocaine refining
    Date
    6. 4.1996 13:22:31
  19. Jones, R.A.: ¬The ethics of research in cyberspace (1995) 0.00
    0.002666851 = product of:
      0.021334808 = sum of:
        0.012781745 = product of:
          0.02556349 = sum of:
            0.02556349 = weight(_text_:online in 2458) [ClassicSimilarity], result of:
              0.02556349 = score(doc=2458,freq=2.0), product of:
                0.09529729 = queryWeight, product of:
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.031400457 = queryNorm
                0.2682499 = fieldWeight in 2458, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.0349014 = idf(docFreq=5778, maxDocs=44218)
                  0.0625 = fieldNorm(doc=2458)
          0.5 = coord(1/2)
        0.008553064 = weight(_text_:information in 2458) [ClassicSimilarity], result of:
          0.008553064 = score(doc=2458,freq=2.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.1551638 = fieldWeight in 2458, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.0625 = fieldNorm(doc=2458)
      0.125 = coord(2/16)
    
    Abstract
    As computers, the Internet, online digtial resources, and eventually the National Information Infrastructure become increasingly important. The study of their use has become a fast growing areas in social science. This research is important but it raises questions of ethics and human dignity. Major research universities have guidelines for this kind of scholarship, based on the Nuremberg Code and/or the Belmont principles. But research in cyberspace was not on the minds of those drafting these guidelines. Discusses some of the difficulties produced by tensions between traditional guidelines and new technologies
  20. Information ethics : privacy, property, and power (2005) 0.00
    0.0025071697 = product of:
      0.020057358 = sum of:
        0.012536696 = weight(_text_:information in 2392) [ClassicSimilarity], result of:
          0.012536696 = score(doc=2392,freq=44.0), product of:
            0.055122808 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.031400457 = queryNorm
            0.2274321 = fieldWeight in 2392, product of:
              6.6332498 = tf(freq=44.0), with freq of:
                44.0 = termFreq=44.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.007520661 = product of:
          0.015041322 = sum of:
            0.015041322 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
              0.015041322 = score(doc=2392,freq=4.0), product of:
                0.10995905 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.031400457 = queryNorm
                0.13679022 = fieldWeight in 2392, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.01953125 = fieldNorm(doc=2392)
          0.5 = coord(1/2)
      0.125 = coord(2/16)
    
    BK
    06.00 / Information und Dokumentation: Allgemeines
    Classification
    323.44/5 22 (GBV;LoC)
    06.00 / Information und Dokumentation: Allgemeines
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Rez. in: JASIST 58(2007) no.2, S.302 (L.A. Ennis):"This is an important and timely anthology of articles "on the normative issues surrounding information control" (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics, intellectual property, privacy, free speech, and more, the book provides information professionals of all kinds with a valuable and thought-provoking resource. Information Ethics is divided into five parts and twenty chapters or articles. At the end of each of the five parts, the editor has included a few "discussion cases," which allows the users to apply what they just read to potential real life examples. Part I, "An Ethical Framework for Analysis," provides readers with an introduction to reasoning and ethics. This complex and philosophical section of the book contains five articles and four discussion cases. All five of the articles are really thought provoking and challenging writings on morality. For instance, in the first article, "Introduction to Moral Reasoning," Tom Regan examines how not to answer a moral question. For example, he thinks using what the majority believes as a means of determining what is and is not moral is flawed. "The Metaphysics of Morals" by Immanuel Kant looks at the reasons behind actions. According to Kant, to be moral one has to do the right thing for the right reasons. By including materials that force the reader to think more broadly and deeply about what is right and wrong, Moore has provided an important foundation and backdrop for the rest of the book. Part II, "Intellectual Property: Moral and Legal Concerns," contains five articles and three discussion cases for tackling issues like ownership, patents, copyright, and biopiracy. This section takes a probing look at intellectual and intangible property from a variety of viewpoints. For instance, in "Intellectual Property is Still Property," Judge Frank Easterbrook argues that intellectual property is no different than physical property and should not be treated any differently by law. Tom Palmer's article, "Are Patents and Copyrights Morally Justified," however, uses historical examples to show how intellectual and physical properties differ.
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
    LCSH
    Freedom of information
    Information society
    Information technology / Social aspects
    Subject
    Freedom of information
    Information society
    Information technology / Social aspects

Authors

Years

Languages

  • e 86
  • d 16
  • m 2
  • i 1
  • More… Less…

Types

  • a 88
  • m 13
  • s 7
  • More… Less…