5 found
Order:
  1.  11
    Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development.Katie Shilton & Daniel Greene - 2019 - Journal of Business Ethics 155 (1):131-146.
    Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful spaces for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  50
    Anticipatory Ethics for a Future Internet: Analyzing Values During the Design of an Internet Infrastructure.Katie Shilton - 2015 - Science and Engineering Ethics 21 (1):1-18.
    The technical details of Internet architecture affect social debates about privacy and autonomy, intellectual property, cybersecurity, and the basic performance and reliability of Internet services. This paper explores one method for practicing anticipatory ethics in order to understand how a new infrastructure for the Internet might impact these social debates. This paper systematically examines values expressed by an Internet architecture engineering team—the Named Data Networking project—based on data gathered from publications and internal documents. Networking engineers making technical choices also weigh (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  11
    Business and the Ethical Implications of Technology: Introduction to the Symposium.Kirsten Martin, Katie Shilton & Jeffery Smith - 2019 - Journal of Business Ethics 160 (2):307-317.
    While the ethics of technology is analyzed across disciplines from science and technology studies, engineering, computer science, critical management studies, and law, less attention is paid to the role that firms and managers play in the design, development, and dissemination of technology across communities and within their firm. Although firms play an important role in the development of technology, and make associated value judgments around its use, it remains open how we should understand the contours of what firms owe society (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Engaging Values Despite Neutrality: Challenges and Approaches to Values Reflection During the Design of Internet Infrastructure.Katie Shilton - 2018 - Science, Technology, and Human Values 43 (2):247-269.
    Internet protocol development is a social process, and resulting protocols are shaped by their developers’ politics and values. This article argues that the work of protocol development poses barriers to developers’ reflection upon values and politics in protocol design. A participant observation of a team developing internet protocols revealed that difficulties defining the stakeholders in an infrastructure and tensions between local and global viewpoints both complicated values reflection. Further, Internet architects tended to equate a core value of interoperability with values (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  4
    Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation.Katie Shilton, Donal Heidenblad, Adam Porter, Susan Winter & Mary Kendig - 2020 - Science and Engineering Ethics 26 (6):2911-2926.
    There is growing consensus that teaching computer ethics is important, but there is little consensus on how to do so. One unmet challenge is increasing the capacity of computing students to make decisions about the ethical challenges embedded in their technical work. This paper reports on the design, testing, and evaluation of an educational simulation to meet this challenge. The privacy by design simulation enables more relevant and effective computer ethics education by letting students experience and make decisions about common (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark