Information technology is an integral part of the practices and institutions of post-industrial society. It is also a source of hard moral questions and thus is both a probing and relevant area for moral theory. In this volume, an international team of philosophers sheds light on many of the ethical issues arising from information technology, including informational privacy, digital divide and equal access, e-trust and tele-democracy. Collectively, these essays demonstrate how accounts of equality and justice, property and privacy benefit from (...) taking into account how information technology has shaped our social and epistemic practices and our moral experiences. Information technology changes the way that we look at the world and deal with one another. It calls, therefore, for a re-examination of notions such as friendship, care, commitment and trust. (shrink)
This paper presents the principal findings from a three-year research project funded by the US National Science Foundation on ethics of human enhancement technologies. To help untangle this ongoing debate, we have organized the discussion as a list of questions and answers, starting with background issues and moving to specific concerns, including: freedom & autonomy, health & safety, fairness & equity, societal disruption, and human dignity. Each question-and-answer pair is largely self-contained, allowing the reader to skip to those issues of (...) interest without affecting continuity. (shrink)
Nanoethics seeks to examine the potential risks and rewards of applications of nanotechnology. This up-to-date anthology gives the reader an introduction to and basic foundation in nanotechnology and nanoethics, and then delves into near-, mid-, and far-term issues. Comprehensive and authoritative, it: -/- - Goes beyond the usual environmental, health, and safety (EHS) concerns to explore such topics as privacy, nanomedicine, human enhancement, global regulation, military, humanitarianism, education, artificial intelligence, space exploration, life extension, and more -/- -Features contributions from forty (...) preeminent experts from academia and industry worldwide, reflecting diverse perspectives -/- -Includes seminal works that influence nanoethics today -/- -Encourages an informed, proactive approach to nanoethics and advocates addressing new and emerging controversies before they impede progress or impact our welfare -/- This resource is designed to promote further investigations and a broad and balanced dialogue in nanoethics, dealing with critical issues that will affect the industry as well as society. While this will be a definitive reference for students, scientists in academia and industry, policymakers, and regulators, it's also a valuable resource for anyone who wants to understand the challenges, principles, and potential of nanotechnology. (shrink)
This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of work, and the (...) monitoring of email, listservers and the World Wide Web. It is argued that many of the common justifications given for this surveillance and monitoring do not stand up to close scrutiny. (shrink)
This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of work, and the (...) monitoring of email, listservers and the World Wide Web. It is argued that many of the common justifications given for this surveillance and monitoring do not stand up to close scrutiny. (shrink)
PurposeThe purpose of this paper is to add one further value to the previously articulated “universal values” and to describe the constituent components of three universal values.Design/methodology/approachThis interpretive/constructivist study of Australia's largest online community of seniors involved a 30‐month ethnographic investigation. After an initial period of 11 months of observing social interaction on the entire site, in‐depth, semi‐structured interviews were conducted with 30 participants, selected according to criterion sampling, a form of purposive sampling.FindingsFour key moral values were identified: equality, freedom, (...) respect and trust. All of them had been found in other studies, with equality and respect identified as universal values. The findings from this study suggest that freedom is another universal value.Originality/valueThis study extends the understanding of universal values to include freedom. Further, it demonstrates the constituent components for freedom, and those of two other universal values previously identified in the literature, equality and human dignity, as well as revealing linkages between these three values. (shrink)
Purpose – The purpose of this study is to investigate the reasons behind unethical behaviour in the Australian Information and Communications Technology workplace. Design/methodology/approach – The study employed a qualitative research methodology. A total of 43 ICT professionals were interviewed during the month of February 2014 in six Australian capital cities. All interviews were conducted face-to-face and followed a semi-structured interviewing format utilising open-end questions and further probing questions. The purposive sample represented ICT professionals from large and small organisations, government (...) and private sector, different geographic locations, ages, genders, types of jobs and employment experience. Data analysis was completed with the help of QSR NVivo 10, a software package for managing qualitative data. Findings – Of the 25 reasons identified for unethical behaviour in ICT workplaces, 30 per cent of participants agreed on five major ones: pressure, bad management, greed, lack of respect towards ICT and communication issues. Practical implications – By focussing on the reasons behind unethical behaviour in the Australian ICT workplace, this article helps those identifying strategies for dealing with unprofessional behaviour to take into account the root causes of unprofessional behaviour. Originality/value – There is hardly any literature on reasons for unethical behaviour in the ICT workplaces. This article seeks to address this imbalance in the literature. Also, integrity systems in ICT are a new focus in collective, organisational ethics. Identification of and resolving unethical ICT workplace practice is an innovative contribution to the literature. (shrink)
Changes in information technologylead to new topics and new emphases in computerethics. The present article examines a varietyof such issues, and argues that computer ethicsmust become more rigorous and develop astronger theoretical base. The articleconcludes with a discussion of ways to makecomputer ethics more effective in bringinghelpful changes to the world.
