Wiley the handbook of information and computer ethics may 2008 ISBN 0471799599 pdf

703 89 0
Wiley the handbook of information and computer ethics may 2008 ISBN 0471799599 pdf

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS Edited by Kenneth Einar Himma and Herman T Tavani THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS Edited by Kenneth Einar Himma and Herman T Tavani Copyright © 2008 by John Wiley & Sons, Inc All rights reserved Published by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the web at www.copyright.com Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008 Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose No warranty may be created or extended by sales representatives or written sales materials The advice and strategies contained herein may not be suitable for your situation You should consult with a professional where appropriate Neither the publisher nor the author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages For general information on our other products and services please contact our Customer Care Department within the U.S at 877-762-2974, outside the U.S at 317-572-3993 or fax 317-572-4002 Wiley also publishes its books in a variety of electronic formats Some content that appears in print, however may not be available in electronic formats Library of Congress Cataloging-in-Publication Data: The handbook of information and computer ethics / edited by Kenneth Einar Himma and Herman T Tavani p cm Includes index ISBN 978-0-471-79959-7 (cloth) Electronic data processing–Moral and ethical aspects I Himma, Kenneth Einar II Tavani, Herman T QA76.9.M65H36 2008 004.01’9–dc22 2007044568 Printed in the United States of America 10 For my wife, Maria Elias Sotirhos, and my nieces, Angela and Maria Katinas KEH In memory of my mother-in-law, Mary Abate HTT CONTENTS Foreword xi Deborah G Johnson Preface xiii Contributors xvii Introduction xxiii Kenneth Einar Himma and Herman T Tavani PART I: FOUNDATIONAL ISSUES AND METHODOLOGICAL FRAMEWORKS Foundations of Information Ethics Luciano Floridi Milestones in the History of Information and Computer Ethics 25 Terrell Ward Bynum Moral Methodology and Information Technology 49 Jeroen van den Hoven Value Sensitive Design and Information Systems 69 Batya Friedman, Peter H Kahn Jr., and Alan Borning PART II: THEORETICAL ISSUES AFFECTING PROPERTY, PRIVACY, ANONYMITY, AND SECURITY Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property 103 105 Adam D Moore Informational Privacy: Concepts, Theories, and Controversies 131 Herman T Tavani Online Anonymity 165 Kathleen A Wallace vii viii CONTENTS Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking 191 Kenneth Einar Himma PART III: PROFESSIONAL ISSUES AND THE INFORMATION-RELATED PROFESSIONS 219 Information Ethics and the Library Profession 221 Kay Mathiesen and Don Fallis 10 Ethical Interest in Free and Open Source Software 245 Frances S Grodzinsky and Marty J Wolf 11 Internet Research Ethics: The Field and Its Critical Issues 273 Elizabeth A Buchanan and Charles Ess 12 Health Information Technology: Challenges in Ethics, Science, and Uncertainty 293 Kenneth W Goodman 13 Ethical Issues of Information and Business 311 Bernd Carsten Stahl PART IV: RESPONSIBILITY ISSUES AND RISK ASSESSMENT 337 14 Responsibilities for Information on the Internet 339 Anton Vedder 15 Virtual Reality and Computer Simulation 361 Philip Brey 16 Genetic Information: Epistemological and Ethical Issues 385 Antonio Marturano 17 The Ethics of Cyber Conflict 407 Dorothy E Denning 18 A Practical Mechanism for Ethical Risk Assessment — A SoDIS Inspection 429 Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan PART V: REGULATORY ISSUES AND CHALLENGES 473 19 Regulation and Governance of the Internet 475 John Weckert and Yeslam Al-Saggaf 20 Information Overload David M Levy 497 SPECIAL ISSUES 657 there is the history of societies with its correspondent cognitive-emotional perceptions of the world, that is, of the web of human relations and contingent experiences, laid down in language and shared through oral and/or written traditions as the primordial medium of social cultural memory Even if we agree on the surface of our intercultural dialogues that one concept in one culture “in some way” corresponds to the other, their factical or historical resonance is different and leads to different options about to what is considered morally good or bad 27.4.2 Intellectual Property Dan Burk examines the question of intellectual property from the perspective of utilitarian and deontological traditions in the United States and Europe in contrast to some non-Western approaches (Burk, 2007) In the United States “intellectual property rights are justified only to the extent that they benefit the public in general,” which means that they could be eliminated “if a convincing case against public benefit could be shown” (Burk, 2007, p 96) The industries supporting copyright usually make the case for public benefit arising from the incentives offered by such constraints The European tradition regards creative work as reflecting the author’s personality According to Burk, two similar models of privacy regulation have emerged The United States has adopted a sectoral approach, “eschewing comprehensive data protection laws in favor of piecemeal treatment of the issue,” while the European Union has adopted an approach “based on comprehensive legislation, and grounded in strong, even inalienable individual rights” (Burk, 2007, pp 97–98) In China, the Confucian tradition largely denied the value of novel creative contribution by instead promoting the respect for the classical work that should be emulated Under this perspective, copying becomes a cardinal virtue For New Zealand Maori, creative works belong to the tribe or group, not to a single author Similarly, among some sub-Saharan communities as well as in the case of many Native American tribes the control of cultural property may be restricted to certain families In all these cases the goal of ownership is “to maintain such control, rather than to generate new works” (Burk, 2007, p 102).In line with arguments by Lawrence Lessig, Wolfgang Coy explores the question of sharing intellectual properties in global communities from a historical point of view Although there is a growing interest in commercially useful intellectual artifacts, there are still vast unregulated areas, for instance, native cultural practices, including regional cooking, natural healing, and use of herbal remedies (Coy, 2007) Similar alternatives to Western individualist conceptions and practices of privacy can be found in non-Western cultures, such as the indigenous African norms based on the concept of ubuntu that emphasizes communal values or in Japanese norms of information access as defined by “situated community.” 27.4.3 Online Communities Wolfgang S€ utzl compares different conceptions of locality in the Internet on the one hand and in the emerging localized “free networks” on the other, investigating the 658 INTERCULTURAL INFORMATION ETHICS ethical and intercultural status of both conceptions (S€utzl, 2007) Free networks are guided by the idea of the commons and the principle of sharing and participating in contrast to a closed conception of location as the negation of freedom Following Martin Heidegger and Emmanuel Levinas, Lucas Introna argues that communities are communities because their members already share concerns or a meaning horizon of ongoing being, that is, a world According to Introna the boundary between the insiders and the outsiders must continually remain unsettled Virtual strangers raise the possibility of “crossing” and questioning these boundaries But virtuality may also function to confirm them (Introna, 2007) Frances Grodzinsky and Herman Tavani examine some pros and cons of online communities particularly with regard to the digital divide and its effects at the local level, that is, in the United States as well as in other nations such as Malawi (Grodzinsky and Tavani, 2007a) 27.4.4 Governmentality Fernando Elitchirigoity discusses various facets of the Internet in the context of Michel Foucault’s notions of “governmentality” and “technologies of the self” (Elichirigoity, 2007) He argues that the emergence of new forms of informational empowerment not function independently from the informational practices that make them possible and, thus, need to be understood less as an absolute gain of freedom and more as the way freedom and power are continually produced and reproduced as processes of governmentality He analyzes the significance of these tools in connection with significant changes in retirement and pension programs in the United States and other Western countries 27.4.5 Gender Issues Britta Schinzel criticizes common attitudes within the computer professions and the working cultures in which they develop Alternative perspectives for responsible technological action may be derived from (feminist) situational, welfare-based closerange ethics or micro-ethics (Schinzel, 2007) According to Johny Søraker, it is possible to broaden the moral status of digital entities in case they have become “an irreplaceable and constitutive part of someone’s identity” (Søraker, 2007, p 17) The author draws insights from Western as well as from East Asian classical philosophy 27.4.6 Mobile Phones Theptawee Chokvasin shows how the condition of self-government arising from hi-tech mobilization affects Thai culture (Chokvasin, 2007) Buddhism encourages us to detach ourselves from our selves, the self having no existence of its own The Buddhist teachings of “self-adjustment” and “self-government” should not be misunderstood as if there is a “persistent person who acts as their bearer” (Chokvasin, 2007, p 78) Autonomy means to adjust oneself to the right course of living According SPECIAL ISSUES 659 to Chokvasin this Buddhist concept of autonomy can only be conceived by those who know the Buddhist teachings (dhamma) There is a kind of freedom in the Buddhist concept of autonomy that is related to impermanence (Anitya), suffering (Duhkha), and not-self (Anatta) Not clinging to our individual selves is the condition of possibility for moral behavior, that is, for “human nobility.” Chokvasin claims that the mobility made possible by the mobile phone makes possible a new view on individuality as an instrumental value at the cost of disregarding the morally good Richard Spinello argues that all regulators, but especially those in developing countries, should refrain from imposing any regulations on IP telephony intended to protect a state-sponsored telecom and its legacy systems (Spinello, 2007) 27.4.7 Health Care In their analysis of cross-cultural ethical issues of the current and future state of ICT deployment and utilization in healthcare, Bernd Stahl, Simon Rogerson, and Amin Kashmeery argue that the ethical implications of such applications are multifaceted and have diverse degrees of sensitivity from culture to culture (Stahl et al., 2007) They use the term “informatics” instead of information systems or computer science because it is more inclusive and socially oriented For the purpose of this study, culture is being defined as the totality of shared meanings and interpretations They write: “An important aspect of culture is that it has a normative function This means that cultures contain an idea of how things should be and how its members are expected to behave This means that they are inherently utopian and imply a good state of the world” (Stahl et al., 2007, p 171) The normative character of culture is transmitted through morality, values as well as tenets and creeds that are called by the authors “metaethics.” Cultures are deeply linked to the question of identity The authors see a close link between culture and technology starting with agricultural cultures and, nowadays, with the importance of ICT for our culture(s) Applications of ICT in health care raise not only a policy but also an ethics vacuum that becomes manifest in the debate on values-based practice (VBP) versus evidence-based practice (EBP) of decision making The authors analyze cases of Western and non-Western cultures in order to show the complexity of the issues they deal with British culture is an example of Western liberalism, utilitarianism, and modernism that is fundamentally appreciative of new technologies This modernist view overlooks the pitfalls of health care as a complex system with conflicting actors and interests In Islamic cultures, governed by the Shari’a code of conduct, the question of, for instance, “a male healthcare provider to examine a female patient (or vice versa) are hot debate topics” (Stahl et al., 2007, p 178) The authors present six scenarios in order to give an idea of such ethical conflicts when dealing with ICT in health care 27.4.8 Digital Divide Lynettee Kvasny explores the existential significance of the digital divide for America’s historically underserved populations (Kvasny, 2007) According to Kvasny, the increased physical access to ICT does not signal the closure of the digital divide in 660 INTERCULTURAL INFORMATION ETHICS the United States She writes: “For me, the digital divide is fundamentally about evil— it is a painful discourse softened through statistics and dehumanized by numbers [ .] Instead of understanding the everyday practices of people who historically have been excluded from the eWorld and developing technology services and information sources to serve their unique needs, the more common response is to convert and educate the backward masses We produce discourses that discount their values and cultures and show them why they need to catch up.” (Kvasny, 2007, p 205) In other words, she refuses the instrumental depiction of the digital divide (Britz, 2007; Himma, 2007) 27.5 CONCLUSION IIE is an emerging discipline The present debate shows a variety of foundational perspectives as well as a preference for the narrow view that focuses IIE on ICT Consequently comparative studies with other media and epochs have mostly not been considered so far With regard to IIE issues in today’s information societies, there are a lot of cultures that have not been analyzed, such as Eastern Europe and the Arabic world Asia and the Pacific is represented by Japan, China, and Thailand Latin America and Africa are still underrepresented I plead for the enlargement of the historical scope of our field beyond the limited horizon of the present digital infospheres even if such a view is not an easy task for research IIE is in this regard no less complex than, say, comparative literature IIE not only deals with the question of the impact of ICT on local cultures but explores also how specific ICT issues or, more generally, media issues, can be analyzed from different IIE perspectives The present debate emphasizes the question of privacy, but other issues such as online communities, governmentality, gender issues, mobile phones, health care, and, last but not least, the digital divide are on the agenda New issues such as blogs and wikis are arising within what is being called Web 2.0 We have to deepen the foundational debate on the sources of morality from a IIE perspective According to Michel Foucault, ethics can be understood not just as the theory but as the “problematization” of morality (Foucault, 1983) IIE has a critical task to achieve when it compares information moralities This concerns the ontological or structural as well as the ontic or empirical levels of analysis One important issue in this regard is the question of the universality of values versus the locality of cultures and vice versa that is related to the problem of their homogeneization or hybridization as well as the question of the relation between cognition and moods and the corresponding (un-) successful interplay between information cultures REFERENCES African Information Ethics Conference (2007) Proceedings International Review of Information Ethics, Online: http://www.i-r-i-e.net ANIE (African Network for Information Ethics) (2007) Online: http://www.africainfoethics org REFERENCES 661 Baier, K (2006) Welterschliessung durch Grundstimmungen als Problem interkultureller Phaenomenologie Daseinsanalyse 22, 99–109 Barber, G (2001) Jihad vs McWorld Ballentine, New York Bhattarakosol, P (2007) Interactions among thai culture, ICT, and IT ethics In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 138–152 Britz, J (2007) The Internet: the missing link between the information rich and the information poor? In: Capurro, R Fr€uhbauer, J and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 265–277 Burk, D.L (2007) In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 94–107 Bynum, T.W (2006) Flourishing ethics Ethics and Information Technology, 8, 157–173 Capurro, R (2005a) Between trust and anxiety: on the moods of information society In: Richard, K (Ed.), Communication Ethics Today Troubadour Publishing Ltd., Leicester, pp 187–196 Online: http://www.capurro.de/lincoln.html Capurro, R (2005b) Privacy: an intercultural perspective Ethics and Information Technology, 7, 37–47 Capurro, R (2006a) Toward an Ontological Foundation of Information Ethics and Information Technology, 8, 157–186 Capurro, R (2006b) Ethik der Informationsgesellschaft Ein interkultureller Versuch Online: http://www.capurro.de/parrhesia.html Capurro, R (2007a) Intercultural information ethics In: Capurro, R Fr€ uhbauer, J and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 21–38 Capurro, R (2007b) Information Ethics for and from Africa International Review of Information Ethics, Online: http://www.capurro.de/africa.html Capurro, R., Scheule, R.M (2007) Fruit, water, and philosophy Intercultural perspectives on the Web In: Capurro, R Fr€uhbauer, J and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 323–332 Capurro, R., Fr€uhbauer, J and Hausmanninger, T (Eds.) (2007) Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich Chokvasin, T (2007) In Hongladarom, S and Ess, C (Eds.) Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 68–80 Coy, W (2007) On sharing ideas and expressions in global communities In: Capurro, R Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 279–288 Damasio, A (1994) Descartes’ Error: Emotion, Reason, and the Human Brain Putnam Publishing Dreyfus, H.L (1991) Being-in-the-World A Commentary on Heidegger’s Being and Time, Division I The MIT Press Eldred, M (2006) Technology, Technique, Interplay: Questioning Die Frage nach der Technik Online: http://www.webcom.com/artefact/untpltcl/tchniply.html 662 INTERCULTURAL INFORMATION ETHICS Elichirigoity, F (2007) The internet, information machines, and the technologies of the self In: Capurro, R., Fr€uhbauer, J and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 289–300 Ess, C (2005) Lost in translation?: Intercultural dialogues on privacy and information ethics (Introduction to special issue on privacy and data privacy in Asia) Ethics and Information Technology, 7, 1–6 Ess, C (2006) Ethical pluralism and global informaion ethics Ethics and Information Technology, 8, 215–226 Ess, C (2007) Can the local reshape the global? ethical imperatives for humane intercultural communication online In: Capurro, R., Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 153– 169 Figueroa, A and Hugo, A (2007) Collective construction of identity in the internet: ethical dimension and intercultural perspective In: Capurro, R., Fr€ uhbauer, J., and Hausmanninger, T (Eds), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 229–241 Finquelievich, S (2007) A toolkit to empower communities in Latin America In: Capurro, R., Fr€uhbauer, J and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 301–319 Floridi, L (2006) Information technologies and the tragedy of the Good Will Ethics and Information Technology, 8, 253–262 Floridi, L and Savulescu, J (2006) Information ethics: agents, artefacts and new cultural perspectives Ethics and Information Technology, 8, 155–156 Foucault, M (1983) Discourse and Truth: The Problematization of Parrhesia University of California at Berkeley, October–November 1983 Online: http://foucault.info/documents/ parrhesia/ (visited on May 30, 2007) Froehlich, T (2004) A brief history of information ethics In Textos universitaris de biblioteconomia i documentacio Nr 13 Online: http://www.ubes/bid/13froel2.htm (visited on May 30, 2007) Frohmann, B (2007) Foucault, Deleuze, and the ethics of digital networks In: Capurro, R., Fr€uhbauer, J and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 57–68 Gendlin, E.T (1978) Befindlichkeit: (1) Heidegger and the Philosophy of Psychology Review of Existential Psychology & Psychiatry: Heidegger and Psychology Vol XVI, pp 1–3 Online: http://www.focusing.org/gendlin_befindlichkeit.html (visited on May 30, 2007) Grodzinsky, F.S and Tavani, H.T (2007a) The internet and community building at the local and global levels: some implications and challenges In: Capurro, R., Fr€ uhbauer, J and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 135–149 Grodzinsky, F.S and Tavani, H.T (2007b) Online communities, democratic ideals, and the digital divide In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives, Idea Group, Hershey, PA, pp 20–30 Hausmanninger, T (2007) Allowing for difference some preliminary remarks concerning intercultural information ethics In: Capurro, R., Fr€ uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 39–56 REFERENCES 663 Heidegger, M (1987) Being and Time Translated by John Macquarrie & Edward Robinson, Basil Blackwell, Oxford Herdin, T., Hofkirchner, W., and Maier-Rabler, U (2007) In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 54–67 Himma, K.E (2007) The information gap, the digital divide, and the obligations of affluent nations International Review of Information Ethics, Hiruta, K (2006) What pluralism, why pluralism, and how? A response to Charles Ess Ethics and Information Technology, 8, 227–236 Hongladarom, S (2001) Cultures and Global Justice Online: http://www.polylog.org/them/3/ fcshs-en-htm (visited on May 30, 2007) Hongladarom, S (2007) Analysis and justification of privacy from a Buddhist perspective In: Hongladarom, S., and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 108–122 Hongladarom, S and Ess, C (Eds.), (2007a) Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA Hongladarom, S and Ess, C (Eds.) (2007b) Preface Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp xi–xxxiii International Review of Information Ethics (IRIE) (2004) International ICIE Symposium Online: http://www.i-r-i-e.net Introna, L.D (2007) Virtual Strangers—on the social and ethical conditions of virtual communities In: Capurro, R., Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 95–108 Jackson, W and Mande, I (2007) New Technologies and Ancient Africa: the impact of new information and communication technologies in sub-Saharian Africa In: Capurro, R., Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 171–176 Jullien, F (1995) Fonder la Morale Grasset, Paris Kitiyadisai, K (2005) Privacy rights and protection: foreign values in modern Thai context Ethics and Information Technology, 7, 17–26 Kuhn, T.S (1962) The Structure of Scientific Revolutions The University of Chicago Press Kvasny, L (2007) The Existential significance of the digital divide for America’s historically underserved populations In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA pp 200–212 Ladd, J (1985) The quest for a code of professional ethics: an intellectual and moral confusion In: Johnson, D.G and Snapper, J.W (Eds.), Ethical Issues in the Use of Computers Belmont, CA, pp 8–13 Levinas, E (1968) Totalite et Infini Essai sur l’ext eriorit e Nijhoff, The Hague L€ u, Y (2005) Privacy and data privacy in contemporary China Ethics and Information Technology, 7, 7–15 L€ u, Y (2007) Globalization and informatioan ethics In: Capurro, R., Fr€ uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 69–73 € Luhmann, N (1990) Paradigm lost Uber die ethische Reflexion der Moral Suhrkamp, Frankfurt am Main 664 INTERCULTURAL INFORMATION ETHICS Magnani, L (2007) The Mediating Effect of Material Cultures as Human Hybridization Online Communities, Democratic Ideals, and the Digital Divide Nakada, M (2007) The Internet within Seken as an old and indigenous world of meanings in Japan In: Capurro, R., Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 177–203 Nakada, M and Tamura, T (2005) Japanese conceptions of privacy: an intercultural perspective Ethics and Information Technology, 7, 27–36 Nath, V (2007) Digital governance models: towards empowerment and good governance in developing countries In: Capurro, R., Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 77–94 Nietzsche, F (1999) Menschliches, Allzumenschliches In: Giorgio, C and Mazzino, M (Eds.), Kritische Studienasugabe Vol dtv, Munich Nietzsche, F (1999) Nachgelass 1884–1885 In: Giorgio, C and Mazzino, M (Eds.), Kritische Studienausgabe, Vol 11 dtv, Munich Nishigaki, T (2006) The ethics in Japanese information society: consideration on Fracisco Varela’s The Embodied Mind from the perspective of fundamental informatics Ethics and Information Technology, 8, 237–242 Nishigaki, T and Takenouchi, T (Eds.) (2007) The Thought of Information Ethics Communis 05 (in Japanese) Tokyo Olinger, H.N., Britz, J.J., and Olivier, M.S (2005) Western privacy and ubuntu: influences in the forthcoming data privacy bill In: Philip, B., Frances, G., and Lucas, I (Eds.), Ethics and New Information Technology, CEPE 2005, Enschede, The Netherlands, pp 291–306 Paterson, B (2007) We cannot eat data: the need for computer ethics to address the cultural and ecological impacts of computing In: Hongladarom, S and Ess, C (Eds.), Infor-mation Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 153–168 Pimienta, D (2007) At the boundaries of ethics and cultures Virtual communities as an open ended process carrying the will for social change (the “MISTICA” experience”) In: Capurro, R., Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 205–228 Ramasoota Rananad, P (2007) Information privacy in a surveillance state: a perspective from Thailand In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 124–137 Ramose, M.B (2002) Globalization and ubuntu In: Coetzee, P and Roux, A Philosophy from Africa A Text with Readings 2nd edition Oxford University Press, pp 626–650 Robertson, R (1992) Globalization Sage, London Roth, K (2001) Material culture and intercultural communication International Journal of Intercultural Communication, 25, 563–580 Schinzel, B (2007) Gendered views on the ethics of computer professionals In: Capurro, R., Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 121–134 Sontag, S (2004) Die Welt als Indien In Lettre International, September, Vol 65, 82–86 Søraker, J.H (2007) The moral status of information and information technologies: a relational theory of moral status In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 1–19 REFERENCES 665 Spinello, R.A (2007) Laissaz-Faire or regulation? Social and policy implications for IP telephony In: Capurro, R Fr€uhbauer, J., and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 109–119 Stahl, B.C., Rogerson, S., and Kashmeery, A (2007) Current and future state of ICT development and utilization in healthcare: an anaylsis of cross-cultural ethical issues In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 169–183 S€ utzl, W (2007) Internet and free networks From world-networking to place-networking In: Capurro, R., Fr€uhbauer, J and Hausmanninger, T (Eds.), Localizing the Internet Ethical Aspects in Intercultural Perspective Fink, Munich, pp 243–262 Takenouchi, T (2006) Information ethics as information ecology: connecting Frankl’s thought and fundamental informatics Ethics and Information Technology, 8, 187–193 Tshwane Declaration on Information Ethics in Africa (2007) Online: http://www.africainfoethics.org/tshwanedeclaration.html van der Velden, M (2007) In: Hongladarom, S and Ess, C Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 81–93 Walzer, M (1994) Thick and Thin: Moral Arguments at Home and Abroad University of Notre Dame Press, Notre Dame Weckert, J (2007) Foreword In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, p x Welsch, W (1999) Transculturality—The puzzling form of cultures today In: Featherstone, M and Lash, S (Eds.), Spaces of Culture: City, Nation, World Sage, London, pp 194–213 Online: http://www2.uni-jena.de/welsch/Papers/transcultSociety.html (visited on May 30, 2007) Wieviorka, M (2003) Kulturelle Differenzen und kollektive Identit€ aten Hamburger Edition, Hamburg Wittgenstein, L (1984) Zu Heidegger In: McGuiness, B.F (Ed.), Ludwig Wittgenstein und der Wiener Kreis Gespr€ ache, aufgezeichnet von Friedrich Waismann Suhrkamp, Frankfurt am Main Wittgenstein, L (1989) Vortrag u€ber Ethik Suhrkamp, Frankfurt am Main Wurman, R (2001) Information Anxiety Indianapolis, IN Yamamoto, G.T and Karaman, F (2007) Business Ethics and Technology in Turkey: An emerging country at the crossroad of civilizations In: Hongladarom, S and Ess, C (Eds.), Information Technology Ethics: Cultural Perspectives Idea Group, Hershey, PA, pp 184–199 INDEX access to information, 574 access to expression versus censorship, 574 access-and-equity issues, 573–588 accessibility privacy, 135–136 active response to hacking, 422 Adam, Alison, xvii, xxx, 156, 320–321, 589–619 agency, 373–374 Alfino, Mark, 6, 134, 148 Allen, Anita, 141–142, 157 Al-Saggaf, Yeslam, xvii, xxviii–xxx, 475–496 anonymity attribution bias, 177–179 concept of, 167–168 definition of, 165 features of complex social structures, 165–167 ethical issues of, 175–177 identity theft, 181–182 Anscombe, Elizabeth, 53 anti-spam measures, 526–529 applied ethics, 51–60 approaches to system design, 71 Aristotle, 124 Assimov, Isaac, 18 autonomy, 143, 260, 656 avatars, 373–374 Benn, Stanley, 157 Berne Convention, 107 behavior in virtual environments, 372–373 Bok, Sisela, 142 Borning, Alan, xvii, xxiv, 69–99 Bottis, Maria Canellopoulou, xvii, xxx, 621–638 Boyd v United States, 136 Brandeis, Louis, 135–136 Branscomb, Ann, 134 Brey, Philip, xvii, xxvii, 36, 51, 63, 320, 361–384 Buchanan, Elizabeth, xvii, xxvii, 9, 273–292 Buddhist ethics, 643, 646, 655–658 business ethics, 313–318 business-ethical issues in information, 311–336 business ethics and computer ethics, 318–319 Bynum, Terrell Ward, xi, xvii–xviii, xxiii–xxiv, 4, 9, 64, 25–48, 646–647 Capurro, Rafael, xviii, xxx–xxxi, 5, 18, 639–661 categorial privacy, 151 censorship arguments against, 579–585 definition of, 576–579 types of harm, 579–585 Clarke, Roger, 134, 159 Clear, Tony, xviii, xxviii, 429–472 communities in cyberspace, 607 computer games, 377–381 computer mediated communication (CMC), 650 computer monitoring and surveillance, workplace, 154–155, 322–323 consumer privacy, 151–152 The Handbook of Information and Computer Ethics Edited by Kenneth Einar Himma and Herman T Tavani Copyright Ó 2008 John Wiley & Sons, Inc 667 668 INDEX computer security, 191–218 computer simulation, 361–384 confidentiality, 294–298 content regulation, 477 control theory of privacy, 142–144 cookies technology, 74, 151–152 counterhacking, 191–218 Custers, Bart, 135 cyberattacks, 415–440 cyberconflict and ethics, 407–429 cyberrape, 374 cyberstalking, 606–607 cyberwarfare, 409–410 data mining, 152–154 data monitoring and recording, privacy techniques, 152–155-156 DeMay v Roberts, 136 DeCew, Judith, 132–134, 139, 157–159, 607 decisional privacy, 136–137 denial of service attacks, 412 Denning, Dorothy, xviii, xxviii, 407–428 deontological ethics, 320 digital divide, 328–329,621–638, 659–660 digital rights management (DRM), 254–256, 323–324 distributed denial of service (DDoS), 412 Dreyfus, Hubert, 166–167, 642 Dworkin, Ronald, 19, 580 effective regulation of the Internet, 385–402 Einstein, Albert, 19 Eisenstadt v Baird, 136–137 Elgesem, Dag, 142 employee privacy and surveillance, 154–155, 322–323 e-mail spam, 517–532 empricial investigations affecting information, 72–73 epistemological issues affecting information, 385–402 Ess, Charles, xviii, xxvi, 7, 9, 273–292, 609, 639–640, 640–645, 650, 653–654, 656 ethical behavior, 599–601 ethics of cyber conflict, 407–428 e-voting in UK, 448 Etzioni, Amatai, 135, 158, 582 facebook, 166 Fallis, Don, xvii, xxv–xxvi, 221–244 feminist computer ethics, 611–615 feminist ethics, 591–592 Floridi, Luciano, xviii, xxiii, 3–24, 33, 37–39, 49, 64, 132–141, 147–150, 320, 640 flourishing ethics, 641 foundational debate in morality, 640–644 foundational issues in information ethics, 3–24 free software, 246–250 Free Software Foundation (FSF), 245–250 free speech versus censorship, 476–579 freedom and autonomy, 143, 656 freedom and privacy, 135–137 Freidman, Batya, xvi, xxii, 36, 60, 69–99 Fried, Charles, 142, 157 Gauthier, David, 123–124, 314 Gavison, Ruth, 141–142 gender and computer ethics, 589–620, 658 gender and computer games, 380–381 general public license (GPL), 246–250, 253, 255 genetic information, 385–406 Gert, Bernard, 49, 54, 318 Gilligan, Carol, 591, 593, 603, 610 global information divide, 621–622 globalization, 327–328, 646, 649 GNU/Linux, 267 GNU Manifesto, 246–250 Goodman, Kenneth, xviii, xxvi, 293–319 Gotterbarn, Don, xix, xxviii, 35–36, 63, 159, 266, 429–471 Griswold v Connecticut, 137–141 Grodzinsky, Frances, xix, xxvi, 64, 245–271, 558–589, 650, 658 hacker communities, 607 hacking active responses against and hacking back, 422–426 motivated for benign purposes, 193–196 prima facie case against, 192–193 gender issues affecting, 606–607 hacktivism, 186–205, 415–422, 615 Hauptman, Robert, healthcare privacy, 152–154 INDEX health information technology, 293–310 Health Insurance Portability and Accountability Act (HIPAA), 152–153 Heidegger, Martin, 641–644, 658 Himma, Kenneth, xix, xxv, xxx , 18, 33, 65, 126, 158, 191–218, 559, 584, 621–638, 660 history of information ethics, 25–48 Hobbes, Thomas, 132 Hume, David, 120 Hunter, Larry, 134 identity theft, 181–182 information concept of, 385–386 definition of, 499–500 genetic, 382–392 overload, 497–499 theory of, 386–387 information divide and poverty, 622–624 information overload, 497–516 informational-privacy theories, 141–151 informed consent and cookies, 76 infosphere, 3–5 intellectual property defined, 105–107 digital rights management (DRM), 323–324 labor theory of property, 119–128 personality theory of property, 108–110 rule-utilitarian theory of property, 110–119 intercultural information ethics, 497–516 Internet regulation issues, 475–496 Internet research ethics, 221–244 Internet responsibility issues, 339–360 Internet service providers (ISPs), 343–349 Innes, Julie, 136–137 Introna, Lucas, 36, 60, 154, 658 Johnson, Deborah G., xi–xii, xix, 18, 32–33, 157, 266, 343 Kahn, Peter, H, Jr., xix, xxiv, 69–99 Kant, Immanuel, 7, 108, 124, 645, 655 Kantian deontological tradition, 58, 320, 343, 348, 645 KaZaA, 554 Kwan, Choon-Tuck, xix, xxviii, 429–472 669 Ladd, John, 644 legal jurisdiction and regulation, 481–491 Lessig, Lawrence, 60, 560 Levy, David M., xix, xxix, 497–516 Levy, Steven, 205, 607–608, 610 library profession children’s access to information, 233–236 classification and labeling, 230–233 core values, 222–226 selection, bias, and neutrality, 226–230 library professionals and information technology, 221–224 Linux, 250–262, 267 location privacy, 155–156 Locke, John, 119–122, 132 Lockton, Vance, 155 MacKinnon, Catherine, 157–158 macroethical approach to information ethics, 9, 11, 14 Maner, Walter, 5, 31–32, 63 Marturano, Antonio, xix, xxvii–xxviii, 385–406 Mather, Karen, 7, 33 Mathiesen, Kay, xix–xx, xxv–xxvi, xxvii–xxviii, 7, 18–19, 221–244, 573–588 Marx, Gary, 168–169 McCloskey, H J., 131, 133, 138 medical privacy, 152–154 methodological considerations, 49–68 MGM v Grokster, 553, 561–563 microethical approach to information ethics, Mill, John Stuart, 7, 132, 485–486, 591 Miller, Arthur, 142 Miller, Keith, xx, xxix, 63, 517–532 mobile phones, 658 Moor, James H., xi, xx, xxix, 7, 33–35, 49, 132, 143–146, 157, 160, 517–532 Moore, Adam D., xx, xxiv–xxv, 105–130, 132, 157 Moore, Barrington, 132 Moore, G E., 71 moral agents, 14–16 moral cognitivism, 640–644 moral noncognitivism, 640–644 moral methodology, 49–68 670 INDEX moral principles, 1618 MP3, 558 Myspace, 166 Napster controversy, 553–554 Nissenbaum, Helen, 36, 49, 60, 70, 133, 141–144, 186, 266 Nietzsche, Frederick, 642 noosphere, 256, 258–259 Nozick, Robert, 54, 113, 120, 123, 558 O’Neill, Onora, 49, 53, 153 online anonymity, 165–190 online communities, 657–658 online file sharing, challenges of, 553–570 open source software (OSS), 256–264 ontological theory of privacy, 148–150 P2P architectures, 554–555, 560 P2P networks, 554, 560 Parent, W A, 132–133, 139, 141 personal privacy See privacy personal health records, 304–305 personality theory of property, 108–110 physical privacy, 135–136 plagiarism concept of, 533–536 authorization and economic foundation, 537–541 moral rights, 541–545 noninfringing plagiarism, 545–549 Plato, 185–186 Posner, Richard, 65, 158 Pretty Good Privacy (PGP), 152, 159 privacy accessibility privacy, 146–151 benchmark theories, 146–151 concept of, 131–135 confidentiality and, 294–298 control over flow of personal information, 139–141 cookies, 151–152 contextual integrity, 141–145 control theory, 142–144 data mining, 152–154 decisional privacy, 136–137 freedom from interference, 136–138 freedom from unwarranted intrusion, 135–136 ontological theory, 148–150 privacy-enhancing tools (PETs), 152, 159 psychological privacy, 137–138 RALC theory, 144–146 restricted access theory, 141–142 privacy-enhancing tools (PETs), 152, 159 privacy policies, 158–160 professional ethics, 221–244, 381–382 property See intellectual property qualititative research methodologies, 597–599 quantitative research methodologies, 597–599 Quine, W V O., 57 Rachels, James, 142 radio frequency identification (RFID), 155–156 Rawls, John, 6, 20, 57, 59, 124, 314 Raymond, Eric, 245, 250, 256–263, 268 Regan, Priscilla, 132, 137, 137, 158 reflective equilibrium, 56–57 representation and simulation, 369–370 responsibility issues on the Internet, 339–360 restricted access theory of privacy, 141–142 restricted access/limited control (RALC) theory of privacy, 144–146 RIAA v Verizon, 553 risk assessment ethical issues, 435–436 evolving practices, 430–435 generic standards, 430–435 SoIDS audit process, 437–447 Rosen, Jeffrey, 138 rule-utilitarian theory of property, 110–119 Sanders, J W., 3–5, 10–12, 15–16, 33, 37–39 secondary liability for ISPs, 560–561 Scanlon, Thomas, 133 Snapper, John, xx, xxix, 533–552 SoIDS Inspection, 429–472 Solove, Daniel J 132 Spafford, Eugene, 193 INDEX 671 spam anti-spam measures, 526–529 definition of, 517 email, 518–526 ethics of, 526–529 history of, 517–518 legislation, 529–530 Spinello, Richard A., xx, xxix, 7–8, 132, 134, 155, 320, 477, 553–570, 659 Stahl, Bernd Carsten, xx, xxvi–xxvii, 311–336, 659 stakeholders, 80, 438 Stallman, Richard, 246–250, 253, 267–268 surveillance and computer monitoring in the workplace, 154–155 Tong, Rose Marie, 589–590 Torvald, Linus, 245, 255–257, 262 Tavani, Herman T., xx, xxv, 4, 33, 49, 131–164, 191, 321, 481, 558–559, 650, 658 technical investigations, 75 theories of privacy benchmark theories, 146–151 contextual integrity theory, 141–145 control theory, 142–144 ontological theory, 148–145 RALC theory, 144–146 restricted access theory, 141–142 theories of property labor theory, 119–128 personality theory, 108–110 rule-utilitarian theory, 110–118 Thomson, Judith Jarvis, 133–134, 141 Wallace, Kathleen, xxi, xxv, 165–190 Warren, Samuel, 135 Weckert, John, xxi, xxviii–xxx, 173, 320, 475–496 Westin, Anthony, 132, 138 Weiner, Norbert, xxiii, 25–31, 36, 647 Weizenbaum, Joseph, xi, 31 Whalen v Roe, 134 Winner, Langdon, 61, 609 Wittgenstein, Ludwig, 10, 522, 642 Wolf, Marty J., xxi, xxvi, 245–272 women in computing, 604–606 workplace privacy and surveillance, 154–155, 322–323 utilitarian theory of property, 110–118 value sensitive design (VSD), 60–61, 69–102 van den Hoven, Jeroen, xx, xxiv, 6–7, 49–68, 133, 156 Vedder, Anton, xvii, xxvii, 150–151, 153–154, 339–360 virtual child pornography, 371–372 virtual economy, 375–377 virtual reality, 361–384 Volkman, Richard, 133 Zimmer, Michael, 148 .. .THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS Edited by Kenneth Einar Himma and Herman T Tavani THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS. .. appearance of these first works, the field of computer ethics has flourished enormously Of course, the development of the field has gone hand-in-hand with the development of computer and information. .. have come to the field more recently For this reason, I applaud the efforts of Kenneth Himma and Herman Tavani and welcome the publication of The Handbook of Information and Computer Ethics DEBORAH

Ngày đăng: 20/03/2019, 14:42

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan