Int. J. Technoethics最新文献

筛选
英文 中文
College Students, Piracy, and Ethics: Is there a Teachable Moment? 大学生、盗版和道德:是否存在一个可教育的时刻?
Int. J. Technoethics Pub Date : 2011-07-01 DOI: 10.4018/jte.2011070102
J. Reiss, R. Cintrón
{"title":"College Students, Piracy, and Ethics: Is there a Teachable Moment?","authors":"J. Reiss, R. Cintrón","doi":"10.4018/jte.2011070102","DOIUrl":"https://doi.org/10.4018/jte.2011070102","url":null,"abstract":"This study explores the nature of piracy prevention tools used by IT departments in the Florida State University System to determine their relative effectiveness. The study also examines the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other prevention methods would be effective. The authors conclude that monitoring techniques are a short-term solution and more research must put into finding long-term solutions.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131470467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Without Informed Consent 未经知情同意
Int. J. Technoethics Pub Date : 2011-07-01 DOI: 10.4018/jte.2011070104
S. Belfrage
{"title":"Without Informed Consent","authors":"S. Belfrage","doi":"10.4018/jte.2011070104","DOIUrl":"https://doi.org/10.4018/jte.2011070104","url":null,"abstract":"The requirement of always obtaining participants' informed consent in research with human subjects cannot always be met, for a variety of reasons. This paper describes and categorises research situations where informed consent is unobtainable. Some of these kinds of situations, common in biomedicine and psychology, have been previously discussed, whereas others, for example, those more prevalent in infrastructure research, introduce new perspectives. The advancement of new technology may lead to an increase in research of these kinds. The paper also provides a review of methods intended to compensate for lack of consent, and their applicability and usefulness for the different categories of situations are discussed. The aim of this is to provide insights into one important aspect of the question of permitting research without informed consent, namely, how well that which informed consent is meant to safeguard can be achieved by other means.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Boys with Toys and Fearful Parents?: The Pedagogical Dimensions of the Discourse in Technology Ethics 有玩具的男孩和害怕的父母?技术伦理学话语的教学维度
Int. J. Technoethics Pub Date : 2011-07-01 DOI: 10.4018/jte.2011070103
Albrecht Fritzsche
{"title":"Boys with Toys and Fearful Parents?: The Pedagogical Dimensions of the Discourse in Technology Ethics","authors":"Albrecht Fritzsche","doi":"10.4018/jte.2011070103","DOIUrl":"https://doi.org/10.4018/jte.2011070103","url":null,"abstract":"Based on recent complaints about the neglect of the human in the philosophy of technology, this paper explores the different ways how technology ethics put the relation between the human and the technical on stage. It identifies various similarities in the treatment of the human in technology and the treatment of the child in education and compares Heidegger's concerns about the role of technology with the duplicity of childhood and adulthood in conflicts of adolescence. The findings give reason to assume that technology ethics and pedagogy are closely related. A brief review of selected topics in technology ethics illustrates exemplarily how a pedagogic interpretation of the current discussion can contribute to further progress in the field.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Laboring in Cyberspace: A Lockean Theory of Property in Virtual Worlds 网络空间中的劳动:洛克式的虚拟世界财产理论
Int. J. Technoethics Pub Date : 2011-07-01 DOI: 10.4018/jte.2011070105
Marcus Schulzke
{"title":"Laboring in Cyberspace: A Lockean Theory of Property in Virtual Worlds","authors":"Marcus Schulzke","doi":"10.4018/jte.2011070105","DOIUrl":"https://doi.org/10.4018/jte.2011070105","url":null,"abstract":"This paper examines property relations in massively multiplayer online games MMOGs through the lens of John Locke's theory of property. It argues that Locke's understanding of the common must be modified to reflect the differences between the physical world that he dealt with and the virtual world that is now the site of property disputes. Once it is modified, Locke's theory provides grounds for recognizing player ownership of much of the intellectual material of virtual worlds, the goods players are responsible for creating, and the developer-created goods that players obtain through an exchange of labor or goods representing labor value.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130669962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet History 互联网的历史
Int. J. Technoethics Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040104
R. Cohen-Almagor
{"title":"Internet History","authors":"R. Cohen-Almagor","doi":"10.4018/jte.2011040104","DOIUrl":"https://doi.org/10.4018/jte.2011040104","url":null,"abstract":"This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase 1984-1989. It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133575452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Socio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System 网络间谍活动的社会技术影响:以鬼网系统为例
Int. J. Technoethics Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040105
X. Lin, R. Luppicini
{"title":"Socio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System","authors":"X. Lin, R. Luppicini","doi":"10.4018/jte.2011040105","DOIUrl":"https://doi.org/10.4018/jte.2011040105","url":null,"abstract":"Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other government offices in 103 countries and infected at least 1,295 computers. The following case study explores the influences of GhostNet on affected organizations by critically reviewing GhostNet documentation and relevant literature on cyber espionage. The research delves into the socio-technical aspects of cyber espionage through a case study of GhostNet. Drawing on Actor Network Theory ANT, the research examined key socio-technical relations of Ghostnet and their influence on affected organizations. Implications of these findings for the phenomenon of GhostNet are discussed in the hope of raising awareness about the importance of understanding the dynamics of socio-technical relations of cyber-espionage within organizations.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Perverting Activism: Cyberactivism and Its Potential Failures In Enhancing Democratic Institutions 变态行动主义:网络行动主义及其在加强民主制度方面的潜在失败
Int. J. Technoethics Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040102
T. Bertolotti, Emanuele Bardone, L. Magnani
{"title":"Perverting Activism: Cyberactivism and Its Potential Failures In Enhancing Democratic Institutions","authors":"T. Bertolotti, Emanuele Bardone, L. Magnani","doi":"10.4018/jte.2011040102","DOIUrl":"https://doi.org/10.4018/jte.2011040102","url":null,"abstract":"This paper analyzes the impact of new technologies on a range of practices related to activism. The first section shows how the functioning of democratic institutions can be impaired by scarce political accountability connected with the emergence of moral hazard; the second section displays how cyberactivism can improve the transparency of political dynamics; in the last section the authors turn specifically to cyberactivism and isolate its flaws and some of the most pernicious and self-defeating effects.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116844910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The Impact of Context on Employee Perceptions of Acceptable Non-Work Related Computing 情境对员工可接受的与工作无关的计算认知的影响
Int. J. Technoethics Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040103
Troy J. Strader, J. R. Fichtner, Suzanne R. Clayton, Lou Ann Simpson
{"title":"The Impact of Context on Employee Perceptions of Acceptable Non-Work Related Computing","authors":"Troy J. Strader, J. R. Fichtner, Suzanne R. Clayton, Lou Ann Simpson","doi":"10.4018/jte.2011040103","DOIUrl":"https://doi.org/10.4018/jte.2011040103","url":null,"abstract":"Employees have access to a wide range of computer-related resources at work, and often these resources are used for non-work related personal activities. In this study, the authors address the relationship between employee's utilitarian ethical orientation, the factors that create the context that influences their ethical perceptions, and their overall perceptions regarding the level of acceptability for 14 different non-work related computing activities. The authors find that time and monetary cost associated with an activity has a negative relationship to perceived acceptability. Results indicate that contextual variables, such as an employee's supervisory or non-supervisory role, opportunity, computer self-efficacy, and whether or not an organization has computer use policies, training, and monitoring, influence individual ethical perceptions. Implications and conclusions are discussed for organizations and future research.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
The Middle Ground for Nuclear Waste Management: Social and Ethical Aspects of Shallow Storage 核废料管理的中间地带:浅层储存的社会和伦理问题
Int. J. Technoethics Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040101
A. Marshall
{"title":"The Middle Ground for Nuclear Waste Management: Social and Ethical Aspects of Shallow Storage","authors":"A. Marshall","doi":"10.4018/jte.2011040101","DOIUrl":"https://doi.org/10.4018/jte.2011040101","url":null,"abstract":"The 2001 terrorist attacks in the USA and the 2011 seismic events in Japan have brought into sharp relief the vulnerabilities involved in storing nuclear waste on the land's surface. Nuclear engineers and waste managers are deciding that disposing nuclear waste deep underground is the preferred management option. However, deep disposal of nuclear waste is replete with enormous technical uncertainties. A proposed solution to protect against both the technical vagaries of deep disposal and the dangers of surface events is to store the nuclear waste at shallow depths underground. This paper explores social and ethical issues that are relevant to such shallow storage, including security motivations, intergenerational equity, nuclear stigma, and community acceptance. One of the main ethical questions to emerge is whether it is right for the present generation to burden local communities and future generations with these problems since neither local peoples nor future people have sanctioned the industrial and military processes that have produced the waste in the first place.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber-Terrorism and Ethical Journalism: A Need for Rationalism 网络恐怖主义与新闻伦理:理性主义的需要
Int. J. Technoethics Pub Date : 2010-10-01 DOI: 10.4018/jte.2010100101
Mahmoud Eid
{"title":"Cyber-Terrorism and Ethical Journalism: A Need for Rationalism","authors":"Mahmoud Eid","doi":"10.4018/jte.2010100101","DOIUrl":"https://doi.org/10.4018/jte.2010100101","url":null,"abstract":"Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist goals. Among the countless cyber-terrorist cases and scenarios of only this last decade, the paper discusses four cyber-terrorism cases that represent the most recent severe cyber-terrorist attacks on infrastructure and network systems-Internet Black Tigers, MafiaBoy, Solo, and Irhabi 007. Regardless of the nature of actors and their motivations, cyber-terrorists hit very aggressively causing serious damages. Cyber-terrorists are rational actors who use the most advanced technology; hence, the critical need for the use of counter-threat swords by actors on the other side. Given that terrorist goals are mostly dependent on the media's reactions, journalistic practices are significant and need to be most effective. A major tool that can help journalists in their anti-and counter-terrorist strategies with cyber-terrorists is rationalism, merged with the expected socially responsible conduct. Rational behaviour, founded in game theory, along with major journalistic ethical principles are fundamental components of effective media decision-making during times of terrorism.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信