首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Self-driving cars currently face a lot of technological problems that need to be solved before the cars can be widely used. However, they also face ethical problems, among which the question of crash-optimization algorithms is most prominently discussed. Reviewing current debates about whether we should use the ethics of the Trolley Dilemma as a guide towards designing self-driving cars will provide us with insights about what exactly ethical research does. It will result in the view that although we need the ethics of the Trolley Dilemma as important input for self-driving cars, the route towards simply implementing it into automated cars is blocked.  相似文献   

2.
An important question one can ask of ethical theories is whether and how they aim to raise claims to universality. This refers to the subject area that they intend to describe or govern and also to the question whether they claim to be binding for all (moral) agents. This paper discusses the question of universality of Luciano Floridi’s information ethics (IE). This is done by introducing the theory and discussing its conceptual foundations and applications. The emphasis will be placed on the ontological grounding of IE. IE’s claims to universality will be contrasted with those raised by discourse ethics. This comparison of two pertinent ethical theories allows for a critical discussion of areas where IE currently has room for elaboration and development.  相似文献   

3.
This study was interested in determining whether ethnicity-based cultural differences affected knowledge usage in today's multicultural organizations. Our empirical study uses a psychology-based approach to measure what we refer to as implicit managerial knowledge of Information and Communication Technology (ICT) workers within three Australian organizations. The research instrument captures responses to various ICT workplace scenarios in order to determine and compare the different ways in which people make use of the implicit knowledge they use to manage themselves and others. Using the culture-based literature to assist with interpretation of the data, we have identified a number of themes and their characteristics and brought these together to provide a comprehensive model for understanding cultural influences. This model can be used to better appreciate why and perhaps anticipate how an individual's implicit managerial knowledge will be used in responding to everyday workplace situations. Such an understanding will assist organizations to develop appropriate and effective knowledge management strategies.  相似文献   

4.
Based on a wide-ranging literature review, we argue that the information and communications technology (ICT) infrastructure has not received adequate attention for its role in the development and maintenance of industrial clusters. This article develops expectations for how firms in an industrial cluster make use of a public, broadband ICT infrastructure, particularly in support of e-commerce applications. We further address the question of whether ICT use, by enabling stronger ties to non-cluster partners, can weaken clusters. A case study of a successful biotechnology cluster in Denmark and Sweden—the Medicon Valley—is used to explore ICT use in a knowledge-intensive cluster context. We conclude that ICT use appears to strengthen rather than weaken the Medicon Valley cluster, and that firms located within a cluster appear to gain some unique advantages from their ICT usage that are not necessarily available to firms outside the cluster.  相似文献   

5.
In the face of ubiquitous information communication technology, the presence of blogs, personal websites, and public message boards give the illusion of uncensored criticism and discussion of the ethical implications of business activities. However, little attention has been paid to the limitations on free speech posed by the control of access to the Internet by private entities, enabling them to censor content that is deemed critical of corporate or public policy. The premise of this research is that transparency alone will not achieve the desired results if ICT is used in a one way system, controlled by the provider of information. Stakeholders must have an avenue using the same technology to respond to and interact with the information. We propose a model that imposes on corporations a public trust, requiring these gatekeepers of communication technology to preserve individual rights to criticism and review.  相似文献   

6.
In addressing persistent gaps in existing theories, recent advances in data-driven research approaches offer novel perspectives and exciting insights across a spectrum of scientific fields concerned with technological change and the socio-economic impact thereof. The present investigation suggests a novel approach to identify and analyze the evolution of technology sectors, in this case, information and communications technology (ICT), considering international collaboration patterns and knowledge flows and spillovers via information inputs derived from patent documents.The objective is to utilize and explore information regarding inventors’ geo-location, technology sector classifications, and patent citation records to construct various types of networks. This, in turn, will open up avenues to discover the nature of evolutionary pathways in ICT trajectories and will also provide evidence of how the overall ICT knowledge space, as well as directional knowledge flows within the ICT space, have evolved differently. It is expected that this data-driven inquiry will deliver intuitive results for decision makers seeking evidence for future resource allocation and who are interested in identifying well-suited collaborators for the development of potential next-generation technologies. Further, it will equip researchers in technology management, economic geography, or similar fields with a systematic approach to analyze evolutionary pathways of technological advancements and further enable exploitation and development of new theories regarding technological change and its socio-economic consequences.  相似文献   

7.
The need for quick, timely, and accurate information is critical in emergency events. During mass emergencies, people assemble information from both official and unofficial sources. As digital access expands, people will increasingly incorporate information from digital sources into decision making and assess it against the local circumstances they experience. If we extrapolate what such behavior means for the future, we can see that information management under emergency conditions will need to become increasingly socially distributed. The key question then is how to assess the quality of information: how “good” or “bad” it is; whether it is “misinformation” or “disinformation.” Borrowing from Simon's notion of satisficing, the authors argue that people's assessment of information helpfulness and credibility is a function of the “everyday analytic” skills they employ during mass emergencies. To facilitate the critical work of “everyday analysts,” we outline a research agenda for the development of analytical support tools.  相似文献   

