Results for ' Management of Computing and Information Systems'

1000+ found
Order:
  1.  19
    Bibliometric mapping of computer and information ethics.Richard Heersmink, Jeroen den Hoven, Nees Eck & Jan den Berg - 2011 - Ethics and Information Technology 13 (3):241-249.
    This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology concepts on the one hand and ethical concepts on the other hand. To produce the term map, a data set of over (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  2.  18
    Computers and the nature of farm management.Ulrich Nitsch - 1990 - Knowledge, Technology & Policy 3 (3):67-75.
    The introduction of computer-based information systems to be used by farmers, as in many other fields, is preceded mostly by great expectations. Some persons even tend to think that eventually the computer might take over farm management. This article tries to make an assessment of the validity of such expectations. Based upon a study among Swedish farmers, it examines the nature of farmers' decision-making. The latter is based upon an adaptive rationality, as opposed to the normative models (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  59
    The relationship between the uniqueness of computer ethics and its independence as a discipline in applied ethics.Kenneth Einar Himma - 2003 - Ethics and Information Technology 5 (4):225-237.
    A number of different uniquenessclaims have been made about computer ethics inorder to justify characterizing it as adistinct subdiscipline of applied ethics. Iconsider several different interpretations ofthese claims and argue, first, that none areplausible and, second, that none provideadequate justification for characterizingcomputer ethics as a distinct subdiscipline ofapplied ethics. Even so, I argue that computerethics shares certain important characteristicswith medical ethics that justifies treatingboth as separate subdisciplines of appliedethics.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  4.  28
    Information systems ethics – challenges and opportunities.Simon Rogerson, Keith W. Miller, Jenifer Sunrise Winter & David Larson - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):87-97.
    Purpose The purpose of this paper is to explore the ethical issues surrounding information systems practice with a view to encouraging greater involvement in this aspect of IS research. Information integrity relies upon the development and operation of computer-based information systems. Those who undertake the planning, development and operation of these information systems have obligations to assure information integrity and overall to contribute to the public good. This ethical dimension of information (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  21
    Customer relationship management information systems (CRM‐IS) and the realisation of moral agency.Christopher Bull & Alison Adam - 2010 - Journal of Information, Communication and Ethics in Society 8 (2):164-177.
    PurposeThe purpose of this paper is to examine how the design of characteristics and use of practices incorporated in customer relationship management information systems (CRM‐IS) impact on the expression and realisation of moral agency within organisations.Design/methodology/approachThe paper draws on the findings from an in‐depth UK case study of a CRM‐IS implementation.FindingsThe paper finds that some characteristics and practices within CRM‐IS can restrict the expression and realisation of moral agency in organisational life, resulting in a number of problems. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6. Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   116 citations  
  7.  27
    Ethics, computing and medicine. Informatics and the transformation of health care. Kenneth W. Goodman, editor.Marian Verkerk - 1999 - Ethics and Information Technology 1 (4):303-304.
  8. Computer systems and responsibility: A normative look at technological complexity.Deborah G. Johnson & Thomas M. Powers - 2005 - Ethics and Information Technology 7 (2):99-107.
    In this paper, we focus attention on the role of computer system complexity in ascribing responsibility. We begin by introducing the notion of technological moral action (TMA). TMA is carried out by the combination of a computer system user, a system designer (developers, programmers, and testers), and a computer system (hardware and software). We discuss three sometimes overlapping types of responsibility: causal responsibility, moral responsibility, and role responsibility. Our analysis is informed by the well-known accounts provided by Hart and Hart (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  9.  48
    Refining the ethics of computer-made decisions: a classification of moral mediation by ubiquitous machines.Marlies Van de Voort, Wolter Pieters & Luca Consoli - 2015 - Ethics and Information Technology 17 (1):41-56.
    In the past decades, computers have become more and more involved in society by the rise of ubiquitous systems, increasing the number of interactions between humans and IT systems. At the same time, the technology itself is getting more complex, enabling devices to act in a way that previously only humans could, based on developments in the fields of both robotics and artificial intelligence. This results in a situation in which many autonomous, intelligent and context-aware systems are (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  10.  26
    The concept of information overload: A preliminary step in understanding the nature of a harmful information-related condition.Kenneth Einar Himma - 2007 - Ethics and Information Technology 9 (4):259-272.
    The amount of content, both on and offline, to which people in reasonably affluent nations have access has increased to the point that it has raised concerns that we are now suffering from a harmful condition of ‹information overload.’ Although the phrase is being used more frequently, the concept is not yet well understood – beyond expressing the rather basic idea of having access to more information than is good for us. This essay attempts to provide a philosophical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  11. Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  12.  50
    Information technology and the management of knowledge.Henrik Sinding-Larsen - 1987 - AI and Society 1 (2):93-101.
    The social sciences lack concepts and theories for an understanding of what new information technology is doing to our society. The article sketches the outlines of a broad historical and comparative approach to this issue: ‘an anthropology of information technology’. At the base is the idea ofexternalisation of knowledge as a historical process. Three main epochs are characterised by externalisation of knowledge through a) spoken language and a social organisation of specialists, b) writing and c) computer programming. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13. The ethics of representation and action in virtual reality.Philip Brey - 1999 - Ethics and Information Technology 1 (1):5-14.
    This essay addresses ethical aspects of the design and use of virtual reality (VR) systems, focusing on the behavioral options made available in such systems and the manner in which reality is represented or simulated in them. An assessment is made of the morality of immoral behavior in virtual reality, and of the virtual modeling of such behavior. Thereafter, the ethical aspects of misrepresentation and biased representation in VR applications are discussed.
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  14.  75
    Human values and the design of computer technology, edited by batya Friedman.John M. Artz - 1999 - Ethics and Information Technology 1 (4):305-306.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  15.  18
    Formalizing the Dynamics of Information.Martina Faller, Stefan C. Kaufmann, Marc Pauly & Center for the Study of Language and Information S.) - 2000 - Center for the Study of Language and Information Publications.
    The papers collected in this volume exemplify some of the trends in current approaches to logic, language and computation. Written by authors with varied academic backgrounds, the contributions are intended for an interdisciplinary audience. The first part of this volume addresses issues relevant for multi-agent systems: reasoning with incomplete information, reasoning about knowledge and beliefs, and reasoning about games. Proofs as formal objects form the subject of Part II. Topics covered include: contributions on logical frameworks, linear logic, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  16.  35
    Proactive management of distributed organisational computing: Prevention always pays, doesn't it? [REVIEW]Lauri Forsman - 1998 - AI and Society 12 (4):328-345.
    Organisations have eagerly adopted the new opportunities provided by distributed computing technology. These opportunities have also created new dependency on the technology and threats of technical problems. Information technology (IT) management has to choose its position towards these new technical risks. Should the problems be prevented proactively in advance or settled reactively afterwards?This paper draws conclusions from an action research case study aimed at proactive versus reactive end-user support. Between 1994 and 1997 one of the business units (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  17.  9
    Optimization of the Marketing Management System Based on Cloud Computing and Big Data.Lin Zhang - 2021 - Complexity 2021:1-10.
    With the rapid development of the Internet information age, social networks, mobile Internet, and e-commerce have expanded the scope of Internet applications. The “big data” era is a challenge and chance for companies and has a great impact on social economy, politics, culture, and people’s lives. An accurate marketing system is developed based on J2EE, and the architecture is selected from the user layer, business logic layer, and data layer and the B/S3 layer application, including three layers of crip-dm (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  48
    Autonomous weapons systems and the moral equality of combatants.Michael Skerker, Duncan Purves & Ryan Jenkins - 2020 - Ethics and Information Technology 22 (3):197-209.
    To many, the idea of autonomous weapons systems (AWS) killing human beings is grotesque. Yet critics have had difficulty explaining why it should make a significant moral difference if a human combatant is killed by an AWS as opposed to being killed by a human combatant. The purpose of this paper is to explore the roots of various deontological concerns with AWS and to consider whether these concerns are distinct from any concerns that also apply to long-distance, human-guided weaponry. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  19.  51
    The ethical decision-making processes of information systems workers.David B. Paradice & Roy M. Dejoie - 1991 - Journal of Business Ethics 10 (1):1 - 21.
    An empirical investigation was conducted to determine whether management information systems (MIS) majors, on average, exhibit ethical decision-making processes that differ from students in other functional business areas. The research also examined whether the existence of a computer-based information system in an ethical dilemma influences ethical desision-making processes. Although student subjects were used, the research instrument has been highly correlated with educational levels attained by adult subjects in similar studies. Thus, we feel that our results have (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  20.  21
    The landscape of data and AI documentation approaches in the European policy context.Josep Soler-Garrido, Blagoj Delipetrev, Isabelle Hupont & Marina Micheli - 2023 - Ethics and Information Technology 25 (4):1-21.
    Nowadays, Artificial Intelligence (AI) is present in all sectors of the economy. Consequently, both data-the raw material used to build AI systems- and AI have an unprecedented impact on society and there is a need to ensure that they work for its benefit. For this reason, the European Union has put data and trustworthy AI at the center of recent legislative initiatives. An important element in these regulations is transparency, understood as the provision of information to relevant stakeholders (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  22.  34
    A comparison of experts' and high tech students' ethical beliefs in computer-related situations.Susan Athey - 1993 - Journal of Business Ethics 12 (5):359 - 370.
    Sixty-five computer science and computer information systems students were surveyed to ascertain their ethical beliefs on seven scenarios and nineteen ethical problems. All seven scenarios incorporated computer-related problems facing programmers and managers in the high tech world. Hypotheses were tested for significant differences between the students'' beliefs and the beliefs of experts in the field who responded to the same scenarios. The first two hypothesis tested whether female and male high tech students have the same ethical beliefs as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  23.  56
    Lyotard’s postmodern ethics and information technology.A. T. Nuyen - 2004 - Ethics and Information Technology 6 (3):185-191.
  24.  31
    Karl Jaspers and artificial neural nets: on the relation of explaining and understanding artificial intelligence in medicine.Christopher Poppe & Georg Starke - 2022 - Ethics and Information Technology 24 (3):1-10.
    Assistive systems based on Artificial Intelligence (AI) are bound to reshape decision-making in all areas of society. One of the most intricate challenges arising from their implementation in high-stakes environments such as medicine concerns their frequently unsatisfying levels of explainability, especially in the guise of the so-called black-box problem: highly successful models based on deep learning seem to be inherently opaque, resisting comprehensive explanations. This may explain why some scholars claim that research should focus on rendering AI systems (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Editorial introduction – ethics of new information technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  45
    Against the moral Turing test: accountable design and the moral reasoning of autonomous systems.Thomas Arnold & Matthias Scheutz - 2016 - Ethics and Information Technology 18 (2):103-115.
    This paper argues against the moral Turing test as a framework for evaluating the moral performance of autonomous systems. Though the term has been carefully introduced, considered, and cautioned about in previous discussions :251–261, 2000; Allen and Wallach 2009), it has lingered on as a touchstone for developing computational approaches to moral reasoning :98–109, 2015). While these efforts have not led to the detailed development of an MTT, they nonetheless retain the idea to discuss what kinds of action and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  27. Patiency is not a virtue: the design of intelligent systems and systems of ethics.Joanna J. Bryson - 2018 - Ethics and Information Technology 20 (1):15-26.
    The question of whether AI systems such as robots can or should be afforded moral agency or patiency is not one amenable either to discovery or simple reasoning, because we as societies constantly reconstruct our artefacts, including our ethical systems. Consequently, the place of AI systems in society is a matter of normative, not descriptive ethics. Here I start from a functionalist assumption, that ethics is the set of behaviour that maintains a society. This assumption allows me (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   43 citations  
  28.  15
    Management of knowledge and competence through human resource information system—A structured review.Khalid Rasheed Memon, Bilqees Ghani, Syed Irfan Hyder, Heesup Han, Muhammad Zada, Antonio Ariza-Montes & Marcelo Arraño-Muñoz - 2022 - Frontiers in Psychology 13.
    The fourth industrial revolution will be ushered in by future high technology, and as a result, the world will face new difficulties relating to people, the environment, and profitability. Accordingly, the competitive edge and long-term viability of businesses would depend on the knowledge workers who could overcome these excruciatingly difficult obstacles and have the knowledge and competency to influence the overall performance of any type of company. But managing knowledge workers falls under the purview of human resources, and only effective (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  28
    Who is controlling whom? Reframing “meaningful human control” of AI systems in security.Pascal Vörös, Serhiy Kandul, Thomas Burri & Markus Christen - 2023 - Ethics and Information Technology 25 (1):1-7.
    Decisions in security contexts, including armed conflict, law enforcement, and disaster relief, often need to be taken under circumstances of limited information, stress, and time pressure. Since AI systems are capable of providing a certain amount of relief in such contexts, such systems will become increasingly important, be it as decision-support or decision-making systems. However, given that human life may be at stake in such situations, moral responsibility for such decisions should remain with humans. Hence the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  22
    System and Complex Approach in Management of Modern Education.Raisa B. Kvesko & Svetlana B. Kvesko - 2008 - Proceedings of the Xxii World Congress of Philosophy 37:161-167.
    In the article is examined a problem of system and complex approach to management of modern education. The authors emphasize that development of education technology is accompanied by formation of informational, telecommunicational and communicative systems. The development of informationaltechnologies entails the formation of in principle new educational system. This system can ensure millions of people accordance to new educational services. The use of modern computer, telecommunicational and communicative technologies in education intends re-engineering of educational activities, considerablechanges in all (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  36
    Advancing the ethical use of digital data in human research: challenges and strategies to promote ethical practice.Karin Clark, Matt Duckham, Marilys Guillemin, Assunta Hunter, Jodie McVernon, Christine O’Keefe, Cathy Pitkin, Steven Prawer, Richard Sinnott, Deborah Warr & Jenny Waycott - 2019 - Ethics and Information Technology 21 (1):59-73.
    The proliferation of digital data and internet-based research technologies is transforming the research landscape, and researchers and research ethics communities are struggling to respond to the ethical issues being raised. This paper discusses the findings from a collaborative project that explored emerging ethical issues associated with the expanding use of digital data for research. The project involved consulting with researchers from a broad range of disciplinary fields. These discussions identified five key sets of issues and informed the development of guidelines (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  67
    Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  33.  67
    Identity management in GRID computing and Service Oriented Architectures: research and practice. [REVIEW]Theodora Varvarigou & Vassiliki Andronikou - 2009 - Identity in the Information Society 2 (2):95-98.
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  34.  10
    Matching values to technology: a value sensitive design approach to identify values and use cases of an assistive system for people with dementia in institutional care.Stefan J. Teipel, Antonia Kowe, Doreen Görß & Stefanie Köhler - 2022 - Ethics and Information Technology 24 (3):1-17.
    The number of people with dementia is increasing worldwide. At the same time, family and professional caregivers’ resources are limited. A promising approach to relieve these carers’ burden and assist people with dementia is assistive technology. In order to be useful and accepted, such technologies need to respect the values and needs of their intended users. We applied the value sensitive design approach to identify values and needs of patients with dementia and family and professional caregivers in respect to assistive (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  39
    Recent books and proceedings on ethics and information technology.Herman T. Tavani - 2000 - Ethics and Information Technology 2 (1):77-83.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  36.  20
    Public health measures and the rise of incidental surveillance: Considerations about private informational power and accountability.B. A. Kamphorst & A. Henschke - 2023 - Ethics and Information Technology 25 (4):1-14.
