首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This essay examines some ethical aspects of stalkingincidents in cyberspace. Particular attention is focused on the Amy Boyer/Liam Youens case of cyberstalking, which has raised a number of controversial ethical questions. We limit our analysis to three issues involving this particular case. First, we suggest that the privacy of stalking victims is threatened because of the unrestricted access to on-linepersonal information, including on-line public records, currently available to stalkers. Second, we consider issues involving moral responsibility and legal liability for Internet service providers (ISPs) when stalking crimesoccur in their `space' on the Internet. Finally, we examine issues of moral responsibility for ordinary Internet users to determine whether they are obligated to inform persons whom they discover to be the targets of cyberstalkers.  相似文献   

2.
Post-mortem privacy is becoming a vital topic of public and scholarly legal concern. Post-mortem privacy is understood as the right of a person to preserve and control what becomes of his reputation and dignity after death. The assumption that the deceased does not qualify for privacy rights, because his bodily presence has been terminated, no longer holds in our networked society. In the digital age, the phenomenon of the digital legacy that an Internet user leaves behind after his demise, has led to new challenges for the legal system. The deceased is no longer in a position to exercise human autonomy as an active agent. The article reconsiders the notion of human autonomy with regard to these digital representations. Taking the point of view that the control over personal information (also known as informational self-determination) is essential in protecting one’s privacy in the antemortem life, the article explores whether this principle may have validity in the postmortem context. Legal philosophical arguments are advanced in a discourse about the quandary if digital personae of deceased persons can be bestowed with a legal basis of personality rights and concomitantly privacy rights. Therefore much attention is given to the problem of the subject, which does not seem to be functioning in the case of the absence of a living subject. Briefly referring to novel personae, it is argued that fundamental human rights need not be limited to the rights of living human beings.  相似文献   

3.
4.
This article addresses some of the most important legal and ethical issues posed by robot companions. Firstly, we clarify that robots are to be deemed objects and more precisely products. This on the one hand excludes the legitimacy of all such considerations involving robots as bearers of own rights and obligations, and forces a functional approach in the analysis. Secondly, pursuant to these methodological considerations we address the most relevant ethical and legal concerns, ranging from the risk of dehumanization and isolation of the user, to privacy and liability concerns, as well as financing of the diffusion of this—still expensive—technology. Solutions are briefly sketched, in order to provide the reader with sufficient indications on what strategies could and should be implemented, already in the design phase, as well as what kind of intervention ought to be favored and expected by national and European legislators. The recent Report with Recommendations to the Commission on Civil Law Rules on Robotics of January 24, 2017 by the European Parliament is specifically taken into account.  相似文献   

5.
Communication researchers and social scientists are quickly discovering the value of data that exists in the postings of members of Internet e-mail, Usenet, and real-time groups. The ability to communicate with one's peers, no matter how esoteric the interests, is causing an explosion in the number of new virtual communities. The interpersonal dynamics of these groups are increasingly coming under the scrutiny of academic research. The publicly available archived records of Internet virtual communities are being analyzed for a wide variety of research interests. The ability to do naturalistic observations of group dynamics, as they are exhibited in these exchanges of text, has captured the attention of many researchers. The institutional review boards of major universities are granting researchers exempt or expedited (exempt from full review) status for this work, due to the public nature of the notes being analyzed. These studies often involve the lack of informed consent, where the group members under study are unaware they are being monitored. There is a potential for psychological harm to the members of these groups, depending on the way results are reported. This article explores the ethical considerations that must be taken into account to protect cyberspace participants. The guidelines proposed are based on the American Psychological Association ethical guidelines for use of human subjects in research. An explanation is offered as to how such guidelines can best be applied to the study of Internet communities. The constructs of Group Accessibility (the public/private nature of the actual cyberspace occupied by a group) and Perceived Privacy (the level of privacy that group members assume they have) are defined and proposed as two dimensions by which individual Internet communities may be evaluated in order to assure the ethical reporting of research findings.  相似文献   

6.
The spectacular growth of the Internet in Korea has propelled her to the very top of the international rankings based on technology peneration statistics. The resulting international attention and national pride have fostered the notion of “Korea—a strong Internet nation.” The ready embrace of this idea by officials and the public at large has made a critical evaluation almost an anathema. This article reviews the published critiques, which have been rare and scattered, and opens up the “what next” question for an unbounded discussion.  相似文献   