8.
This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.  相似文献   

9.
This paper will address the question of the morality of technology. I believe this is an important question for our contemporary society in which technology, especially information technology, is increasingly becoming the default mode of social ordering. I want to suggest that the conventional manner of conceptualising the morality of technology is inadequate – even dangerous. The conventional view of technology is that technology represents technical means to achieve social ends. Thus, the moral problem of technology, from this perspective, is the way in which the given technical means are applied to particular (good or bad) social ends. In opposition to this I want to suggest that the assumed separation, of this approach, between technical means and social ends are inappropriate. It only serves to hide the most important political and ethical dimensions of technology. I want to suggest that the morality of technology is much more embedded and implicit than such a view would suggest. In order to critique this approach I will draw on phenomenology and the more recent work of Bruno Latour. With these intellectual resources in mind I will propose disclosive ethics as a way to make the morality of technology visible. I will give a brief account of this approach and show how it might guide our␣understanding of the ethics and politics of technology by considering two examples of contemporary information technology: search engines and plagiarism detection systems.  相似文献   

10.
This article deals with the contribution made by domestication research to our understanding of information and communication technologies (ICTs) in everyday life, especially in the home. It first provides a sense of the diversity of research in this tradition and how this is evolving. The article then reflects upon and illustrates different elements of research in this tradition, providing examples of how these help to explain patterns of ICT experience, the way people evaluate that experience, and what bearing it has on their lives. To contextualize domestication research further, it considers overlaps with other traditions of research before moving on to the core, and the range of methodologies that have been employed. Finally, the article examines some of the general insights from domestication research, as well as more specific applications to the commercial and policy fields.  相似文献   

11.
Corporate dynamic transparency: the new ICT-driven ethics?   总被引:1,自引:1,他引:0  
The term “corporate transparency” is frequently used in scholarly discussions of business ethics and corporate social responsibility (CSR); however, it remains a volatile and imprecise term, often defined incompletely as “information disclosure” accomplished through standardized reporting. Based on the results of empirical studies of organizational behaviors, this paper identifies a new set of managerial practices based on the use of information and communication technologies (ICT) and particularly Internet-based tools. These practices are resulting in what can be termed “dynamic transparency.” ICT allows for an informational environment characterized by two-way exchange between corporations and their stakeholders, which fosters a more collaborative marketplace. It is proposed that such dynamic information sharing, conducted by means of ICT, drives organizations to display greater openness and accountability, and more transparent operations, which benefit both the corporations and their constituents. One of the most important outcomes that will accrue to consumers and other individuals is the “right to know,” especially about corporate strategies and activities that might directly affect their quality of life. This paper demonstrates that dynamic transparency is more desirable and more effective than the more common “static transparency” where firms’ information disclosure is one-way, usually in response to government regulation. We present three ethical arguments to justify the implementation by business firms of dynamic transparency and demonstrate that their doing so is related to CSR and to augment and complement stakeholder engagement and dialogue. The paper concludes with a summary of the possible limits to and the problems involved in the implementation of dynamic transparency for corporations, and suggests some strategies to counter them.  相似文献   

12.
In this study, we develop a theorisation of an internet dating site as a cultural artifact. The site, Gaydar, is targeted at gay men. We argue that contemporary received representations of their sexuality figure heavily in the site's focus by providing a cultural logic for the apparent ad hoc development trajectories of its varied commercial and non-commercial services. More specifically, we suggest that the growing sets of services related to the website are heavily enmeshed within current social practices and meanings. These practices and meanings are, in turn, shaped by the interactions and preferences of a variety of diverse groups involved in what is routinely seen within the mainstream literature as a singularly specific sexuality and cultural project. Thus, we attend to two areas—the influence of the various social engagements associated with Gaydar together with the further extension of its trajectory ‘beyond the web’. Through the case of Gaydar, we contribute a study that recognises the need for attention to sexuality in information systems research and one which illustrates sexuality as a pivotal aspect of culture. We also draw from anthropology to theorise ICTs as cultural artifacts and provide insights into the contemporary phenomena of ICT enabled social networking.  相似文献   

13.
Whether the Internet Protocol address should be seen as personal data or not remains a contested issue with regard to information privacy. This article explores the question by looking at the technical attributes of the Internet Protocol address, European Union (EU) and U.S. case law, and how the EU's advisory data protection body, the Article 29 Working Party, and some of the world's most influential information and communication technology (ICT) companies consider the IP address. The notion of contextual integrity is then used to show that information privacy regulation must stipulate concrete technical mandates instead of guiding principles, contrary to the ideal of technology neutrality in Internet regulation.  相似文献   

14.
《普罗米修斯》2012,30(4):327-342
We explore aspects of unconventional competition between firms. In particular, we address two critical questions. The first is: what happens when firms decide to compete outside the rules and frameworks of conventional competition? In other words, how should firms react to competitors who employ unconventional means of competition that differ from recognised Western ethical and legal norms? Secondly, we examine whether current warfare models provide guidance to firms facing such unconventional competition. To address these two questions, we seek to draw lessons from decision‐making approaches adopted by the military. We come to the conclusion that businesses can learn a great deal from how the military deals with unconventional competition.  相似文献   

15.
Information and communication technology is regarded as a critical means of addressing rural problems of information deficiency, ineffective communication and emotional disconnection. Most studies on information and communication technology for development (ICT4D) can be categorized as a top-down development approach and are often theoretical research or case studies conducted using qualitative methods. In this study, we discuss a new phenomenon of citizen-led information practices in rural areas driven by the rural community and its citizens. By employing a mixed-method approach combining case studies and social network analysis (SNA), we explore how ICT4D can be achieved through citizen-led information practices. This study makes theoretical contributions to the study of ICT4D and information practices as well as the mixed-method approach, which deepen our understanding of the citizen-led information practices of ICT4D. This study also provides practical suggestions to the governments, enterprises, social organizations and rural communities in ICT4D practices and ICT function design.  相似文献   

16.
It is commonly accepted that the use of personal information in business and government puts individual privacy at risk. However, little is known about these risks-for instance, whether and how they can be measured, and how they vary across social groups and the sectors in which personal data are used. Unless we can gain a purchase on such issues, our knowledge of the societal effects of information technology and systems will remain deficient, and the ability to make and implement better policies for privacy protection, and perhaps for a more equitable distribution of risk and protection, will remain impaired. The article explores this topic, examining conventional paradigms in data protection, including the one-dimensional view of the 'data subject,' that inhibit better conceptualizations and practices. It looks at some comparative survey evidence that casts light on the question of the distribution of privacy risks and concerns. It examines theoretical issues in the literature on risk, raising questions about the objectivity and perception of the risk of privacy invasion.  相似文献   

17.
ICTs and Internet adoption in China's tourism industry   总被引:1,自引:0,他引:1  
The fast development of information communication technologies (ICTs) and the expansion of the Internet have changed industry structures around the world. New technologies have been adopted in the tourism industry in Europe and America for more than 30 years, and the trend is likely to continue into the future. China, as a fast-growing developing country in Asia, is gaining importance in the international tourism market for its historical and cultural attractiveness as a destination. It is also becoming a booming tourism source country as its population starts travelling overseas. This study examines how the ICT and Internet gradually change the tourism industry structure in China; how important such changes are, and to where such changes will lead China's tourism industry. This exploratory research is conducted based on information collected from several tourism organisations, such as airlines, hotels, tour operators, visitor attractions and the tourism authorities within China.  相似文献   

18.
Information and communication technology (ICT) development initiatives have begun to acknowledge the power and importance of cultural and community-focused belief systems. Yet the vast majority of such initiatives tend to preidentify developmental goals that communities hold. Paulo Freire's writings have influenced development initiatives by introducing the possibility of working with communities to orient projects. While these “participatory” initiatives have involved soliciting community feedback relative to a research project whose goals were formulated in the university or development institution, they do not go far enough to harness actual visions held by communities. It is important to conceptualize a model and methodology of engaging communities to develop and articulate their own goals of information access and ultimately, an indigenous approach toward cultural, political, and economic aspects of development. This approach holds promise to sustain communities within a return on the investment and efforts of the researcher or institution. This article closes by describing a current initiative in Southern India that reflects the described methodology.  相似文献   

19.
The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be disclosed and what sort of information should be used in order to implement and make effective the ethical practices and principles to which an organisation is committed. The concepts of “heterogeneous organisation” and “autonomous computational artefact” are further defined in order to clarify the ethical implications of the technology used in implementing information transparency. It is argued that explicit ethical designs, which describe how ethical principles are embedded into the practice of software design, would represent valuable information that could be disclosed by organisations in order to support their ethical standing.  相似文献   

20.
Process Virtualization Theory (PVT) proposes a set of requirements and relationships to explain and predict whether or not a knowledge work process can be successfully virtualized. However, at least in remote work, the crisis-driven digital transformation (e.g., during the COVID-19 pandemic) shows that almost all knowledge work processes can be virtualized unexpectedly and immediately. Since the requirements for these processes remain the same and need to be met to continue the processes remotely, an interesting question arises of how information technology (IT) can help to meet these requirements in a crisis-driven digital transformation of knowledge work. To address this question, we conducted 40 semi-structured interviews with a multiple-case approach using a critical realist perspective. Our findings contribute to information systems (IS) research in a twofold way. First, we demonstrate that the crisis-driven digital transformation of knowledge work triggers a revisited perspective on PVT by turning virtualized knowledge work processes into a prerequisite. Second, we show how the IT characteristics of PVT (representation, reach, monitoring capability) help to fulfill knowledge work process requirements in remote work settings and outline two additional IT characteristics (social presence and situation awareness) that positively support the fulfillment.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号