首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We argue that a command and control system can undermine a commander’s moral agency if it causes him/her to process information in a purely syntactic manner, or if it precludes him/her from ascertaining the truth of that information. Our case is based on the resemblance between a commander’s circumstances and the protagonist in Searle’s Chinese Room, together with a careful reading of Aristotle’s notions of ‘compulsory’ and ‘ignorance’. We further substantiate our case by considering the Vincennes Incident, when the crew of a warship mistakenly shot down a civilian airliner. To support a combat commander’s moral agency, designers should strive for systems that help commanders and command teams to think and manipulate information at the level of meaning. ‘Down conversions’ of information from meaning to symbols must be adequately recovered by ‘up conversions’, and commanders must be able to check that their sensors are working and are being used correctly. Meanwhile ethicists should establish a mechanism that tracks the potential moral implications of choices in a system’s design and intended operation. Finally we highlight a gap in normative ethics, in that we have ways to deny moral agency, but not to affirm it.  相似文献   

2.
Smartphones and mobile applications are omnipresent in our lives. At the core of this article are ‘other-tracking apps’, i.e. mobile applications that make it possible, via location technology, to track others. These apps ensure that we are never unconnected from the network of ubiquitous information and, via that network, from others. In specific, focus lies on apps designed for parents to remotely track the whereabouts of their child(ren). This particular case can be considered as one example of broader reflection on what continuous technical connectivity means in moral terms. Other-tracking apps give new ground to moral queries related to information technologies. Even though there is little doubt that parents might implement these technologies with good intention to extend care and responsibility over a distance, our concern is that they mistake control for care. This article seeks to demonstrate that a critical stance towards other-tracking by parents is required, because these apps raise a number of concerns that should be recognized as they are implemented. A number of moral critiques are expressed and discussed. These apps have the potential to engender a situation of ‘over-proximity’. A framework is hence required that emphasizes maintaining the critical distance to respect the other’s heterogeneity, autonomy, and privacy.  相似文献   

3.
This paper raises three objections to the argument presented by Ostritsch in The amoralist challenge to gaming and the gamer’s moral obligation, in which the amoralist’s mantra “it’s just a game” is viewed as an illegitimate rebuttal of all moral objections to (typically violent) video games. The first objection focuses on Ostritsch’s ‘strong sense’ of player enjoyment, which I argue is too crude, given the moral work it is meant to be doing. Next, I question the legitimacy of Ostritsch’s claim that certain video games are immoral. I examine what is involved in making this claim and what would be required for a normative position to be established: none of which is addressed by Ostritsch. Finally, I challenge the legitimacy of his claim that players are obliged not to play certain video games in certain ways (i.e., games endorsing immorality as ‘fun games’). I distinguish between immoral and suberogatory actions, arguing that the latter is in fact more applicable to cases Ostritsch has in mind, and that one is not obliged not to engage in these actions.  相似文献   

4.
Floridi and Sanders, seminal work, “On the morality of artificial agents” has catalyzed attention around the moral status of computer systems that perform tasks for humans, effectively acting as “artificial agents.” Floridi and Sanders argue that the class of entities considered moral agents can be expanded to include computers if we adopt the appropriate level of abstraction. In this paper we argue that the move to distinguish levels of abstraction is far from decisive on this issue. We also argue that adopting certain levels of abstraction out of context can be dangerous when the level of abstraction obscures the humans who constitute computer systems. We arrive at this critique of Floridi and Sanders by examining the debate over the moral status of computer systems using the notion of interpretive flexibility. We frame the debate as a struggle over the meaning and significance of computer systems that behave independently, and not as a debate about the ‘true’ status of autonomous systems. Our analysis leads to the conclusion that while levels of abstraction are useful for particular purposes, when it comes to agency and responsibility, computer systems should be conceptualized and identified in ways that keep them tethered to the humans who create and deploy them.  相似文献   

5.
Can we build ‘moral robots’? If morality depends on emotions, the answer seems negative. Current robots do not meet standard necessary conditions for having emotions: they lack consciousness, mental states, and feelings. Moreover, it is not even clear how we might ever establish whether robots satisfy these conditions. Thus, at most, robots could be programmed to follow rules, but it would seem that such ‘psychopathic’ robots would be dangerous since they would lack full moral agency. However, I will argue that in the future we might nevertheless be able to build quasi-moral robots that can learn to create the appearance of emotions and the appearance of being fully moral. I will also argue that this way of drawing robots into our social-moral world is less problematic than it might first seem, since human morality also relies on such appearances.  相似文献   

6.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

7.
The findings of our experiments showed that social network sites (SNSs) such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her contextual integrity framework in order to answer the question of whether or not an online user’s privacy is being violated by this practice.  相似文献   

8.
课程思政作为当前高校思想政治工作的新重点,充分体现了高校立德树人的根本目标。然而,专业课程都有各自的特点,课程思政的建设需要根据不同专业、不同课程的具体实际去探索。财政学作为一门社会科学,应该与时俱进、适应中国的发展现状。因此,亟须建立和完善中国特色社会主义财政学,使其能更好地指引我国财政改革;亟须将社会主义核心价值观贯穿在课程教学中;也亟须解决财政学课程内容与思政内容无缝融合的问题。该文将结合财政学课程特点以及对课程思政的教育教学实践,提出财政学课程思政内容嵌入的设计方案以及课程思政内容嵌入的路径。  相似文献   

9.
《普罗米修斯》2012,30(2):288-289
Despite a dramatic growth in interest in technology over the last two decades, this has not resulted in a clear understanding of either the nature of technological change or the basis for its regulation. Part of the problem is the ambiguous heritage of science, technology and society studies which rose to prominence in the 1970s. This paper seeks to provide a theoretical scheme for categorising the commonly used models of technological change: to outline the limitations of ‘technocratic’ and ‘technophobic’ approaches to technology and social development and argue for the superiority of an explicitly ‘technochoice’ approach; and to discuss the dominant models for the public control of technology.  相似文献   

10.
In a recent and provocative essay, Christopher Bartel attempts to resolve the gamer’s dilemma. The dilemma, formulated by Morgan Luck, goes as follows: there is no principled distinction between virtual murder and virtual pedophilia. So, we’ll have to give up either our intuition that virtual murder is morally permissible—seemingly leaving us over-moralizing our gameplay—or our intuition that acts of virtual pedophilia are morally troubling—seemingly leaving us under-moralizing our game play. Bartel’s attempted resolution relies on establishing the following three theses: (1) virtual pedophilia is child pornography, (2) the consumption of child pornography is morally wrong, and (3) virtual murder is not murder. Relying on Michael Rea’s definition of pornography, I argue that we should reject thesis one, but since Bartel’s moral argument in thesis two does not actually rely thesis one that his resolution is not thereby undermined. Still, even if we grant that there are adequate resources internal to Bartel’s account to technically resolve the gamer’s dilemma his reasoning is still unsatisfying. This is so because Bartel follows Neil Levy in arguing that virtual pedophilia is wrong because it harms women. While I grant Levy’s account, I argue that this is the wrong kind of reason to resolve the gamer’s dilemma because it is indirect. What we want is to know what is wrong with virtual child pornography itself. Finally, I suggest alternate moral resources for resolving the gamer’s dilemma that are direct in a way that Bartel’s resources are not.  相似文献   

11.
基于扩展的引力模型,利用2009~2013年我国30个省区面板数据,对我国跨区域技术转移边界效应进行测度并分析其影响因素。实证结果表明:我国省际技术转移边界效应较大,技术转移本地偏好性强;提高区域"技术创新质量"和加强知识产权保护对省际技术转移有显著促进作用;地理距离、产业"距离"和文化"距离"对边界效应具有较强的解释力,同时经济规模、产业和文化上存在的差异能够调节由于地理距离造成的跨区域技术转移边界效应。  相似文献   

12.
张豪 《科教文汇》2014,(3):205-206
建设一支听党指挥、能打胜仗、作风优良的人民军队,这是党在新形势下提出的强军目标。国防生是我国国防的重要后备力量,是我军军官的主要来源之一.其战斗精神的强弱对能否顺利实现强军目标具有重要影响。本文试从心理学的角度提出几点国防生战斗力精神培育的途径。  相似文献   

13.
近年来,参与实验作为STS中新出现的研究方法受到了广泛的关注。在方法层面,参与实验吸收了行动者-网络理论(ANT)等研究成果对实践的关注,挑战了现有公众参与科学模式囿于议程、代表权、共识等概念的困境,将公众参与科学引向对日常活动中物质实践的定制和分析。在理论层面,参与实验区分了ANT、存在论政治学等“经验化”存在论方案,试图在STS中建立一种“实验化”的存在论方案。“实验化”研究突破了“经验化”研究的方法论框架,但其存在论地位仍显模糊。本研究讨论了德勒兹与拉图尔对伦理问题的不同思考,指出了两者在伦理学上不同的存在论立场可以成为解释“实验化”和“经验化”之间对立根源的思想线索。在此思想线索的基础上,诉诸“遭遇中的生成”将为“实验化”存在论方案提供一条区分于“经验化”的立足之途,从而为在“公众参与科学”中促发更多具备可行性的实践方案提供一种可能的理论前提。  相似文献   

14.
《Research Policy》2022,51(3):104410
In the most prestigious journals of many disciplines, female researchers are underrepresented. To better understand this phenomenon, we compare the proportions of female authors in all leading management and organization studies (MOS) journals, explore underlying gendered publication patterns, and analyze factors explaining differences between journals. We examine the gendered distribution of authorship in these journals using a complete, original time series. The comprehensive data set includes all articles published in fourteen leading journals in the MOS field, comprising 77,472 cases (authors) and 43,673 articles. The findings show that women have been underrepresented in all leading MOS journals until now. However, our findings reveal significant differences between journals, with some journals lagging far behind their peers. We ask why some journals score much higher than others and show that gendered authorship constellations and research topic specialization consistently explain female representation differences between journals. More specifically, we find a dominance of ‘men's clubs’ when it comes to authorship constellations and thriving ‘male islands’ when it comes to research topics. In contrast, ‘women's clubs’ are far less prevalent and no ‘female island’ exists. Interestingly, female authorship and ‘shared islands’ play a particularly powerful role in narrowing the gender gap in leading journals. Our results provide a benchmark for female representation across leading journals and allow for the formulation of concrete research policy goals and directions for change.  相似文献   

15.
16.
王雪珠 《科教文汇》2012,(5):155-156
党建工作是学校德育工作的重要组成部分,是提高师生思想觉悟和道德水平的关键。当前,我国高等职业艺术院校党建工作存在一些问题。这些问题表现为党组织生活受到忽视、党员对党的认识比较薄弱、学生党支部干部的先进性不足以及存在一定的金钱主义和享乐主义。针对这种情况,学校应该采取积极措施提高学生的思想认识水平。这些措施包括完善党组织建设、加强党员教育、提倡和践行社会主义价值观、重视和提高非党员的思想认识水平和寓思想教育于专业教育之中。  相似文献   

17.
This paper illustrates the overlap of computer ethics and business ethics by examining two issues. The first is the lack of fit between digitalized information and copyright protection. Although there are moral arguments that can be used to justify protection of intellectual property, including computer software and digitalized data, the way that copyright protection has developed often reflects vested interests rather than the considered weighing of moral considerations. As a result, with respect to downloading MP3s, among other material, what is ethical is largely determined by the appropriately passed laws in each jurisdiction, and what is ethically permissible in one jurisdiction may be ethically impermissible in another. The second issue is the outsourcing of IT jobs from the U.S. While the practice has been politicized, examining it from an all-things-considered perspective, this paper argues it is ethically justified.I wrote this while I was a Resident at the Rockefeller Foundation Bellagio Study and Conference Center and I am pleased to acknowledge the support of the Foundation. I gave an abridged version of this paper at the Third World Congress of Business, Economics and Ethics in Melbourne, Australia, in July, 2004.  相似文献   

18.
19.
Over the past decade Identity Management has become a central theme in information technology, policy, and administration in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains. Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens, and customers, there is a growing demand for systems that enable the regulation of rights, duties, responsibilities, entitlements and access of innumerable people simultaneously. ‘Identity Management’ or ‘Identity Management Systems’ have become important headings under which such systems are designed and implemented. But there is another meaning of the term ‘identity management’, which is clearly related and which has gained currency. This second construal refers to the need to manage our moral identities and our identity related information. This paper explores the relation between the management of our (moral) identities and ‘Identity Management’ as conceptualized in IT discourse.  相似文献   

20.
The morality of virtual representations and the enactment of prohibited activities within single-player gamespace (e.g., murder, rape, paedophilia) continues to be debated and, to date, a consensus is not forthcoming. Various moral arguments have been presented (e.g., virtue theory and utilitarianism) to support the moral prohibition of virtual enactments, but their applicability to gamespace is questioned. In this paper, I adopt a meta-ethical approach to moral utterances about virtual representations, and ask what it means when one declares that a virtual interaction ‘is morally wrong’. In response, I present constructive ecumenical expressivism to (i) explain what moral utterances should be taken to mean, (ii) argue that they mean the same when referring to virtual and non-virtual interactions and (iii), given (ii), explain why consensus with regard to virtual murder, rape and paedophilia is not forthcoming even though such consensus is readily found with regard to their non-virtual equivalents.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号