Results for 'Management of Computing and Information Systems'

1000+ found
Order:
  1.  31
    Using Genetic Information While Protecting the Privacy of the Soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade (...)
    Direct download (12 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  2. Information Ethics: On the Philosophical Foundation of Computer Ethics. [REVIEW]Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33-52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is (...)
    Direct download (12 more)  
     
    Export citation  
     
    My bibliography   47 citations  
  3.  22
    Proactive Management of Distributed Organisational Computing: Prevention Always Pays, Doesn't It? [REVIEW]Lauri Forsman - 1998 - AI and Society 12 (4):328-345.
    Organisations have eagerly adopted the new opportunities provided by distributed computing technology. These opportunities have also created new dependency on the technology and threats of technical problems. Information technology (IT) management has to choose its position towards these new technical risks. Should the problems be prevented proactively in advance or settled reactively afterwards?This paper draws conclusions from an action research case study aimed at proactive versus reactive end-user support. Between 1994 and 1997 one of the business units (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  4.  43
    Reliability of Information on the Internet: Some Distinctions.Anton Vedder & Robert Wachbroit - 2003 - Ethics and Information Technology 5 (4):211-215.
    In this contribution, we identify and clarifysome distinctions we believe are useful inestablishing the reliability of information onthe Internet. We begin by examining some of thesalient features of information that go intothe determination of reliability. In so doing,we argue that we need to distinguish contentand pedigree criteria of reliability and thatwe need to separate issues of reliability ofinformation from the issues of theaccessibility and the usability of information.We then turn to an analysis of some commonfailures to recognize (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  5. An Overview of Information Ethics Issues in a World-Wide Context.Elizabeth A. Buchanan - 1999 - Ethics and Information Technology 1 (3):193-201.
    This article presents an overview of significant issues facing contemporary information professionals. As the world of information continues to grow at unprecedented speed and in unprecedented volume, questions must be faced by information professionals. Will we participate in the worldwide mythology of equal access for all, or will we truly work towards this debatable goal? Will we accept the narrowing of choice for our corresponding increasing diverse clientele? Such questions must be considered in a holistic context and (...)
    Direct download (13 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  6.  31
    Editorial Introduction – Ethics of New Information Technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109-109.
  7.  16
    Shamans, Software, and Spleens: Law and the Construction of the Information Society by James Boyle. [REVIEW]Richard A. Spinello - 1999 - Ethics and Information Technology 1 (2):161-165.
  8.  3
    Bibliometric Mapping of Computer and Information Ethics.Richard Heersmink, Jeroen den Hoven, Nees Eck & Jan den Berg - 2011 - Ethics and Information Technology 13 (3):241-249.
    Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  9.  35
    A Gift of Fire: Social Legal, and Ethical Issues in Computing by Sara Baase. [REVIEW]Joseph S. Fulda - 2000 - Ethics and Information Technology 2 (4):241-247.
    Extremely favorable review, with hardly any criticisms at all.
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  10.  18
    Ethics, Computing and Medicine. Informatics and the Transformation of Health Care. Kenneth W. Goodman, Editor.Marian Verkerk - 1999 - Ethics and Information Technology 1 (4):303-304.
  11.  18
    Information and Communication Technology (ICT) Ethics: A Bibliography of Recent Books. [REVIEW]Herman T. Tavani - 2001 - Ethics and Information Technology 3 (1):77-81.
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  12.  1
    Customer Relationship Management Information Systems and the Realisation of Moral Agency.Christopher Bull & Alison Adam - 2010 - Journal of Information, Communication and Ethics in Society 8 (2):164-177.
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  13. Workshop on Modelling of Location Management in Mobile Information Systems (MLM 06)-Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks.Seung-Jae Yoo & Kuinam J. Kim - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3981--1025.
     
    Export citation  
     
    My bibliography  
  14.  13
    Application of IT Examination in Investigation of Crimes on Safety of Electronic Data and Information Systems.Lina Novikoviene & Egle Bileviciute - 2010 - Jurisprudencija: Mokslo darbu žurnalas 119 (1):317-329.
    As an EU state, Lithuania has become an active member of the eEurope 2005 initiative, implementing the goals set forth in the strategic plan for the development of information society in Lithuania. Information technologies introduced into various areas of life open up new, more convenient opportunities to receive services and information. The modernization of state management becomes an integral factor for ensuring continuous social development. The objective of this paper is to study practical aspects of the (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  15.  4
    The Role of Information Systems in Total Quality Management.Jaak Jurison - 1994 - Knowledge and Policy 7 (2):3-16.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  16. Proceedings of the 11th IPMU Conference (Information Processing and Management of Uncertainty in Knowledge-Based Systems.Niki Pfeifer & G. D. Kleiter - 2006
    No categories
    Translate
     
     
    Export citation  
     
    My bibliography  
  17.  20
    Introduction: Conceptual Framework and Research Design for a Comparative Analysis of National eID Management Systems in Selected European Countries. [REVIEW]Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):5-26.
    This paper introduces the objectives and basic approach of a collaborative comparative research project on the introduction of national electronic Identity Management Systems (eIDMS) in Member States of the European Union. Altogether eight country case studies have been produced in two waves by researchers in the respective countries, which will be presented in the following articles in this special issue. The studies adopt a common conceptual framework and use the same terminology, which will be presented in this introduction, (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  18. The Ethics of Representation and Action in Virtual Reality.Brey Philip - 1999 - Ethics and Information Technology 1 (1):5-14.
    This essay addresses ethical aspects of the design and use of virtual reality (VR) systems, focusing on the behavioral options made available in such systems and the manner in which reality is represented or simulated in them. An assessment is made of the morality of immoral behavior in virtual reality, and of the virtual modeling of such behavior. Thereafter, the ethical aspects of misrepresentation and biased representation in VR applications are discussed.
    Direct download (13 more)  
     
    Export citation  
     
    My bibliography   15 citations  
  19.  97
    Anonymity.Kathleen A. Wallace - 1999 - Ethics and Information Technology 1 (1):21-31.
    Anonymity is a form of nonidentifiability which I define as noncoordinatability of traits in a given respect. This definition broadens the concept, freeing it from its primary association with naming. I analyze different ways anonymity can be realized. I also discuss some ethical issues, such as privacy, accountability and other values which anonymity may serve or undermine. My theory can also conceptualize anonymity in information systems where, for example, privacy and accountability are at issue.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   9 citations  
  20. Just Consequentialism and Computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Direct download (13 more)  
     
    Export citation  
     
    My bibliography   7 citations  
  21.  25
    Privacy Lost: The Net, Autonomous Agents, and 'Virtual Information'. [REVIEW]Donald Gotterbarn - 1999 - Ethics and Information Technology 1 (2):147-154.
    The positive qualities of the Internet--anonymity, openness, and reproducibility have added a new ethical dimension to the privacy debate. This paper describes a new and significant way in which privacy is violated. A type of personal information, called virtual information is described and the effectiveness of techniques to protect this type of information is examined. This examination includes a discussion of technical approaches and professional standards as ways to address this violation of virtual information.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  22. Can Information Warfare Ever Be Just?John Arquilla - 1999 - Ethics and Information Technology 1 (3):203-212.
    The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker''s true identity put (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  23.  49
    The Illegal Body: `Eurodac' and the Politics of Biometric Identification. [REVIEW]Irma van der Ploeg - 1999 - Ethics and Information Technology 1 (4):295-302.
    Biometrics is often described as `the next big thingin information technology'. Rather than IT renderingthe body irrelevant to identity – a mistaken idea tobegin with – the coupling of biometrics with ITunequivocally puts the body center stage. The questions to be raised about biometrics is howbodies will become related to identity, and what thenormative and political ramifications of this couplingwill be. Unlike the body rendered knowable in thebiomedical sciences, biometrics generates a readable body: it transforms the body's surfaces andcharacteristics (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   6 citations  
  24.  53
    Common Morality and Computing.Bernard Gert - 1999 - Ethics and Information Technology 1 (1):53-60.
    This article shows how common morality can be helpful in clarifying the discussion of ethical issues that arise in computing. Since common morality does not always provide unique answers to moral questions, not all such issues can be resolved, however common morality does provide a clear answer to the question whether one can illegally copy software for a friend.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  25.  29
    The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated (...)
    Direct download (12 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  26.  94
    Anonymity Versus Commitment: The Dangers of Education on the Internet. [REVIEW]Hubert L. Dreyfus - 1999 - Ethics and Information Technology 1 (1):369-378.
    I shall translate Kierkegaard's account of the dangers and opportunities of what he called the Press into a critique of the Internet so as to raise the question: what contribution -- for good or ill -- can the World Wide Web, with its ability to deliver vast amounts of information to users all over the world, make to educators trying to pass on knowledge and to develop skills and wisdom in their students? I will then use Kierkegaard's three-stage answer (...)
    Direct download (16 more)  
     
    Export citation  
     
    My bibliography  
  27.  8
    Universal Service in a Ubiquitous Digital Network.L. Jean Camp & Rose P. Tsang - 2001 - Ethics and Information Technology 2 (4):211-221.
    Before there was the digital divide there was the analog divide– and universal service was the attempt to close that analogdivide. Universal service is becoming ever more complex in terms ofregulatory design as it becomes the digital divide. In order to evaluatethe promise of the next generation Internet with respect to the digitaldivide this work looks backwards as well as forwards in time. Byevaluating why previous universal service mechanisms failed andsucceeded this work identifies specific characteristics ofcommunications systems – in (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  28.  35
    Censorship, the Internet, and the Child Pornography Law of 1996: A Critique. [REVIEW]Jacques N. Catudal - 1999 - Ethics and Information Technology 1 (2):105-115.
    After describing the Child Pornography Prevention Act (CPPA) of 1996, I argue that the Act ought to be significantly amended. The central objections to CPPA are (1) that it is so broad in its main proscriptions as to violate the First Amendment rights of adults; (2) that it altogether fails to provide minors and their legal guardians with the privacy rights needed to combat the harms associated with certain classes of prurient material on the Internet; and, (3) that the actual (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  29.  65
    Anonymity Versus Commitment: The Dangers of Education on the Internet. [REVIEW]Hubert L. Dreyfus - 2002 - Educational Philosophy and Theory 34 (4):369–378.
    I shall translate Kierkegaard's account of the dangers and opportunities of what he called the Press into a critique of the Internet so as to raise the question: what contribution -- for good or ill -- can the World Wide Web, with its ability to deliver vast amounts of information to users all over the world, make to educators trying to pass on knowledge and to develop skills and wisdom in their students? I will then use Kierkegaard's three-stage answer (...)
    Direct download (17 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  30.  69
    Computer Systems and Responsibility: A Normative Look at Technological Complexity.Deborah G. Johnson & Thomas M. Powers - 2005 - Ethics and Information Technology 7 (2):99-107.
    In this paper, we focus attention on the role of computer system complexity in ascribing responsibility. We begin by introducing the notion of technological moral action (TMA). TMA is carried out by the combination of a computer system user, a system designer (developers, programmers, and testers), and a computer system (hardware and software). We discuss three sometimes overlapping types of responsibility: causal responsibility, moral responsibility, and role responsibility. Our analysis is informed by the well-known accounts provided by Hart and Hart (...)
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography   7 citations  
  31.  31
    Computers in Control: Rational Transfer of Authority or Irresponsible Abdication of Autonomy? [REVIEW]Arthur Kuflik - 1999 - Ethics and Information Technology 1 (3):173-184.
    To what extent should humans transfer, or abdicate, responsibility to computers? In this paper, I distinguish six different senses of responsible and then consider in which of these senses computers can, and in which they cannot, be said to be responsible for deciding various outcomes. I sort out and explore two different kinds of complaint against putting computers in greater control of our lives: (i) as finite and fallible human beings, there is a limit to how far we can acheive (...)
    Direct download (7 more)  
     
    Export citation  
     
    My bibliography   6 citations  
  32.  62
    Information Ethics: A Reappraisal. [REVIEW]Luciano Floridi - 2008 - Ethics and Information Technology 10 (2-3):189-204.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   11 citations  
  33.  36
    The Relationship Between the Uniqueness of Computer Ethics and its Independence as a Discipline in Applied Ethics.Kenneth Einar Himma - 2003 - Ethics and Information Technology 5 (4):225-237.
    A number of different uniquenessclaims have been made about computer ethics inorder to justify characterizing it as adistinct subdiscipline of applied ethics. Iconsider several different interpretations ofthese claims and argue, first, that none areplausible and, second, that none provideadequate justification for characterizingcomputer ethics as a distinct subdiscipline ofapplied ethics. Even so, I argue that computerethics shares certain important characteristicswith medical ethics that justifies treatingboth as separate subdisciplines of appliedethics.
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  34.  54
    Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web. [REVIEW]Colin J. Bennett - 2001 - Ethics and Information Technology 3 (3):195-208.
    This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  35.  33
    Ethical Reflections on the Problem of Spam.R. A. Spinello - 1999 - Ethics and Information Technology 1 (3):185-191.
    After reviewing some of the difficulties caused by spam and summarizing the arguments of its defenders, this paper will focus on its present legal status. It will then dwell on spam from a moral point of view and address some of the ethical implications associated with transmitting this unsolicited commercial e-mail. It will attempt to sort out the conflicting rights involved and develop a viable case that even if we prescind from its social costs, spam is ethically questionable under certain (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  36.  18
    Emergent Values for Automatons: Ethical Problems of Life in the Generalized Internet. [REVIEW]Eric Steinhart - 1999 - Ethics and Information Technology 1 (2):155-160.
    The infrastructure is becoming a network of computerized machines regulated by societies of self-directing software agents. Complexity encourages the emergence of novel values in software agent societies. Interdependent human and software political orders cohabitate and coevolve in a symbiosis of freedoms.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  37.  58
    The Internet and Japanese Conception of Privacy.Masahiko Mizutani, James Dorsey & James H. Moor - 2004 - Ethics and Information Technology 6 (2):121-128.
  38.  71
    “Lost in translation”?: Intercultural dialogues on privacy and information ethics (introduction to special issue on privacy and data privacy protection in asia). [REVIEW]Charles Ess - 2005 - Ethics and Information Technology 7 (1):1-6.
  39. The Ethics of Designing Artificial Agents.Frances Grodzinsky, Keith Miller & Marty Wolf - 2008 - Ethics and Information Technology 10 (2-3):115-121.
  40.  34
    Information Ethics: Agents, Artefacts and New Cultural Perspectives. [REVIEW]Luciano Floridi & Julian Savulescu - 2006 - Ethics and Information Technology 8 (4):155-156.
  41.  46
    The Impact of the Internet on Our Moral Lives in Academia.Lawrence M. Hinman - 2002 - Ethics and Information Technology 4 (1):31-35.
  42.  1
    Anonymity Versus Commitment: The Dangers of Education on the Internet.Hubert Dreyfus - 2004 - Ethics and Information Technology 1 (1):15-20.
    Direct download  
     
    Export citation  
     
    My bibliography   2 citations  
  43. How Can Contributors to Open-Source Communities Be Trusted? On the Assumption, Inference, and Substitution of Trust.Paul Laat - 2010 - Ethics and Information Technology 12 (4):327-341.
    Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  44.  18
    Recent Works in Information and Communication Technology (ICT) Ethics.Herman T. Tavani - 2002 - Ethics and Information Technology 4 (2):169-175.
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  45.  13
    Ethical, Legal, and Policy Conundrums of Privacy in Our Knowledge-Based Society.Leslie Regan Shade - 1999 - Ethics and Information Technology 1 (4):307-309.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  46.  52
    Human Values and the Design of Computer Technology, Edited by Batya Friedman.John M. Artz - 1999 - Ethics and Information Technology 1 (4):305-306.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  47.  12
    Robots for the Rest of Us or the 'Best' of Us?Peter Danielson - 1999 - Ethics and Information Technology 1 (1):75-81.
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  48.  56
    Luciano Floridi, Philosophy and Computing: An Introduction. [REVIEW]Anthony F. Beavers - 2001 - Ethics and Information Technology 3 (4):299-301.
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  49.  53
    Thinking About Technology: Foundations of the Philosophy of Technology, Joseph C. Pitt. [REVIEW]John M. Artz - 2001 - Ethics and Information Technology 2 (4):249-250.
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  50.  50
    Information, Silence, and Sanctuary.David M. Levy - 2007 - Ethics and Information Technology 9 (4):233-236.
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
1 — 50 / 1000