首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.  相似文献   

2.
This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues, within the transparency practices of nongovernmental organizations (NGOs). Based upon a one-year study of a European NGO, the Italian Association of Blind People, it presents compelling empirical evidence concerning the main ethical, social and economic challenges that NGOs face in the development of more transparent relationships with the public and the related role of ICTs, in particular, the organization’s website. This study shows that, although the attempt to be completely transparent has great ethical value, ICT-enabled information disclosure is limited by privacy and security concerns and by pressure from financial supporters and benefactors and potential NGO competitors who vie for grants and donations. The paper provides some implications and suggestions for managers of NGOs and policy makers.  相似文献   

3.
I explore philosophically the phenomenon of home wireless networks as used to share broadband Internet connections. Because such networks are frequently unsecured, third parties can use them to access the Internet. Here I consider carefully whether this kind of behaviour should be properly called theft. I begin with a brief non-technical introduction to 802.11 wireless networks. Subsequently, I present a four part argument – appealing to the unsecured nature of the networks discussed, entrenched software and hardware behaviours, trespass law, and the openness of ‹public park’ spectrum – suggesting that this kind of behaviour is permissible and should not be construed as theft. Substantively, I conclude that, despite the quite compelling considerations that these arguments bring to bear, this behaviour is theft. Additionally, I draw attention to significant flaws in the design and implementation of wireless technology (specifically in the out-of-the-box configuration for wireless access points and in the wireless connectivity of early versions of Windows XP) that facilitate the intentional and unintentional theft of Internet bandwidth. I suggest some simple mechanisms that could be incorporated into the technology which would serve to remove the ethical ambiguity in its usage by third parties, including adding the ability for a network owner to explicitly mark her network as not for public use,␣and changes to default hardware and software behaviours. I conclude by encouraging increased use of value-sensitive design practices in the development of future wireless technologies.  相似文献   

4.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies we identify two areas where social factors compel software developers to drift away from a global set of rules constituting software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish its vulnerability.  相似文献   

5.
The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions. Currently, however, different practices being put in place in order to enhance the protection of individuals appear to deliberately rely on the use of ‘inaccurate’ personal information. This article explores such practices and tries to assess their potential for privacy protection, giving particular attention to their legal implications and to related ethical issues. Ultimately, it suggests that the use of ‘inaccurate’ data can potentially play a useful role to preserve the informational autonomy of the individual, and that any understandings of privacy or personal data protection that would tend to unduly limit such potential should be critically questioned.  相似文献   

6.
Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal data, towards making transparent and controlling the profiling process by which knowledge is produced from these data. The tendency in intellectual property law to commodify information embedded in software and profiles could counteract this shift to transparency and control. These rights obstruct the access and contestation of the design of the code that impacts one’s personhood. This triggers a political discussion about the public nature of this code and forces us to rethink the relations between property, privacy and personhood in the digital age.  相似文献   

7.
Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer an overview and discussion of the most important ethical issues concerning RFID, and describes and examine some methods of protecting privacy. Norman G. Einspruch serves as a consultant to several high-technology companies, one of which is in the RFID components and systems business.  相似文献   

8.
This paper deals with forms of communication aiming at a better informed public or publics. The main idea is that democratic societies are dependent on toleration of a plurality of publics, and simultaneously there is a need for communication between the different publics. The ethos underlying this assumption is that democracy requires a transcendence of subjective conditions in order for the public(s) to gain legitimacy and recognition of opinions. Validity of opinions presupposes a public aspect that is available through communication. More specifically, the validity in question is obtained through its claim on universality – i.e. the transcendence of purely private subjective conditions. This kind of validity is found in reflective judgment or enlarged thinking, as displayed in Kant’s third critique. In the last part of the paper it is discussed how new information technologies and the internet may contribute positively to facilitate modes of communication that are associated with the particularity at work in reflective thinking. Storytelling technologies and virtual realities are of particular interest in envisaging how this might work.  相似文献   

9.
This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.  相似文献   

10.
Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many of the sites’ privacy issues. Applications, which nearly invisibly shares not just a users’, but a user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship” online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an interface that made the flows of information more transparent to users.  相似文献   

11.
J. van den Hoven suggested to analyse privacy from the perspective of informational justice, whereby he referred to the concept of distributive justice presented by M. Walzer in “Spheres of Justice”. In “privacy as contextual integrity” Helen Nissenbaum did also point to Walzer’s approach of complex equality as well to van den Hoven’s concept. In this article I will analyse the challenges of applying Walzer’s concept to issues of informational privacy. I will also discuss the possibilities of framing privacy from the point of the “art of separation” by looking at the intersection of information infrastructures and institutions.  相似文献   

12.
In this paper we discuss the social and ethical issues that arise as a result of digitization based on six dominant technologies: Internet of Things, robotics, biometrics, persuasive technology, virtual & augmented reality, and digital platforms. We highlight the many developments in the digitizing society that appear to be at odds with six recurring themes revealing from our analysis of the scientific literature on the dominant technologies: privacy, autonomy, security, human dignity, justice, and balance of power. This study shows that the new wave of digitization is putting pressure on these public values. In order to effectively shape the digital society in a socially and ethically responsible way, stakeholders need to have a clear understanding of what such issues might be. Supervision has been developed the most in the areas of privacy and data protection. For other ethical issues concerning digitization such as discrimination, autonomy, human dignity and unequal balance of power, the supervision is not as well organized.  相似文献   

13.
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount of personal information collected. Further, recent developments in computing falling under the heading of social computing have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’ information privacy theory in light of these developments. I will argue that the increasing collection of personal data will not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information privacy theory will continue to be relevant.  相似文献   

14.
探讨影响浙江省共同富裕示范区建设的相关主要科技活动的潜在伦理风险。以“互联网+”、生命健康和新材料科学领域代表技术为研究对象,基于Web of Science、PubMed、Scopus、中国知网、万方、维普等数据库筛选出143篇相关中英文文献,梳理、分析和预判其中有关信息资源公平、生物资源公平、公共安全等问题,揭示其中所隐含的人体安全、隐私保护、受试者尊重等伦理风险;基于此,以浙江省数字一体化建设为例,阐析浙江省政府作为元治理者行使三阶治理职能,为多元主体共治提供基础治理平台、促进多元主体参与一二阶治理的实践措施,如建立自纠自查伦理生态、伦理治理信息化平台等,为研判新兴科技共性伦理风险、探索科技伦理治理新模式提供参考。  相似文献   

15.
Radio Frequency Identification, or RFID, is a technology which has been receiving considerable attention as of late. It is a fairly simple technology involving radio wave communication between a microchip and an electronic reader, in which an identification number stored on the chip is transmitted and processed; it can frequently be found in inventory tracking and access control systems. In this paper, we examine the current uses of RFID, as well as identifying potential future uses of the technology, including item-level tagging, human implants and RFID-chipped passports, while discussing the impacts that each of these uses could potentially have on personal privacy. Possible guidelines for RFID’s use, including Fair Information Principles and the RFID Bill of Rights are then presented, as well as technological solutions to personal privacy problems, such as tag killing and blocker tags, as well as simple aluminum foil shields for passports. It is then claimed, though, that guidelines and technological solutions will be ineffective for privacy protection, and that legislation will be necessary to guard against the threats posed by the RFID. Finally, we present what we believe to be the most important legislative points that must be addressed. Vance Lockton has recently completed the M.Sc. program at the University of British Columbia, majoring in Computer Science. Richard S. Rosenberg is a professor emeritus in the Department of Computer Science at the University of British Columbia; the third edition of his book, “The Social Impact of Computers”, was published by Elsevier Academic Press in 2004.  相似文献   

16.
The tendency towards an increasing integration of the informational web into our daily physical world (in particular in so-called Ambient Intelligent technologies which combine ideas derived from the field of Ubiquitous Computing, Intelligent User Interfaces and Ubiquitous Communication) is likely to make the development of successful profiling and personalization algorithms, like the ones currently used by internet companies such as Amazon, even more important than it is today. I argue that the way in which we experience ourselves necessarily goes through a moment of technical mediation. Because of this algorithmic profiling that thrives on continuous reconfiguration of identification should not be understood as a supplementary process which maps a pre-established identity that exists independently from the profiling practice. In order to clarify how the experience of one’s identity can become affected by such machine-profiling a theoretical exploration of identity is made (including Agamben’s understanding of an apparatus, Ricoeur’s distinction between idem- and ipse-identity, and Stiegler’s notion of a conjunctive–disjunctive relationship towards retentional apparatuses). Although it is clear that no specific predictions about the impact of Ambient Intelligent technologies can be made without taking more particulars into account, the theoretical concepts are used to describe three general scenarios about the way wherein the experience of identity might become affected. To conclude, I argue that the experience of one’s identity may affect whether the cases of unwarranted discrimination resulting from ubiquitous differentiations and identifications within an Ambient Intelligent environment, will become a matter of societal concern.  相似文献   

17.
Information technologies (IT) play a criticalrole in transforming public administration andredefining the role of bureaucracy in ademocratic society. New applications of ITbring great promises for government, but at thesame time raise concerns about administrativepower and its abuse. Using GeographicInformation Systems (GIS) as the centralexample, this paper provides the philosophicalunderpinnings of the role of technology anddiscusses the importance of an ethicaldiscourse in IT for public serviceprofessionals. Such ethical discourse must bebased on upholding the democratic values andpreserving the institutional integrity of ITprofessionals in public office.  相似文献   

18.
This essay describes a new ethical theory that has begun to coalesce from the works of several scholars in the international computer ethics community. I call the new theory ‚Flourishing Ethics’ because of its Aristotelian roots, though it also includes ideas suggestive of Taoism and Buddhism. In spite of its roots in ancient ethical theories, Flourishing Ethics is informed and grounded by recent scientific insights into the nature of living things, human nature and the fundamental nature of the universe – ideas from today’s information theory, astrophysics and genetics. Flourishing Ethics can be divided conveniently into two parts. The first part, which I call ‚Human-Centered FE,’ is focused exclusively upon human beings – their actions, values and characters. The second part, which I call ‚General FE,’ applies to every physical entity in the universe, including humans. Rather than replacing traditional ‚great ethical theories,’ Flourishing Ethics is likely to deepen and broaden our understanding of them.  相似文献   

19.
This paper presents research results regarding a vehicle collision avoidance system that uses a wireless sensor platform and communication based on 802.15.4 standard. The system is comprised of two components: monitoring stationary nodes mounted on the road and mobile nodes installed in vehicles. Signal strength and link quality indicators are evaluated to assist in the sequence identification of vehicles as they approach each other at an intersection. The study shows the feasibility of implementing 802.15.4 standard in wireless sensor network communication to act as a time-critical vehicle warning system that can be used for safety application.  相似文献   

20.
Real friends: how the Internet can foster friendship   总被引:1,自引:0,他引:1  
Dean Cocking and Steve Matthews’ article “Unreal Friends” (Ethics and Information Technology, 2000) argues that the formation of purely mediated friendships via the Internet is impossible. I critique their argument and contend that mediated contexts, including the Internet, can actually promote exceptionally strong friendships according to the very conceptual criteria utilized by Cocking and Matthews. I first argue that offline relationships can be constrictive and insincere, distorting important indicators and dynamics in the formation of close friends. The distance of mediated friendships mitigates this problem by promoting the courage to be candid. Next, I argue that the offline world of largely oral exchanges is often too shallow and hasty to promote deep bonds. The deliberateness of written correspondence acts as a weight to submerge friendships to greater depths and as a brake to enhance attentiveness to and precision about one’s own and one’s friend’s character. Nonetheless, close friendships may fail to develop on the Internet. Insofar as this failure occurs, however, it would be for reasons other than those identified by Cocking and Matthews.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号