Symposium on Animal Disenhancement: Introduction Content Type Journal Article Category Introduction Pages 1-2 DOI 10.1007/s11569-012-0145-3 Authors John Weckert, Centre for Applied Philosophy and Public Ethics, Charles Sturt University, Canberra, ACT, Australia Journal NanoEthics Online ISSN 1871-4765 Print ISSN 1871-4757.
‘It is much more difficult than is often admitted to make a strong case for the ownership of computer software.’ This closely argued study of the strengths and weaknesses of the case for intellectual property rights and against software piracy is based on material contained in the author’s joint work with Douglas Adeney, Computer and Information Ethics, Greenwood Press, an imprint of Greenwood Publishing Group, INC., Westport, CT, forthcoming May, 1997. The author is a member of the School of Information (...) Studies at Charles Sturt University, PO Box 588, Wagga Wagga, NSW 2650 Australia; tel 61 69 33 2372; fax 61 69 33 2733; email [email protected] wishes to acknowledge the contribution to this paper of Douglas Adeney of the University of Melbourne. (shrink)
The implementation of Responsible Research and Innovation is not without its challenges, and one of these is raised when societal desirability is included amongst the RRI principles. We will argue that societal desirability is problematic even though it appears to fit well with the overall ideal. This discord occurs partly because the idea of societal desirability is inherently ambiguous, but more importantly because its scope is unclear. This paper asks: is societal desirability in the spirit of RRI? On von Schomberg’s (...) account, it seems clear that it is, but societal desirability can easily clash with what is ethically permissible; for example, when what is desirable in a particular society is bad for the global community. If that society chose not to do what was desirable for it, the world would be better off than if they did it. Yet our concern here is with a more complex situation, where there is a clash with ethical acceptability, but where the world would not be better off if the society chose not do what was societally desirable for itself. This is the situation where it is argued that someone else will do it if we do not. The first section of the paper gives an outline of what we take technology to be, and the second is a discussion of which criteria should be the basis for choosing research and innovation projects. This will draw on the account of technology outlined in the first section. This will be followed by an examination of a common argument, “If we don’t do it, others will”. This argument is important because it appears to justify acting in morally dubious ways. Finally, it will be argued that societal desirability gives support to the “If we don’t…” argument and that this raises some difficulties for RRI. (shrink)
Our technologies have enabled us to change both the world and our perceptions of the world, as well as to change ourselves and to find new ways to fulfil the human desire for improvement and for having new capacities. The debate around using technology for human enhancement has already raised many ethical concerns, however little research has been done in how human enhancement can affect human communication. The purpose of this paper is to explore whether some human enhancements could change (...) our shared lifeworld so radically that human communication as we know it would not be possible any longer. After exploring the kinds of communication problems we are concerned with as well as mentioning some possible enhancement interventions that could bring about such problems, we will address some of the ethical implications that follow from these potential communication problems. We argue that because of the role that communication plays in human society, this issue deserves attention. (shrink)
‘It is much more difficult than is often admitted to make a strong case for the ownership of computer software.’ This closely argued study of the strengths and weaknesses of the case for intellectual property rights and against software piracy is based on material contained in the author’s joint work with Douglas Adeney, Computer and Information Ethics, Greenwood Press, an imprint of Greenwood Publishing Group, INC., Westport, CT, forthcoming May, 1997. The author is a member of the School of Information (...) Studies at Charles Sturt University, PO Box 588, Wagga Wagga, NSW 2650 Australia; tel 61 69 33 2372; fax 61 69 33 2733; email [email protected] wishes to acknowledge the contribution to this paper of Douglas Adeney of the University of Melbourne. (shrink)
The impact of the Internet on democracy is a widely discussed subject. Many writers view the Internet, potentially at least, as a boon to democracy and democratic practices. According to one popular theme, both e-mail and web pages give ordinary people powers of communication that have hitherto been the preserve of the relatively wealthy (Graham 1999, p. 79). So the Internet can be expected to close the influence gap between wealthy citizens and ordinary citizens, a weakness of many procedural democracies.
Claims have been made that the current COVID-19 pandemic is a message from nature to stop exploiting the earth to the extent that we have been. While there is no direct evidence that this pandemic is a result of human actions with respect to the earth, ample evidence exists that deforestation and other environmental changes, together with climate change, do make it more likely that viruses will cross from wildlife to humans. We humans are mammals and our welfare depends on (...) the health of the earth. We are not so different from other living creatures in this regard. It is in our interests to look after the earth, something that Indigenous Australians knew well. Mother Earth must be cared for if she is to care for us. Nature perhaps is sending us a message in the same sense that my car does if I do not maintain it. It stops functioning properly. We have to modify nature to satisfy our needs but we must be careful how we modify it. (shrink)
These comments claim that a shift has occurred between early discussions of online trust, where the focus was on the possibility of such trust and later ones, such as Ess’s, where the concern is more with the influence of the new communication technologies on trust in general. The comments, then, focus on _affordance_ as examined by Ess, arguing that it is, indeed, a central issue in new communications and trust.
Technology facilitates certain behaviours. This underlies the argument that the Internet may not be as benign as we might like to think. It is argued in this paper, through examination of the case of the capture of a large number of people on charges of possession of child pornography, that the Internet constitutes a kind of unintentional entrapment. Some consequences of this are explored.
Legislation was recently introduced into theAustralian parliament to regulate the Internet. Thiscreated a storm of protest from within the computerindustry, where arguments against the legislationranged from those based on technical difficulties tothose based on moral considerations, particularly offreedom of speech and freedom to access information.This paper is primarily concerned with the moralaspects of Internet regulation, but within theparameters of current technology. It will argue thatsuch regulation can be justified, despite the factthat given the current technology there will bedifficulties with enforcement, (...) and reduction inInternet performance. (shrink)
It has been argued that it is in the best interests of IT professionals, to adopt and enforce professional codes in the work place. But there is no code for usability engineers, unless one accepts that it is a branch of software engineering. The new joint ACM/IEEE‐CS Software Engineering Code of Ethics is applied to actual usability cases. This enables usability engineers to interpret this code in their profession. This is achieved by utilizing four case studies both directly in terms (...) of the ethical issues involved and in the light of the code. Also examined are the short‐comings of the code for the domain of usability engineering, and suggestions are made for enhancements for future revisions of the code. (shrink)
Recently two reports appeared in the press, each of which expressed a very different attitude towards intellectual property. One, in the Australian press, discusses a bill before the US House of Representatives that would “give American copyright holders freedom to hack PCs used to illicitly share files over peer‐to‐peer networks, without fear of prosecution or litigation”. That this represents a fairly strong view of the importance of intellectual property can be seen further as the report continues.
In Putnam's theory of reference, an historical component and an indexical one both play some part in establishing the extension of terms, although in “The meaning of ‘meaning’” it is not altogether clear just how important he believes the historical element to be. He seems to be much more interested in its indexical component, which he believes plays more or less the same role in his theory as rigidity does in Krip-ke's. In this paper, I will look more closely at (...) these two elements and see what sorts of roles they could play in a theory like Putnam's. A theory of the extensions of general terms will emerge which differs from Putnam's in some important respects. It does, however, have some similarity with a recently published theory of Matthen's, but the arguments are different. I will also outline a theory of essences and kinds, which is based on this modified version. (shrink)