This category needs an editor. We encourage you to help if you are qualified.
Volunteer, or read more about what this involves.
Related categories
Siblings:
51 found
Search inside:
(import / add options)   Order:
1 — 50 / 51
  1. Carusi Annamaria & De Grandis Giovanni (2012). The Ethical Work That Regulations Will Not Do. Information, Communication and Society 15 (1):124-141.
    Ethical concerns in e-social science are often raised with respect to privacy, confidentiality, anonymity and the ethical and legal requirements that govern research. In this article, the authors focus on ethical aspects of e-research that are not directly related to ethical regulatory framework or requirements. These frameworks are often couched in terms of benefits or harms that can be incurred by participants in the research. The authors shift the focus to the sources of value in terms of which benefits or (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  2. S. G. Arnal (2001). Gordon Graham The Internet://A Philosophical Inquiry. Journal of Applied Philosophy 18 (3):311-311.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  3. Andrea J. Baker (2009). Mick or Keith: Blended Identity of Online Rock Fans. [REVIEW] Identity in the Information Society 2 (1):7-21.
    This paper discusses the “blended identity” of online rock fans to show that the standard dichotomy between anonymous and real life personas is an inadequate description of self-presentation in online communities. Using data from an ethnographic, exploratory study of an online community and comparison groups including interviews, an online questionnaire, fan discussion boards, and participant/observation, the research analyzes fan identity online and then offline. Rolling Stones fans often adopt names that illustrate their allegiance to the band, along with avatars. Issues (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  4. Christopher Banthin, Douglas Blanke & John Archard (2004). Legal Approaches to Regulating Internet Tobacco Sales. Journal of Law, Medicine & Ethics 32 (s4):64-68.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  5. D. Barnard-Wills & D. Ashenden (2010). Public Sector Engagement with Online Identity Management. Identity in the Information Society 3 (3):657-674.
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government and governmentality. This approach draws attention to the wide assemblage of public and private actors (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  6. Connie R. Bateman, Sean Valentine & Terri Rittenburg (2013). Ethical Decision Making in a Peer-to-Peer File Sharing Situation: The Role of Moral Absolutes and Social Consensus. [REVIEW] Journal of Business Ethics 115 (2):229-240.
    Individuals are downloading copyrighted materials at escalating rates (Hill 2007; Siwek 2007). Since most materials shared within these networks are copyrighted works, providing, exchanging, or downloading files is considered to be piracy and a violation of intellectual property rights (Shang et al. 2008). Previous research indicates that personal moral philosophies rooted in moral absolutism together with social context may impact decision making in ethical dilemmas; however, it is yet unclear which motivations and norms contextually impact (...) awareness in a peer-to-peer (P2P) file sharing context (Shang et al. 2008). In sum, factors affecting the decision to share copyrighted material require further clarification and investigation (Shang et al. 2008). The purpose of this study was to use a consumer-based scenario and multiple ethics measures to explore how idealism, formalism, and perceived social consensus impact users’ propensity to recognize that the sharing of copyrighted media through P2P networks was an ethical issue and their subsequent ethical intentions. Results showed that high levels of idealism and formalism were associated with an increased recognition that file sharing was an ethical issue, but neither construct had a direct effect on ethical intention. Strong social consensus among respondents that other people consider file sharing to be unethical was also positively related to the recognition that file sharing was an ethical issue, and ethical recognition was a moderate predictor of intention not to engage in file sharing. Finally, a post hoc mediation analysis indicated that idealism, formalism, and social consensus operated through recognition of an ethical issue to impact ethical intention (indirect-only mediation). (shrink)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  7. Ashok J. Bharucha, Alex John London, David Barnard, Howard Wactlar, Mary Amanda Dew & Charles F. Reynolds (2006). Ethical Considerations in the Conduct of Electronic Surveillance Research. Journal of Law, Medicine & Ethics 34 (3):611-619.
    The extant clinical literature indicates profound problems in the assessment, monitoring, and documentation of care in long-term care facilities. The lack of adequate resources to accommodate higher staff-to-resident ratios adds additional urgency to the goal of identifying more costeffective mechanisms to provide care oversight. The ever expanding array of electronic monitoring technologies in the clinical research arena demands a conceptual and pragmatic framework for the resolution of ethical tensions inherent in the use of such innovative tools. CareMedia is a project (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  8. Anat Biletzki (2013). Online Security: What's in a Name? [REVIEW] Philosophy and Technology 26 (4):397-410.
    This article motions to a real contradiction between online security and civil rights. It traverses semantic and conceptual elaborations of both security and human rights, narrowing their range to national security and human rather than civil rights, and suggests that the concept of security itself, whether online or not, is a rhetorical instrument in the hands of interested parties, mostly states and militaries. This instrument is used to undermine human rights precisely by means of its association and even identification with (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  9. David G. W. Birch (2008). Psychic ID: A Blueprint for a Modern National Identity Scheme. [REVIEW] Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? Can we assemble a (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  10. Stephanic J. Bird & Diane Hoffman-Kim (1998). Damned If You Do, Damned If You Don't: The Scientific Community's Responses to Whistleblowing. Science and Engineering Ethics 4 (1):3-6.
    The papers in this issue are based on presentations by the authors at the 163nd National Meeting of the American Association for the Advancement of Science, Seattle, Washington, 13–18 February 1997 in the session entitled Damned If You Do, Damned If You Don’t: What the Scientific Community Can Do about Whistleblowing organized by Stephanie J. Bird and Diane Hoffman-Kim. The papers have been modified following double blind peer review.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  11. Pamela Bluh (2006). "Open Access," Legal Publishing, and Online Repositories. Journal of Law, Medicine & Ethics 34 (1):126-130.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  12. Elizabeth Buchanan (2006). Introduction: Internet Research Ethics at a Critical Juncture. Journal of Information Ethics 15 (2):14-17.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  13. Elizabeth Buchanan (2004). The Internet as Friend or Foe of Intellectual Freedom. International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  14. Ian Budge (1996). Bytes That Bite: The Internet and Deliberative Democracy. Constellations 4 (2):248-263.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  15. Teresa Blankmeyer Burke (2012). A Disability Response to Surrogate Decision Making in the Internet Age. American Journal of Bioethics 12 (10):36-37.
    The American Journal of Bioethics, Volume 12, Issue 10, Page 36-37, October 2012.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  16. Mei-Fang Chen & Ya-Hui Yen (2011). Costs and Utilities Perspective of Consumers' Intentions to Engage in Online Music Sharing: Consumers' Knowledge Matters. Ethics and Behavior 21 (4):283 - 300.
    Online music sharing, deemed illegal for invading intellectual property rights under current laws, has become a crucial issue for the music industry in the modern digital age, but few have investigated the potential costs and utilities for individuals involved in such online misbehavior. This study aimed to fill in this gap to predict consumers' intentions to engage in online music sharing and further consider consumers' online music sharing knowledge as a moderator in the research model. The results of repeated measures (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  17. Craig A. Childress & Joy K. Asamen (1998). The Emerging Relationship of Psychology and the Internet: Proposed Guidelines for Conducting Internet Intervention Research. Ethics and Behavior 8 (1):19 – 35.
    The Internet is rapidly developing into an important medium of communication in modem society, and both psychological research and therapeutic interventions are being increasingly conducted using this new communication medium. As therapeutic interventions using the Internet are becoming more prevalent, it is becoming increasingly important to conduct research on psychotherapeutic Internet interventions to assist in the development of an appropriate standard of practice regarding interventions using this new medium. In this article, we examine the Internet and the current psychological uses (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  18. Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley (2013). Ethical Issues of 'Morality Mining': When the Moral Identity of Individuals Becomes a Focus of Data-Mining. In Hakikur Rahman & I. Ramos (eds.), Ethical Data Mining Applications for Socio-Economic Development. IGI Global 1-21.
