Search results

1 – 7 of 7
Book part
Publication date: 6 December 2005

Michael Schwartz

With impeccable timing, literally just before the so-called dot.com boom went completely bust, the Australian Journal of Professional and Applied Ethics (July, 1999) dedicated a…

Abstract

With impeccable timing, literally just before the so-called dot.com boom went completely bust, the Australian Journal of Professional and Applied Ethics (July, 1999) dedicated a special issue to the topic of “computer ethics”. The lead article in that issue was by the pioneering American computer ethicist, Terrell Ward Bynum, who edited one of the first books in the field of computer ethics (Bynum, 1985).

Details

Crisis and Opportunity in the Professions
Type: Book
ISBN: 978-1-84950-378-5

Article
Publication date: 10 June 2021

Nesibe Kantar and Terrell Ward Bynum

The purpose of this paper is to explore an emerging ethical theory for the Digital Age – Flourishing Ethics – which will likely be applicable in many different cultures worldwide…

Abstract

Purpose

The purpose of this paper is to explore an emerging ethical theory for the Digital Age – Flourishing Ethics – which will likely be applicable in many different cultures worldwide, addressing not only human concerns but also activities, decisions and consequences of robots, cyborgs, artificially intelligent agents and other new digital technologies.

Design/methodology/approach

In the past, a number of influential ethical theories in Western philosophy have focused upon choice and autonomy, or pleasure and pain or fairness and justice. These are important ethical concepts, but we consider “flourishing” to be a broader “umbrella concept” under which all of the above ideas can be included, plus additional ethical ideas from cultures in other regions of the world (for example, Buddhist, Muslim, Confucianist cultures and others). Before explaining the applied approach, this study discusses relevant ideas of four example thinkers who emphasize flourishing in their ethics writings: Aristotle, Norbert Wiener, James Moor and Simon Rogerson.

Findings

Flourishing Ethics is not a single ethical theory. It is “an approach,” a “family” of similar ethical theories which can be successfully applied to humans in many different cultures, as well as to non-human agents arising from new digital technologies.

Originality/value

This appears to be the first extended analysis of the emerging flourishing ethics “family” of theories.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 31 May 2004

Terrell Ward Bynum

This article discusses the foresight of philosopher/mathematician Norbert Wiener who, in the 1940s, founded Information Ethics as a research discipline. Wiener envisioned the…

Abstract

This article discusses the foresight of philosopher/mathematician Norbert Wiener who, in the 1940s, founded Information Ethics as a research discipline. Wiener envisioned the coming of an “automatic age” in which information technology would have profound social and ethical impacts upon the world. He predicted, for example, machines that will learn, reason and play games; “automatic factories” that will replace assembly‐line workers and middle managers with computerized devices; workers who will perform their jobs over great distances with the aid of new communication technologies; and people who will gain remarkable powers by adding computerized “prostheses” to their bodies. To analyze the ethical implications of such developments, Wiener presented some principles of justice and employed a powerful practical method of ethical analysis.

Details

Journal of Information, Communication and Ethics in Society, vol. 2 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 27 June 2008

Rafael Capurro

This paper aims to examine the present status of the research field intercultural information ethics (IIE) including the foundational debate as well as specific issues.

1676

Abstract

Purpose

This paper aims to examine the present status of the research field intercultural information ethics (IIE) including the foundational debate as well as specific issues.

Design/methodology/approach

A critical overview of the recent literature of the field is given.

Findings

The present IIE debate focuses on a narrow view of the field leaving aside comparative studies with non‐digital media as well as with other epochs and cultures. There is an emphasis on the question of privacy but other issues such as online communities, governmentality, gender issues, mobile phones, health care and the digital divide are on the agenda.

Originality/value

The paper addresses basic issues of IIE that may open new vistas for research and practice in this field.

Details

Journal of Information, Communication and Ethics in Society, vol. 6 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Content available
Article
Publication date: 6 September 2021

Charles M. Ess

Abstract

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 3
Type: Research Article
ISSN: 1477-996X

Article
Publication date: 10 August 2015

Anne Gerdes

This paper aims to explore human technology relations through the lens of sci-fi movies within the life cycle of the ETHICOMP conference series. Here, different perspectives on…

Abstract

Purpose

This paper aims to explore human technology relations through the lens of sci-fi movies within the life cycle of the ETHICOMP conference series. Here, different perspectives on artificial intelligent agents, primarily in the shape of robots, but also including other kinds of intelligent systems, are explored. Hence, IT-ethical issues related to humans interactions with social robots and artificial intelligent agents are illustrated with reference to: Alex Proyas’ I, Robot; James Cameron’s Terminator; and the Wachowski brothers’ Matrix. All three movies present robots cast in the roles of moral agents capable of doing good or evil. Steven Spielberg’s Artificial Intelligence, A.I. gives rise to a discussion of the robot seen as a moral patient and furthermore reflects on possibilities for care and trust relations between robots and humans. Andrew Stanton’s Wall-E shapes a discussion of robots as altruistic machines in the role as facilitators of a flourishing society. Steven Spielberg’s Minority Report allows for a discussion of knowledge-discovering technology and the possibility for balancing data utility and data privacy.

Design/methodology/approach

Observations of themes in sci-fi movies within the life span of the ETHICOMP conference series are discussed with the purpose of illustrating ways in which science fiction reflects (science) faction. In that sense, science fiction does not express our worries for a distant future, but rather casts light over questions, which is of concern in the present time.

Findings

Human technology interactions are addressed and it is shown how sci-fi films highlight philosophical questions that puzzle us today, such as which kind of relationships can and ought to be formed with robots, and whether the roles they play as social actors demand that one ought to assign moral standing to them. The paper does not present firm answers but instead pays attention to the selection and framing of questions that deserve attention.

Originality/value

To relate sci-fi movies to topics raised during the past 20 years of the ETHICOMP conference series, seemed to be an appropriate way of celebrating the 20-year anniversary of the ETHICOMP conference series.

Details

Journal of Information, Communication and Ethics in Society, vol. 13 no. 3/4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 2 September 2014

Issam Kouatli

The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to…

2072

Abstract

Purpose

The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. However, issues regarding such new hype of technology do not come without obstacles. These issues have to be addressed before full acceptability of cloud services in a globalized business environment. Businesses need to be aware of issues of concerns before joining the cloud services. This paper also highlights these issues and shows the comparison table to help businesses with appropriate decision-making when joining the cloud.

Design/methodology/approach

A historical review of emerged vulnerabilities as IT systems evolved was conducted, then these vulnerabilities were categorized into eight different categories, each of which composed of multiple vulnerability types. Simple scoring techniques were used to build a “risk” analysis table where each vulnerability type was given a score based on availability of matured solution and the likeliness of happening, then in case of vulnerability type, another score was used to derive the impact of such vulnerability. The resulted weighted score can be derived from the multiplication of likeliness to happen score with that of its impact in case it did happen. Percentage of seriousness represented by the percentage of the derived weighted score of each of the vulnerabilities can then be concluded. Similar table was developed for issues related to cloud computing environment in specific.

Findings

After surveying the historical background of IT systems and emerged vulnerabilities as well as reviewing the common malicious types of system vulnerabilities, this paper identifies 22 different types of vulnerability categorized in eight different categories. This comparative study explores amount of possible vulnerabilities in new technology like cloud computing services. Specific issues for cloud computing were also explored and a similar comparative study was developed on these issues. The result of the comparative study between all types of vulnerabilities since the start of IT system development till today’s technology of cloud computing, shows that the highest percentage vulnerability category was the one related to mobility access as mobile applications/systems are relatively newly emerged and do not have a matured security solution(s).

Practical implications

Learning from history, one can conclude the current risk factor in dealing with new technology like cloud computing. Businesses can realize that decision to join the cloud requires thinking about the issues mentioned in this paper and identifying the most vulnerability types to try to avoid them.

Originality/value

A new comparative study and new classification of vulnerabilities demonstrated with risk analysis using simple scoring technique.

1 – 7 of 7