首页 > 最新文献

Int. J. Technoethics最新文献

英文 中文
College Students, Piracy, and Ethics: Is there a Teachable Moment? 大学生、盗版和道德:是否存在一个可教育的时刻?
Pub Date : 2011-07-01 DOI: 10.4018/jte.2011070102
J. Reiss, R. Cintrón
This study explores the nature of piracy prevention tools used by IT departments in the Florida State University System to determine their relative effectiveness. The study also examines the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other prevention methods would be effective. The authors conclude that monitoring techniques are a short-term solution and more research must put into finding long-term solutions.
本研究探讨了佛罗里达州立大学系统IT部门使用的盗版预防工具的性质,以确定其相对有效性。该研究还调查了信息安全官员在不涉及法律行动和监控的替代盗版预防技术方面的意见。调查发现,大多数机构没有使用正式的软件来监控侵权数据。此外,各院校同意学生缺乏适当的道德规范和对版权问题的关注,但并不完全相信其他预防方法会有效。这组作者的结论是,监测技术是一种短期解决方案,必须投入更多的研究来寻找长期解决方案。
{"title":"College Students, Piracy, and Ethics: Is there a Teachable Moment?","authors":"J. Reiss, R. Cintrón","doi":"10.4018/jte.2011070102","DOIUrl":"https://doi.org/10.4018/jte.2011070102","url":null,"abstract":"This study explores the nature of piracy prevention tools used by IT departments in the Florida State University System to determine their relative effectiveness. The study also examines the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other prevention methods would be effective. The authors conclude that monitoring techniques are a short-term solution and more research must put into finding long-term solutions.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131470467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Without Informed Consent 未经知情同意
Pub Date : 2011-07-01 DOI: 10.4018/jte.2011070104
S. Belfrage
The requirement of always obtaining participants' informed consent in research with human subjects cannot always be met, for a variety of reasons. This paper describes and categorises research situations where informed consent is unobtainable. Some of these kinds of situations, common in biomedicine and psychology, have been previously discussed, whereas others, for example, those more prevalent in infrastructure research, introduce new perspectives. The advancement of new technology may lead to an increase in research of these kinds. The paper also provides a review of methods intended to compensate for lack of consent, and their applicability and usefulness for the different categories of situations are discussed. The aim of this is to provide insights into one important aspect of the question of permitting research without informed consent, namely, how well that which informed consent is meant to safeguard can be achieved by other means.
由于各种原因,在人类受试者的研究中,总是获得参与者的知情同意的要求并不总是得到满足。本文描述并分类了无法获得知情同意的研究情况。其中一些情况在生物医学和心理学中很常见,以前已经讨论过,而其他情况,例如在基础设施研究中更普遍的情况,则引入了新的视角。新技术的进步可能会导致这类研究的增加。本文还提供了旨在补偿缺乏同意的方法的回顾,并讨论了它们对不同类别情况的适用性和有用性。这样做的目的是为允许在没有知情同意的情况下进行研究这个问题的一个重要方面提供见解,即,知情同意所要保护的东西可以通过其他方式实现的程度如何。
{"title":"Without Informed Consent","authors":"S. Belfrage","doi":"10.4018/jte.2011070104","DOIUrl":"https://doi.org/10.4018/jte.2011070104","url":null,"abstract":"The requirement of always obtaining participants' informed consent in research with human subjects cannot always be met, for a variety of reasons. This paper describes and categorises research situations where informed consent is unobtainable. Some of these kinds of situations, common in biomedicine and psychology, have been previously discussed, whereas others, for example, those more prevalent in infrastructure research, introduce new perspectives. The advancement of new technology may lead to an increase in research of these kinds. The paper also provides a review of methods intended to compensate for lack of consent, and their applicability and usefulness for the different categories of situations are discussed. The aim of this is to provide insights into one important aspect of the question of permitting research without informed consent, namely, how well that which informed consent is meant to safeguard can be achieved by other means.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Boys with Toys and Fearful Parents?: The Pedagogical Dimensions of the Discourse in Technology Ethics 有玩具的男孩和害怕的父母?技术伦理学话语的教学维度
Pub Date : 2011-07-01 DOI: 10.4018/jte.2011070103
Albrecht Fritzsche
Based on recent complaints about the neglect of the human in the philosophy of technology, this paper explores the different ways how technology ethics put the relation between the human and the technical on stage. It identifies various similarities in the treatment of the human in technology and the treatment of the child in education and compares Heidegger's concerns about the role of technology with the duplicity of childhood and adulthood in conflicts of adolescence. The findings give reason to assume that technology ethics and pedagogy are closely related. A brief review of selected topics in technology ethics illustrates exemplarily how a pedagogic interpretation of the current discussion can contribute to further progress in the field.
本文以近年来技术哲学对人的忽视的抱怨为基础,探讨了技术伦理如何以不同的方式将人与技术的关系置于舞台上。它确定了在技术中对待人类和在教育中对待儿童的各种相似之处,并将海德格尔对技术角色的关注与童年和成年在青春期冲突中的两面性进行了比较。研究结果使我们有理由认为技术伦理与教育学密切相关。简要回顾技术伦理中选定的主题,举例说明当前讨论的教学解释如何有助于该领域的进一步发展。
{"title":"Boys with Toys and Fearful Parents?: The Pedagogical Dimensions of the Discourse in Technology Ethics","authors":"Albrecht Fritzsche","doi":"10.4018/jte.2011070103","DOIUrl":"https://doi.org/10.4018/jte.2011070103","url":null,"abstract":"Based on recent complaints about the neglect of the human in the philosophy of technology, this paper explores the different ways how technology ethics put the relation between the human and the technical on stage. It identifies various similarities in the treatment of the human in technology and the treatment of the child in education and compares Heidegger's concerns about the role of technology with the duplicity of childhood and adulthood in conflicts of adolescence. The findings give reason to assume that technology ethics and pedagogy are closely related. A brief review of selected topics in technology ethics illustrates exemplarily how a pedagogic interpretation of the current discussion can contribute to further progress in the field.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Laboring in Cyberspace: A Lockean Theory of Property in Virtual Worlds 网络空间中的劳动:洛克式的虚拟世界财产理论
Pub Date : 2011-07-01 DOI: 10.4018/jte.2011070105
Marcus Schulzke
This paper examines property relations in massively multiplayer online games MMOGs through the lens of John Locke's theory of property. It argues that Locke's understanding of the common must be modified to reflect the differences between the physical world that he dealt with and the virtual world that is now the site of property disputes. Once it is modified, Locke's theory provides grounds for recognizing player ownership of much of the intellectual material of virtual worlds, the goods players are responsible for creating, and the developer-created goods that players obtain through an exchange of labor or goods representing labor value.
本文通过约翰·洛克的财产理论来研究大型多人在线游戏mmog中的财产关系。它认为洛克对公有物的理解必须修改,以反映他所处理的物理世界和虚拟世界之间的差异,虚拟世界现在是财产纠纷的场所。一旦对洛克的理论进行修改,它就为承认玩家对虚拟世界中大部分智力材料的所有权、玩家负责创造的商品以及玩家通过交换劳动或代表劳动价值的商品而获得的开发者创造的商品提供了依据。
{"title":"Laboring in Cyberspace: A Lockean Theory of Property in Virtual Worlds","authors":"Marcus Schulzke","doi":"10.4018/jte.2011070105","DOIUrl":"https://doi.org/10.4018/jte.2011070105","url":null,"abstract":"This paper examines property relations in massively multiplayer online games MMOGs through the lens of John Locke's theory of property. It argues that Locke's understanding of the common must be modified to reflect the differences between the physical world that he dealt with and the virtual world that is now the site of property disputes. Once it is modified, Locke's theory provides grounds for recognizing player ownership of much of the intellectual material of virtual worlds, the goods players are responsible for creating, and the developer-created goods that players obtain through an exchange of labor or goods representing labor value.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130669962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet History 互联网的历史
Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040104
R. Cohen-Almagor
This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase 1984-1989. It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed.
