Switch to: Citations

Add references

You must login to add references.
  1. Returning students' right to access, choice and notice: a proposed code of ethics for instructors using Turnitin. [REVIEW]Bastiaan Vanacker - 2011 - Ethics and Information Technology 13 (4):327-338.
    This paper identifies the ethical issues associated with college instructors’ use of plagiarism detection software (PDS), specifically the Turnitin program. It addresses the pros and cons of using such software in higher education, arguing that its use is justified on the basis that it increases institutional trust, and demonstrating that two common criticisms of such software are not universally valid. An analysis of the legal issues surrounding Turnitin, however, indicates that the way it is designed and operates raises some ethical (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Moral Deskilling and Upskilling in a New Machine Age: Reflections on the Ambiguous Future of Character.Shannon Vallor - 2015 - Philosophy and Technology 28 (1):107-124.
    This paper explores the ambiguous impact of new information and communications technologies on the cultivation of moral skills in human beings. Just as twentieth century advances in machine automation resulted in the economic devaluation of practical knowledge and skillsets historically cultivated by machinists, artisans, and other highly trained workers , while also driving the cultivation of new skills in a variety of engineering and white collar occupations, ICTs are also recognized as potential causes of a complex pattern of economic deskilling, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  • Coercion or empowerment? Moderation of content in Wikipedia as 'essentially contested' bureaucratic rules.Paul B. de Laat - 2012 - Ethics and Information Technology 14 (2):123-135.
    In communities of user-generated content, systems for the management of content and/or their contributors are usually accepted without much protest. Not so, however, in the case of Wikipedia, in which the proposal to introduce a system of review for new edits (in order to counter vandalism) led to heated discussions. This debate is analysed, and arguments of both supporters and opponents (of English, German and French tongue) are extracted from Wikipedian archives. In order to better understand this division of the (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • How can contributors to open-source communities be trusted? On the assumption, inference, and substitution of trust.Paul B. Laat - 2010 - Ethics and Information Technology 12 (4):327-341.
    Open-source communities that focus on content rely squarely on the contributions of invisible strangers in cyberspace. How do such communities handle the problem of trusting that strangers have good intentions and adequate competence? This question is explored in relation to communities in which such trust is a vital issue: peer production of software (FreeBSD and Mozilla in particular) and encyclopaedia entries (Wikipedia in particular). In the context of open-source software, it is argued that trust was inferred from an underlying ‘hacker (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Disclosive Ethics and Information Technology: Disclosing Facial Recognition Systems.Lucas D. Introna - 2005 - Ethics and Information Technology 7 (2):75-86.
    This paper is an attempt to present disclosive ethics as a framework for computer and information ethics – in line with the suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful politics since information technology is an opaque technology – i.e. relatively closed to scrutiny. It presents the design of technology (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • How can contributors to open-source communities be Trusted? On the assumption, inference, and substitution of trust.Paul B. de Laat - 2010 - Ethics and Information Technology 12 (4):327-341.
    Open-source communities that focus on content rely squarely on the contributions of invisible strangers in cyberspace. How do such communities handle the problem of trusting that strangers have good intentions and adequate competence? This question is explored in relation to communities in which such trust is a vital issue: peer production of software (FreeBSD and Mozilla in particular) and encyclopaedia entries (Wikipedia in particular). In the context of open-source software, it is argued that trust was inferred from an underlying ‘hacker (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • From open-source software to Wikipedia: ‘Backgrounding’ trust by collective monitoring and reputation tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered instead. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Disclosive computer ethics.Philip Brey - 2000 - Acm Sigcas Computers and Society 30 (4):10-16.
    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   45 citations  
  • NAVIGATING BETWEEN CHAOS AND BUREAUCRACY: BACKGROUNDING TRUST IN OPEN-CONTENT COMMUNITIES.Paul B. de Laat - 2012 - In Karl Aberer, Andreas Flache, Wander Jager, Ling Liu, Jie Tang & Christophe Guéret (eds.), 4th International Conference, SocInfo 2012, Lausanne, Switzerland, December 5-7, 2012. Proceedings. Springer.
    Many virtual communities that rely on user-generated content (such as social news sites, citizen journals, and encyclopedias in particular) offer unrestricted and immediate ‘write access’ to every contributor. It is argued that these communities do not just assume that the trust granted by that policy is well-placed; they have developed extensive mechanisms that underpin the trust involved (‘backgrounding’). These target contributors (stipulating legal terms of use and developing etiquette, both underscored by sanctions) as well as the contents contributed by them (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Nature, Importance, and Difficulty of Machine Ethics.James Moor - 2006 - IEEE Intelligent Systems 21:18-21.
     
    Export citation  
     
    Bookmark   111 citations