1. Trang chủ
  2. » Công Nghệ Thông Tin

Wiley the handbook of information and computer ethics may 2008 ISBN 0471799599 pdf

703 94 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 703
Dung lượng 6,71 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Library of Congress Cataloging-in-Publication Data: The handbook of information and computer ethics / edited by Kenneth Einar Himma and Herman T.. The growingdependence of large-scale ec

Trang 3

THE HANDBOOK

OF INFORMATION

AND COMPUTER ETHICS

Trang 6

Published by John Wiley & Sons, Inc., Hoboken, New Jersey

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or

by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose No warranty may be created or extended by sales representatives or written sales materials The advice and strategies contained herein may not be suitable for your situation You should consult with a professional where appropriate Neither the publisher nor the author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services please contact our Customer Care Department within the U.S at 877-762-2974, outside the U.S at 317-572-3993 or fax 317-572-4002 Wiley also publishes its books in a variety of electronic formats Some content that appears in print, however may not be available in electronic formats.

Library of Congress Cataloging-in-Publication Data:

The handbook of information and computer ethics / edited by Kenneth Einar Himma and

Herman T Tavani.

p cm.

Includes index.

ISBN 978-0-471-79959-7 (cloth)

QA76.9.M65H36 2008

004.01’9–dc22

2007044568 Printed in the United States of America

10 9 8 7 6 5 4 3 2 1

fax 978-646-8600, or on the web at www.copyright.com Requests to the Publisher for permission

Trang 7

In memory of my mother-in-law, Mary Abate

HTT

Trang 9

Kenneth Einar Himma and Herman T Tavani

PART I: FOUNDATIONAL ISSUES AND METHODOLOGICAL

Luciano Floridi

2 Milestones in the History of Information and Computer Ethics 25

Terrell Ward Bynum

Jeroen van den Hoven

Batya Friedman, Peter H Kahn Jr., and Alan Borning

PART II: THEORETICAL ISSUES AFFECTING PROPERTY,

5 Personality-Based, Rule-Utilitarian, and Lockean Justifications

Trang 10

8 Ethical Issues Involving Computer Security: Hacking,

Kenneth Einar Himma

PART III: PROFESSIONAL ISSUES AND THE

Kay Mathiesen and Don Fallis

Frances S Grodzinsky and Marty J Wolf

11 Internet Research Ethics: The Field and Its Critical Issues 273

Elizabeth A Buchanan and Charles Ess

12 Health Information Technology: Challenges in Ethics, Science,

Kenneth W Goodman

Bernd Carsten Stahl

18 A Practical Mechanism for Ethical Risk

Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan

John Weckert and Yeslam Al-Saggaf

David M Levy

Trang 11

21 Email Spam 517

Keith W Miller and James H Moor

John Snapper

23 Intellectual Property: Legal and Moral Challenges of

Richard A Spinello

Kay Mathiesen

Alison Adam

Maria Canellopoulou-Bottis and Kenneth Einar Himma

Rafael Capurro

Trang 13

The publication of The Handbook of Information and Computer Ethics signifies amilestone in the field of computer ethics The field began to emerge as a scholarlyfield in the late 1970s and early 1980s Joseph Weizenbaum’s Computer Power andHuman Reason (1976) was the first extended work to draw attention to thepotentially deep social implications of the new technology During this period,privacy had been subject to a number of major studies, including Alan Westin andMichael Baker’s Data Banks in a Free Society (1972) The first works by philo-sophers began to appear in the 1980s, and in 1985 Terrell Bynum published a specialissue of Metaphilosophy pulling together these first works and making them moreavailable to the philosophical community That year, 1985, was also the year inwhich my own Computer Ethics was first published.

Perhaps it is an understatement to say that in the twenty-plus years since theappearance of these first works, the field of computer ethics has flourishedenormously Of course, the development of the field has gone hand-in-hand withthe development of computer and information technology In one of the seminalarticles in the field, Jim Moor identifies malleability as a key feature of computers;that malleability has meant that computer and information technology has perme-ated almost every domain of human activity And, of course, wherever thetechnology goes, ethical issues can be found While the flourishing of the field

of computer ethics is to be celebrated, growth inevitably means pressure to splitthe whole into parts The topics that need to be addressed continue to expand,and perspectives from a wide range of disciplines are relevant Thus, there ispressure for the field to become splintered into subfields (for example, with adistinction between computer ethics and information ethics); for scholars tobecome specialists in one subfield (for example, to choose to become an expert

in privacy or intellectual property or professional ethics); or to have subfieldsmerged into already existing fields such as media studies, business ethics, infor-mation sciences, etc

In this context, the publication of The Handbook of Information and ComputerEthics is particularly important because it aims to keep the field whole It isintended to provide an overview of the issues and controversies in a field that hasbecome increasingly unwieldy As a handbook, the volume defines the field as awhole; it identifies foundational issues, provides theoretical perspectives, andincludes analyses of a range of applied and practical issues The volume does thisthrough chapters by individuals who have been working in the field from the

xi

Trang 14

beginning, as well as works by scholars who have come to the field morerecently For this reason, I applaud the efforts of Kenneth Himma and HermanTavani and welcome the publication of The Handbook of Information andComputer Ethics.

DEBORAHG JOHNSON

Trang 15

In the last 10 years, information and computer ethics has emerged as an importantarea of philosophical and social theorizing, combining conceptual, metaethical,normative, and applied elements Interest in the area has increased dramatically incomputer science departments, philosophy departments, communications depart-ments, business schools, information and library schools, and law schools Infor-mation ethics has become one of the most important areas of applied philosophy interms of professional, student, and popular interest Many of the most pressing newethical issues we face have arisen in connection with the use and development of newinformation technologies For example, debates about the ethics of online music filesharing have led academics and ordinary citizens to reconsider the arguments for thelegitimacy of intellectual property protection New developments in informationtechnology threaten privacy in ways that could not have been imagined 50 years ago,raising new ethical issues about the rights to privacy and anonymity The growingdependence of large-scale economies on the Internet creates new vulnerabilities thatcan be exploited by hackers, cybercriminals, and terrorists, raising novel ethicalissues about computer intrusions and security.

The Handbook of Information and Computer Ethics responds to this growingprofessional interest in information ethics with 27 chapters that address both tradi-tional and current issues in information and computer ethics research Each chapter,written by one or more of the most influential information ethicists, explains andevaluates the most important positions and arguments on the respective issues As aresult, the Handbook reader will be able to come away from each chapter with anunderstanding of the major positions and arguments, their strengths and weaknesses,and the author’s original take on the issue In addition, each chapter not only containsuseful summaries of the most important research on the topic but also makes animportant new contribution to the literature, and ends with a bibliography thatidentifies the most important books and articles on the topic

Because a number of very good anthologies on information and computer ethicsalready exist, one might ask: Why another book of readings on ethical aspects ofinformation and computer technology? One justification for the book is that, as notedabove, each chapter in the present volume is written in a style that conforms to theobjectives of a handbook and thus provides the conceptual background that is often notfound in papers comprising other volumes Consider that many papers included inthose volumes are compiled from disparate sources and, thus, can reflect various stylesand diverse objectives With one exception, every chapter in this volume is an originalpiece that was written specifically for the Handbook As such, each paper provides an

xiii

Trang 16

accessible but sophisticated overview of the most important positions and supportingarguments and objections, along with the author’s state-of-the-art take on thesepositions, arguments, and objections.

Another justification for this book is that existing anthologies tend to be narrower inscope than The Handbook of Information and Computer Ethics For example, manyanthologies cover only a limited set of topics that affect one or more subfields ofinformation ethics; as a result, these works often exclude some of the controversies andissues that arise in information ethics as a broader field of inquiry Consider that someanthologies have focused on Internet- or cyber-specific issues involving informationethics,1while others have centered mainly on professional ethics issues affectingresponsibility.2Other volumes are dedicated to information ethics concerns affectingspecific topical areas such as privacy, security, and property.3Still other anthologieshave focused on ethical aspects of information technology that converge with ethics-related concerns affecting medicine and genetics/genomics research.4 And otheranthologies are dedicated to the examination of ethical issues in information technol-ogy that intersect either with disciplines, such as philosophy, or with new or emergingfields, such as nanotechnology.5So even though there is no shortage of anthologies thatexamine ethical issues centering on these, and related, ethical aspects of informationtechnology, none addresses the breadth of topics covered in the present handbook.The Handbook is organized into six main parts, which cover a wide range oftopics—i.e., from foundational concepts and methodological approaches in informa-tion ethics (at the theoretical level) to specific problem areas involving applied orpractical ethical issues

At the theoretical level, conceptual frameworks underlying topical areas such asintellectual property, privacy, and security are examined These frameworks provideHandbook readers with some conceptual tools needed to analyze more systematicallythe kinds of issues examined in the chapters comprising the remaining sections of thebook At the practical level, a number of contemporary controversies ranging fromprofessional-ethical issues to issues of responsibility, regulation, and access areexamined For example, these chapters examine controversies affecting open-sourcesoftware, medical informatics and genetic research, cyber-conflict, risk assessment,the digital divide, information overload, e-mail spam, online file sharing, plagiarism,censorship and free speech, and so forth Thus, Handbook readers will gain an

1

See Langford, D (Ed.) Internet Ethics Macmillan, 2000; Baird, R., Reagan, R., and Ramsower, S., (Eds.) Cyberethics Prometheus, 2000; Spinello, R and Tavani, H (Eds.) Readings in CyberEthics, 2nd ed Jones and Bartlett, 2004.

Trang 17

understanding of both the general frameworks and specific issues that define the fields

of information and computer ethics

ACKNOWLEDGMENTS

The editors would like to acknowledge the support they received from their respectiveinstitutions while composing the Handbook Kenneth Himma’s work on this projectwas partially supported by Seattle Pacific University through a Faculty ResearchGrant, which released him from teaching duties and made it possible for him to devotemost of his efforts to this project Herman Tavani also received institutional support inthe form of a Summer Faculty Research and Professional Development Grant fromRivier College, during the summer of 2006, to work on the Handbook The editors arevery grateful to Seattle Pacific University and Rivier College, respectively, for theinstitutional support they received

The editors are especially grateful to the contributing authors, without whom thisvolume would not exist The contributors’ willingness to revise drafts of their papers tocomply with the specific objectives of this handbook is greatly appreciated We alsoappreciate the extraordinary patience, as well as the ongoing cooperation and support,the contributors displayed throughout the long, and sometimes tedious, processrequired to complete this book

We are also grateful to the editorial staff at Wiley, especially to Paul Petralia,Anastasia Wasko, and Whitney Lesch, for managing to keep the book on a reasonableschedule, despite some of the obstacles that we encountered along the way.Finally, we wish to thank our spouses, and our families, for their unwaveringsupport throughout this project To them, we dedicate this book

K E H

H T T.August, 2007

Trang 19

Alison Adam, PhD, is Professor of Information Systems and Director ofthe Informatics Research Institute at the University of Salford, UK Her recentpublications include Gender, Ethics and Information Technology (Palgrave Mac-millan, 2005).

Yeslam Al-Saggaf, PhD, is a Senior Lecturer in Information Technology at CharlesSturt University and a Research Fellow at the Centre for Applied Philosophy andPublic Ethics His research interests lie in the areas of online communities (bothsocial and political) and the online political public sphere in the Arab world.Alan Borning, PhD, is Professor in the Department of Computer Science andEngineering at the University of Washington, adjunct professor in the InformationSchool, and Co-Director of the Center for Urban Simulation and Policy Analysis Hiscurrent research interests are in human–computer interaction and designing for humanvalues, particularly as applied to land use, transportation, and environmentalmodeling

Maria Canellopoulou-Bottis, PhD, is a Lecturer at the Information Science partment of the Ionian University, Greece Her recent publications include The LegalProtection of Databases (2004) and Information Law (2004), in Greek, and numerousarticles in Greek and foreign journals

De-Philip Brey, PhD, is Professor of Philosophy and Director of the Center forPhilosophy of Technology and Engineering Science at the University of Twente, TheNetherlands He is a member of the board of the International Society for Ethics andInformation Technology and the author of numerous articles in philosophy oftechnology and computer and information ethics

Elizabeth A Buchanan, PhD, is Associate Professor and Director, Centerfor Information Policy Research, School of Information Studies, University ofWisconsin-Milwaukee She is Co-Director of the International Society for Ethicsand Information Technology (INSEIT), Chair, Ethics Working Group, Association ofInternet Researchers (AoIR), and Chair, Intellectual Freedom Round Table, Wiscon-sin Library Association

Terrell Ward Bynum, PhD, is Professor of Philosophy at Southern ConnecticutState University and Director of the Research Center for Computing and Society.His recent publications include Computer Ethics and Professional Responsibility(Blackwell, 2004), coedited with Simon Rogerson, and Cyberphilosophy: The

xvii

Trang 20

Intersection of Philosophy and Computing (Blackwell, 2002), coedited with JamesMoor.

Rafael Capurro, PhD, is Professor of Information Science and Information Ethics

at Stuttgart Media University (Germany) and Director of the International Center forInformation Ethics (ICIE) His recent publications include Localizing the Internet:Ethical Aspects in Intercultural Perspective (Fink Munich, 2007), coedited with J.Fruehbauer and T Hausmanninger, as well as numerous book chapters and journalarticles

Tony Clear, is Associate Head of School in the School of Computing and ical Sciences at Auckland University of Technology, New Zealand He edits a regularcolumn in the ACM SIGCSE Bulletin, is on the editorial board of Computer ScienceEducation, and has research interests in software risk assessment

Mathemat-Dorothy E Denning, PhD, is Professor of Defense Analysis at the Naval uate School She is the author of Information Warfare and Security (Addison Wesley,1999) and of numerous articles and book chapters relating to conflict in cyberspaceand information security

Postgrad-Charles Ess, PhD, is Distinguished Research Professor and Professor of Philosophyand Religion at Drury University His recent publications include InformationTechnology Ethics: Cultural Perspectives, coedited with Soraj Hongladarom (IdeaGroup, 2007), and special issues of Ethics and Information Technology devoted tocross-cultural approaches to privacy and to Kantian approaches to topics in informa-tion ethics

Don Fallis, PhD, is Associate Professor of Information Resources and AdjunctAssociate Professor of Philosophy at the University of Arizona His articles haveappeared in the Journal of Philosophy, Philosophical Studies, Library Quarterly,and the Journal of the American Society for Information Science and Technology.Luciano Floridi, PhD, holds the research chair in philosophy of information at theDepartment of Philosophy of the University of Hertfordshire and is Fellow of St CrossCollege, Oxford University His books include the Blackwell Guide to the Philosophy

of Computing and Information (2004) and The Philosophy of Information (OxfordUniversity Press, forthcoming)

Batya Friedman, PhD, is Professor in the Information School, an Adjunct Professor

in the Department of Computer Science & Engineering, and Co-Director of the ValueSensitive Design Research Lab at the University of Washington Her recent publica-tions include the development of an open source privacy addendum (Ubicomp, 2006),the value-sensitive design of a corporation’s groupware systems (GROUP, 2007), andnumerous journal articles and book chapters

Kenneth W Goodman, PhD, is Associate Professor of Medicine and Philosophy atthe University of Miami, where he directs the Bioethics Program He has writtenextensively about ethics and health informatics, including hospital, public health, andgenetics applications

Trang 21

Don Gotterbarn, PhD, Director of the Software Engineering Ethics ResearchInstitute at East Tennessee State University, has been active in computer ethics formore than 20 years Most recently, his work has focused on ethical decision supportmethodologies.

Frances S Grodzinsky, PhD, is Professor of Computer Science and InformationTechnology at Sacred Heart University and Co-Director of the Hersher Institute ofEthics Her recent publications include numerous book chapters and journalarticles

Kenneth Einar Himma, PhD, JD, is Associate Professor of Philosophy at SeattlePacific University and formerly taught at the University of Washington in theInformation School, Law School, and Philosophy Department He has publishedmore than a hundred journal articles and is on the editorial boards of several journals oninformation technology and ethics

Deborah G Johnson, PhD, is the Anne Shirley Carter Olsson Professor of AppliedEthics and Chair of the Department of Science, Technology, and Society at theUniversity of Virginia Her anthology, Technology & Society: Engineering ourSocioTechnical Future (coedited with J Wetmore), is forthcoming from MIT Press

in 2008, and she is currently working on the fourth edition of Computer Ethics(forthcoming from Prentice Hall)

Peter H Kahn, Jr., PhD, is Associate Professor of Psychology at the University ofWashington His books include The Human Relationship with Nature: Developmentand Culture (MIT Press, 1999) and Children and Nature: Psychological, Socio-cultural, and Evolutionary Investigations (MIT Press, 2002), and his researchpublications have appeared in such journals as Child Development, DevelopmentalPsychology, Human-Computer Interaction, and Journal of Systems Software.Choon-Tuck Kwanis a Lecturer at the Auckland University of Technology (NewZealand) and Manager of the New-Zealand-based Software Engineering PracticeImprovement Alliance He was formerly a senior IT manager in a large governmentalStatutory Board in Singapore

David M Levy, PhD, is Professor in the Information School of the University ofWashington He is the author of Scrolling Forward: Making Sense of Documents in theDigital Age (Arcade, 2001)

Antonio Marturano, PhD, an Adjunct Professor of Business Ethics at the Faculty ofEconomics, Sacred Heart Catholic University of Rome, has held several academicposts at universities in the United States, United Kingdom, and Italy His main researcharea is applied ethics, with a special focus on ethical and legal problems spanninggenetics and information technology

Kay Mathiesen, PhD, teaches courses on information ethics and policy at the School

of Information Resources and Library Science, University of Arizona Her articleshave appeared in journals such as Library Quarterly, Computers and Society, theAnnual Review of Law and Ethics, and Business Ethics Quarterly

Trang 22

Keith W Miller, PhD, is Professor of Computer Science at the University ofIllinois at Springfield and Editor of IEEE Technology and Society Magazine Hisresearch interests include computer ethics, software testing, and computer scienceeducation.

James H Moor, PhD, is Professor of Philosophy at Dartmouth College, an AdjunctProfessor with the Centre for Applied Philosophy and Public Ethics at The AustralianNational University, and President of the International Society for Ethics andInformation Technology His ethical writings are on computer ethics, artificialintelligence, and nanotechnology

Adam D Moore, PhD, is Associate Professor in the Philosophy Department and theInformation School at the University of Washington He is the author of IntellectualProperty and Information Control (Transaction Pub University, hardback 2001,paperback 2004), and editor of Intellectual Property: Moral, Legal, and InternationalDilemmas (Rowman and Littlefield, 1997) and Information Ethics: Privacy, Property,and Power (The University of Washington Press, 2005)

John Snapper, PhD, is Associate Professor of Philosophy and an Associate of theCenter for the Study of Ethics in the Professions He is coeditor of Owning Scientificand Technical Information (Rutgers Press, 1989) and Ethical Issues in the Use ofComputers (Wadsworth, 1985) and author of a numerous journal articles on relatedsubjects

Richard A Spinello, PhD, is Associate Research Professor in the Carroll School ofManagement at Boston College He has written and edited seven books on ethics andpublic policy, including CyberEthics: Morality and Law in Cyberspace (Jones andBartlett, third edition, 2006) and Intellectual Property Rights in a Networked World(Idea Group, 2005)

Bernd Carsten Stahl, PhD, is Reader in Critical Research in Technology in theCentre for Computing and Social Responsibility at De Montfort University, Leicester,

UK As the Editor-in-Chief of the International Journal of Technology and HumanInteraction, his interests cover philosophical issues arising from the intersections ofbusiness, technology, and information

Herman T Tavani, PhD, is Professor of Philosophy at Rivier College, a Lecturer inthe Carroll School of Management at Boston College, and a visiting scholar/ethicist inthe Department of Environmental Health at the Harvard School of Public Health Hisrecent books include Ethics and Technology (Wiley, second edition 2007) and Ethics,Computing, and Genomics (Jones and Bartlett, 2006)

Jeroen van den Hoven, PhD, is Professor of Moral Philosophy at Delft University ofTechnology (the Netherlands) He is the Editor-in-Chief of Ethics and InformationTechnology (Springer), Scientific Director of the Centre of Excellence for Ethics andTechnology of the three technical universities in the Netherlands, and a member of theHigh Level Advisory Group on ICT (ISTAG) of the European Commission inBrussels

Trang 23

Anton Vedder, PhD, is Associate Professor of Ethics and Law at the Tilburg Institutefor Law, Technology, and Society of Tilburg University (the Netherlands) His recentpublications include NGO Involvement in International Governance and Policy:Sources of Legitimacy (Martinus Nijhoff, 2007) and several book chapters and journalarticles on privacy, reliability of information, accountability, and legitimacy of newlyemerging governance regimes.

Kathleen A Wallace, PhD, is Professor of Philosophy at Hofstra University Herrecent publications include “Educating for Autonomy: Identity and IntersectionalSelves,” in Education for a Democratic Society (Rodopi Press, 2006), “Moral Reform,Moral Disagreement and Abortion” (Metaphilosophy, 2007), and “Morality and theCapacity for Symbolic Cognition,” Moral Psychology (MIT Press, 2007)

John Weckert, PhD, is Professor of Computer Ethics and Professorial Fellow at theCentre for Applied Philosophy and Public Ethics, Charles Sturt University, Australia

He is founding editor-in-chief of the journal Nanoethics: Ethics for Technologies thatConverge at the Nanoscale, and author of numerous book chapters and journal articles.Marty J Wolf, PhD, is Professor of Computer Science and the Computer ScienceProgram Coordinator at Bemidji State University in Minnesota He has over 15 yearsexperience using and administering Linux and has published numerous book chaptersand journal articles in areas ranging from graph theory to computer ethics

Trang 25

KENNETH EINAR HIMMA and HERMAN T TAVANI

As noted in the Preface to this volume, The Handbook of Information and ComputerEthics covers a wide range of topics and issues The 27 chapters that comprisethis work are organized into six main parts: I Foundational Issues and Methodo-logical Frameworks; II Theoretical Issues Affecting Property, Privacy, Anonymity,and Security; III Professional Issues and the Information-Related Professions;

IV Responsibility Issues and Risk Assessment; V Regulatory Issues and lenges; and VI Access and Equity Issues

Chal-I FOUNDATChal-IONAL Chal-ISSUES AND METHODOLOGChal-ICAL FRAMEWORKSPart I, comprising four chapters, opens with Luciano Floridi’s examination of somekey foundational concepts in information ethics Floridi points out that the expression

“information ethics,” introduced in the 1980s, was originally used as a general label todiscuss issues regarding information (or data) confidentiality, reliability, quality, andusage He also notes that “information ethics” has since come to mean different things

to different researchers working in a variety of disciplines, including computer ethics,business ethics, medical ethics, computer science, the philosophy of information, andlibrary and information science Floridi is perhaps best known among computerethicists for his influential methodological (and metaethical) framework, which hecalls Information Ethics or IE He contrasts his framework with traditional views thathave tended to view IE as either an “ethics of informational resources,” an “ethics ofinformational products,” or an “ethics of the informational environment.” Floridiargues that his alternative view of IE, as a “macroethics,” is superior to the variousmicroethical analyses of IE that have been suggested

Floridi’s discussion of foundational issues in IE is followed by Terrell WardBynum’s chapter, “Milestones in the History of Information Ethics.” Bynum isgenerally considered to be one of the “pioneers” in computer ethics, helping toestablish the field as an independent area of applied ethics in the 1980s In Chapter 2,Bynum argues that the origin of computer and information ethics can be traced to thework of philosopher/scientist Norbert Wiener, who, during World War II, worked with

a group of scientists and engineers on the invention of digital computers and radar Hischapter begins with a discussion of Wiener’s “powerful foundation” for information

xxiii

Trang 26

and computer ethics, and then it describes a number of additional “milestones” in thehistory of what Bynum describes as a “new and vital branch of ethics.”

Next, Jeroen van den Hoven examines some methodological issues in his chapter,

“Moral Methodology and Information Technology.” One question that has beenconsidered by some theoreticians in the fields of information and computer ethics iswhether a new and distinct methodology is needed to handle the kinds of ethical issuesthat have been generated Van den Hoven suggests that we need a methodology that is

“different from what we have seen thus far in applied ethics,” but which does not callfor “cataclysmic re-conceptualizations.” He begins with an overview of some of themain methodological positions in applied ethics that are relevant for computer ethics,before sketching out his proposed method that aims at making moral values a part oftechnological design in the early stages of its development This method assumes, asvan den Hoven notes, that “human values, norms, moral considerations can beimparted to the things we make and use (technical artefacts, policy, laws andregulation, institutions, incentive structures, plans).”

Part I closes with Batya Friedman, Peter Kahn, and Alan Borning’s chapter, “ValueSensitive Design and Information Systems.” The authors note that value sensitivedesign (VSD) is a theoretically grounded approach to the design of technology thataccounts for human values in a “principled and comprehensive manner throughout thedesign process.” It also includes a tripartite methodology, consisting of conceptual,empirical, and technical investigations In explicating VSD, Friedman, Kahn, andBorning consider three case studies: one concerning information and control of webbrowser cookies (implicating the value of informed consent); a second study con-cerning using high-definition plasma displays in an office environment to provide a

“window to the outside world” (implicating the values of physical and psychologicalwell-being and privacy in public spaces); and a third study concerning an integratedland use, transportation, and environmental simulation system to support publicdeliberation and debate on major land use and transportation decisions (implicatingthe values of fairness, accountability, and support for the democratic process) In theconcluding section of their chapter, the authors offer some practical suggestions forhow to engage in VSD

II THEORETICAL ISSUES AFFECTING PROPERTY, PRIVACY,

ANONYMITY, AND SECURITY

Part II comprises four chapters that examine conceptual and theoretical frameworks ininformation ethics Unlike the chapters in Part I, however, they examine some topic- ortheme-specific frameworks that underlie many of the practical issues considered in theremaining parts of the Handbook Specifically, the chapters in Part II examinetheoretical and conceptual aspects of intellectual property, informational privacy,online anonymity, and cyber security In the opening chapter, Adam Moore discussesthree different kinds of justifications for intellectual property (IP), also noting that weneed to be careful not to confuse moral claims involving IP with legal ones His chapterbegins with a brief sketch of Anglo-American and Continental systems of IP that

Trang 27

focuses on legal conceptions and rights Moore then examines arguments for thepersonality-based, utilitarian, and Lockean views of property He concludes that thereare justified moral claims to intellectual works, that is, “claims that are strong enough

to warrant legal protection.”

Moore’s analysis of IP is followed by Herman Tavani’s examination of some keyconcepts, theories, and controversies affecting informational privacy Beginning with

an overview of the concept of privacy in general, Tavani distinguishes among fourdistinct kinds of privacy: physical, decisional, psychological, and informationalprivacy He then evaluates some classic and contemporary theories of informationalprivacy before considering the impact that some specific information technologies(such as cookies, data mining, and RFID techologies) have had on four subcategories

of informational privacy: consumer privacy, medical privacy, employee privacy, andlocation privacy His chapter closes with a brief examination of some recent proposalsfor framing a comprehensive informational-privacy policy

Next, Kathleen Wallace examines the concept of anonymity in her chapter, “OnlineAnonymity.” Wallace points out that anonymity and privacy are closely related, withanonymity “being one means of ensuring privacy.” She also notes that anonymity can

be brought about in a variety of ways and that there are many purposes, both positive andnegative, that anonymity could serve For example, on the positive side, it can promotefree expression and exchange of ideas, and it can protect someone from undesirablepublicity On the negative side, however, anonymity can facilitate hate speech with noaccountability, as well as fraud or other criminal activity Wallace believes that thereare two thoughts regarding anonymity as a “byproduct” that are worth distinguishing;

it could be the “byproduct of sheer size as when one is among a throng of people whodon’t know one another” or the “byproduct of complex social organization.”Part II concludes with Kenneth Himma’s chapter, “Ethical Issues InvolvingComputer Security: Hacking, Hacktivism, and Counterhacking.” Himma considerswhether and to what extent various types of unauthorized computer intrusions byprivate persons and groups (as opposed to state agents and agencies) are morallypermissible After articulating a prima facie general case against these intrusions,Himma considers intrusions motivated by malicious intentions and by certain benignintentions, such as the intent to expose security vulnerabilities The final sections of hischapter consider controversies associated with “hacktivism” and “counterhacking”(or hack backs) Himma’s chapter can also be read in connection with DorothyDenning’s chapter on the ethics of cyber conflict

III PROFESSIONAL ISSUES AND THE INFORMATION-RELATEDPROFESSIONS

Part III comprises five chapters that examine a diverse set of professional-ethics issuesaffecting the information and information-related professions—for example, concernsthat affect library professionals, software engineering/development professionals,(online) research professionals, medical and healthcare professionals, and businessprofessionals It opens with Kay Mathiesen and Don Fallis’ chapter, “Information

Trang 28

Ethics and the Library Profession.” Mathiesen and Fallis note that, in general, therole of the professional librarian is to provide access to information, but they alsopoint out that librarians vary in their activities depending on the goal of such access,and on whether they are corporate librarians, academic librarians, or publiclibrarians The authors begin their analysis by considering the “mission” of thelibrarian as an “information provider” and then focus on some of the issues that arise

in relation to “the role of the librarian as an information provider.” In particular, theauthors focus on questions pertaining to the “selection and organization of infor-mation,” which, in turn, raises concerns having to do with “bias, neutrality,advocacy, and children’s rights to access information.”

Mathiesen’s and Fallis’s analysis of ethical challenges facing librarians and thelibrary profession is followed by an examination of controversies affecting opensource software development and the computing profession in Frances Grodzinsky’sand Marty Wolf’s chapter, “Ethical Interest in Free and Open Source Software.”Grodzinsky and Wolf begin by comparing free software (FS) and open source software(OSS), and by examining the history, philosophy, and development of each Next, theyexplore some important issues that affect the ethical interests of all who use and aresubject to the influences of software, regardless of whether that software is FS or OSS.The authors also argue that the distinction between FS and OSS is one that isphilosophically and socially important Additionally, they review some issues affect-ing the autonomy of OSS software developers and their “unusual professionalresponsibilities.”

Next, Elizabeth Buchanan and Charles Ess examine some professional-ethicalissues affecting online research in their chapter, “Internet Research Ethics: The Fieldand its Critical Issues.” Buchanan and Ess begin by noting that Internet research ethics(IRE) is an emerging multi- and interdisciplinary field that systematically studies theethical implications that arise from the use of the Internet as “a space or locale of, and/

or tool for, research.” The authors believe that no one discipline can claim IRE as itsown Because Internet research is undertaken from a wide range of disciplines, theyargue that IRE builds on the research ethics traditions developed for medical,humanistic, and social science research For Buchanan and Ess, a “central challengefor IRE is to develop guidelines for ethical research that aim toward objective,universally recognized norms, while simultaneously incorporating important disci-plinary differences in research ethics.” The authors consider and review a range of themost common ethical issues in IRE, and they offer some suggestions for possibleresolutions of specific ethical challenges

Buchanan and Ess’s analysis of IRE-related ethical issues is followed by KennethGoodman’s chapter, “Health Information Technology: Challenges in Ethics, Sci-ence, and Uncertainty.” Goodman notes that the use of information technology in thehealth professions has introduced numerous ethical issues and professional chal-lenges The three principal issues that Goodman examines in the context of thesechallenges are (1) privacy and confidentiality; (2) the use of decision supportsystems; and (3) the development of personal health records

Part III closes with Bernd Carsten Stahl’s examination of some business-relatedethical concerns in his chapter, “Ethical Issues of Information and Business.” Stahl

Trang 29

begins his analysis with a brief definition of the concept of business and thendiscusses some specific business-ethics issues affecting privacy/employee surveil-lance, intellectual property, globalization, and digital divides He considers variousapproaches to these and related business-ethical issues, drawing on some of thedebates in computer and information ethics Stahl notes that in these debates,different “sets of ethical discourse” have been used He also notes that in someinstances, these “ethical discourses” overlap and have “the potential to inform eachother.” Stahl’s chapter aims at establishing a link between these discourses.

IV RESPONSIBILITY ISSUES AND RISK ASSESSMENT

The five chapters that make up Part IV examine a wide range of topics, each of whichtouches on one or more aspects of responsibility and risk involving informationtechnology In the opening chapter, “Responsibilities for Information on the Internet,”Anton Vedder begins by noting that issues involving responsibility for Internet serviceproviders (ISPs) are much broader in scope than they are sometimes portrayed in theresearch literature, where the emphasis has tended to be more narrowly on concernsaffecting accountability with regard to illegal content He then examines someissues affecting the responsibilities involved in the possible negative impact of “thedissemination of information” on the Internet Here, he focuses mainly on threeparties: (1) those who put forward information on the Internet, that is, the contentproviders; (2) the organizations that provide the infrastructure for the dissemination ofthat information — the ISPs; and (3) the receivers or users of the information, that is,the third parties

Vedder’s analysis of responsibility for the dissemination of information on theInternet is followed by Philip Brey’s chapter, “Virtual Reality and ComputerSimulation.” Brey argues that virtual reality and computer simulation have notreceived much attention from ethicists, including ethicists in the computing profes-sion, and that this relative neglect is unjustified because of the important ethicalquestions that arise He begins his chapter by describing what virtual reality andcomputer simulations are and then describes some current applications of thesetechnologies Brey then discusses the ethics of three distinct aspects of virtual reality:(1) representation in virtual reality and computer simulations, (2) behavior in virtualreality, and (3) computer games He concludes with a discussion of issues affectingresponsibility, such as, responsibility in the development and professional use ofvirtual reality systems and computer simulations

Next, Antonio Marturano examines some issues in genetic research that overlapwith questions in information ethics In his chapter, “Genetic Information: Epistemo-logical and Ethical Issues,” Marturano first analyzes some basic information-relatedconcepts of molecular biology and then considers the ethical consequences of theirmisuse He notes that genetics has utilized many concepts from informatics and thatthese concepts are used in genetics at different, but related, levels At the most basiclevel, for example, genetics has taken the very notion of information — central to thefield of informatics — to explain the mechanisms of life Marturano notes that some

Trang 30

authors have questioned the application of informational concepts in genetics He alsobelieves that it is important to understand the way the information-related concepts ofmolecular biology are interpreted to understand the reason why their “incorrectapplication—and consequent rhetorical use by geneticists—turns into an ethicalfailure.” In this sense, Marturano’s chapter is also concerned with issues affectingresponsibility and the use of informational concepts.

In the next chapter, Dorothy Denning examines some ethical aspects of “cyberconflict.” Denning believes that there are three areas of cyber conflict where the ethicalissues are problematic The first is “cyber warfare at the state level,” when conducted inthe interests of national security One of the questions raised in this context is whether it

is ethical for a state to penetrate or disable the computer systems of an adversary statethat has threatened its territorial or political integrity The second area involves

“nonstate actors,” whose cyber attacks are politically or socially motivated Thisdomain of conflict is often referred to as “hacktivism,” the convergence of hackingwith activism Denning notes that if the attacks are designed to be “sufficientlydestructive as to severely harm and terrorize civilians,” they become “cyberterrorism”

— the integration of cyber attacks with terrorism The third area involves the “ethics ofcyber defense,” particularly what is called “hack back,” “strike back,” or “activeresponse.” If a system is under cyber attack, can the system administrators attack back

to stop it? What if the attack is coming from computers that may themselves be victims

of compromise? Since many attacks are routed through chains of “compromisedmachines,” can a victim “hack back” along the chain to determine the source?Denning’s chapter, which raises questions about responsibility and risk issuesaffecting cyber conflict, can also be read in conjunction with Ken Himma’s analysis

of security-related issues in Chapter 8

In the closing chapter of Part V, “A Practical Mechanism for Ethical RiskAssessment—A SoDIS Inspection,” Don Gotterbarn, Tony Clear, and Choon-TuckKwan examine some specific issues and concerns involving risk analysis The authorsbegin by noting that although the need for high quality software may be obvious,information systems are “frequently plagued by problems that continue to occur inspite of a considerable amount of attention to the development and applications ofcertain forms of risk assessment.” They claim that the narrow form of risk analysis thathas been used, with its limited understanding of the scope of a software project andinformation systems, has contributed to significant software failures Next, the authorsintroduce an expanded risk analysis process, which goes beyond the concept of

“information system risk” to include social, professional, and ethical risks that lead tosoftware failure They point out that using an expanded risk analysis will enlarge theproject scope considered by software developers

V REGULATORY ISSUES AND CHALLENGES

Part V includes five chapters that examine a diverse set of issues and challengesaffecting the regulation of information It opens with John Weckert and Yeslam Al-Saggaf’s chapter, “Regulation and Governance on the Internet,” which raises the

Trang 31

question: What, if anything, on the Internet should be governed or regulated? Weckertand Al-Saggaf note that we live in a world where people misbehave, and that for groupsand societies to function satisfactorily, some restrictions on behavior are required.They also note that even where there is no malicious intent, there can be a need for somecentralized body or perhaps “decentralized bodies” to coordinate activities.Weckert and Al-Saggaf’s analysis is followed by David Levy’s chapter,

“Information Overload.” Levy first provides a preliminary definition of informationoverload and then identifies some of the questions surrounding it He also discusses thehistory of the English phrase “information overload” and shows how industrializationand “informatization” prepared the ground for its emergence In the closing section ofhis chapter, Levy explores some of the consequences, both practical and ethical, ofoverload and he considers what can be done in response

Next, Keith Miller and James Moor examine controversies associated with spam intheir chapter “E-mail Spam.” The authors begin their analysis with a short history ofspam, and they note that not every unwanted e-mail can be defined as spam Miller andMoor suggest a “just consequentialist” approach to controversies involving e-mailspam — an approach that takes into account several different characteristics that help

to differentiate spam from other e-mails The authors conclude by noting that while the

“struggle against unwanted e-mails” will likely continue, ethical analysis can be useful

in analyzing spam-related issues provided that ethicists are careful to look at

“individual stakeholders as well as systematic stakeholders” (i.e., both micro- andmacro-level issues) They also argue that ethical analysis should start with a “clearexposition” of the characteristics of the e-mails that will be considered “spam.”Miller and Moor’s analysis is followed by John Snapper’s discussion of plagiarism

in his chapter, “Plagiarism: What, Why, and If.” Snapper defines plagiarism as an

“expression that incorporates existing work either without authorization or withoutdocumentation, or both,” and he points out that plagiarism can occur irrespective ofpossible copyright violation Drawing some useful distinctions between plagiarismand copyright violation, Snapper shows how the two can occur simultaneously in somecases but are completely independent in others

Part V concludes with Richard Spinello’s chapter, “Intellectual Property: Legal andMoral Challenges of Online File Sharing.” Spinello asks whether we should holdcompanies such as Napster, Grokster, or BitTorrent morally accountable for the directinfringement of their users, particularly if they intentionally design the code to enablethe avoidance of copyright liability He presents the conflicting arguments on bothsides of this provocative debate Although he focuses primarily on the ethicaldimension of this controversy, Spinello claims that we cannot neglect the complexand intertwined legal issues Taking this point into account, he then discusses therecent MGM v Grokster (2005) case where both kinds of these issues have surfaced

VI ACCESS AND EQUITY ISSUES

Part VI, the final section of the Handbook, includes four chapters that examinecontroversies affecting either access or equity, or both, with respect to information

Trang 32

technology It opens with Kay Mathiesen’s chapter, “Censorship and Access toExpression,” which can also be read in conjunction with some of the chapters inPart V that examine regulatory issues and challenges But since Mathiesen’s chapterincludes an important analysis of issues affecting access to information, within herbroader discussion of censorship, we decided to include it here Mathiesen argues thatthe term “censorship” is commonly used in ways that “go much beyond the strictconfines of First Amendment law.” She also believes that philosophers, even thosewho have written much of “freedom of expression,” have not tried to provide aconceptual analysis of censorship itself Mathiesen tries to fill in this gap by providing

an acceptable definition of censorship

Mathiesen’s analysis is followed by Alison Adam’s examination of access issuesaffecting gender in her chapter, “The Gender Agenda in Computer Ethics.” Adam’schapter is concerned with two interrelated questions: (1) What gender issues areinvolved in computer ethics? (2) What contribution may feminist ethics offer computerethics? After briefly introducing the topic of feminist ethics, she reviews existingresearch on gender and computer ethics Adam believes that this research falls into twomain categories: (i) empirical comparisons of computer ethics decision-making bymen and women; and (ii) other aspects of gender and computing that have beenconsidered in ethical terms in the literature (which, she notes, usually involve aconsideration of the low numbers of women in computing) She then identifies anumber of gaps where extended discussion from a gender perspective would benefitseveral current problem areas within the purview of contemporary computer ethics;these include topics such as cyberstalking and hacking In the concluding section of herchapter, Adam speculates that a gender analysis of computer ethics from the perspec-tive of theoretical development of feminist ethics may enable the framing of “thediscussion on‘cyberfeminism’ as a possible locus for a feminist computer ethics.”Next, Maria Canellopoulou-Bottis and Kenneth Himma examine a different set ofaccess issues affecting information technology in their chapter, “The Digital Divide: APerspective for the Future.” Bottis and Himma argue that the digital divide is not anyone particular “gap” between rich and poor or between local and global, but ratherincludes a “variety of gaps believed to bear on the world’s inequitable distribution ofresources.” They argue that there is a comparative lack of meaningful access toinformation and communication technologies (ICTs), which can be viewed in terms ofseveral kinds of “gaps”: (1) a gap in access to the ICTs themselves; (2) a gap in havingthe skills needed to use these technologies; (3) a gap between rich and poor in theirability to access information needed to compete in a global economy; and (4) a gap ineducation that translates into a “gap in abilities to process and absorb information.”The authors also point out that there are “nondigital gaps” that contribute to thedistribution of resources Himma and Bottis believe that the moral importance of thedigital divide as a problem that needs to be addressed is linked to “inequalitiesbetween the rich and the poor — especially between wealthy nations and nations inabsolute poverty.”

In the final chapter of Part VI, and of the Handbook, Rafael Capurro examines someintercultural issues in information ethics in his chapter, “Intercultural InformationEthics.” He begins with an examination of the foundational debate of morality in

Trang 33

general, which is addressed within the background of continental European phy (but also “with hints to Eastern traditions”) Next, Capurro presents some ethicalquestions about the impact of information and communication technologies ondifferent cultures in Asia and the Pacific, Latin America and the Caribbean, Africa,Australia, and Turkey Then, he addresses special issues such as privacy, intellectualproperty, online communities, “governmentality,” gender issues, mobile phones,health care, and the digital divide.

philoso-We believe that the 27 chapters comprising The Handbook of Information andComputer Ethics address most of the rich and diverse issues that arise in and, in effect,define the field of information/computer ethics We hope that the Handbook readerswill discover for themselves why this field warrants serious attention by bothprofessionals and the general public and why it is becoming one of the most importantfields of applied ethics

Trang 35

FOUNDATIONAL ISSUES AND

METHODOLOGICAL FRAMEWORKS

Trang 37

Foundations of Information Ethics

LUCIANO FLORIDI

1.1 INTRODUCTION

We call our society “the information society” because of the pivotal role played byintellectual, intangible assets (knowledge-based economy), information-intensiveservices (business and property services, communications, finance, and insurance),and public sectors (education, public administration, health care) As a socialorganization and way of life, the information society has been made possible by acluster of information and communication technologies (ICTs) infrastructures And as

a full expression of techne, the information society has already posed fundamentalethical problems, whose complexity and global dimensions are rapidly growing andevolving Nowadays, a pressing task is to formulate an information ethics that can treatthe world of data, information, and knowledge,1 with their relevant life cycles(including creation, elaboration, distribution, communication, storage, protection,usage, and possible destruction), as a new environment, the infosphere,2in whichhumanity is and will be flourishing An information ethics should be able to addressand solve the ethical challenges arising in the infosphere

The last statement is more problematic than it might seem at first sight As we shallsee in some detail in the following sections, in recent years, “Information Ethics” (IE)has come to mean different things to different researchers working in a variety ofdisciplines, including computer ethics, business ethics, medical ethics, computer

The Handbook of Information and Computer Ethics, Edited by Kenneth Einar Himma

and Herman T Tavani

1

For this distinction, see Floridi (1999b).

2

Infosphere is a neologism I coined years ago (see, e.g., Floridi (1999b) or Wikipedia) based on

“biosphere,” a term referring to that limited region on our planet that supports life It denotes the whole informational environment constituted by all informational entities (thus including informational agents as well), their properties, interactions, processes, and mutual relations It is an environment comparable to, but different from, cyberspace (which is only one of its subregions, as it were), since it also includes offline and analogue spaces of information.

3

Trang 38

science, the philosophy of information, social epistemology ICT studies, and libraryand information science This is not surprising Given the novelty of the field, theurgency of the problems it poses, and the multifarious nature of the concept ofinformation itself and of its related phenomena, perhaps a Babel of interpretations wasalways going to be inevitable.3It is, however, unfortunate, for it has generated someconfusion about the specific nature, scope, and goals of IE Fortunately, the problem isnot irremediable, for a unified approach can help to explain and relate the main senses

in which IE has been discussed in the literature This approach will be introduced inthe rest of this section Once it is outlined, I shall rely on it in order to reconstruct threedifferent approaches to IE, in Sections 1.2–1.4 These will then be critically assessed inSection 1.5 In Section 1.6, I will show how the approaches can be overcome by a fourthapproach, which will be qualified as macroethical In Section 1.7 two main criticisms,often used against IE as a macroethical theory, are discussed Section 1.8 concludesthis chapter with some brief, general considerations

The approach mentioned above is best introduced schematically and by focusingour attention on a moral agent A ICTs affect an agent’s moral life in many ways.Recently (Floridi, forthcoming), I suggested that these may be schematically orga-nized along three lines (see Fig 1.1)

Suppose our moral agent A is interested in pursuing whatever she considers her bestcourse of action, given her predicament We shall assume that A’s evaluations andinteractions have some moral value, but no specific value needs to be introduced at thisstage Intuitively, A can avail herself of some information (information as a resource)

to generate some other information (information as a product) and, in so doing, affecther informational environment (information as target) This simple model, summa-rized in Fig 1.1, may help one to get some initial orientation in the multiplicity ofissues belonging to Information Ethics I shall refer to it as the RPT model.The RPT model is useful to explain, among other things, why any technology thatradically modifies the “life of information” is bound to have profound moralimplications for any moral agent Moral life is a highly information-intensive activity,and ICTs, by radically transforming the informational context in which moral issuesarise, not only add interesting new dimensions to old problems, but may lead us torethink, methodologically, the very grounds on which our ethical positions are based.4

At the same time, the model rectifies an excessive emphasis occasionally placed onspecific technologies (this happens most notably in computer ethics), by calling ourattention to the more fundamental phenomenon of information in all its varieties andlong tradition This was also Wiener’s position,5

and it might be argued that the variousdifficulties encountered in the conceptual foundations of information and computerethics are arguably connected to the fact that the latter has not yet been recognized asprimarily an environmental ethics, whose main concern is (or should be) the ecological

and Sanders (2002a) and Tavani (2002).

considered as one of the founding fathers of information ethics.

Trang 39

management and well-being of the infosphere (see Floridi and Sanders (2002b) for adefense of this position).

Since the appearance of the first works in the eighties,6Information Ethics has beenclaimed to be the study of moral issues arising from one or another of the three distinct

“information arrows” in the RPT model We are now ready to map the differentapproaches to IE by following each arrow

1.2 THE FIRST STAGE: IE AS AN ETHICS OF INFORMATIONALRESOURCES

According to Froehlich (2004),7the expression “information ethics” was introduced

in the 1980s by Koenig et al (1981) and Hauptman (1988), who then went on toestablish the Journal of Information Ethics in 1992 It was used as a general label todiscuss issues regarding information (or data) confidentiality, reliability, quality, andusage Not surprisingly, the disciplines involved were initially library and informationscience and business and management studies They were only later joined byinformation technologies studies

It is easy to see that this initial interest in information ethics was driven by concernabout information as a resource that should be managed efficiently, effectively, andfairly Using the RPT model, this meant paying attention to the crucial role played byinformation as something extremely valuable for A’s evaluations and actions,especially in moral contexts Moral evaluations and actions have an epistemiccomponent, as A may be expected to proceed “to the best of her information,” that

is, A may be expected to avail herself of whatever information she can muster, in order

to reach (better) conclusions about what can and ought to be done in some given

FIGURE 1.1 The “External” R(esource) P(roduct) T(arget) model

Trang 40

circumstances Socrates already argued that a moral agent is naturally interested

in gaining as much valuable information as the circumstances require, and that a informed agent is more likely to do the right thing The ensuing “ethical in-tellectualism” analyzes evil and morally wrong behavior as the outcome of deficientinformation Conversely, A’s moral responsibility tends to be directly proportional to

well-A’s degree of information: any decrease in the latter usually corresponds to a decrease

in the former This is the sense in which information occurs in the guise of judicialevidence It is also the sense in which one speaks of A’s informed decision, informedconsent, or well-informed participation In Christian ethics, even the worst sins can beforgiven in the light of the sinner’s insufficient information, as a counterfactualevaluation is possible: had A been properly informed, A would have acted differentlyand hence would not have sinned (Luke 23:44) In a secular context, Oedipus andMacbeth remind us how the mismanagement of informational resources may havetragic consequences.8

From a “resource” perspective, it seems that the moral machine needs information,and quite a lot of it, to function properly However, even within the limited scopeadopted by an analysis based solely on information as a resource, care should beexercised lest all ethical discourse is reduced to the nuances of higher quantity, quality,and intelligibility of informational resources The more the better is not the only, noralways the best, rule of thumb, for the (sometimes explicit and conscious) withdrawal

of information can often make a significant difference A may need to lack (or precludeherself from accessing) some information in order to achieve morally desirable goals,such as protecting anonymity, enhancing fair treatment, or implementing unbiasedevaluation Famously, Rawls’ “veil of ignorance” exploits precisely this aspect ofinformation-as-a-resource, in order to develop an impartial approach to justice (Rawls,1999) Being informed is not always a blessing and might even be morally wrong ordangerous

Whether the (quantitative and qualitative) presence or the (total) absence ofinformation-as-a-resource is in question, it is obvious that there is a perfectlyreasonable sense in which Information Ethics may be described as the study of themoral issues arising from “the triple A”: availability, accessibility, and accuracy ofinformational resources, independently of their format, kind, and physical support.Rawls’ position has been already mentioned Since the 1980s, other important issueshave been unveiled and addressed by IE understood as an Information-as-ResourceEthics: the so-called digital divide, the problem of infoglut, and the analysis of thereliability and trustworthiness of information sources (Froehlich, 1997; Smith, 1997).Courses on IE, taught as part of Information Sciences degree programs, tend to sharethis approach as researchers in library and information sciences are particularlysensitive to such issues, also from a professional perspective (Alfino and Pierce, 1997;Mintz, 1990; Stichler and Hauptman, 1998)

One may recognize in this original approach to Information Ethics a positionbroadly defended by Van Den Hoven (1995) and more recently by Mathiesen (2004),

Ngày đăng: 20/03/2019, 14:42

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm