62 found
Order:
Disambiguations
Herman T. Tavani [63]Herman Thomas Tavani [1]
  1. Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   37 citations  
  2. Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology.Herman T. Tavani - 2003 - Acm Sigcas Computers and Society 33 (3):1.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  3. Privacy Protection, Control of Information, and Privacy-Enhancing Technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  4.  60
    Trust and Multi-Agent Systems: Applying the Diffuse, Default Model of Trust to Experiments Involving Artificial Agents. [REVIEW]Jeff Buechner & Herman T. Tavani - 2011 - Ethics and Information Technology 13 (1):39-51.
    We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical model of trust based on Richard Holton’s interpretation of P. F. Strawson’s writings on freedom and resentment, and we show why this account of trust is difficult to extend to artificial agents (AAs) as well as to other non-human entities. (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  5.  78
    The Uniqueness Debate in Computer Ethics: What Exactly is at Issue, and Why Does It Matter? [REVIEW]Herman T. Tavani - 2002 - Ethics and Information Technology 4 (1):37-54.
    The purpose of this essay is to determinewhat exactly is meant by the claimcomputer ethics is unique, a position thatwill henceforth be referred to as the CEIUthesis. A brief sketch of the CEIU debate is provided,and an empirical case involving a recentincident of cyberstalking is briefly consideredin order to illustrate some controversialpoints of contention in that debate. To gain aclearer understanding of what exactly isasserted in the various claims about theuniqueness of computer ethics, and to avoidmany of the confusions currently (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  6.  65
    Levels of Trust in the Context of Machine Ethics.Herman T. Tavani - 2015 - Philosophy and Technology 28 (1):75-90.
    Are trust relationships involving humans and artificial agents possible? This controversial question has become a hotly debated topic in the emerging field of machine ethics. Employing a model of trust advanced by Buechner and Tavani :39–51, 2011), I argue that the “short answer” to this question is yes. However, I also argue that a more complete and nuanced answer will require us to articulate the various levels of trust that are also possible in environments comprising both human agents and AAs. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  7. Informational Privacy, Data Mining, and the Internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  8.  89
    Floridi’s Ontological Theory of Informational Privacy: Some Implications and Challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  9. Locke, Intellectual Property Rights, and the Information Commons.Herman T. Tavani - 2005 - Ethics and Information Technology 7 (2):87-97.
    This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections, Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property. In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and digital information. In Section (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  10.  47
    Computer Ethics: Philosophical Enquiry.Deborah G. Johnson, James H. Moor & Herman T. Tavani - 2000 - Acm Sigcas Computers and Society 30 (4):6-9.
  11.  88
    Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  12.  69
    P2p Networks and the Verizon V. RIAA Case: Implications for Personal Privacy and Intellectual Property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  13. Ethical Reflections on the Digital Divide.Herman T. Tavani - 2003 - Journal of Information, Communication and Ethics in Society 1 (2):99-108.
    During the past decade, a fairly extensive literature on the digital divide has emerged. Many reports and studies have provided statistical data pertaining to sociological aspects of ‘the divide,’ while some studies have examined policy issues involving universal service and universal access. Other studies have suggested ways in which the digital divide could be better understood if it were ‘reconceptualized’ in terms of an alternative metaphor, e.g. a ‘divide’ having to do with literacy, power, content, or the environment. However, with (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  14.  66
    The State of Computer Ethics as a Philosophical Field of Inquiry: Some Contemporary Perspectives, Future Projections, and Current Resources. [REVIEW]Herman T. Tavani - 2001 - Ethics and Information Technology 3 (2):97-108.
    The present article focusesupon three aspects of computer ethics as aphilosophical field: contemporary perspectives,future projections, and current resources.Several topics are covered, including variouscomputer ethics methodologies, the `uniqueness'of computer ethics questions, and speculationsabout the impact of globalization and theinternet. Also examined is the suggestion thatcomputer ethics may `disappear' in the future.Finally, there is a brief description ofcomputer ethics resources, such as journals,textbooks, conferences and associations.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  15. KDD, Data Mining, and the Challenge for Normative Privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  16.  94
    Cyberstalking, Personal Privacy, and Moral Responsibility.Herman T. Tavani & Frances S. Grodzinsky - 2002 - Ethics and Information Technology 4 (2):123-132.
    This essay examines some ethical aspects of stalkingincidents in cyberspace. Particular attention is focused on the Amy Boyer/Liam Youens case of cyberstalking, which has raised a number of controversial ethical questions. We limit our analysis to three issues involving this particular case. First, we suggest that the privacy of stalking victims is threatened because of the unrestricted access to on-linepersonal information, including on-line public records, currently available to stalkers. Second, we consider issues involving moral responsibility and legal liability for Internet (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  17.  35
    Online File Sharing: Resolving the Tensions Between Privacy and Property Interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  26
    Computer Ethics Textbooks: A Thirty-Year Retrospective.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (3):26-31.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  31
    Trust, Betrayal, and Whistle-Blowing.Herman T. Tavani & Frances S. Grodzinsky - 2014 - Acm Sigcas Computers and Society 44 (3):8-13.
    Is every act of whistle blowing, by definition, a betrayal of trust on the part of the whistle-blower? If so, are employees who blow the whistle, by implication, untrustworthy employees? Assuming that they are, would employees who blow the whistle also be willing to concede that they are not trustworthy employees, by virtue of carrying out their whistle-blowing act? In answering these questions, we first propose some working definitions of whistle-blowing, trust, and trustworthiness. We then ask whether some instances of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  32
    Privacy Online.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (4):11-19.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  62
    Can We Develop Artificial Agents Capable of Making Good Moral Decisions?: Wendell Wallach and Colin Allen: Moral Machines: Teaching Robots Right From Wrong, Oxford University Press, 2009, Xi + 273 Pp, ISBN: 978-0-19-537404-9.Herman T. Tavani - 2011 - Minds and Machines 21 (3):465-474.
  22.  26
    Some Ethical Reflections on Cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.
    The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  21
    Cyberethics Biliography 2001: A Select List of Recent Works.Herman T. Tavani - 2001 - Acm Sigcas Computers and Society 31 (2):30-36.
    Included in the 2001 annual bibliography update is a select list of recent books and articles, each with a publisher's date of either 2000 or 2001. For an annotated list of selected books and articles published between 1998 and 2000, see the June 1999 and June 2000 issues of Computers and Society; and for a comprehensive list of books and articles published before 1997, see my Computing, ethics, and social responsiblity: a bibliography.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  15
    Metabibliography of Computers, Ethics, and Society: An Annotated Bibliography of Bibliographies.Herman T. Tavani - 1997 - Acm Sigcas Computers and Society 27 (1):19-21.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Introduction to Computer Ethics: Philosophy Enquiry. [REVIEW]Deborah G. Johnson, James H. Moor & Herman T. Tavani - 2001 - Ethics and Information Technology 3 (1):1-2.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  26. Moral Arrogance.Herman T. Tavani - 2007 - Metaphilosophy 38 (4):365-419.
     
    Export citation  
     
    Bookmark  
  27.  47
    Computer Ethics as a Field of Applied Ethics.Herman T. Tavani - 2012 - Journal of Information Ethics 21 (2):52-70.
    The present essay includes an overview of key milestones in the development of computer ethics as a field of applied ethics. It also describes the ongoing debate about the proper scope of CE, as a subfield both in applied ethics and computer science. Following a brief description of the cluster of ethical issues that CE scholars and practitioners have generally considered to be the standard or "mainstream" issues comprising the field thus far, the essay speculates about the future direction of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  51
    ICT Ethics Bibliography 2004: A Select List of Recent Books. [REVIEW]Herman T. Tavani - 2004 - Ethics and Information Technology 6 (2):141-144.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  29.  64
    Computer Ethics in the Post-September 11 World.Herman T. Tavani, Frances S. Grodzinsky & Richard A. Spinello - 2003 - Ethics and Information Technology 5 (4):181-182.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30. Maria Bottis and Eugenia Alexandropoulou (Eds.): Broadening the Horizons of Information Law and Ethics: A Time for Inclusion.Herman T. Tavani - 2017 - International Review of Information Ethics 26.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  55
    ICT Ethics Bibliography 2006–2008: A Select List of Recent Books. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (1):85-88.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  32.  48
    Information and Communication Technology (ICT) Ethics: A Bibliography of Recent Books. [REVIEW]Herman T. Tavani - 2001 - Ethics and Information Technology 3 (1):77-81.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  33.  30
    Cyberethics and the Future of Computing.Herman T. Tavani - 1996 - Acm Sigcas Computers and Society 26 (2):22-29.
  34. Search Engines, Personal Information and the Problem of Privacy in Public.Herman T. Tavani - 2005 - International Review of Information Ethics 3:39-45.
    The purpose of this paper is to show how certain uses of search-engine technology raise concerns for personal privacy. In particular, we examine some privacy implications involving the use of search engines to acquire information about persons. We consider both a hypothetical scenario and an actual case in which one or more search engines are used to find information about an individual. In analyzing these two cases, we note that both illustrate an existing problem that has been exacerbated by the (...)
     
    Export citation  
     
    Bookmark   1 citation  
  35.  27
    Editorial: Moral Luck, Social Networking Sites, and Trust on the Web. [REVIEW]Maria C. Bottis, Frances S. Grodzinsky & Herman T. Tavani - 2010 - Ethics and Information Technology 12 (4):297-298.
  36.  41
    ICT Ethics Bibliography 2005: A Select List of Recent Books. [REVIEW]Herman T. Tavani - 2005 - Ethics and Information Technology 7 (3):181-182.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  37.  40
    Recent Books on or Related to ICT Ethics.Herman T. Tavani - 2003 - Ethics and Information Technology 5 (3):177-180.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  38.  38
    Recent Books and Proceedings on Ethics and Information Technology.Herman T. Tavani - 2000 - Ethics and Information Technology 2 (1):77-83.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39.  39
    Genomics, Ethics, and ICT.Ann Backus, Richard A. Spinello & Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):1-3.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  40.  22
    Cyberethics bibliography 2005.Herman T. Tavani - 2005 - Acm Sigcas Computers and Society 35 (3):3.
    Included in the 2005 cyberethics bibliography update is an annotated list of more than fifty recent books; each has a publisher's date of 2002 or later. This list expands upon the books identified and annotated in cyberethics bibliography included in the June 2003 issue of ACM Computers and Society Magazine. For information about selected books published between 1998 and 2002, see the June 1999, June 2000, June 2001, and June 2002 issues of Computers and Society; and for a comprehensive list (...)
    No categories
    Direct download (7 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  41.  21
    Book Review: Virtual Reality by Howard Rheingold. [REVIEW]Herman T. Tavani - 1997 - Acm Sigcas Computers and Society 27 (4):31-32.
  42.  18
    Crossing Boundaries: Ethics in Interdisciplinary and Intercultural Relations: Selected Papers From the CEPE 2011 Conference.Elizabeth A. Buchanan & Herman T. Tavani - 2013 - Acm Sigcas Computers and Society 43 (1):6-8.
    The Ninth International Conference on Computer Ethics: Philosophical Enquiry was held in Milwaukee, WI. Four papers originally presented at that conference are included in this issue of Computers and Society. The selected papers examine a wide range of information/computer-ethics-related issues, and taken together, they show great diversity in the field of information/computer ethics. We are continually negotiating with ethics, law, and policy in our technology-driven activities in the interconnected global arena. As we consider the themes within and among the papers (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43.  15
    The Consent Process in Medical Research Involving DNA Databanks: Some Ethical Implications and Challenges.Herman T. Tavani & Maria Bottis - 2010 - Acm Sigcas Computers and Society 40 (2):11-21.
    Organized into three main parts, this paper examines some challenges for the informed-consent process in medical research where DNA databanks are employed. In Part 1, we briefly describe the principle of informed consent and show why it is ethically important. Part 2 focuses on some specific challenges that that arise for the traditional informed-consent process in population-wide genetics/genomics research, especially where data-mining techniques are used. In the third and final section, we defend a model of consent based on the notion (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  44.  19
    Announcements.Herman T. Tavani - 2000 - Ethics and Information Technology 2 (4):251-255.
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  44
    The Internet, Ethical Values, and Conceptual Frameworks: An Introduction to Cyberethics.Richard A. Spinello & Herman T. Tavani - 2001 - Acm Sigcas Computers and Society 31 (2):5-7.
    What exactly is Cyberethics? How did the field develop? What are some of the central issues and themes in this field, and what methodologies are used by those working in this area of applied ethics? These and related questions are considered in the readings included in Chapter 1. It is perhaps important to note at the outset that the field that many are now beginning to refer to as "cyberethics" has until quite recently been referred to by the more general (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  10
    Book Review: Technology and the Future, Edited by Albert H. Teich. [REVIEW]Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (3):39-40.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  48
    Recent Works in Information and Communication Technology (ICT) Ethics.Herman T. Tavani - 2002 - Ethics and Information Technology 4 (2):169-175.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  9
    Computer Ethics: Philosophical Enquiry.Herman T. Tavani & Lucas D. Introna - 1999 - Acm Sigcas Computers and Society 29 (1):4-8.
  49.  7
    Book Review: Technology and the Future, Sixth Edition Edited by Albert H. Teich. [REVIEW]Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (3):39-40.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  26
    Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace.Herman T. Tavani - 2000 - Acm Sigcas Computers and Society 30 (3):3-9.
1 — 50 / 62