    The public health measures implemented in response to the COVID-19 pandemic have resulted in a substantially increased shared reliance on private infrastructure and digital services in areas such as healthcare, education, retail, and the workplace. This development has (i) granted a number of private actors significant (informational) power, and (ii) given rise to a range of digital surveillance practices incidental to the pandemic itself. In this paper, we reflect on these secondary consequences of the pandemic and observe that, even though (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. A phenomenology and epistemology of large language models: transparency, trust, and trustworthiness.Richard Heersmink, Barend de Rooij, María Jimena Clavel Vázquez & Matteo Colombo - 2024 - Ethics and Information Technology 26 (3):1-15.
    This paper analyses the phenomenology and epistemology of chatbots such as ChatGPT and Bard. The computational architecture underpinning these chatbots are large language models (LLMs), which are generative artificial intelligence (AI) systems trained on a massive dataset of text extracted from the Web. We conceptualise these LLMs as multifunctional computational cognitive artifacts, used for various cognitive tasks such as translating, summarizing, answering questions, information-seeking, and much more. Phenomenologically, LLMs can be experienced as a “quasi-other”; when that happens, users (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  31
    Post-september 11: Computers, ethics and war.Richard T. De George - 2003 - Ethics and Information Technology 5 (4):183-190.
    This paper considers the moralresponsibility of computer scientists withrespect to weapons development in post-911America. It does so by looking at the doctrineof jus in bello as exemplified in fourscenarios. It argues that the traditionaldoctrine should be augmented by a number ofprinciples, including the Principle of aMorally Obligatory Smart Arms Race, thePrinciple of Assistance to One's Enemies, thePrinciple of Public Debate on Weapons of MassDisruption, and the Principle of the MoralUnjustifiability of Private Wars.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  39. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  54
    How to be a responsible slave: Managing the use of expert information systems[REVIEW]Emma Rooksby - 2009 - Ethics and Information Technology 11 (1):81-90.
    Computer ethicists have for some years been troubled by the issue of how to assign moral responsibility for disastrous events involving erroneous information generated by expert information systems. Recently, Jeroen van den Hoven has argued that agents working with expert information systems satisfy the conditions for what he calls epistemic enslavement. Epistemically enslaved agents do not, he argues, have moral responsibility for accidents for which they bear causal responsibility. In this article, I develop two objections (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  20
    Socio-political stability, voter’s emotional expectations, and information management.Vladimir Tsyganov - 2023 - AI and Society 38 (1):269-281.
    The dependence of socio-political stability on the emotional expectations of voters is investigated. For this, a model of a socio-political system consisting of a society of voters and a democratically elected politician is considered. The neuropsychological model of the voter takes into account his emotional expectations. The social stability is guaranteed by the expectations of positive emotions of all voters. Socio-political stability means both the social stability and the re-election of politician. One type of voter is a Progressist who seeks (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  79
    Technology and moral change: the transformation of truth and trust.Henrik Skaug Sætra & John Danaher - 2022 - Ethics and Information Technology 24 (3):1-16.
    Technologies can have profound effects on social moral systems. Is there any way to systematically investigate and anticipate these potential effects? This paper aims to contribute to this emerging field on inquiry through a case study method. It focuses on two core human values—truth and trust—describes their structural properties and conceptualisations, and then considers various mechanisms through which technology is changing and can change our perspective on those values. In brief, the paper argues that technology is transforming these values (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  72
    Reliability of information on the internet: Some distinctions.Anton Vedder & Robert Wachbroit - 2003 - Ethics and Information Technology 5 (4):211-215.
    In this contribution, we identify and clarifysome distinctions we believe are useful inestablishing the reliability of information onthe Internet. We begin by examining some of thesalient features of information that go intothe determination of reliability. In so doing,we argue that we need to distinguish contentand pedigree criteria of reliability and thatwe need to separate issues of reliability ofinformation from the issues of theaccessibility and the usability of information.We then turn to an analysis of some commonfailures to recognize (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  15
    Formal Ontology in Information Systems: Proceedings of the Eighth International Conference.Paweł Garbacz & Oliver Kutz (eds.) - 2014 - IOS Press.
    Formal Ontology in Information Systems is the flagship conference of the International Association for Ontology and its Applications. Its interdisciplinary research focus lies at the intersection of philosophical ontology, linguistics, logic, cognitive science, and computer science, as well as in the applications of ontological analysis to conceptual modeling, knowledge engineering, knowledge management, information-systems development, library and information science, scientific research, and semantic technologies in general.As in previous years, FOIS 2014 was a nexus of interdisciplinary (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  45. An overview of information ethics issues in a world-wide context.Elizabeth A. Buchanan - 1999 - Ethics and Information Technology 1 (3):193-201.
    This article presents an overview of significant issues facing contemporary information professionals. As the world of information continues to grow at unprecedented speed and in unprecedented volume, questions must be faced by information professionals. Will we participate in the worldwide mythology of equal access for all, or will we truly work towards this debatable goal? Will we accept the narrowing of choice for our corresponding increasing diverse clientele? Such questions must be considered in a holistic context and (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  6
    Generation and Management of Electronic Waste in the City of Pune, India.Anwesha Borthakur - 2014 - Bulletin of Science, Technology and Society 34 (1-2):43-52.
    Electronic waste (E-waste) illustrates discarded appliances that utilize electricity for their functioning. It is one of the fastest growing waste streams across the globe. A study on the generation and management of E-waste was conducted in the city of Pune, India, involving four different stakeholders, namely, the information technology (IT) sector, banking sector, educational institutes, and households. All these stakeholders are listed by the Indian Ministry of Environment and Forest as major contributors to the problem of E-waste in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  77
    On crimes and punishments in virtual worlds: bots, the failure of punishment and players as moral entrepreneurs.Stefano De Paoli & Aphra Kerr - 2012 - Ethics and Information Technology 14 (2):73-87.
    This paper focuses on the role of punishment as a critical social mechanism for cheating prevention in MMORPGs. The role of punishment is empirically investigated in a case study of the MMORPG Tibia and by focusing on the use of bots to cheat. We describe the failure of punishment in Tibia, which is perceived by players as one of the elements facilitating the proliferation of bots. In this process some players act as a moral enterprising group contributing to the reform (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  48.  86
    Ethics of generative AI and manipulation: a design-oriented research agenda.Michael Klenk - 2024 - Ethics and Information Technology 26 (1):1-15.
    Generative AI enables automated, effective manipulation at scale. Despite the growing general ethical discussion around generative AI, the specific manipulation risks remain inadequately investigated. This article outlines essential inquiries encompassing conceptual, empirical, and design dimensions of manipulation, pivotal for comprehending and curbing manipulation risks. By highlighting these questions, the article underscores the necessity of an appropriate conceptualisation of manipulation to ensure the responsible development of Generative AI technologies.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  63
    Computers in control: Rational transfer of authority or irresponsible abdication of autonomy? [REVIEW]Arthur Kuflik - 1999 - Ethics and Information Technology 1 (3):173-184.
    To what extent should humans transfer, or abdicate, responsibility to computers? In this paper, I distinguish six different senses of responsible and then consider in which of these senses computers can, and in which they cannot, be said to be responsible for deciding various outcomes. I sort out and explore two different kinds of complaint against putting computers in greater control of our lives: (i) as finite and fallible human beings, there is a limit to how far we can acheive (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  50. Common morality and computing.Bernard Gert - 1999 - Ethics and Information Technology 1 (1):53-60.
    This article shows how common morality can be helpful in clarifying the discussion of ethical issues that arise in computing. Since common morality does not always provide unique answers to moral questions, not all such issues can be resolved, however common morality does provide a clear answer to the question whether one can illegally copy software for a friend.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   9 citations  
1 — 50 / 1000