7.
In this paper we discuss the social and ethical issues that arise as a result of digitization based on six dominant technologies: Internet of Things, robotics, biometrics, persuasive technology, virtual & augmented reality, and digital platforms. We highlight the many developments in the digitizing society that appear to be at odds with six recurring themes revealing from our analysis of the scientific literature on the dominant technologies: privacy, autonomy, security, human dignity, justice, and balance of power. This study shows that the new wave of digitization is putting pressure on these public values. In order to effectively shape the digital society in a socially and ethically responsible way, stakeholders need to have a clear understanding of what such issues might be. Supervision has been developed the most in the areas of privacy and data protection. For other ethical issues concerning digitization such as discrimination, autonomy, human dignity and unequal balance of power, the supervision is not as well organized.  相似文献   

8.
通用模型是近年来人工智能发展的重要方向之一。随着模型研发应用的增多,模型的社会和伦理影响受到广泛关注。文章从通用模型的特性出发、分析了模型在算法、数据和算力3个层面潜在的伦理挑战,包括不确定性、真实性、可靠性,偏见、毒性、公平、隐私及环境问题。进一步从技术哲学的视角分析了数据驱动的模型在人与世界关系中的中介性作用及所产生的“镜像”效应问题和透明性问题,提出了人与世界关系的新形态是以模型(数据)为中介的,即“人-模型(数据)-世界”关系。最后,从治理技术和治理机制两方面反思了当前的应对措施及局限性。建议建立开放式、全流程、价值嵌入的伦理规约机制,保障通用模型在合规、合伦理的框架下发展。  相似文献   

9.
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

10.
It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters their future capacities for autonomy and relationships.  相似文献   

11.
The emergence of the new information economy hascomplicated jurisdictional issues in commerce andcrime. Many of these difficulties are simplyextensions of problems that arose due to other media.Telephones and fax machines had already complicatedjurists' determinations of applicable laws. Evenbefore the Internet, contracts were often negotiatedwithout any face-to-face contact – entirely bytelephone and fax. Where is such a contractnegotiated? The answer to this question is critical toany litigation that may arise over such contracts. Thelaws of contract are often quite different from onejurisdiction to the next.The Internet has brought with it new forms ofcommunication which make determining the loci of actseven more complicated. Where are contracts negotiatedwhen they are negotiated in cyberspace? Business isbeing conducted in chat rooms, on web sites, andthrough e-mail. Each of these is technically distinctfrom telephones and fax machines. More importantly,these tools seem ontologically different, in varyingdegrees, from traditional methods of communication.The question is, are these ontological differencessufficient to warrant new legal notions ofjurisdiction in cyberspace?Only a thorough ontological analysis of the parts ofcyberspace and acts ``in'' it can reveal the answers tothe legal questions posed by this new medium.Traditional legal analyses have relied, in part, on acrude legal ontology. That is, courts have grappledwith notions of the topology and mereology of theworld and legal objects when considering questions ofjurisdiction. There is a simpler, theoretically soundmethod for determining legal jurisdiction which isbased upon the notion of ``purposeful direction,'' andwhich treats computer-mediated transactions as justanother form of communication. I will explore thatmethod below.  相似文献   

12.
Critical research is becoming increasingly accepted as a valid approach to research in information systems. It is deemed to be particularly suitable for situations where researchers want to address conspicuous injustice, such as in areas of development or the digital divide. Critical research in information systems (CRIS), I will argue, is a possible approach to some of the ethical problems arising in the context of information and communication technology (ICT). It can be sensitive to the question of culture and therefore suitable for researching cross-cultural ethical questions in ICT. It is often unclear, however, what exactly critical research stands for and to what extent critical approaches are applicable across cultural boundaries. This paper will address these problems by proposing a definition of critical research as focused on changing the status quo and aiming for emancipation. It will then look at the question whether different cultures are compatible and comparable and what the role of culture in research on information systems is. The paper will then return to the question whether the critical intention to emancipate and empower humans is an expression of cultural imperialism or whether there are valid ways of promoting emancipation across cultural divides.  相似文献   

13.
After reviewing some of the difficulties caused by spam and summarizing the arguments of its defenders, this paper will focus on its present legal status. It will then dwell on spam from a moral point of view and address some of the ethical implications associated with transmitting this unsolicited commercial e-mail. It will attempt to sort out the conflicting rights involved and develop a viable case that even if we prescind from its social costs, spam is ethically questionable under certain conditions. Moreover, given the current volume of spam and its negative impact on the Internet environment, the transmission of spam can also be characterized as an asocial act primarily because of the significant externalities which it generates. As a result, spam cannot be justified from the perspective of duty-based moral philosophies that emphasize the need to conform to the legitimate norms of the community.  相似文献   

14.
KDD, data mining, and the challenge for normative privacy   总被引:3,自引:1,他引:2  
The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.  相似文献   

15.
The Internet of Things (IoT) is an emerging global infrastructure that employs wireless sensors to collect, store, and exchange data. Increasingly, applications for marketing and advertising have been articulated as a means to enhance the consumer shopping experience, in addition to improving efficiency. However, privacy advocates have challenged the mass aggregation of personally-identifiable information in databases and geotracking, the use of location-based services to identify one’s precise location over time. This paper employs the framework of contextual integrity related to privacy developed by Nissenbaum (Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, 2010) as a tool to understand citizen response to implementation IoT-related technology in the supermarket. The purpose of the study was to identify and understand specific changes in information practices brought about by the IoT that may be perceived as privacy violations. Citizens were interviewed, read a scenario of near-term IoT implementation, and were asked to reflect on changes in the key actors involved, information attributes, and principles of transmission. Areas where new practices may occur with the IoT were then highlighted as potential problems (privacy violations). Issues identified included the mining of medical data, invasive targeted advertising, and loss of autonomy through marketing profiles or personal affect monitoring. While there were numerous aspects deemed desirable by the participants, some developments appeared to tip the balance between consumer benefit and corporate gain. This surveillance power creates an imbalance between the consumer and the corporation that may also impact individual autonomy. The ethical dimensions of this problem are discussed.  相似文献   

16.
Taking Operation Payback and the broader context provided by The Pirate Bay as a point of reference, I consider the role of network-based initiatives in shaping the digital rights movement. I argue that Operation Payback is a significant milestone in copyright controversies because it exposed formal and informal, legal and extralegal strategies that have crystallized into an intricate business model around intellectual property. The most consequential outcome of this operation was that it created a focus on privacy violations that occurred at the behest of copyright, and thus revealed the tensions between intellectual property and privacy. In so doing, it brought privacy concerns front and center, galvanizing unprecedented support for the digital rights movement.  相似文献   

17.
Significant U.S. policy initiatives in the late 1990s were intended to control Internet access, privacy, and indecency--specifically among children. This study reflects on these using quantitative data from a computer center in a children's library in the inner city. Researchers gathered 16 weeks of page requests ( n = 203,647) using "click stream" and behavioral data, and analyzed these using nonparametric tests. Findings show that users are highly influenced by each other and browse only a small universe of sites. Game playing and communicating with individuals (via e-mail and chat) were the most popular uses. Children were uninterested in pornography and sites directed toward children. Advertising was extremely common. Children were most likely to engage in sharing when using games and chat. For this population, access, privacy and indecency initiatives to control Internet use fails to achieve its stated goals, but activities that encourage sharing in public places hold some promise for building computer knowledge.  相似文献   

18.
Significant U.S. policy initiatives in the late 1990s were intended to control Internet access, privacy, and indecency--specifically among children. This study reflects on these using quantitative data from a computer center in a children's library in the inner city. Researchers gathered 16 weeks of page requests ( n = 203,647) using "click stream" and behavioral data, and analyzed these using nonparametric tests. Findings show that users are highly influenced by each other and browse only a small universe of sites. Game playing and communicating with individuals (via e-mail and chat) were the most popular uses. Children were uninterested in pornography and sites directed toward children. Advertising was extremely common. Children were most likely to engage in sharing when using games and chat. For this population, access, privacy and indecency initiatives to control Internet use fails to achieve its stated goals, but activities that encourage sharing in public places hold some promise for building computer knowledge.  相似文献   

19.
Whether the Internet Protocol address should be seen as personal data or not remains a contested issue with regard to information privacy. This article explores the question by looking at the technical attributes of the Internet Protocol address, European Union (EU) and U.S. case law, and how the EU's advisory data protection body, the Article 29 Working Party, and some of the world's most influential information and communication technology (ICT) companies consider the IP address. The notion of contextual integrity is then used to show that information privacy regulation must stipulate concrete technical mandates instead of guiding principles, contrary to the ideal of technology neutrality in Internet regulation.  相似文献   

20.
Anonymity versus commitment: The dangers of education on the internet   总被引:1,自引:1,他引:0  
I shall translate Kierkegaard's account of the dangers and opportunities of what he called the Press into a critique of the Internet so as to raise the question: what contribution -- for good or ill -- can the World Wide Web, with its ability to deliver vast amounts of information to users all over the world, make to educators trying to pass on knowledge and to develop skills and wisdom in their students? I will then use Kierkegaard's three-stage answer to the problem of lack of involvement posed by the Press -- his claim that to have a meaningful life the learner must pass through the aesthetic, the ethical and the religious spheres of existence -- to suggest that only the first two stages -- the aesthetic and the ethical -- can be implemented with Information Technology, while the final stage, which alone makes meaningful learning possible, is undermined rather than supported by the tendencies of the desituated and anonymous Net.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号