Search results
1 – 10 of 44F S Grodzinsky, K Miller and M J Wolf
In this essay we argue that the current social and ethical structure in the Open Source Software (OSS) Community stem from its roots in academia. The individual developers…
Abstract
In this essay we argue that the current social and ethical structure in the Open Source Software (OSS) Community stem from its roots in academia. The individual developers experience a level of autonomy similar to that of a faculty member. Furthermore, we assert that the Open Source Software Community’s social structure demands benevolent leadership. We argue that it is difficult to pass off low quality open source software as high quality software and that the Open Source development model offers strong accountability. Finally, we argue that Open Source Software introduces ethical challenges for universities and the software development community.
Details
Keywords
F. S. Grodzinsky, K. Miller and M. J. Wolf
We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the…
Abstract
We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the public good as a central tenant and on the professional relationship between a software developer and the users of the software developed.
Details
Keywords
Marty J. Wolf, Frances S. Grodzinsky and Keith W. Miller
This paper aims to explore the ethical and social impact of augmented visual field devices (AVFDs), identifying issues that AVFDs share with existing devices and suggesting new…
Abstract
Purpose
This paper aims to explore the ethical and social impact of augmented visual field devices (AVFDs), identifying issues that AVFDs share with existing devices and suggesting new ethical and social issues that arise with the adoption of AVFDs.
Design/methodology/approach
This essay incorporates both a philosophical and an ethical analysis approach. It is based on Plato’s Allegory of the Cave, philosophical notions of transparency and presence and human values including psychological well-being, physical well-being, privacy, deception, informed consent, ownership and property and trust.
Findings
The paper concludes that the interactions among developers, users and non-users via AVFDs have implications for autonomy. It also identifies issues of ownership that arise because of the blending of physical and virtual space and important ways that these devices impact, identity and trust.
Practical implications
Developers ought to take time to design and implement an easy-to-use informed consent system with these devices. There is a strong need for consent protocols among developers, users and non-users of AVFDs.
Social implications
There is a social benefit to users sharing what is visible on their devices with those who are in close physical proximity, but this introduces tension between notions of personal privacy and the establishment and maintenance of social norms.
Originality/value
There is new analysis of how AVFDs impact individual identity and the attendant ties to notions of ownership of the space between an object and someone’s eyes and control over perception.
Details
Keywords
The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of…
Abstract
Purpose
The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of openness. Threats arising from these file sharing applications‐systems should not be a pretext to limit freedom of research, speech or the right “freely to participate in the cultural life of the community”, as granted by the Universal Declaration of Human Rights from 1948. The paper aims to take sides in today's debate.
Design/methodology/approach
The paper adopts an interdisciplinary approach, including network theory, law and ethics. The method draws on both theoretical and empirical material so as to stress the paradox of the principle of precaution applied to P2P systems and why the burden of proof should fall on the party proposing that one refrain from action.
Findings
Censors and opponents of P2P systems who propose to apply the principle of precaution to this case deny the premise upon which that principle rests. “Levels of evidence” required by the precautionary principle show that – in many cases in which the outcomes of technology are ignored – another principle is needed for orienting action, namely, the principle of openness.
Social implications
Alarm about how P2P systems undermine crucial elements of the societies often led to the ban of this technology. The paper illustrates why it should not be the case: rather than shutting these networks down, they should be further developed.
Originality/value
The paper provides the comprehensive picture of a far too often fragmented debate.
Details
Keywords
The paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human…
Abstract
Purpose
The paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human affairs. It seeks to explore the meaning of invisibility via an interdisciplinary approach, including computer science, law, and ethics.
Design/methodology/approach
The method draws on both theoretical and empirical material so as to scrutinise the ways in which today's information revolution is recasting the boundaries between visibility and invisibility.
Findings
The degrees of exposure to public notice can be understood as a matter of balance between access and control over information in a specific context, as well as a function of the ontological friction in a given region of the environment.
Originality/value
The originality of the case study on a new kind of recommender system is enhanced because of the procedural approach which is suggested to further develop the distinction between “good” and “evil” as anything that enriches, or damages, the informational complexity of the environment.
Details
Keywords
This paper aims to argue that traditional ethical theories used in disaster response may be inadequate and particularly strained by the emergence of new technologies and social…
Abstract
Purpose
This paper aims to argue that traditional ethical theories used in disaster response may be inadequate and particularly strained by the emergence of new technologies and social media, particularly with regard to privacy. The paper suggests incorporation of care ethics into the disaster ethics nexus to better include the perspectives of disaster affected communities.
Design/methodology/approach
This paper presents a theoretical examination of privacy and care ethics in the context of social media/digitally enhanced disaster response.
Findings
The paper proposes an ethics of care can fruitfully by used by public and private agents in disaster management. Its relational ontology restores the priority of fostering good relationships between stakeholders, thus giving central importance to values such as transparency and trust and the situated knowledge of disaster-affected communities.
Research limitations/implications
This paper presents theoretical research and is limited by the availability of empirical data. There is opportunity for future research to evaluate the impact of a conscious adoption of an ethics of care by disaster management agents.
Practical implications
An ethos of care ethics needs to be mainstreamed into disaster management organisations and digital initiatives.
Social implications
This paper argues that power asymmetry in disaster response renders the public vulnerable to abuse, and that the adoption of care ethics can support disaster management agents in recognising this power imbalance and wielding power responsibly.
Originality/value
This paper examines the applicability of an alternative ethical framework to novel circumstances.
Details
Keywords
The purpose of this paper is to present a preliminary analysis of age and gender across a number of questions asked in a survey of ethical attitudes of professionals in the…
Abstract
Purpose
The purpose of this paper is to present a preliminary analysis of age and gender across a number of questions asked in a survey of ethical attitudes of professionals in the information and communication technology (ICT) industry in Australia. While a large number of demographic questions regarding ethics and regulation, only those concerning age and gender are examined here.
Design/methodology/approach
An online survey was conducted of the ICT workplace in Australia. The results were analyzed using SPSS.
Findings
There are some significant differences across the generations as well between the genders. Gen Y is different when compared to the others on how important ethical regulations ought to be. Gen Y thinks that ethical regulations ought to be less important. When gender was examined it was clear that males thought that ethical regulations ought to be significantly less important when compared with what females thought.
Research limitations/implications
While a larger sample size was desired, the consistency of the replies, when compared against a number of comparative populations, indicated that the replies we received were representative of the ICT workforce.
Originality/value
This paper raises many issues that demand greater care and attention be given when constructing new models of governing ethics within the Australian ICT workplace.
Details
Keywords
Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been…
Abstract
Purpose
Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”.
Design/methodology/approach
New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is reviewed concerning its capability to grasp these problems. The argument is based on the assumption that the technologies work, persons are fully informed and capable of deciding according to advanced privacy considerations.
Findings
Big data and ubiquitous computing enable privacy threats for persons whose data are only indirectly involved and even for persons about whom no data have been collected and processed. Those new problems are intrinsic to the functionality of these new technologies and need to be addressed on a social and political level. Furthermore, a concept of data minimization in terms of the quality of the data is proposed.
Originality/value
The use of personal data as a threat to the privacy of others is established. This new perspective is used to reassess and recontextualize Helen Nissenbaum's concept of privacy. Data minimization in terms of quality of data is proposed as a new concept.
Details
Keywords
The purpose of this paper is to provide an overview of some issues and controversies surrounding arguments for regulating cyberspace.
Abstract
Purpose
The purpose of this paper is to provide an overview of some issues and controversies surrounding arguments for regulating cyberspace.
Design/methodology/approach
The paper begins with a brief investigation of some background questions such as “What is cyberspace?” and “What is meant by ‘regulation’?” It then considers some distinctions between descriptive and normative aspects of questions involving internet regulation. Next, the paper examines Lawrence Lessig's model, which describes four modes of regulation that can be applied to cyberspace. The paper then considers some recent controversies that have emerged because of “regulation by code” and the “privatization of information policy.”
Findings
Cyberspace regulation raises ethical concerns.
Research limitations/implications
Internet regulation is evolving.
Originality/value
The way cyberspace is viewed, either as a “place” or as a “medium,” affects how it will be regulated.
Details
Keywords
Information ethics, as is well known, has emerged as an independent area of ethical and philosophical inquiry. There are a number of academic journals that are devoted entirely to…
Abstract
Purpose
Information ethics, as is well known, has emerged as an independent area of ethical and philosophical inquiry. There are a number of academic journals that are devoted entirely to the numerous ethical issues that arise in connection with the new information communication technologies; these issues include a host of intellectual property, information privacy, and security issues of concern to librarians and other information professionals. In addition, there are a number of major international conferences devoted to information ethics every year. It would hardly be overstating the matter to say that information ethics is as “hot” an area of theoretical inquiry as medical ethics. The purpose of this paper is to provide an overview on these and related issues.
Design/methodology/approach
The paper presents a review of relevant information ethics literature together with the author's assessment of the arguments.
Findings
There are issues that are more abstract and basic than the substantive issues with which most information ethics theorizing is concerned. These issues are thought to be “foundational” in the sense that we cannot fully succeed in giving an analysis of the concrete problems of information ethics (e.g. are legal intellectual property rights justifiably protected?) until these issues are adequately addressed.
Originality/value
The paper offers a needed survey of foundational issues in information ethics.
Details