Results for 'Ethical uses of software'

1000+ found
Order:
  1. The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  39
    Sequencing Newborns: A Call for Nuanced Use of Genomic Technologies.Josephine Johnston, John D. Lantos, Aaron Goldenberg, Flavia Chen, Erik Parens, Barbara A. Koenig, Members of the Nsight Ethics & Policy Advisory Board - forthcoming - Zygon.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  74
    The freedoms of software and its ethical uses.Samir Chopra & Scott Dexter - 2009 - Ethics and Information Technology 11 (4):287-297.
    The “free” in “free software” refers to a cluster of four specific freedoms identified by the Free Software Definition. The first freedom, termed “Freedom Zero,” intends to protect the right of the user to deploy software in whatever fashion, towards whatever end, he or she sees fit. But software may be used to achieve ethically questionable ends. This highlights a tension in the provision of software freedoms: while the definition explicitly forbids direct restrictions on users’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  22
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  5.  76
    Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  6.  18
    Ethics in the Software Development Process: from Codes of Conduct to Ethical Deliberation.Jan Gogoll, Niina Zuber, Severin Kacianka, Timo Greger, Alexander Pretschner & Julian Nida-Rümelin - 2021 - Philosophy and Technology 34 (4):1085-1108.
    Software systems play an ever more important role in our lives and software engineers and their companies find themselves in a position where they are held responsible for ethical issues that may arise. In this paper, we try to disentangle ethical considerations that can be performed at the level of the software engineer from those that belong in the wider domain of business ethics. The handling of ethical problems that fall into the responsibility of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  25
    The Ethics of Innovation: p2p Software Developers and Designing Substantial Noninfringing Uses Under the Sony Doctrine.Edward Lee - 2005 - Journal of Business Ethics 62 (2):147-162.
    This essay explores the controversy over peer-to-peer (p2p) software, examining the legal and ethical dimensions of allowing software companies to develop p2p technologies. It argues that, under the Supreme Court’s ruling in the Sony betamax case, technology developers must be accorded the freedom to innovate and develop technologies that are capable of substantial noninfringing uses. This doctrine, known as the Sony doctrine, provides an important safe harbor for technological development, including p2p. The safe harbor, however, does (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  8.  14
    Ethical aspects of Dhaka University Tele-medicine System.Ahmed Raihan Abir & Shamima Parvin Lasker - 2016 - Bangladesh Journal of Bioethics 6 (3):30-36.
    To provide basic health care services in rural areas is one of the major challenges for developing countries like Bangladesh because of lack of infrastructures and unavailability of qualified medical doctors in the villages. Telemedicine viewed as a new way of offering health care services that has the potential to overcome this problem. Author is a member of extended group at Dhaka University (DU) which has been developing telemedicine equipment and data acquisition software to promote telemedicine practice in Bangladesh. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  74
    Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy.Kanika Tandon Bhal & Nivedita D. Leekha - 2008 - Journal of Business Ethics 81 (3):635-646.
    The article reports findings of a study conducted to explore the cognitive moral logics used for considering software piracy as ethical or unethical. Since the objective was to elicit the moral logics from the respondents, semi-structured in-depth interviews of 38 software professionals of India were conducted. The content of the interviews was analyzed using the grounded theory framework which does not begin with constructs and their interlinkages and then seek proof instead it begins with an area of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10. Ethics in information technology and software use.Vincent J. Calluzzo & Charles J. Cante - 2004 - Journal of Business Ethics 51 (3):301-312.
    The emerging concern about software piracy and illegal or unauthorized use of information technology and software has been evident in the media and open literature for the last few years. In the course of conducting their academic assignments, the authors began to compare observations from classroom experiences related to ethics in the use of software and information technology and systems. Qualitatively and anecdotally, it appeared that many if not most, students had misconceptions about what represented ethical (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  11.  2
    Ethical Issues in Human Genetics: Genetic Counseling and the Use of Genetic Knowledge.Henry David Aiken, Bruce Hilton, the Life Sciences John E. Fogarty International Center for Advanced Study in the Health Sciences & Ethics Institute of Society - 1973 - Springer.
    "The Bush administration and Congress are in concert on the goal of developing a fleet of unmanned aircraft that can reduce both defense costs and aircrew losses in combat by taking on at least the most dangerous combat missions. Unmanned combat aerial vehicles (UCAVs) will be neither inexpensive enough to be readily expendable nor-- at least in early development-- capable of performing every combat mission alongside or in lieu of manned sorties. Yet the tremendous potential of such systems is widely (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  9
    Ethical and Legal Aspects of Computing: A Professional Perspective from Software Engineering.Gerard O'Regan - 2024 - Springer Nature Switzerland.
    This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering. The author gained exposure to these aspects of computing while working as a software engineer at Motorola in Ireland, where he coordinated the patent programme and worked with several software suppliers. Topics and features: Presents a broad overview of ethics and the law Includes key learning topics, summaries, and review (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  23
    The ethics of disclosing the use of artificial intelligence tools in writing scholarly manuscripts.Mohammad Hosseini, David B. Resnik & Kristi Holmes - 2023 - Research Ethics 19 (4):449-465.
    In this article, we discuss ethical issues related to using and disclosing artificial intelligence (AI) tools, such as ChatGPT and other systems based on large language models (LLMs), to write or edit scholarly manuscripts. Some journals, such as Science, have banned the use of LLMs because of the ethical problems they raise concerning responsible authorship. We argue that this is not a reasonable response to the moral conundrums created by the use of LLMs because bans are unenforceable and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  14.  49
    Unauthorized copying of software: an empirical study of reasons for and against.Mikko T. Siponen & Tero Vartiainen - 2007 - Acm Sigcas Computers and Society 37 (1):30-43.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  15.  70
    The Social Disutility of Software Ownership.David M. Douglas - 2011 - Science and Engineering Ethics 17 (3):485-502.
    Software ownership allows the owner to restrict the distribution of software and to prevent others from reading the software’s source code and building upon it. However, free software is released to users under software licenses that give them the right to read the source code, modify it, reuse it, and distribute the software to others. Proponents of free software such as Richard M. Stallman and Eben Moglen argue that the social disutility of (...) ownership is a sufficient justification for prohibiting it. This social disutility includes the social instability of disregarding laws and agreements covering software use and distribution, inequality of software access, and the inability to help others by sharing software with them. Here I consider these and other social disutility claims against withholding specific software rights from users, in particular, the rights to read the source code, duplicate, distribute, modify, imitate, and reuse portions of the software within new programs. I find that generally while withholding these rights from software users does cause some degree of social disutility, only the rights to duplicate, modify and imitate cannot legitimately be denied to users on this basis. The social disutility of withholding the rights to distribute the software, read its source code and reuse portions of it in new programs is insufficient to prohibit software owners from denying them to users. A compromise between the software owner and user can minimise the social disutility of withholding these particular rights from users. However, the social disutility caused by software patents is sufficient for rejecting such patents as they restrict the methods of reducing social disutility possible with other forms of software ownership. (shrink)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. A bundle of software rights and duties.David M. Douglas - 2011 - Ethics and Information Technology 13 (3):185-197.
    Like the ownership of physical property, the issues computer software ownership raises can be understood as concerns over how various rights and duties over software are shared between owners and users. The powers of software owners are defined in software licenses, the legal agreements defining what users can and cannot do with a particular program. To help clarify how these licenses permit and restrict users’ actions, here I present a conceptual framework of software rights and (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  17.  70
    Global Ethics of Collective Internet Governance: Intrinsic Motivation and Open Source Software.Chong Ju Choi, Sae Won Kim & Shui Yu - 2009 - Journal of Business Ethics 90 (4):523-531.
    The ethical governance of the global Internet is an accelerating global phenomenon. A key paradox of the global Internet is that it allows individual and collective decision making to co-exist with each other. Open source software (OSS) communities are a globally accelerating phenomenon. OSS refers to groups of programs that allow the free use of the software and further the code sharing to the general and corporate users of the software. The combination of private provision and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  62
    The morality of software piracy: A cross-cultural analysis. [REVIEW]W. R. Swinyard, H. Rinne & A. Keng Kau - 1990 - Journal of Business Ethics 9 (8):655 - 664.
    Software piracy is a damaging and important moral issue, which is widely believed to be unchecked in particular areas of the globe. This cross-cultural study examines differences in morality and behavior toward software piracy in Singapore versus the United States, and reviews the cultural histories of Asia versus the United States to explore why these differences occur. The paper is based upon pilot data collected in the U.S. and Singapore, using a tradeoff analysis methodology and analysis. The data (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   57 citations  
  19. Iudicium ex Machinae – The Ethical Challenges of Automated Decision-Making in Criminal Sentencing.Frej Thomsen - 2022 - In Julian Roberts & Jesper Ryberg (eds.), Principled Sentencing and Artificial Intelligence. Oxford University Press.