本文概述并分析了互联网历史上的里程碑。随着技术的进步,它提出了新的社会和伦理挑战。早期的互联网是由美国的研究单位、大学和电信公司设计和实施的,他们对前沿研究有远见和兴趣。1984-1989年,互联网进入了商业阶段。主干网的升级、新软件程序的编写以及越来越多的相互连接的国际网络促进了这一进程。20世纪90年代,使用不同操作系统的商用电脑和个人电脑加入到通用网络中,互联网大规模扩展为全球网络。讨论了社交网站的即时和日益增长的成功,这些网站使用户能够与共同的朋友和同事分享信息、照片、私人日志、爱好和个人以及商业利益。
{"title":"Internet History","authors":"R. Cohen-Almagor","doi":"10.4018/jte.2011040104","DOIUrl":"https://doi.org/10.4018/jte.2011040104","url":null,"abstract":"This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase 1984-1989. It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133575452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Socio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System 网络间谍活动的社会技术影响:以鬼网系统为例
Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040105
X. Lin, R. Luppicini
Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other government offices in 103 countries and infected at least 1,295 computers. The following case study explores the influences of GhostNet on affected organizations by critically reviewing GhostNet documentation and relevant literature on cyber espionage. The research delves into the socio-technical aspects of cyber espionage through a case study of GhostNet. Drawing on Actor Network Theory ANT, the research examined key socio-technical relations of Ghostnet and their influence on affected organizations. Implications of these findings for the phenomenon of GhostNet are discussed in the hope of raising awareness about the importance of understanding the dynamics of socio-technical relations of cyber-espionage within organizations.
技术伦理调查涉及新技术应用的各种社会、法律、文化、经济、政治和伦理影响,这些影响可能威胁到当代生活和社会的重要方面。“鬼网”是一个大规模的网络间谍网络,它渗透了103个国家的重要政治、经济和媒体机构,包括大使馆、外交部和其他政府办公室,感染了至少1295台电脑。以下案例研究通过批判性地审查GhostNet文档和有关网络间谍的相关文献,探讨了GhostNet对受影响组织的影响。该研究通过对“鬼网”的案例研究,深入探讨了网络间谍活动的社会技术方面。利用行动者网络理论ANT,研究了Ghostnet的关键社会技术关系及其对受影响组织的影响。本文讨论了这些发现对GhostNet现象的影响,希望提高人们对理解组织内网络间谍活动的社会技术关系动态的重要性的认识。
{"title":"Socio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System","authors":"X. Lin, R. Luppicini","doi":"10.4018/jte.2011040105","DOIUrl":"https://doi.org/10.4018/jte.2011040105","url":null,"abstract":"Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other government offices in 103 countries and infected at least 1,295 computers. The following case study explores the influences of GhostNet on affected organizations by critically reviewing GhostNet documentation and relevant literature on cyber espionage. The research delves into the socio-technical aspects of cyber espionage through a case study of GhostNet. Drawing on Actor Network Theory ANT, the research examined key socio-technical relations of Ghostnet and their influence on affected organizations. Implications of these findings for the phenomenon of GhostNet are discussed in the hope of raising awareness about the importance of understanding the dynamics of socio-technical relations of cyber-espionage within organizations.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Perverting Activism: Cyberactivism and Its Potential Failures In Enhancing Democratic Institutions 变态行动主义:网络行动主义及其在加强民主制度方面的潜在失败
Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040102
T. Bertolotti, Emanuele Bardone, L. Magnani
This paper analyzes the impact of new technologies on a range of practices related to activism. The first section shows how the functioning of democratic institutions can be impaired by scarce political accountability connected with the emergence of moral hazard; the second section displays how cyberactivism can improve the transparency of political dynamics; in the last section the authors turn specifically to cyberactivism and isolate its flaws and some of the most pernicious and self-defeating effects.
本文分析了新技术对一系列与行动主义相关的实践的影响。第一部分表明,与道德风险的出现有关的政治问责缺失如何损害民主机构的运作;第二部分展示了网络行动主义如何提高政治动态的透明度;在最后一节,作者专门转向网络行动主义,并孤立其缺陷和一些最有害和自我挫败的影响。
{"title":"Perverting Activism: Cyberactivism and Its Potential Failures In Enhancing Democratic Institutions","authors":"T. Bertolotti, Emanuele Bardone, L. Magnani","doi":"10.4018/jte.2011040102","DOIUrl":"https://doi.org/10.4018/jte.2011040102","url":null,"abstract":"This paper analyzes the impact of new technologies on a range of practices related to activism. The first section shows how the functioning of democratic institutions can be impaired by scarce political accountability connected with the emergence of moral hazard; the second section displays how cyberactivism can improve the transparency of political dynamics; in the last section the authors turn specifically to cyberactivism and isolate its flaws and some of the most pernicious and self-defeating effects.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116844910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The Impact of Context on Employee Perceptions of Acceptable Non-Work Related Computing 情境对员工可接受的与工作无关的计算认知的影响
Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040103
Troy J. Strader, J. R. Fichtner, Suzanne R. Clayton, Lou Ann Simpson
Employees have access to a wide range of computer-related resources at work, and often these resources are used for non-work related personal activities. In this study, the authors address the relationship between employee's utilitarian ethical orientation, the factors that create the context that influences their ethical perceptions, and their overall perceptions regarding the level of acceptability for 14 different non-work related computing activities. The authors find that time and monetary cost associated with an activity has a negative relationship to perceived acceptability. Results indicate that contextual variables, such as an employee's supervisory or non-supervisory role, opportunity, computer self-efficacy, and whether or not an organization has computer use policies, training, and monitoring, influence individual ethical perceptions. Implications and conclusions are discussed for organizations and future research.
员工在工作中可以访问大量与计算机相关的资源,这些资源通常用于与工作无关的个人活动。在这项研究中,作者探讨了员工的功利主义道德取向、影响他们道德观念的环境因素以及他们对14种不同的与工作无关的计算机活动的可接受程度的总体看法之间的关系。作者发现,与一项活动相关的时间和金钱成本与感知可接受性呈负相关。结果表明,情境变量,如员工的监督或非监督角色、机会、计算机自我效能,以及组织是否有计算机使用政策、培训和监控,都会影响个人的伦理观念。讨论了对组织和未来研究的启示和结论。
{"title":"The Impact of Context on Employee Perceptions of Acceptable Non-Work Related Computing","authors":"Troy J. Strader, J. R. Fichtner, Suzanne R. Clayton, Lou Ann Simpson","doi":"10.4018/jte.2011040103","DOIUrl":"https://doi.org/10.4018/jte.2011040103","url":null,"abstract":"Employees have access to a wide range of computer-related resources at work, and often these resources are used for non-work related personal activities. In this study, the authors address the relationship between employee's utilitarian ethical orientation, the factors that create the context that influences their ethical perceptions, and their overall perceptions regarding the level of acceptability for 14 different non-work related computing activities. The authors find that time and monetary cost associated with an activity has a negative relationship to perceived acceptability. Results indicate that contextual variables, such as an employee's supervisory or non-supervisory role, opportunity, computer self-efficacy, and whether or not an organization has computer use policies, training, and monitoring, influence individual ethical perceptions. Implications and conclusions are discussed for organizations and future research.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
The Middle Ground for Nuclear Waste Management: Social and Ethical Aspects of Shallow Storage 核废料管理的中间地带:浅层储存的社会和伦理问题
Pub Date : 2011-04-01 DOI: 10.4018/jte.2011040101
A. Marshall
The 2001 terrorist attacks in the USA and the 2011 seismic events in Japan have brought into sharp relief the vulnerabilities involved in storing nuclear waste on the land's surface. Nuclear engineers and waste managers are deciding that disposing nuclear waste deep underground is the preferred management option. However, deep disposal of nuclear waste is replete with enormous technical uncertainties. A proposed solution to protect against both the technical vagaries of deep disposal and the dangers of surface events is to store the nuclear waste at shallow depths underground. This paper explores social and ethical issues that are relevant to such shallow storage, including security motivations, intergenerational equity, nuclear stigma, and community acceptance. One of the main ethical questions to emerge is whether it is right for the present generation to burden local communities and future generations with these problems since neither local peoples nor future people have sanctioned the industrial and military processes that have produced the waste in the first place.
2001年发生在美国的恐怖袭击和2011年发生在日本的地震事件使在陆地表面储存核废料的脆弱性得到了极大的缓解。核工程师和废物管理人员决定,将核废料深埋地下是首选的管理方案。然而,核废料的深层处理充满了巨大的技术不确定性。为了防止深层处置技术上的变幻莫测和地表事件的危险,一种被提议的解决方案是将核废料储存在地下浅层。本文探讨了与这种浅储存相关的社会和伦理问题,包括安全动机、代际公平、核污名和社区接受度。其中一个主要的伦理问题是,由于当地人民和未来的人都没有首先批准产生废物的工业和军事过程,因此,让这一代人给当地社区和后代负担这些问题是否正确。
{"title":"The Middle Ground for Nuclear Waste Management: Social and Ethical Aspects of Shallow Storage","authors":"A. Marshall","doi":"10.4018/jte.2011040101","DOIUrl":"https://doi.org/10.4018/jte.2011040101","url":null,"abstract":"The 2001 terrorist attacks in the USA and the 2011 seismic events in Japan have brought into sharp relief the vulnerabilities involved in storing nuclear waste on the land's surface. Nuclear engineers and waste managers are deciding that disposing nuclear waste deep underground is the preferred management option. However, deep disposal of nuclear waste is replete with enormous technical uncertainties. A proposed solution to protect against both the technical vagaries of deep disposal and the dangers of surface events is to store the nuclear waste at shallow depths underground. This paper explores social and ethical issues that are relevant to such shallow storage, including security motivations, intergenerational equity, nuclear stigma, and community acceptance. One of the main ethical questions to emerge is whether it is right for the present generation to burden local communities and future generations with these problems since neither local peoples nor future people have sanctioned the industrial and military processes that have produced the waste in the first place.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber-Terrorism and Ethical Journalism: A Need for Rationalism 网络恐怖主义与新闻伦理:理性主义的需要
Pub Date : 2010-10-01 DOI: 10.4018/jte.2010100101
Mahmoud Eid
Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist goals. Among the countless cyber-terrorist cases and scenarios of only this last decade, the paper discusses four cyber-terrorism cases that represent the most recent severe cyber-terrorist attacks on infrastructure and network systems-Internet Black Tigers, MafiaBoy, Solo, and Irhabi 007. Regardless of the nature of actors and their motivations, cyber-terrorists hit very aggressively causing serious damages. Cyber-terrorists are rational actors who use the most advanced technology; hence, the critical need for the use of counter-threat swords by actors on the other side. Given that terrorist goals are mostly dependent on the media's reactions, journalistic practices are significant and need to be most effective. A major tool that can help journalists in their anti-and counter-terrorist strategies with cyber-terrorists is rationalism, merged with the expected socially responsible conduct. Rational behaviour, founded in game theory, along with major journalistic ethical principles are fundamental components of effective media decision-making during times of terrorism.
恐怖主义一直是传统和现代社会的一个持续威胁。近年来,它与新媒体技术和网络空间相融合,形成了网络恐怖主义这一现代战术,成为实现恐怖主义目标的最有效手段。在过去十年无数的网络恐怖主义案例和场景中,本文讨论了四个网络恐怖主义案例,它们代表了最近对基础设施和网络系统的严重网络恐怖主义攻击——互联网黑虎、黑手党、索罗和伊尔哈比007。无论行为者的性质和动机如何,网络恐怖分子的攻击都非常猛烈,造成了严重的破坏。网络恐怖分子是使用最先进技术的理性行为者;因此,另一方的行动者迫切需要使用反威胁剑。鉴于恐怖分子的目标主要取决于媒体的反应,新闻实践是重要的,需要最有效的。一个主要的工具,可以帮助记者在他们的反和反恐战略与网络恐怖分子是理性主义,与预期的社会责任行为相结合。建立在博弈论基础上的理性行为,以及主要的新闻伦理原则,是恐怖主义时期媒体有效决策的基本组成部分。
{"title":"Cyber-Terrorism and Ethical Journalism: A Need for Rationalism","authors":"Mahmoud Eid","doi":"10.4018/jte.2010100101","DOIUrl":"https://doi.org/10.4018/jte.2010100101","url":null,"abstract":"Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist goals. Among the countless cyber-terrorist cases and scenarios of only this last decade, the paper discusses four cyber-terrorism cases that represent the most recent severe cyber-terrorist attacks on infrastructure and network systems-Internet Black Tigers, MafiaBoy, Solo, and Irhabi 007. Regardless of the nature of actors and their motivations, cyber-terrorists hit very aggressively causing serious damages. Cyber-terrorists are rational actors who use the most advanced technology; hence, the critical need for the use of counter-threat swords by actors on the other side. Given that terrorist goals are mostly dependent on the media's reactions, journalistic practices are significant and need to be most effective. A major tool that can help journalists in their anti-and counter-terrorist strategies with cyber-terrorists is rationalism, merged with the expected socially responsible conduct. Rational behaviour, founded in game theory, along with major journalistic ethical principles are fundamental components of effective media decision-making during times of terrorism.","PeriodicalId":287069,"journal":{"name":"Int. J. Technoethics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Int. J. Technoethics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1