62 found
Order:
Disambiguations
Herman T. Tavani [63]Herman Thomas Tavani [1]
  1. Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   35 citations  
  2. Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology.Herman T. Tavani - 2003 - Acm Sigcas Computers and Society 33 (3):1.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   30 citations  
  3. Privacy Protection, Control of Information, and Privacy-Enhancing Technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  4.  54
    Trust and Multi-Agent Systems: Applying the Diffuse, Default Model of Trust to Experiments Involving Artificial Agents. [REVIEW]Jeff Buechner & Herman T. Tavani - 2011 - Ethics and Information Technology 13 (1):39-51.
    We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical model of trust based on Richard Holton’s interpretation of P. F. Strawson’s writings on freedom and resentment, and we show why this account of trust is difficult to extend to artificial agents (AAs) as well as to other non-human entities. (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  5.  68
    The Uniqueness Debate in Computer Ethics: What Exactly is at Issue, and Why Does It Matter? [REVIEW]Herman T. Tavani - 2002 - Ethics and Information Technology 4 (1):37-54.
    The purpose of this essay is to determinewhat exactly is meant by the claimcomputer ethics is unique, a position thatwill henceforth be referred to as the CEIUthesis. A brief sketch of the CEIU debate is provided,and an empirical case involving a recentincident of cyberstalking is briefly consideredin order to illustrate some controversialpoints of contention in that debate. To gain aclearer understanding of what exactly isasserted in the various claims about theuniqueness of computer ethics, and to avoidmany of the confusions currently (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  6.  58
    Levels of Trust in the Context of Machine Ethics.Herman T. Tavani - 2015 - Philosophy and Technology 28 (1):75-90.
    Are trust relationships involving humans and artificial agents possible? This controversial question has become a hotly debated topic in the emerging field of machine ethics. Employing a model of trust advanced by Buechner and Tavani :39–51, 2011), I argue that the “short answer” to this question is yes. However, I also argue that a more complete and nuanced answer will require us to articulate the various levels of trust that are also possible in environments comprising both human agents and AAs. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  7.  88
    Floridi’s Ontological Theory of Informational Privacy: Some Implications and Challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  8. Informational Privacy, Data Mining, and the Internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  9. Locke, Intellectual Property Rights, and the Information Commons.Herman T. Tavani - 2005 - Ethics and Information Technology 7 (2):87-97.
    This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections, Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property. In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and digital information. In Section (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  10.  44
    Computer Ethics: Philosophical Enquiry.Deborah G. Johnson, James H. Moor & Herman T. Tavani - 2000 - Acm Sigcas Computers and Society 30 (4):6-9.
  11.  87
    Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  12.  67
    P2p Networks and the Verizon V. RIAA Case: Implications for Personal Privacy and Intellectual Property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  13. Ethical Reflections on the Digital Divide.Herman T. Tavani - 2003 - Journal of Information, Communication and Ethics in Society 1 (2):99-108.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14.  64
    The State of Computer Ethics as a Philosophical Field of Inquiry: Some Contemporary Perspectives, Future Projections, and Current Resources. [REVIEW]Herman T. Tavani - 2001 - Ethics and Information Technology 3 (2):97-108.
    The present article focusesupon three aspects of computer ethics as aphilosophical field: contemporary perspectives,future projections, and current resources.Several topics are covered, including variouscomputer ethics methodologies, the `uniqueness'of computer ethics questions, and speculationsabout the impact of globalization and theinternet. Also examined is the suggestion thatcomputer ethics may `disappear' in the future.Finally, there is a brief description ofcomputer ethics resources, such as journals,textbooks, conferences and associations.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  15. KDD, Data Mining, and the Challenge for Normative Privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  16.  35
    Online File Sharing: Resolving the Tensions Between Privacy and Property Interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  90
    Cyberstalking, Personal Privacy, and Moral Responsibility.Herman T. Tavani & Frances S. Grodzinsky - 2002 - Ethics and Information Technology 4 (2):123-132.
    This essay examines some ethical aspects of stalkingincidents in cyberspace. Particular attention is focused on the Amy Boyer/Liam Youens case of cyberstalking, which has raised a number of controversial ethical questions. We limit our analysis to three issues involving this particular case. First, we suggest that the privacy of stalking victims is threatened because of the unrestricted access to on-linepersonal information, including on-line public records, currently available to stalkers. Second, we consider issues involving moral responsibility and legal liability for Internet (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  29
    Trust, Betrayal, and Whistle-Blowing.Herman T. Tavani & Frances S. Grodzinsky - 2014 - Acm Sigcas Computers and Society 44 (3):8-13.
    Is every act of whistle blowing, by definition, a betrayal of trust on the part of the whistle-blower? If so, are employees who blow the whistle, by implication, untrustworthy employees? Assuming that they are, would employees who blow the whistle also be willing to concede that they are not trustworthy employees, by virtue of carrying out their whistle-blowing act? In answering these questions, we first propose some working definitions of whistle-blowing, trust, and trustworthiness. We then ask whether some instances of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  58
    Can We Develop Artificial Agents Capable of Making Good Moral Decisions?: Wendell Wallach and Colin Allen: Moral Machines: Teaching Robots Right From Wrong, Oxford University Press, 2009, Xi + 273 Pp, ISBN: 978-0-19-537404-9.Herman T. Tavani - 2011 - Minds and Machines 21 (3):465-474.
  20.  32
    Privacy Online.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (4):11-19.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  24
    Some Ethical Reflections on Cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.
    The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  26
    Computer Ethics Textbooks: A Thirty-Year Retrospective.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (3):26-31.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  21
    Cyberethics Biliography 2001: A Select List of Recent Works.Herman T. Tavani - 2001 - Acm Sigcas Computers and Society 31 (2):30-36.
    Included in the 2001 annual bibliography update is a select list of recent books and articles, each with a publisher's date of either 2000 or 2001. For an annotated list of selected books and articles published between 1998 and 2000, see the June 1999 and June 2000 issues of Computers and Society; and for a comprehensive list of books and articles published before 1997, see my Computing, ethics, and social responsiblity: a bibliography.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  13
    Metabibliography of Computers, Ethics, and Society: An Annotated Bibliography of Bibliographies.Herman T. Tavani - 1997 - Acm Sigcas Computers and Society 27 (1):19-21.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  38
    Search Engines, Personal Information and the Problem of Privacy in Public.Herman T. Tavani - 2005 - International Review of Information Ethics 3:39-45.
    The purpose of this paper is to show how certain uses of search-engine technology raise concerns for personal privacy. In particular, we examine some privacy implications involving the use of search engines to acquire information about persons. We consider both a hypothetical scenario and an actual case in which one or more search engines are used to find information about an individual. In analyzing these two cases, we note that both illustrate an existing problem that has been exacerbated by the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  44
    The Internet, Ethical Values, and Conceptual Frameworks: An Introduction to Cyberethics.Richard A. Spinello & Herman T. Tavani - 2001 - Acm Sigcas Computers and Society 31 (2):5-7.
    What exactly is Cyberethics? How did the field develop? What are some of the central issues and themes in this field, and what methodologies are used by those working in this area of applied ethics? These and related questions are considered in the readings included in Chapter 1. It is perhaps important to note at the outset that the field that many are now beginning to refer to as "cyberethics" has until quite recently been referred to by the more general (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  48
    Recent Works in Information and Communication Technology (ICT) Ethics.Herman T. Tavani - 2002 - Ethics and Information Technology 4 (2):169-175.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  26
    Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace.Herman T. Tavani - 2000 - Acm Sigcas Computers and Society 30 (3):3-9.
  29.  13
    Journals and Periodicals on Computers, Ethics & Society.Herman T. Tavani - 1997 - Acm Sigcas Computers and Society 27 (2):20-26.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  9
    Selecting a Computer Ethics Coursebook: A Comparative Study of Five Recent Works.Herman T. Tavani - 1996 - Acm Sigcas Computers and Society 26 (4):15-21.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  8
    Recent Coursebooks and Articles of Interest: Bibliography Update '98.Herman T. Tavani - 1998 - Acm Sigcas Computers and Society 28 (1):40-41.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  8
    Journals and Periodicals on Computers, Ethics, and Society: Part 2: Fifty Publications of Interest.Herman T. Tavani - 1997 - Acm Sigcas Computers and Society 27 (3):39.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  6
    A Computer Ethics Bibliography.Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (2):8-18.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  3
    A Computer Ethics Bibliography.Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (3):25-37.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  38
    Genomics, Ethics, and ICT.Ann Backus, Richard A. Spinello & Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):1-3.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  36.  27
    Editorial: Moral Luck, Social Networking Sites, and Trust on the Web. [REVIEW]Maria C. Bottis, Frances S. Grodzinsky & Herman T. Tavani - 2010 - Ethics and Information Technology 12 (4):297-298.
  37.  18
    Crossing Boundaries: Ethics in Interdisciplinary and Intercultural Relations: Selected Papers From the CEPE 2011 Conference.Elizabeth A. Buchanan & Herman T. Tavani - 2013 - Acm Sigcas Computers and Society 43 (1):6-8.
    The Ninth International Conference on Computer Ethics: Philosophical Enquiry was held in Milwaukee, WI. Four papers originally presented at that conference are included in this issue of Computers and Society. The selected papers examine a wide range of information/computer-ethics-related issues, and taken together, they show great diversity in the field of information/computer ethics. We are continually negotiating with ethics, law, and policy in our technology-driven activities in the interconnected global arena. As we consider the themes within and among the papers (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  38.  8
    Symposium on Bernard Gert's Moral Philosophy.Herman T. Tavani - 2007 - Metaphilosophy 38 (4):363-364.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39. Introduction to Computer Ethics: Philosophy Enquiry. [REVIEW]Deborah G. Johnson, James H. Moor & Herman T. Tavani - 2001 - Ethics and Information Technology 3 (1):1-2.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  19
    Announcements.Herman T. Tavani - 2000 - Ethics and Information Technology 2 (4):251-255.
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  1
    A Computer Ethics Bibliography.Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (4):9-38.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  6
    Book Review: Technology and the Future, Sixth Edition Edited by Albert H. Teich. [REVIEW]Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (3):39-40.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  8
    Book Review: Technology and the Future, Edited by Albert H. Teich. [REVIEW]Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (3):39-40.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  21
    Book Review: Virtual Reality by Howard Rheingold. [REVIEW]Herman T. Tavani - 1997 - Acm Sigcas Computers and Society 27 (4):31-32.
  45.  5
    Bibliography Update '99: Recent Books and Articles of Interest.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (2):28-30.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  46.  23
    Cyberethics and the Future of Computing.Herman T. Tavani - 1996 - Acm Sigcas Computers and Society 26 (2):22-29.
  47.  22
    Cyberethics bibliography 2005.Herman T. Tavani - 2005 - Acm Sigcas Computers and Society 35 (3):3.
    Included in the 2005 cyberethics bibliography update is an annotated list of more than fifty recent books; each has a publisher's date of 2002 or later. This list expands upon the books identified and annotated in cyberethics bibliography included in the June 2003 issue of ACM Computers and Society Magazine. For information about selected books published between 1998 and 2002, see the June 1999, June 2000, June 2001, and June 2002 issues of Computers and Society; and for a comprehensive list (...)
    No categories
    Direct download (7 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  48.  40
    Computer Ethics as a Field of Applied Ethics.Herman T. Tavani - 2012 - Journal of Information Ethics 21 (2):52-70.
    The present essay includes an overview of key milestones in the development of computer ethics as a field of applied ethics. It also describes the ongoing debate about the proper scope of CE, as a subfield both in applied ethics and computer science. Following a brief description of the cluster of ethical issues that CE scholars and practitioners have generally considered to be the standard or "mainstream" issues comprising the field thus far, the essay speculates about the future direction of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  64
    Computer Ethics in the Post-September 11 World.Herman T. Tavani, Frances S. Grodzinsky & Richard A. Spinello - 2003 - Ethics and Information Technology 5 (4):181-182.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  9
    Computer Ethics: Philosophical Enquiry.Herman T. Tavani & Lucas D. Introna - 1999 - Acm Sigcas Computers and Society 29 (1):4-8.
1 — 50 / 62