This study explores the nature of piracy prevention tools used by IT departments in the Florida State University System to determine their relative effectiveness. The study also examines the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other prevention methods would be effective. The authors conclude that monitoring techniques are a short-term solution and more research must put into finding long-term solutions.
{"title":"College Students, Piracy, and Ethics: Is there a Teachable Moment?","authors":"J. Reiss, R. Cintrón","doi":"10.4018/jte.2011070102","DOIUrl":"https://doi.org/10.4018/jte.2011070102","url":null,"abstract":"This study explores the nature of piracy prevention tools used by IT departments in the Florida State University System to determine their relative effectiveness. The study also examines the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other prevention methods would be effective. The authors conclude that monitoring techniques are a short-term solution and more research must put into finding long-term solutions.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131470467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The requirement of always obtaining participants' informed consent in research with human subjects cannot always be met, for a variety of reasons. This paper describes and categorises research situations where informed consent is unobtainable. Some of these kinds of situations, common in biomedicine and psychology, have been previously discussed, whereas others, for example, those more prevalent in infrastructure research, introduce new perspectives. The advancement of new technology may lead to an increase in research of these kinds. The paper also provides a review of methods intended to compensate for lack of consent, and their applicability and usefulness for the different categories of situations are discussed. The aim of this is to provide insights into one important aspect of the question of permitting research without informed consent, namely, how well that which informed consent is meant to safeguard can be achieved by other means.
{"title":"Without Informed Consent","authors":"S. Belfrage","doi":"10.4018/jte.2011070104","DOIUrl":"https://doi.org/10.4018/jte.2011070104","url":null,"abstract":"The requirement of always obtaining participants' informed consent in research with human subjects cannot always be met, for a variety of reasons. This paper describes and categorises research situations where informed consent is unobtainable. Some of these kinds of situations, common in biomedicine and psychology, have been previously discussed, whereas others, for example, those more prevalent in infrastructure research, introduce new perspectives. The advancement of new technology may lead to an increase in research of these kinds. The paper also provides a review of methods intended to compensate for lack of consent, and their applicability and usefulness for the different categories of situations are discussed. The aim of this is to provide insights into one important aspect of the question of permitting research without informed consent, namely, how well that which informed consent is meant to safeguard can be achieved by other means.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on recent complaints about the neglect of the human in the philosophy of technology, this paper explores the different ways how technology ethics put the relation between the human and the technical on stage. It identifies various similarities in the treatment of the human in technology and the treatment of the child in education and compares Heidegger's concerns about the role of technology with the duplicity of childhood and adulthood in conflicts of adolescence. The findings give reason to assume that technology ethics and pedagogy are closely related. A brief review of selected topics in technology ethics illustrates exemplarily how a pedagogic interpretation of the current discussion can contribute to further progress in the field.
{"title":"Boys with Toys and Fearful Parents?: The Pedagogical Dimensions of the Discourse in Technology Ethics","authors":"Albrecht Fritzsche","doi":"10.4018/jte.2011070103","DOIUrl":"https://doi.org/10.4018/jte.2011070103","url":null,"abstract":"Based on recent complaints about the neglect of the human in the philosophy of technology, this paper explores the different ways how technology ethics put the relation between the human and the technical on stage. It identifies various similarities in the treatment of the human in technology and the treatment of the child in education and compares Heidegger's concerns about the role of technology with the duplicity of childhood and adulthood in conflicts of adolescence. The findings give reason to assume that technology ethics and pedagogy are closely related. A brief review of selected topics in technology ethics illustrates exemplarily how a pedagogic interpretation of the current discussion can contribute to further progress in the field.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines property relations in massively multiplayer online games MMOGs through the lens of John Locke's theory of property. It argues that Locke's understanding of the common must be modified to reflect the differences between the physical world that he dealt with and the virtual world that is now the site of property disputes. Once it is modified, Locke's theory provides grounds for recognizing player ownership of much of the intellectual material of virtual worlds, the goods players are responsible for creating, and the developer-created goods that players obtain through an exchange of labor or goods representing labor value.
{"title":"Laboring in Cyberspace: A Lockean Theory of Property in Virtual Worlds","authors":"Marcus Schulzke","doi":"10.4018/jte.2011070105","DOIUrl":"https://doi.org/10.4018/jte.2011070105","url":null,"abstract":"This paper examines property relations in massively multiplayer online games MMOGs through the lens of John Locke's theory of property. It argues that Locke's understanding of the common must be modified to reflect the differences between the physical world that he dealt with and the virtual world that is now the site of property disputes. Once it is modified, Locke's theory provides grounds for recognizing player ownership of much of the intellectual material of virtual worlds, the goods players are responsible for creating, and the developer-created goods that players obtain through an exchange of labor or goods representing labor value.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130669962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase 1984-1989. It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed.
{"title":"Internet History","authors":"R. Cohen-Almagor","doi":"10.4018/jte.2011040104","DOIUrl":"https://doi.org/10.4018/jte.2011040104","url":null,"abstract":"This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase 1984-1989. It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133575452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other government offices in 103 countries and infected at least 1,295 computers. The following case study explores the influences of GhostNet on affected organizations by critically reviewing GhostNet documentation and relevant literature on cyber espionage. The research delves into the socio-technical aspects of cyber espionage through a case study of GhostNet. Drawing on Actor Network Theory ANT, the research examined key socio-technical relations of Ghostnet and their influence on affected organizations. Implications of these findings for the phenomenon of GhostNet are discussed in the hope of raising awareness about the importance of understanding the dynamics of socio-technical relations of cyber-espionage within organizations.
{"title":"Socio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System","authors":"X. Lin, R. Luppicini","doi":"10.4018/jte.2011040105","DOIUrl":"https://doi.org/10.4018/jte.2011040105","url":null,"abstract":"Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other government offices in 103 countries and infected at least 1,295 computers. The following case study explores the influences of GhostNet on affected organizations by critically reviewing GhostNet documentation and relevant literature on cyber espionage. The research delves into the socio-technical aspects of cyber espionage through a case study of GhostNet. Drawing on Actor Network Theory ANT, the research examined key socio-technical relations of Ghostnet and their influence on affected organizations. Implications of these findings for the phenomenon of GhostNet are discussed in the hope of raising awareness about the importance of understanding the dynamics of socio-technical relations of cyber-espionage within organizations.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper analyzes the impact of new technologies on a range of practices related to activism. The first section shows how the functioning of democratic institutions can be impaired by scarce political accountability connected with the emergence of moral hazard; the second section displays how cyberactivism can improve the transparency of political dynamics; in the last section the authors turn specifically to cyberactivism and isolate its flaws and some of the most pernicious and self-defeating effects.
{"title":"Perverting Activism: Cyberactivism and Its Potential Failures In Enhancing Democratic Institutions","authors":"T. Bertolotti, Emanuele Bardone, L. Magnani","doi":"10.4018/jte.2011040102","DOIUrl":"https://doi.org/10.4018/jte.2011040102","url":null,"abstract":"This paper analyzes the impact of new technologies on a range of practices related to activism. The first section shows how the functioning of democratic institutions can be impaired by scarce political accountability connected with the emergence of moral hazard; the second section displays how cyberactivism can improve the transparency of political dynamics; in the last section the authors turn specifically to cyberactivism and isolate its flaws and some of the most pernicious and self-defeating effects.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116844910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Troy J. Strader, J. R. Fichtner, Suzanne R. Clayton, Lou Ann Simpson
Employees have access to a wide range of computer-related resources at work, and often these resources are used for non-work related personal activities. In this study, the authors address the relationship between employee's utilitarian ethical orientation, the factors that create the context that influences their ethical perceptions, and their overall perceptions regarding the level of acceptability for 14 different non-work related computing activities. The authors find that time and monetary cost associated with an activity has a negative relationship to perceived acceptability. Results indicate that contextual variables, such as an employee's supervisory or non-supervisory role, opportunity, computer self-efficacy, and whether or not an organization has computer use policies, training, and monitoring, influence individual ethical perceptions. Implications and conclusions are discussed for organizations and future research.
{"title":"The Impact of Context on Employee Perceptions of Acceptable Non-Work Related Computing","authors":"Troy J. Strader, J. R. Fichtner, Suzanne R. Clayton, Lou Ann Simpson","doi":"10.4018/jte.2011040103","DOIUrl":"https://doi.org/10.4018/jte.2011040103","url":null,"abstract":"Employees have access to a wide range of computer-related resources at work, and often these resources are used for non-work related personal activities. In this study, the authors address the relationship between employee's utilitarian ethical orientation, the factors that create the context that influences their ethical perceptions, and their overall perceptions regarding the level of acceptability for 14 different non-work related computing activities. The authors find that time and monetary cost associated with an activity has a negative relationship to perceived acceptability. Results indicate that contextual variables, such as an employee's supervisory or non-supervisory role, opportunity, computer self-efficacy, and whether or not an organization has computer use policies, training, and monitoring, influence individual ethical perceptions. Implications and conclusions are discussed for organizations and future research.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The 2001 terrorist attacks in the USA and the 2011 seismic events in Japan have brought into sharp relief the vulnerabilities involved in storing nuclear waste on the land's surface. Nuclear engineers and waste managers are deciding that disposing nuclear waste deep underground is the preferred management option. However, deep disposal of nuclear waste is replete with enormous technical uncertainties. A proposed solution to protect against both the technical vagaries of deep disposal and the dangers of surface events is to store the nuclear waste at shallow depths underground. This paper explores social and ethical issues that are relevant to such shallow storage, including security motivations, intergenerational equity, nuclear stigma, and community acceptance. One of the main ethical questions to emerge is whether it is right for the present generation to burden local communities and future generations with these problems since neither local peoples nor future people have sanctioned the industrial and military processes that have produced the waste in the first place.
{"title":"The Middle Ground for Nuclear Waste Management: Social and Ethical Aspects of Shallow Storage","authors":"A. Marshall","doi":"10.4018/jte.2011040101","DOIUrl":"https://doi.org/10.4018/jte.2011040101","url":null,"abstract":"The 2001 terrorist attacks in the USA and the 2011 seismic events in Japan have brought into sharp relief the vulnerabilities involved in storing nuclear waste on the land's surface. Nuclear engineers and waste managers are deciding that disposing nuclear waste deep underground is the preferred management option. However, deep disposal of nuclear waste is replete with enormous technical uncertainties. A proposed solution to protect against both the technical vagaries of deep disposal and the dangers of surface events is to store the nuclear waste at shallow depths underground. This paper explores social and ethical issues that are relevant to such shallow storage, including security motivations, intergenerational equity, nuclear stigma, and community acceptance. One of the main ethical questions to emerge is whether it is right for the present generation to burden local communities and future generations with these problems since neither local peoples nor future people have sanctioned the industrial and military processes that have produced the waste in the first place.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist goals. Among the countless cyber-terrorist cases and scenarios of only this last decade, the paper discusses four cyber-terrorism cases that represent the most recent severe cyber-terrorist attacks on infrastructure and network systems-Internet Black Tigers, MafiaBoy, Solo, and Irhabi 007. Regardless of the nature of actors and their motivations, cyber-terrorists hit very aggressively causing serious damages. Cyber-terrorists are rational actors who use the most advanced technology; hence, the critical need for the use of counter-threat swords by actors on the other side. Given that terrorist goals are mostly dependent on the media's reactions, journalistic practices are significant and need to be most effective. A major tool that can help journalists in their anti-and counter-terrorist strategies with cyber-terrorists is rationalism, merged with the expected socially responsible conduct. Rational behaviour, founded in game theory, along with major journalistic ethical principles are fundamental components of effective media decision-making during times of terrorism.
{"title":"Cyber-Terrorism and Ethical Journalism: A Need for Rationalism","authors":"Mahmoud Eid","doi":"10.4018/jte.2010100101","DOIUrl":"https://doi.org/10.4018/jte.2010100101","url":null,"abstract":"Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist goals. Among the countless cyber-terrorist cases and scenarios of only this last decade, the paper discusses four cyber-terrorism cases that represent the most recent severe cyber-terrorist attacks on infrastructure and network systems-Internet Black Tigers, MafiaBoy, Solo, and Irhabi 007. Regardless of the nature of actors and their motivations, cyber-terrorists hit very aggressively causing serious damages. Cyber-terrorists are rational actors who use the most advanced technology; hence, the critical need for the use of counter-threat swords by actors on the other side. Given that terrorist goals are mostly dependent on the media's reactions, journalistic practices are significant and need to be most effective. A major tool that can help journalists in their anti-and counter-terrorist strategies with cyber-terrorists is rationalism, merged with the expected socially responsible conduct. Rational behaviour, founded in game theory, along with major journalistic ethical principles are fundamental components of effective media decision-making during times of terrorism.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}