    Automated decision making for sentencing is the use of a software algorithm to analyse a convicted offender’s case and deliver a sentence. This chapter reviews the moral arguments for and against employing automated decision making for sentencing and finds that its use is in principle morally permissible. Specifically, it argues that well-designed automated decision making for sentencing will better approximate the just sentence than human sentencers. Moreover, it dismisses common concerns about transparency, privacy and bias as unpersuasive or inapplicable. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  6
    Legal and ethical principles governing the use of artificial intelligence in radiology services in South Africa.Irvine Sihlahla, Dusty-Lee Donnelly, Beverley Townsend & Donrich Thaldar - forthcoming - Developing World Bioethics.
    Artificial intelligence (AI) will drastically change the healthcare system. Radiology is one speciality that is most affected as AI algorithms are increasingly used in diagnostic imaging. AI‐enhanced health technologies will, inter alia, increase workflow efficiency, improve diagnostic accuracy, reduce healthcare‐related costs, and help alleviate medical personnel shortages in under‐resourced settings. However, the development of AI‐enhanced technologies in healthcare is fraught with legal, ethical, and human rights concerns. Currently, the use of AI in South African healthcare is not governed by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  63
    Ethical beliefs of chinese consumers in Hong Kong.Andrew Chan, Simon Wong & Paul Leung - 1998 - Journal of Business Ethics 17 (11):1163-1170.
    In recent years, there has been increased awareness of unethical consumer practices in Asian countries. Asian consumers have gained a bad reputation for buying counterfeit products, such as computer software, fashion clothing and watches. In 1993, the estimated losses to US software companies due to Chinese counterfeiting stood at US $322 million (Kohut, 1994). The present study uses a consumer ethics scale developed by Muncy and Vitell (1992) to investigate consumers' ethical judgments from a Chinese perspective. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   61 citations  
  22.  52
    How to Encourage Customers to Use Legal Software.Hung-Chang Chiu, Yi-Ching Hsieh & Mei-Chien Wang - 2008 - Journal of Business Ethics 80 (3):583-595.
    This study attempts to identify customer retention strategies for legal software and discusses their effectiveness for three consumer groups (stayers, dissatisfied switchers, and satisfied switchers). Although previous studies propose several antipirating strategies, they do not discuss how to enhance customer intentions to use legal software, which is crucial for software companies. The authors provide four generic retention strategies developed from both antipiracy and customer loyalty literature. The results indicate lower-pricing, legal, communication, and product strategies all enhance customer (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  12
    Afterlife: the post-research affect and effect of software.Nicolas E. Gold, Ian Lawson & Neil P. Oxtoby - 2023 - Research Ethics 19 (4):433-448.
    Software plays an important role in contemporary research. Aside from its use for administering traditional instruments like surveys and in data analysis, the widespread use of mobile and web apps for social, medical and lifestyle engagement has led to software becoming a research intervention in its own right. For example, it is not unusual to find apps being studied for their utility as interventions in health and social life. Since the software may persist in use beyond the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  71
    Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking.Priscilla M. Regan & Jolene Jesse - 2019 - Ethics and Information Technology 21 (3):167-179.
    With the increase in the costs of providing education and concerns about financial responsibility, heightened consideration of accountability and results, elevated awareness of the range of teacher skills and student learning styles and needs, more focus is being placed on the promises offered by online software and educational technology. One of the most heavily marketed, exciting and controversial applications of edtech involves the varied educational programs to which different students are exposed based on how big data applications have evaluated (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  25.  32
    The use of Human Resource Management Systems in the Saudi market.Bandar Khalaf Alharthey & Amran Rasli - 2012 - Asian Journal of Business Ethics 1 (2):163 - 176.
    Abstract The goal of the study was to investigate the current situation with Human Resources (HR) systems in the Saudi market on the basis of survey conducted among 100 organizations. Their HR and IT experts were to fill out a questionnaire that allowed receiving their expert opinion and make conclusions considering the HR systems usage in this country. In the course of the study, eight hypotheses were investigated and proved: the number of companies’ users of Human Resource Management (HRM) systems (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  26. The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software.Mei-Fang Chen, Ching-Ti Pan & Ming-Chuan Pan - 2009 - Journal of Business Ethics 90 (3):361 - 373.
    Moral issues have been included in the studies of consumer misbehavior research, but little is known about the joint moderating effect of moral intensity and moral judgment on the consumer’s use intention of pirated software. This study aims to understand the consumer’s use intention of pirated software in Taiwan based on the theory of planned behavior (TPB) proposed by Ajzen (Organizational Behavior and Human Decision Processes, 50, 179, 1991). In addition, moral intensity and moral judgment are adopted as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  27.  39
    An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates.Trevor T. Moores - 2008 - Journal of Business Ethics 81 (1):39-51.
    A number of studies have investigated and found a significant relationship among economic wealth, Hofstede’s national culture dimensions, and software piracy rates (SPR). No study, however, has examined the relationship between economic wealth, culture, and the fact that national SPRs have been declining steadily since 1994. Using a larger sample than has previously been available (57 countries), we confirm the expected negative relationship between economic wealth, culture (individualism and masculinity) and levels of software piracy. The rate of decline (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  38
    Ethical assessment of new technologies: a meta‐methodology.Ian Harris, Richard C. Jennings, David Pullinger, Simon Rogerson & Penny Duquenoy - 2011 - Journal of Information, Communication and Ethics in Society 9 (1):49-64.
    The purpose of this paper is to set out a structured meta‐methodology, named DIODE, for the ethical assessment of new and emerging technologies. DIODE has been designed by a mixture of academics, governmental people and commercial practitioners. It is designed to help diverse organisations and individuals conduct ethical assessments of new and emerging technologies. A framework discussion paper was developed for consultation to ensure that DIODE addresses fundamental ethical concerns, has appropriate and manageable scope and is comprehensive (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  29
    The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software.Mei-Fang Chen, Ching-Ti Pan & Ming-Chuan Pan - 2009 - Journal of Business Ethics 90 (3):361-373.
    Moral issues have been included in the studies of consumer misbehavior research, but little is known about the joint moderating effect of moral intensity and moral judgment on the consumer's use intention of pirated software. This study aims to understand the consumer's use intention of pirated software in Taiwan based on the theory of planned behavior proposed by Ajzen. In addition, moral intensity and moral judgment are adopted as a joint moderator to examine their combined influence on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  30. Freedom, emotion, and self-subsistence. Ethics - 1969 - Inquiry: An Interdisciplinary Journal of Philosophy 12 (1-4):66 – 104.
    A set of basic static predicates, 'in itself, 'existing through itself, 'free', and others are taken to be (at least) extensionally equivalent, and some consequences are drawn in Parts A and? of the paper. Part C introduces adequate causation and adequate conceiving as extensionally equivalent. The dynamism or activism of Spinoza is reflected in the reconstruction by equating action with causing, passion (passive emotion) with being caused. The relation between conceiving (understanding) and causing is narrowed down by introducing grasping (λ (...)
     
    Export citation  
     
    Bookmark  
  31.  63
    The ethical challenges of ubiquitous healthcare.Andrew A. Adams & Ian Brown - 2007 - International Review of Information Ethics 8 (12):53-60.
    Ubiquitous healthcare is an emerging area of technology that uses a large number of environmental and patient sensors and actuators to monitor and improve patients' physical and mental condition. Tiny sensors gather data on almost any physiological characteristic that can be used to diagnose health problems. This technology faces some challenging ethical questions, ranging from the small-scale individual issues of trust and efficacy to the societal issues of health and longevity gaps related to economic status. It presents particular (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  32.  46
    Regulation of genomic and biobanking research in Africa: a content analysis of ethics guidelines, policies and procedures from 22 African countries.Jantina de Vries, Syntia Nchangwi Munung, Alice Matimba, Sheryl McCurdy, Odile Ouwe Missi Oukem-Boyer, Ciara Staunton, Aminu Yakubu & Paulina Tindana - 2017 - BMC Medical Ethics 18 (1):1-9.
    The introduction of genomics and biobanking methodologies to the African research context has also introduced novel ways of doing science, based on values of sharing and reuse of data and samples. This shift raises ethical challenges that need to be considered when research is reviewed by ethics committees, relating for instance to broad consent, the feedback of individual genetic findings, and regulation of secondary sample access and use. Yet existing ethics guidelines and regulations in Africa do not successfully regulate (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  33.  51
    Predictors of Usage Intentions of Pirated Software.Ian Phau & James Ng - 2010 - Journal of Business Ethics 94 (1):23-37.
    The purpose of this study is to investigate the salient factors influencing consumers’ attitudes and usage intentions towards pirated software. Using the Theory of Planned Behaviour, this study investigates the relationships between three sets of factors, i.e. personal, social and perceived behavioural control onto attitudes towards pirated software. Through a multiple regression, only personal factors have shown significant relationship with attitudes towards software piracy. Further results from this study have supported that favourable attitudes towards pirated software (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  34.  44
    Ethical Responsibilities of Software Developers in Developing Simulations.William Spees - 2001 - International Journal of Applied Philosophy 15 (1):59-64.
    Recent innovations in computer software development have produced a new breed of pet, AIBO 2, a robotic pet that simulates the behavior of real pets. This paper argues that software developers who create such simulations have ethical responsibilities to product users and to society. The paper concludes with some general ethical guidelines for software developers to follow when engaged in projects involving real-world simulations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35.  9
    Ethical use of artificial intelligence to prevent sudden cardiac death: an interview study of patient perspectives.Marieke A. R. Bak, Georg L. Lindinger, Hanno L. Tan, Jeannette Pols, Dick L. Willems, Ayca Koçar & Menno T. Maris - 2024 - BMC Medical Ethics 25 (1):1-15.
    BackgroundThe emergence of artificial intelligence (AI) in medicine has prompted the development of numerous ethical guidelines, while the involvement of patients in the creation of these documents lags behind. As part of the European PROFID project we explore patient perspectives on the ethical implications of AI in care for patients at increased risk of sudden cardiac death (SCD).AimExplore perspectives of patients on the ethical use of AI, particularly in clinical decision-making regarding the implantation of an implantable cardioverter-defibrillator (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  53
    Big Brain Data: On the Responsible Use of Brain Data from Clinical and Consumer-Directed Neurotechnological Devices.Philipp Kellmeyer - 2018 - Neuroethics 14 (1):83-98.
    The focus of this paper are the ethical, legal and social challenges for ensuring the responsible use of “big brain data”—the recording, collection and analysis of individuals’ brain data on a large scale with clinical and consumer-directed neurotechnological devices. First, I highlight the benefits of big data and machine learning analytics in neuroscience for basic and translational research. Then, I describe some of the technological, social and psychological barriers for securing brain data from unwarranted access. In this context, I (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  37.  85
    Considerations in ethical decision-making and software piracy.Suzanne C. Wagner & G. Lawrence Sanders - 2001 - Journal of Business Ethics 29 (1-2):161 - 167.
    Individuals are faced with the many opportunities to pirate. The decision to pirate or not may be related to an individual''s attitudes toward other ethical issues. A person''s ethical and moral predispositions and the judgments that they use to make decisions may be consistent across various ethical dilemmas and may indicate their likelihood to pirate software. This paper investigates the relationship between religion and a theoretical ethical decision making process that an individual uses when (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   37 citations  
  38.  41
    Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  39.  19
    Kenyan health stakeholder views on individual consent, general notification and governance processes for the re-use of hospital inpatient data to support learning on healthcare systems.Daniel Mbuthia, Sassy Molyneux, Maureen Njue, Salim Mwalukore & Vicki Marsh - 2019 - BMC Medical Ethics 20 (1):3.
    Increasing adoption of electronic health records in hospitals provides new opportunities for patient data to support public health advances. Such learning healthcare models have generated ethical debate in high-income countries, including on the role of patient and public consent and engagement. Increasing use of electronic health records in low-middle income countries offers important potential to fast-track healthcare improvements in these settings, where a disproportionate burden of global morbidity occurs. Core ethical issues have been raised around the role and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  23
    Application of the rapid ethical assessment approach to enhance the ethical conduct of longitudinal population based female cancer research in an urban setting in Ethiopia.Alem Gebremariam, Alemayehu Worku Yalew, Selamawit Hirpa, Abigiya Wondimagegnehu, Mirgissa Kaba, Mathewos Assefa, Israel Mitiku, Eva Johanna Kantelhardt, Ahmedin Jemal & Adamu Addissie - 2018 - BMC Medical Ethics 19 (1):87.
    Rapid Ethical Assessment is an approach used to design context tailored consent process for voluntary participation of participants in research including human subjects. There is, however, limited evidence on the design of ethical assessment in studies targeting cancer patients in Ethiopia. REA was conducted to explore factors that influence the informed consent process among female cancer patients recruited for longitudinal research from Addis Ababa Population-based Cancer Registry. Qualitative study employing rapid ethnographic approach was conducted from May–July, 2017, at (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  41.  21
    Comparing software piracy in South Africa and Zambia using social cognitive theory.Andrew Thatcher & Mary Matthews - 2012 - African Journal of Business Ethics 6 (1):1.
  42. The ethics of information transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
    The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   57 citations  
  43.  49
    Ethical Guidelines for Human Embryonic Stem Cell Research (A Recommended Manuscript).Chinese National Human Genome Center at Shanghai Ethics Committee - 2004 - Kennedy Institute of Ethics Journal 14 (1):47-54.
    In lieu of an abstract, here is a brief excerpt of the content:Kennedy Institute of Ethics Journal 14.1 (2004) 47-54 [Access article in PDF] Ethical Guidelines for Human Embryonic Stem Cell Research*(A Recommended Manuscript) Adopted on 16 October 2001Revised on 20 August 2002 Ethics Committee of the Chinese National Human Genome Center at Shanghai, Shanghai 201203 Human embryonic stem cell (ES) research is a great project in the frontier of biomedical science for the twenty-first century. Be- cause the research (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  99
    The ethical use of artificial intelligence in human resource management: a decision-making framework.Sarah Bankins - 2021 - Ethics and Information Technology 23 (4):841-854.
    Artificial intelligence is increasingly inputting into various human resource management functions, such as sourcing job applicants and selecting staff, allocating work, and offering personalized career coaching. While the use of AI for such tasks can offer many benefits, evidence suggests that without careful and deliberate implementation its use also has the potential to generate significant harms. This raises several ethical concerns regarding the appropriateness of AI deployment to domains such as HRM, which directly deal with managing sometimes sensitive aspects (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   35 citations  
  46.  26
    The ethical use of crowdsourcing.Susan Standing & Craig Standing - 2017 - Business Ethics: A European Review 27 (1):72-80.
    Crowdsourcing has attracted increasing attention as a means to enlist online participants in organisational activities. In this paper, we examine crowdsourcing from the perspective of its ethical use in the support of open innovation taking a broader system view of its use. Crowdsourcing has the potential to improve access to knowledge, skills, and creativity in a cost-effective manner but raises a number of ethical dilemmas. The paper discusses the ethical issues related to knowledge exchange, economics, and relational (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  58
    Detection of GPT-4 Generated Text in Higher Education: Combining Academic Judgement and Software to Identify Generative AI Tool Misuse.Mike Perkins, Jasper Roe, Darius Postma, James McGaughran & Don Hickerson - 2024 - Journal of Academic Ethics 22 (1):89-113.
    This study explores the capability of academic staff assisted by the Turnitin Artificial Intelligence (AI) detection tool to identify the use of AI-generated content in university assessments. 22 different experimental submissions were produced using Open AI’s ChatGPT tool, with prompting techniques used to reduce the likelihood of AI detectors identifying AI-generated content. These submissions were marked by 15 academic staff members alongside genuine student submissions. Although the AI detection tool identified 91% of the experimental submissions as containing AI-generated content, only (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  71
    Toward a profile of student software piraters.Ronald R. Sims, Hsing K. Cheng & Hildy Teegen - 1996 - Journal of Business Ethics 15 (8):839 - 849.
    Efforts to counter software piracy are an increasing focus of software publishers. This study attempts to develop a profile of those who illegally copy software by looking at undergraduate and graduate students and the extent to which they pirate software. The data indicate factors that can be used to profile the software pirater. In particular, males were found to pirate software more frequently than females and older students more than younger students, based on self-reporting.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   37 citations  
  49.  5
    Working with values: software of the mind: a systematic and practical account of purpose, value, and obligation in organizations and society: the original reference text as used by consultants in SIGMA, the Centre for Transdisciplinary Science.Warren Kinston - 1995 - London, U.K.: The Centre.
  50.  2
    Working with Values: Software of the Mind : a Systematic and Practical Account of Purpose, Value, and Obligation in Organizations and Society : the Original Reference Text as Used by Consultants in SIGMA, the Centre for Transdisciplinary Science.Warren Kinston & Sigma Centre - 1995 - London, U.K.: Centre.
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000