  19. M. Clarke (2009). Ethics of Science Communication on the Web. Ethics in Science and Environmental Politics 9:9-12.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  20. David Coady (2011). An Epistemic Defence of the Blogosphere. Journal of Applied Philosophy 28 (3):277-294.
    Alvin Goldman claims that the conventional media is in decline as a result of competition from the blogosphere, and that this is a threat to our epistemic wellbeing and, as a result, a threat to good democratic decision-making. He supports this claim with three common complaints about the blogosphere: first, that it is undermining professional journalism, second, that, unlike the conventional media, it lacks ‘balance’, and finally that it is a parasite on the conventional media. I defend the blogosphere against (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  21. Raphael Cohen-Almagor (2012). Freedom of Expression, Internet Responsibility, and Business Ethics: The Yahoo! Saga and Its Implications. [REVIEW] Journal of Business Ethics 106 (3):353-365.
    In the late 1990s, the Internet seemed a perfect medium for business: a facilitator of unlimited economical propositions to people without any regulatory limitations. Cases such as that of Yahoo! mark the beginning of the end of that illusion. They demonstrate that Internet service providers (ISPs) have to respect domestic state legislation in order to avoid legal risks. Yahoo! was wrong to ignore French national laws and the plea to remove Nazi memorabilia from its auction site. Its legal struggle proved (...)
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  22. Brandt Dainow (2016). Digital Alienation as the Foundation of Online Privacy Concerns. Acm Sigcas Computers and Society 45 (3):109-117.
    The term ‘digital alienation’ is used in critical IS research to refer to manifestations of alienation online. This paper explores the difficulties of using a traditional Marxist analysis to account for digital alienation. The problem is that the activity people undertake online does not look coerced or estranged from the creator’s individuality, both of which are typically seen as necessary for the production of alienation. As a result of this apparent difficulty, much of the research has focused on the relationship (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  23. Brandt Dainow (2016). Key Dialectics in Cloud Services. Acm Sigcas Computers and Society 45 (3):52-59.
    This paper will identify three central dialectics within cloud services. These constitute defining positions regarding the nature of cloud services in terms of privacy, ethical responsibility, technical architecture and economics. These constitute the main frameworks within which ethical discussions of cloud services occur. The first dialectic concerns the question of whether it is it essential that personal privacy be reduced in order to deliver personalised cloud services. I shall evaluate the main arguments in favour of the view that it is. (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  24. Brandt Dainow (2013). What Can a Medieval Friar Teach Us About the Internet? Deriving Criteria of Justice for Cyberlaw From Thomist Natural Law Theory. Philosophy and Technology 26 (4):459-476.
    This paper applies a very traditional position within Natural Law Theory to Cyberspace. I shall first justify a Natural Law approach to Cyberspace by exploring the difficulties raised by the Internet to traditional principles of jurisprudence and the difficulties this presents for a Positive Law Theory account of legislation of Cyberspace. This will focus on issues relating to geography. I shall then explicate the paradigm of Natural Law accounts, the Treatise on Law, by Thomas Aquinas. From this account will emerge (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  25. Giovanni De Grandis & Yrsa Neuman (2014). Measuring Openness and Evaluating Digital Academic Publishing Models: Not Quite the Same Business. The Journal of Electronic Publishing 17 (3).
    In this article we raise a problem, and we offer two practical contributions to its solution. The problem is that academic communities interested in digital publishing do not have adequate tools to help them in choosing a publishing model that suits their needs. We believe that excessive focus on Open Access (OA) has obscured some important issues; moreover exclusive emphasis on increasing openness has contributed to an agenda and to policies that show clear practical shortcomings. We believe that academic communities (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  26. Paul B. de Laat (2001). Emerging Roles for Third Parties in Cyberspace. Ethics and Information Technology 3 (4):267-276.
    In `real' space, third partieshave always been useful to facilitatetransactions. With cyberspace opening up, it isto be expected that intermediation will alsodevelop in a virtual fashion. The articlefocuses upon new cyberroles for third partiesthat seem to announce themselves clearly.First, virtualization of the market place haspaved the way for `cybermediaries', who brokerbetween supply and demand of material andinformational goods. Secondly,cybercommunication has created newuncertainties concerning informational securityand privacy. Also, as in real space,transacting supposes some decency with one'spartners. These needs are being addressed (...)
    Remove from this list   Direct download (12 more)  
     
    Export citation  
     
    My bibliography  
  27. Jodi Dean (2003). Why the Net is Not a Public Sphere. Constellations 10 (1):95-112.
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  28. Adam Dodek (2010). Ethics in Practice Correspondents' Reports Canada: Sex on the Internet and Fitness for Judicial Office. Legal Ethics 13 (2):215.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  29. David M. Douglas (2015). Towards a Just and Fair Internet: Applying Rawls’ Principles of Justice to Internet Regulation. Ethics and Information Technology 17 (1):57-64.
    I suggest that the social justice issues raised by Internet regulation can be exposed and examined by using a methodology adapted from that described by John Rawls in 'A Theory of Justice'. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the 'original position' as a method of removing bias in decision-making about justice. The original position imposes a 'veil of ignorance' that hides the particular circumstances of individuals from them so that they (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  30. Alfred Driessen (2009). Ethical Aspects of Research in Ultrafast Communication. In Paul Sollie & Marcus Düwell (eds.), Evaluating New Technologies: Methodological Problems for the Ethical Assessment of Technology Developments. Springer
    This chapter summarizes the reflections of a scientist active in optical communication about the need of ethical considerations in technological research. An optimistic definition of ethics, being the art to make good use of technology, is proposed that emphasizes the necessarily involvement of not only technologists but also experts in humanity. The paper then reviews briefly the research activities of a Dutch national consortium where the author had been involved. This mainly academic research dealt with advanced approaches for ultrafast communication. (...)
    Remove from this list  
    Translate
      Direct download  
     
    Export citation  
     
    My bibliography  
  31. Anders Eriksson & Kalle Grill, Who Owns My Avatar? -Rights in Virtual Property. Proceedings of DiGRA 2005 Conference: Changing Views – Worlds in Play.
    This paper presents a framework for discussing issues of ownership in connection to virtual worlds. We explore how divergent interests in virtual property can be mediated by applying a constructivist perspective to the concept ownership. The simple solutions offered today entail that a contract between the game producer and the gamer gives the game developer exclusive rights to all virtual property. This appears to be unsatisfactory. A number of legitimate interests on part of both producers and gamers may be readily (...)
    Remove from this list  
    Translate
      Direct download  
     
    Export citation  
     
    My bibliography  
  32. Karen Frost-Arnold (2014). Trustworthiness and Truth: The Epistemic Pitfalls of Internet Accountability. Episteme 11 (1):63-81.
    Since anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. This paper provides a veritistic argument that accountability mechanisms can cause significant epistemic problems for internet encyclopedias and social media communities. I show that accountability mechanisms can undermine both the dissemination of true beliefs and the detection of error. Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography  
  33. Joseph S. Fulda (2000). A Gift of Fire: Social Legal, and Ethical Issues in Computing by Sara Baase. [REVIEW] Ethics and Information Technology 2 (4):241-247.
    Extremely favorable review, with hardly any criticisms at all.
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  34. Jarek Gryz, Anonymity and Identification. Proceedings of ETHICOMP Conference.
    Anonymity guarantees privacy. This tenet of legal protection of privacy has been recently shown to be unfounded (Ohm, 2010). Clever adversaries can often re-identify or de-anonymize the people hidden in an anonymized database. The process of identification is usually assumed to consist in finding the name of the person in question. In this paper, we provide philosophical analysis of the concept and process of identification, showing, in particular, that discovering the name of an anonymous person is neither necessary nor sufficient (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  35. Justin L. Harmon (2012). Dwelling In the House That Porn Built: A Phenomenological Critique of Pornography In the Age of Internet Technology. Social Philosophy Today 28:115-130.
    This paper is a critique of pornography from within the framework of Heideggerian phenomenology. I contend that pornography is a pernicious form of technological discourse in which women are reduced to spectral and anonymous figures fulfilling a universal role, namely that of sexual subordination. Further, the danger of pornography is covered over in the public sphere as a result of the pervasive appeal to its status as mere fantasy. I argue that relegating the problem to the domain of fantasy is (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  36. Steve Jones (2010). Horrorporn/Pornhorror: The Problematic Communities and Contexts of Extreme Online Imagery. In Feona Attwood (ed.), Porn.com: Making Sense of Online Pornography. Peter Lang 123-137.
    This chapter explores the tentative line between erotic spectacle and horror; a judgement that is problematic given that is based on an axis of moral or ideological normality. The contexts of viewing impact on the status of ‘obscene’ images, both in terms of the communities that view them and their motivation for viewing; for sexual arousal, out of morbid curiosity or malevolence, or perhaps all three simultaneously. The reception of an obscene image is largely based upon the issue of viewer (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  37. Heidi E. Keller & Sandra Lee (2003). Ethical Issues Surrounding Human Participants Research Using the Internet. Ethics and Behavior 13 (3):211 – 219.
    The Internet appears to offer psychologists doing research unrestricted access to infinite amounts and types of data. However, the ethical issues surrounding the use of data and data collection methods are challenging research review boards at many institutions. This article illuminates some of the obstacles facing researchers who wish to take advantage of the Internet's flexibility. The applications of the APA ethical codes for conducting research on human participants on the Internet are reviewed. The principle of beneficence, as well as (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  38. Cathy Legg (2005). Hacking: The Performance of Technology? [REVIEW] Techne 9 (2):151-154.
    The word “hacker” has an interesting double meaning: one vastly more widespread connotation of technological mischief, even criminality, and an original meaning amongst the tech savvy as a term of highest approbation. Both meanings, however, share the idea that hackers possess a superior ability to manipulate technology according to their will (and, as with God, this superior ability to exercise will is a source of both mystifying admiration and fear). This book mainly concerns itself with the former meaning. To Thomas (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  39. Michael C. Loui (2002). Duncan Langford. Internet Ethics. Ethics and Information Technology 4 (2):167-168.
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    My bibliography  
  40. Vincent C. Müller (2006). Some Information is Too Dangerous to Be on the Internet. Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category includes information the use of which (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  41. Bjørn K. Myskja (2008). The Categorical Imperative and the Ethics of Trust. Ethics and Information Technology 10 (4):213-220.
    Trust can be understood as a precondition for a well-functioning society or as a way to handle complexities of living in a risk society, but also as a fundamental aspect of human morality. Interactions on the Internet pose some new challenges to issues of trust, especially connected to disembodiedness. Mistrust may be an important obstacle to Internet use, which is problematic as the Internet becomes a significant arena for political, social and commercial activities necessary for full participation in a liberal (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  42. Michael R. Nelson (2010). A Response to Responsibility of and Trust in ISPs by Raphael Cohen-Almagor. Knowledge, Technology and Policy 23 (3-4):403-407.
    The Internet and Internet applications such as cloud computing continue to grow at an extraordinary rate, enabled by the Internet's open architecture and the vibrant lightly regulated Internet service provider market. Proposals to hold ISPs responsible for content and software shared by their customers would dramatically constrain the openness and innovation that has been the hallmark of the Internet to date. Rather than taking the kind of approach favored by Raphael Cohen-Almagor, government should enlist the assistance of other intermediaries such (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  43. Simon Newman & Wallace Koehler (2004). Copyright. Moral Rights, Fair Use, and the Online Environment. Journal of Information Ethics 13 (2):38-57.
  44. Mitch Parsell & Cynthia Townley, Refereed Articles.
    In response to those who have argued the Internet is amoral at best, and an instrument for immorality at worst, we show that the net can provide a forum for genuine ethical engagement and distinctive forms of wrongdoing. Without deriving the moral value of the Internet from its interface with the non-virtual world and in contrast to presentations of the net as an anarchic utopia or as an unethical or amoral dystopia, we apply a substantive moral test to a selection (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  45. David J. Pittenger (2003). Internet Research: An Opportunity to Revisit Classic Ethical Problems in Behavioral Research. Ethics and Behavior 13 (1):45 – 60.
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  46. Saskia Polder-Verkiel (2012). Online Responsibility: Bad Samaritanism and the Influence of Internet Mediation. Science and Engineering Ethics 18 (1):117-141.
    In 2008 a young man committed suicide while his webcam was running. 1,500 people apparently watched as the young man lay dying: when people finally made an effort to call the police, it was too late. This closely resembles the case of Kitty Genovese in 1964, where 39 neighbours supposedly watched an attacker assault and did not call until it was too late. This paper examines the role of internet mediation in cases where people may or may not have been (...)
    Remove from this list   Direct download (13 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  47. Daniel Edward Shapiro & Charles Eric Schulman (1996). Ethical and Legal Issues in E-Mail Therapy. Ethics and Behavior 6 (2):107 – 124.
    Psychologists and psychiatrists recently started using electronic mail (e-mail) to conduct therapy. This article explores relevant ethical and legal issues including, among others, the nature of the professional relationship, boundaries of competence, informed consent, treating minors, confidentiality, and the duty to warn and protect. To illustrate these complex issues, two services currently operating are discussed. To address potential hazards to clients and the profession, a new ethical standard for e-mail therapists is offered.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  48. Anne Siegetsleitner (2001). E-Mail im Internet und Privatheitsrechte. Alber.
    Neue Formen der Telekommunikation lassen die Sorge um Privatheit wieder aufkeimen. Zu diesen zählen E-Mails im Internet. Wie können Privatheitsrechte bezüglich E-Mails ethisch begründet werden? Eine differenzierte Formulierung der relevanten Privatheitsrechte ermöglicht die analytische Rechtstheorie von Stig Kanger. Für die Begründung dieser Rechte in unterschiedlichen Beziehungen (z.B. gegenüber Systembetreuer/inne/n, dem Staat oder Arbeitgeber/inne/n) spielen Personsein, persönliche und intime Beziehungen, aber auch politische und soziale Freiheiten eine wesentliche Rolle. Wann verzichten Menschen jedoch auf diese Rechte und von welchen Überlegungen werden sie (...)
    Remove from this list  
    Translate
      Direct download  
     
    Export citation  
     
    My bibliography  
  49. Matteo Turilli, Antonino Vaccaro & Mariarosaria Taddeo (2012). Internet Neutrality: Ethical Issues in the Internet Environment. Philosophy and Technology 25 (2):133-151.
    This paper investigates the ethical issues surrounding the concept of Internet neutrality focusing specifically on the correlation between neutrality and fairness. Moving from an analysis of the many available definitions of Internet neutrality and the heterogeneity of the Internet infrastructure, the common assumption that a neutral Internet is also a fair Internet is challenged. It is argued that a properly neutral Internet supports undesirable situations in which few users can exhaust the majority of the available resources or in which specific (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  50. Connie K. Varnhagen, Matthew Gushta, Jason Daniels, Tara C. Peters, Neil Parmar, Danielle Law, Rachel Hirsch, Bonnie Sadler Takach & Tom Johnson (2005). How Informed is Online Informed Consent? Ethics and Behavior 15 (1):37 – 48.
    We examined participants' reading and recall of informed consent documents presented via paper or computer. Within each presentation medium, we presented the document as a continuous or paginated document to simulate common computer and paper presentation formats. Participants took slightly longer to read paginated and computer informed consent documents and recalled slightly more information from the paginated documents. We concluded that obtaining informed consent online is not substantially different than obtaining it via paper presentation. We also provide suggestions for improving (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography   3 citations  
1 — 50 / 51