Search results

1 – 10 of 44
Article
Publication date: 1 November 2003

F S Grodzinsky, K Miller and M J Wolf

In this essay we argue that the current social and ethical structure in the Open Source Software (OSS) Community stem from its roots in academia. The individual developers…

1862

Abstract

In this essay we argue that the current social and ethical structure in the Open Source Software (OSS) Community stem from its roots in academia. The individual developers experience a level of autonomy similar to that of a faculty member. Furthermore, we assert that the Open Source Software Community’s social structure demands benevolent leadership. We argue that it is difficult to pass off low quality open source software as high quality software and that the Open Source development model offers strong accountability. Finally, we argue that Open Source Software introduces ethical challenges for universities and the software development community.

Details

Journal of Information, Communication and Ethics in Society, vol. 1 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 May 2006

F. S. Grodzinsky, K. Miller and M. J. Wolf

We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the…

Abstract

We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the public good as a central tenant and on the professional relationship between a software developer and the users of the software developed.

Details

Journal of Information, Communication and Ethics in Society, vol. 4 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 8 August 2016

Marty J. Wolf, Frances S. Grodzinsky and Keith W. Miller

This paper aims to explore the ethical and social impact of augmented visual field devices (AVFDs), identifying issues that AVFDs share with existing devices and suggesting new…

Abstract

Purpose

This paper aims to explore the ethical and social impact of augmented visual field devices (AVFDs), identifying issues that AVFDs share with existing devices and suggesting new ethical and social issues that arise with the adoption of AVFDs.

Design/methodology/approach

This essay incorporates both a philosophical and an ethical analysis approach. It is based on Plato’s Allegory of the Cave, philosophical notions of transparency and presence and human values including psychological well-being, physical well-being, privacy, deception, informed consent, ownership and property and trust.

Findings

The paper concludes that the interactions among developers, users and non-users via AVFDs have implications for autonomy. It also identifies issues of ownership that arise because of the blending of physical and virtual space and important ways that these devices impact, identity and trust.

Practical implications

Developers ought to take time to design and implement an easy-to-use informed consent system with these devices. There is a strong need for consent protocols among developers, users and non-users of AVFDs.

Social implications

There is a social benefit to users sharing what is visible on their devices with those who are in close physical proximity, but this introduces tension between notions of personal privacy and the establishment and maintenance of social norms.

Originality/value

There is new analysis of how AVFDs impact individual identity and the attendant ties to notions of ownership of the space between an object and someone’s eyes and control over perception.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 4 May 2010

U. Pagallo

The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of…

1188

Abstract

Purpose

The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of openness. Threats arising from these file sharing applications‐systems should not be a pretext to limit freedom of research, speech or the right “freely to participate in the cultural life of the community”, as granted by the Universal Declaration of Human Rights from 1948. The paper aims to take sides in today's debate.

Design/methodology/approach

The paper adopts an interdisciplinary approach, including network theory, law and ethics. The method draws on both theoretical and empirical material so as to stress the paradox of the principle of precaution applied to P2P systems and why the burden of proof should fall on the party proposing that one refrain from action.

Findings

Censors and opponents of P2P systems who propose to apply the principle of precaution to this case deny the premise upon which that principle rests. “Levels of evidence” required by the precautionary principle show that – in many cases in which the outcomes of technology are ignored – another principle is needed for orienting action, namely, the principle of openness.

Social implications

Alarm about how P2P systems undermine crucial elements of the societies often led to the ban of this technology. The paper illustrates why it should not be the case: rather than shutting these networks down, they should be further developed.

Originality/value

The paper provides the comprehensive picture of a far too often fragmented debate.

Details

Journal of Information, Communication and Ethics in Society, vol. 8 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 9 November 2010

Ugo Pagallo

The paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human…

408

Abstract

Purpose

The paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human affairs. It seeks to explore the meaning of invisibility via an interdisciplinary approach, including computer science, law, and ethics.

Design/methodology/approach

The method draws on both theoretical and empirical material so as to scrutinise the ways in which today's information revolution is recasting the boundaries between visibility and invisibility.

Findings

The degrees of exposure to public notice can be understood as a matter of balance between access and control over information in a specific context, as well as a function of the ontological friction in a given region of the environment.

Originality/value

The originality of the case study on a new kind of recommender system is enhanced because of the procedural approach which is suggested to further develop the distinction between “good” and “evil” as anything that enriches, or damages, the informational complexity of the environment.

Details

Journal of Information, Communication and Ethics in Society, vol. 8 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 16 January 2020

Paul Hayes and Damian Jackson

This paper aims to argue that traditional ethical theories used in disaster response may be inadequate and particularly strained by the emergence of new technologies and social…

Abstract

Purpose

This paper aims to argue that traditional ethical theories used in disaster response may be inadequate and particularly strained by the emergence of new technologies and social media, particularly with regard to privacy. The paper suggests incorporation of care ethics into the disaster ethics nexus to better include the perspectives of disaster affected communities.

Design/methodology/approach

This paper presents a theoretical examination of privacy and care ethics in the context of social media/digitally enhanced disaster response.

Findings

The paper proposes an ethics of care can fruitfully by used by public and private agents in disaster management. Its relational ontology restores the priority of fostering good relationships between stakeholders, thus giving central importance to values such as transparency and trust and the situated knowledge of disaster-affected communities.

Research limitations/implications

This paper presents theoretical research and is limited by the availability of empirical data. There is opportunity for future research to evaluate the impact of a conscious adoption of an ethics of care by disaster management agents.

Practical implications

An ethos of care ethics needs to be mainstreamed into disaster management organisations and digital initiatives.

Social implications

This paper argues that power asymmetry in disaster response renders the public vulnerable to abuse, and that the adoption of care ethics can support disaster management agents in recognising this power imbalance and wielding power responsibly.

Originality/value

This paper examines the applicability of an alternative ethical framework to novel circumstances.

Details

Journal of Information, Communication and Ethics in Society, vol. 18 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 21 November 2008

Richard Lucas and Nyree Mason

The purpose of this paper is to present a preliminary analysis of age and gender across a number of questions asked in a survey of ethical attitudes of professionals in the…

1869

Abstract

Purpose

The purpose of this paper is to present a preliminary analysis of age and gender across a number of questions asked in a survey of ethical attitudes of professionals in the information and communication technology (ICT) industry in Australia. While a large number of demographic questions regarding ethics and regulation, only those concerning age and gender are examined here.

Design/methodology/approach

An online survey was conducted of the ICT workplace in Australia. The results were analyzed using SPSS.

Findings

There are some significant differences across the generations as well between the genders. Gen Y is different when compared to the others on how important ethical regulations ought to be. Gen Y thinks that ethical regulations ought to be less important. When gender was examined it was clear that males thought that ethical regulations ought to be significantly less important when compared with what females thought.

Research limitations/implications

While a larger sample size was desired, the consistency of the replies, when compared against a number of comparative populations, indicated that the replies we received were representative of the ICT workforce.

Originality/value

This paper raises many issues that demand greater care and attention be given when constructing new models of governing ethics within the Australian ICT workplace.

Details

Journal of Information, Communication and Ethics in Society, vol. 6 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 6 May 2014

Tobias Matzner

Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been…

3564

Abstract

Purpose

Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”.

Design/methodology/approach

New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is reviewed concerning its capability to grasp these problems. The argument is based on the assumption that the technologies work, persons are fully informed and capable of deciding according to advanced privacy considerations.

Findings

Big data and ubiquitous computing enable privacy threats for persons whose data are only indirectly involved and even for persons about whom no data have been collected and processed. Those new problems are intrinsic to the functionality of these new technologies and need to be addressed on a social and political level. Furthermore, a concept of data minimization in terms of the quality of the data is proposed.

Originality/value

The use of personal data as a threat to the privacy of others is established. This new perspective is used to reassess and recontextualize Helen Nissenbaum's concept of privacy. Data minimization in terms of quality of data is proposed as a new concept.

Details

Journal of Information, Communication and Ethics in Society, vol. 12 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 13 March 2007

Herman T. Tavani

The purpose of this paper is to provide an overview of some issues and controversies surrounding arguments for regulating cyberspace.

2831

Abstract

Purpose

The purpose of this paper is to provide an overview of some issues and controversies surrounding arguments for regulating cyberspace.

Design/methodology/approach

The paper begins with a brief investigation of some background questions such as “What is cyberspace?” and “What is meant by ‘regulation’?” It then considers some distinctions between descriptive and normative aspects of questions involving internet regulation. Next, the paper examines Lawrence Lessig's model, which describes four modes of regulation that can be applied to cyberspace. The paper then considers some recent controversies that have emerged because of “regulation by code” and the “privatization of information policy.”

Findings

Cyberspace regulation raises ethical concerns.

Research limitations/implications

Internet regulation is evolving.

Originality/value

The way cyberspace is viewed, either as a “place” or as a “medium,” affects how it will be regulated.

Details

Library Hi Tech, vol. 25 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 13 March 2007

Kenneth Einar Himma

Information ethics, as is well known, has emerged as an independent area of ethical and philosophical inquiry. There are a number of academic journals that are devoted entirely to…

4872

Abstract

Purpose

Information ethics, as is well known, has emerged as an independent area of ethical and philosophical inquiry. There are a number of academic journals that are devoted entirely to the numerous ethical issues that arise in connection with the new information communication technologies; these issues include a host of intellectual property, information privacy, and security issues of concern to librarians and other information professionals. In addition, there are a number of major international conferences devoted to information ethics every year. It would hardly be overstating the matter to say that information ethics is as “hot” an area of theoretical inquiry as medical ethics. The purpose of this paper is to provide an overview on these and related issues.

Design/methodology/approach

The paper presents a review of relevant information ethics literature together with the author's assessment of the arguments.

Findings

There are issues that are more abstract and basic than the substantive issues with which most information ethics theorizing is concerned. These issues are thought to be “foundational” in the sense that we cannot fully succeed in giving an analysis of the concrete problems of information ethics (e.g. are legal intellectual property rights justifiably protected?) until these issues are adequately addressed.

Originality/value

The paper offers a needed survey of foundational issues in information ethics.

Details

Library Hi Tech, vol. 25 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Access

Year

Content type

Article (44)
1 – 10 of 44