首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
In the analysis of the ethicalproblems of online research, there is much tobe learned from the work that has already beendone on research ethics in the socialsciences and the humanities. I discuss thestructure of norms in the Norwegian ethicalguidelines for research in the social scienceswith respect to their relevance for the ethicalissues of Internet research. A four-stepprocedure for the ethical evaluation ofresearch is suggested. I argue that eventhough, at one level, the problems of onlineresearch are very similar to those we find intraditional areas of social scientificresearch, there still are some issues that areunique to research online. A general model forthe analysis of privacy and data protection issuggested. This model is then used tocharacterize the special problems pertaining tothe protection of privacy in online contexts,and to argue that one cannot assume a simpledistinction between the private and the publicwhen researching in such contexts.  相似文献   

2.
Most guidelines and proposalsfor Internet research ethics are based onregulations for human subjects research. In therelated research, Internet material is viewedas animate and described as people. Humanitiesresearchers have rarely been a part of thedebate about Internet research ethics and thepractices of these scholars have not been takeninto consideration when drafting most of theguidelines. This threatens to limit the kindsof Internet research that can be performed – critical strategies are particularlydiscouraged – and the ways that researchers andother users understand the Internet.Researchers who use human subjects models havenot fully acknowledged computer mediation, theconstructed aspects of Internetrepresentations, and the screen. If we viewInternet material as cultural production thenthe models for Internet research would be ArtHistory and Visual Culture, English andLiterary Studies, Film and Media Studies, Musicand Sound Studies, and Theatre and PerformanceStudies. A more complete integration of theseapproaches into Internet Studies – either as asole investigatory strategy or in tandem withother forms of inquiry – would changeresearchers' ethical questions. It would alsoshow instances in which human subjectsguidelines do not apply to complex Internetmaterial. It is imperative to demonstrate thatInternet material is not people because thisconception makes highly constructed words andimages seem natural and stereotypedrepresentations appear to be real.  相似文献   

3.
Trust can be understood as a precondition for a well-functioning society or as a way to handle complexities of living in a risk society, but also as a fundamental aspect of human morality. Interactions on the Internet pose some new challenges to issues of trust, especially connected to disembodiedness. Mistrust may be an important obstacle to Internet use, which is problematic as the Internet becomes a significant arena for political, social and commercial activities necessary for full participation in a liberal democracy. The Categorical Imperative lifts up trust as a fundamental component of human ethical virtues – first of all, because deception and coercion, the antitheses of trust, cannot be universalized. Mistrust is, according to Kant, a natural component of human nature, as we are social beings dependent on recognition by others but also prone to deceiving others. Only in true friendships can this tendency be overcome and give room for unconditional trust. Still we can argue that Kant must hold that trustworthy behaviour as well as trust in others is obligatory, as expressions of respect for humanity. The Kantian approach integrates political and ethical aspects of trust, showing that protecting the external activities of citizens is required in order to act morally. This means that security measures, combined with specific regulations are important preconditions for building online trust, providing an environment enabling people to act morally and for trust-based relationships.  相似文献   

4.
There has been increasing attention in sociology and internet studies to the topic of ‘digital remains’: the artefacts users of social network services (SNS) and other online services leave behind when they die. But these artefacts also pose philosophical questions regarding what impact, if any, these artefacts have on the ontological and ethical status of the dead. One increasingly pertinent question concerns whether these artefacts should be preserved, and whether deletion counts as a harm to the deceased user and therefore provides pro tanto reasons against deletion. In this paper, I build on previous work invoking a distinction between persons and selves to argue that SNS offer a particularly significant material instantiation of persons. The experiential transparency of the SNS medium allows for genuine co-presence of SNS users, and also assists in allowing persons (but not selves) to persist as ethical patients in our lifeworld after biological death. Using Blustein’s “rescue from insignificance” argument for duties of remembrance, I argue that this persistence function supplies a nontrivial (if defeasible) obligation not to delete these artefacts. Drawing on Luciano Floridi’s account of “constitutive” information, I further argue that the “digital remains” metaphor is surprisingly apt: these artefacts in fact enjoy a claim to moral regard akin to that of corpses.  相似文献   

5.
In this article I try to show in what sense Emmanuel Levinas’ ‘ethics as first philosophy’ moves our ethical thinking away from what has been called ‘centrist ethics’. Proceeding via depictions of the structure of Levinasian ethics and including references to examples as well as to some empirical research, I try to argue that human beings always already find themselves within an ethical universe, a space of meaning. Critically engaging with the writings of David Gunkel and Lucas Introna, I try to argue that these thinkers, rather than clarifying, distort our ethical understanding of how we stand in relation to artefacts. Drawing a distinction between how pervasive our ethical relationship to other human beings, and living animals, is and how the nature of artefacts is tied to us, I conclude by indicating that the aspiration to give artefacts an ethical face suggests a fantasy to avoid ethical responsibility and generates what I call a ‘compensatory logic’.  相似文献   

6.
Critical research is becoming increasingly accepted as a valid approach to research in information systems. It is deemed to be particularly suitable for situations where researchers want to address conspicuous injustice, such as in areas of development or the digital divide. Critical research in information systems (CRIS), I will argue, is a possible approach to some of the ethical problems arising in the context of information and communication technology (ICT). It can be sensitive to the question of culture and therefore suitable for researching cross-cultural ethical questions in ICT. It is often unclear, however, what exactly critical research stands for and to what extent critical approaches are applicable across cultural boundaries. This paper will address these problems by proposing a definition of critical research as focused on changing the status quo and aiming for emancipation. It will then look at the question whether different cultures are compatible and comparable and what the role of culture in research on information systems is. The paper will then return to the question whether the critical intention to emancipate and empower humans is an expression of cultural imperialism or whether there are valid ways of promoting emancipation across cultural divides.  相似文献   

7.
As social distancing and lockdown orders grew more pervasive, individuals increasingly turned to social media for support, entertainment, and connection to others. We posit that global health emergencies - specifically, the COVID-19 pandemic - change how and what individuals self-disclose on social media. We argue that IS research needs to consider how privacy (self-focused) and social (other-focused) calculus have moved some issues outside in (caused by a shift in what is considered socially appropriate) and others inside out (caused by a shift in what information should be shared for the public good). We identify a series of directions for future research that hold potential for furthering our understanding of online self-disclosure and its factors during health emergencies.  相似文献   

8.
Doing the Right Thing: Ethical Cyberspace Research   总被引:1,自引:0,他引:1  
With increased use of the Internet and other computer-based communications resources, researchers have begun examining interactions in, and uses of, 'cyberspace.' In considering ways to conduct ethical cyberspace research, some have looked to guidelines in their own disciplines. A potentially useful ethics statement for social science researchers to consider is that of the Association of Computing Machinery. Keeping in mind some of the ACM guidelines, as well as the similarities and differences between cyberspace and other communications media, may help researchers to be aware of their ethical responsibilities in conducting their research. The ACM guidelines, especially in consideration with other communications media, help remind researchers of the technological environment within which the social interactions being studied take place.  相似文献   

9.
Online social networking has received increasing attention as a new phenomenon among online users. As Internet users utilize online social networking websites as a useful communication tool to maintain their social networks, this study explorers online social networking websites users’ knowledge sharing in particular. This study investigated the factors which influence knowledge contribution behaviors of social networking website users by sharing through user created contents with one another. By employing a socio-technical approach, this study discussed the roles of social system factors such as ethical culture, social tie, and a sense of belonging in online social network. Additionally, this study examined technical systems factors such as structural assurance of service providers and structural assurance of the Internet. The survey method was utilized in order to empirically test the research model. The research findings and contributions are discussed as well.  相似文献   

10.
This study summarizes prior reviews of new media and Internet research, and the growth of the term Internet in academic publications and online newsgroups. It then uses semantic network analysis to summarize the interests and concepts of an interdisciplinary group of Internet researchers, as represented by session titles and paper titles and abstracts from the 2003 and 2004 Association of Internet Researchers conferences. In both years, the most frequent words appearing in the paper abstracts included Internet, online, community, social, technology, and research. The 2003 papers emphasized topics such as the social analysis/research of online/Internet communication, community, and information, with particular coverage of access, individuals, groups, digital media, culture; role and process in e-organizations; and world development. The 2004 papers emphasized topics such as access; news and social issues; the role of individuals in communities; user-based studies; usage data; and blogs, women, and search policy, among others.  相似文献   

11.
This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.  相似文献   

12.

This study summarizes prior reviews of new media and Internet research, and the growth of the term Internet in academic publications and online newsgroups. It then uses semantic network analysis to summarize the interests and concepts of an interdisciplinary group of Internet researchers, as represented by session titles and paper titles and abstracts from the 2003 and 2004 Association of Internet Researchers conferences. In both years, the most frequent words appearing in the paper abstracts included Internet, online, community, social, technology, and research. The 2003 papers emphasized topics such as the social analysis/research of online/Internet communication, community, and information, with particular coverage of access, individuals, groups, digital media, culture; role and process in e-organizations; and world development. The 2004 papers emphasized topics such as access; news and social issues; the role of individuals in communities; user-based studies; usage data; and blogs, women, and search policy, among others.  相似文献   

13.
Communication researchers and social scientists are quickly discovering the value of data that exists in the postings of members of Internet e-mail, Usenet, and real-time groups. The ability to communicate with one's peers, no matter how esoteric the interests, is causing an explosion in the number of new virtual communities. The interpersonal dynamics of these groups are increasingly coming under the scrutiny of academic research. The publicly available archived records of Internet virtual communities are being analyzed for a wide variety of research interests. The ability to do naturalistic observations of group dynamics, as they are exhibited in these exchanges of text, has captured the attention of many researchers. The institutional review boards of major universities are granting researchers exempt or expedited (exempt from full review) status for this work, due to the public nature of the notes being analyzed. These studies often involve the lack of informed consent, where the group members under study are unaware they are being monitored. There is a potential for psychological harm to the members of these groups, depending on the way results are reported. This article explores the ethical considerations that must be taken into account to protect cyberspace participants. The guidelines proposed are based on the American Psychological Association ethical guidelines for use of human subjects in research. An explanation is offered as to how such guidelines can best be applied to the study of Internet communities. The constructs of Group Accessibility (the public/private nature of the actual cyberspace occupied by a group) and Perceived Privacy (the level of privacy that group members assume they have) are defined and proposed as two dimensions by which individual Internet communities may be evaluated in order to assure the ethical reporting of research findings.  相似文献   

14.
This research focuses specifically on uncertainty and information seeking in a digital environment. In this research we argue that different types of uncertainty are associated with the information seeking process and that, with the proliferation of new and different search tools, sources and channels, uncertainty, positive/desirable or negative/undesirable, continues to be a significant factor in the search process. Users may feel uncertain at any stage of the information search and retrieval process and uncertainty may remain even after completion of the process resulting in what may be called persistent uncertainty. An online questionnaire was used to collect data from users in the higher education sector. There were three parts to the questionnaire focusing on: information seeking activities, information seeking problems, and access to specific information channels or sources. Quantitative analysis was carried out on the data collected through the online questionnaire. A total of 668 responses were returned from the chosen user categories of academic staff, research staff and research students. This research has shown that there are some information seeking activities and information seeking problems that are the most common causes of uncertainty among significant number of users from different disciplines, age, gender, ICT skills, etc. This is also the case with respect to access to and use of specific information sources/channels, although the degrees of uncertainty in relation are relatively small. Possible implications of this study and further research issues are indicated.  相似文献   

15.
Anonymity versus commitment: The dangers of education on the internet   总被引:1,自引:1,他引:0  
I shall translate Kierkegaard's account of the dangers and opportunities of what he called the Press into a critique of the Internet so as to raise the question: what contribution -- for good or ill -- can the World Wide Web, with its ability to deliver vast amounts of information to users all over the world, make to educators trying to pass on knowledge and to develop skills and wisdom in their students? I will then use Kierkegaard's three-stage answer to the problem of lack of involvement posed by the Press -- his claim that to have a meaningful life the learner must pass through the aesthetic, the ethical and the religious spheres of existence -- to suggest that only the first two stages -- the aesthetic and the ethical -- can be implemented with Information Technology, while the final stage, which alone makes meaningful learning possible, is undermined rather than supported by the tendencies of the desituated and anonymous Net.  相似文献   

16.
We begin with our reasons for seeking to bring Kant to bear on contemporary information and computing ethics (ICE). We highlight what each contributor to this special issue draws from Kant and then applies to contemporary matters in ICE. We conclude with a summary of what these chapters individually and collectively tell us about Kant’s continuing relevance to these contemporary matters – specifically, with regard to the issues of building trust online and regulating the Internet; how far discourse contributing to deliberative democracy online may include storytelling and appeals to the emotions; and whether or not search engine algorithms should be made public. We further highlight how certain chapters – especially as they incorporate more recent philosophical traditions such as phenomenology and cognitive psychology – develop a Kantian approach (or at least one that is both inspired by while simultaneously transforming Kant) to ethical issues in ICE, including the ethical implications of the on-going blurring of the border between the real and the virtual; designing software in light of distributed ethical responsibility; and trust-building in e-Science collaborations.  相似文献   

17.
In this paper, I will examine a classof ethical problems that essentially involvescomputers. I will argue that this class of heretoforeunknown ethical problems arise in broadcastcommunication received with a device of some kind, andinvolve what I will call impersonal interaction. Ialso argue that the moral element in such problemslies in a conflict between property rights and freespeech rights. Finally, I will argue that the bestapproach to solving these problems requires thecreation of a new standard protocol for computercommunication rather than laws governing the use ofcomputers.  相似文献   

18.
探讨影响浙江省共同富裕示范区建设的相关主要科技活动的潜在伦理风险。以“互联网+”、生命健康和新材料科学领域代表技术为研究对象,基于Web of Science、PubMed、Scopus、中国知网、万方、维普等数据库筛选出143篇相关中英文文献,梳理、分析和预判其中有关信息资源公平、生物资源公平、公共安全等问题,揭示其中所隐含的人体安全、隐私保护、受试者尊重等伦理风险;基于此,以浙江省数字一体化建设为例,阐析浙江省政府作为元治理者行使三阶治理职能,为多元主体共治提供基础治理平台、促进多元主体参与一二阶治理的实践措施,如建立自纠自查伦理生态、伦理治理信息化平台等,为研判新兴科技共性伦理风险、探索科技伦理治理新模式提供参考。  相似文献   

19.
In this paper, we argue that, under a specific set of circumstances, designing and employing certain kinds of virtual reality (VR) experiences can be unethical. After a general discussion of simulations and their ethical context, we begin our argument by distinguishing between the experiences generated by different media (text, film, computer game simulation, and VR simulation), and argue that VR experiences offer an unprecedented degree of what we call “perspectival fidelity” that prior modes of simulation lack. Additionally, we argue that when VR experiences couple this perspectival fidelity with what we call “context realism,” VR experiences have the ability to produce “virtually real experiences.” We claim that virtually real experiences generate ethical issues for VR technologies that are unique to the medium. Because subjects of these experiences treat them as if they were real, a higher degree of ethical scrutiny should be applied to any VR scenario with the potential to generate virtually real experiences. To mitigate this unique moral hazard, we propose and defend what we call “The Equivalence Principle.” This principle states that “if it would be wrong to allow subjects to have a certain experience in reality, then it would be wrong to allow subjects to have that experience in a virtually real setting.” We argue that such a principle, although limited in scope, should be part of the risk analysis conducted by any Institutional Review Boards, psychologists, empirically oriented philosophers, or game designers who are using VR technology in their work.  相似文献   

20.
Involving the Virtual Subject   总被引:1,自引:1,他引:0  
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号