首页 > 最新文献

Journal of Information Ethics最新文献

英文 中文
Information and Computer Ethics: A Brief History 信息与计算机伦理:简史
Q2 Arts and Humanities Pub Date : 2012-09-01 DOI: 10.3172/JIE.21.2.17
R. Spinello
IntroductionIn 1948, a technical paper called "A Mathematical Theory of Communication" appeared in an obscure scientific journal. Its author was Claude Shannon, a diffident young scientist working in the Bell Labs Mathematical Research Group. Shannon's paper proposed the "bit" as the basic unit for measuring information. In that same year, the transistor was discovered at the same Bell Labs in New Jersey. Although very few people noticed what was happening, the incipient information technology revolution was now underway. The discovery of the transistor was crucial, but the elaboration of a commensurate information theory was equally decisive. Thanks to Shannon, information was soon regarded as the "blood and the fuel, the vital principle of all reality" (Gleick 2011, p. 8). Shannon's information theory served as a bridge between mathematics to electrical engineering and then to digital computing (Gleick 2011).The issues that pertain to information ethics (such as ownership and access) existed long before the digital era. Nonetheless, the transition from atoms to bits, which made possible information and communications technologies, meant that more attention than ever before would be focused on information use. It also meant that "information ethics" assumed greater urgency, as users and producers of information searched for fundamental rules that would prescribe how information should be responsibly collected, stored, and accessed.The evolution of information ethics and its merging with computer ethics is an intriguing story that bears some scrutiny for the lessons it can teach us about the nature of information and the task of controlling it fairly. The purpose of this essay is not to trace this history in detail, but to highlight its salient moments and to examine how information ethics took a definitive shape thanks to the discovery of information's digital character. It will also address several controversial topics such as the uniqueness of computer ethics issues, the need for a proper methodology, and this discipline's structural foundations.The Genesis of Information EthicsThe two phrases "information ethics" (IE) and "computer ethics" (CE) are often used interchangeably but in the past they have had very different connotations. There has never been a complete dichotomy between IE and CE but enough discontinuity to keep them apart for some period. Information ethics as it was first conceived by scholars like Kostrewsi and Oppenheim (1980), Capurro (1988), and Hauptman (1988) represented a broad field of study. The Journal of Information Ethics (founded by Hauptman) has certainly played a key role in promoting this broad sub-discipline of applied ethics, which encompasses all informational areas.According to Hauptman (2002), IE is fundamentally concerned with the "production, dissemination, storage, retrieval, security, and application of information within an ethical context" (p. 121) This definition adds some welcome precision to IE. In
1948年,一篇名为《通信的数学理论》的技术论文发表在一本不知名的科学杂志上。它的作者是克劳德·香农,一个在贝尔实验室数学研究小组工作的缺乏自信的年轻科学家。香农的论文提出“比特”作为测量信息的基本单位。同年,晶体管在新泽西州的贝尔实验室被发现。尽管很少有人注意到发生了什么,但一场早期的信息技术革命已经开始。晶体管的发现是至关重要的,但相应的信息理论的阐述同样具有决定性。多亏了香农,信息很快被视为“血液和燃料,所有现实的重要原则”(Gleick 2011, p. 8)。香农的信息理论充当了数学到电子工程再到数字计算之间的桥梁(Gleick 2011)。与信息伦理有关的问题(如所有权和访问权)早在数字时代之前就存在了。尽管如此,从原子到比特的转变使信息和通信技术成为可能,这意味着人们将比以往任何时候都更加关注信息的使用。这也意味着“信息伦理”具有更大的紧迫性,因为信息的使用者和生产者都在寻找基本规则,规定如何负责任地收集、存储和访问信息。信息伦理的演变及其与计算机伦理的融合是一个耐人探味的故事,它可以让我们对信息的本质和公平控制信息的任务有所了解。本文的目的不是详细追溯这段历史,而是强调它的突出时刻,并研究信息伦理是如何由于信息的数字特征的发现而最终形成的。它还将讨论几个有争议的话题,如计算机伦理问题的独特性,对适当方法的需求,以及这门学科的结构基础。信息伦理的起源“信息伦理”(IE)和“计算机伦理”(CE)这两个短语经常互换使用,但在过去它们有着非常不同的内涵。IE和CE之间从来没有一个完全的二分法,但有足够的不连续性使它们在一段时间内分开。信息伦理最早由Kostrewsi和Oppenheim(1980)、Capurro(1988)和Hauptman(1988)等学者提出,代表了一个广泛的研究领域。《信息伦理学杂志》(由Hauptman创办)无疑在推动应用伦理学这一广泛的分支学科方面发挥了关键作用,它涵盖了所有信息领域。根据Hauptman(2002)的说法,IE从根本上关注的是“在道德背景下信息的生产、传播、存储、检索、安全和应用”(第121页)。这一定义为IE增加了一些受欢迎的精确性。在其初期,IE处理的是一般的伦理问题,如适当的所有权、保密、信息偏差、可靠性标准和分配正义。准确、公正的信息具有内在价值,但也是知识(定义为合理的信念)所必需的,因为它提供了足够的证据来合理地证明一个人的主张。例如,知识可以建立在归纳法的基础上,这是一种从特定实例或信息片段推导出一般结论的推理形式。因此,信息是必须有效和谨慎管理的关键资源或资产。没有信息和知识,没有人可以茁壮成长或实现自我实现,无论他的文化背景或他的基本目标。正如阿奎那(1961)所指出的那样,“人类苦难的很大一部分是错误和欺骗。”根据Floridi(2008),信息伦理在其最初阶段主要是由这种基于资源的信息和知识观驱动的。…
{"title":"Information and Computer Ethics: A Brief History","authors":"R. Spinello","doi":"10.3172/JIE.21.2.17","DOIUrl":"https://doi.org/10.3172/JIE.21.2.17","url":null,"abstract":"IntroductionIn 1948, a technical paper called \"A Mathematical Theory of Communication\" appeared in an obscure scientific journal. Its author was Claude Shannon, a diffident young scientist working in the Bell Labs Mathematical Research Group. Shannon's paper proposed the \"bit\" as the basic unit for measuring information. In that same year, the transistor was discovered at the same Bell Labs in New Jersey. Although very few people noticed what was happening, the incipient information technology revolution was now underway. The discovery of the transistor was crucial, but the elaboration of a commensurate information theory was equally decisive. Thanks to Shannon, information was soon regarded as the \"blood and the fuel, the vital principle of all reality\" (Gleick 2011, p. 8). Shannon's information theory served as a bridge between mathematics to electrical engineering and then to digital computing (Gleick 2011).The issues that pertain to information ethics (such as ownership and access) existed long before the digital era. Nonetheless, the transition from atoms to bits, which made possible information and communications technologies, meant that more attention than ever before would be focused on information use. It also meant that \"information ethics\" assumed greater urgency, as users and producers of information searched for fundamental rules that would prescribe how information should be responsibly collected, stored, and accessed.The evolution of information ethics and its merging with computer ethics is an intriguing story that bears some scrutiny for the lessons it can teach us about the nature of information and the task of controlling it fairly. The purpose of this essay is not to trace this history in detail, but to highlight its salient moments and to examine how information ethics took a definitive shape thanks to the discovery of information's digital character. It will also address several controversial topics such as the uniqueness of computer ethics issues, the need for a proper methodology, and this discipline's structural foundations.The Genesis of Information EthicsThe two phrases \"information ethics\" (IE) and \"computer ethics\" (CE) are often used interchangeably but in the past they have had very different connotations. There has never been a complete dichotomy between IE and CE but enough discontinuity to keep them apart for some period. Information ethics as it was first conceived by scholars like Kostrewsi and Oppenheim (1980), Capurro (1988), and Hauptman (1988) represented a broad field of study. The Journal of Information Ethics (founded by Hauptman) has certainly played a key role in promoting this broad sub-discipline of applied ethics, which encompasses all informational areas.According to Hauptman (2002), IE is fundamentally concerned with the \"production, dissemination, storage, retrieval, security, and application of information within an ethical context\" (p. 121) This definition adds some welcome precision to IE. In ","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"21 1","pages":"17-32"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69757073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Law vs. Ethics: Conflict and Contrast in Laws Affecting the Role of Libraries, Schools, and Other Information Intermediaries 法律与道德:影响图书馆、学校和其他信息中介角色的法律的冲突与对比
Q2 Arts and Humanities Pub Date : 2012-09-01 DOI: 10.3172/JIE.21.2.71
T. Lipinski
This article discusses the legal landscape of copyright (and contract, i.e., licensing), privacy, and free speech laws in the United States and assesses this landscape on a continuum, contrasting what is legal with what might be thought to be right, formed from a sense of ethical or professional responsibility. Of course, what is right in the mind of one is not so in the mind of another. The purpose of this article is not to suggest what is "right" or "wrong" for all, in terms of professional responsibility or the proper ethical response, as differing positions can be articulated, if not also defended. Rather the point is to demonstrate that the present law contains numerous examples of variation. At times the law perhaps goes too far, offering the potential for infringing use of copyrighted material, imposing excessive privacy restrictions that can impact access rights to government activity or allowing speech that some might view as harmful. At other times the law may extend too far in the other direction, curtailing access and use of copyrighted content, failing to protect privacy, or to allow for robust comment. There may, however, be times when the law though far from perfect comes much closer to the mark, with the law and a sense of responsibility, professional or otherwise, more closely aligned.Further, this discussion brings into focus the intermediary entity as arbiter of access within the information landscape. Of most interest to the readership of this publication is the focus on libraries and educational institutions such as schools, colleges, and universities. Such intermediaries are often in the best position to facilitate access, to educate, and to make fluent its constituents with respect to knowledge: knowledge that is often protected by copyright, knowledge that is the subject of debate, knowledge that necessitates the rights of free inquiry regarding it, and knowledge that may require rights of privacy extended to a record of its access or use. The intermediary may then be in a position to alert the patron, student, et al. to the points of friction between what our laws aspire to be and what a given law is at a given moment or in a given situation.Finally, the examples provided here may also enhance discussion among teachers and students of law, ethics, and policy, presenting the position that the law is neither "all-bad" or "all-good" but offering points of conflict or contrast along such a continuum. In general, it is found that when the law does not go far enough, the opportunity for a learning encounter or so-called teaching moment is created. A response to which the intermediary may find is consistent with its goals of educating or enhancing the information experience. A characteristic of examples where the law does not go far enough is often the conflict of rights created by the law that may impact other rights such as free speech, self- responsibility, or self- restraint for the benefit of others.The first examples below
本文讨论了美国版权(和合同,即许可)、隐私和言论自由法律的法律环境,并在一个连续统一体上评估了这一环境,对比了什么是合法的,什么是可能被认为是正确的,这是由道德或职业责任感形成的。当然,一个人认为正确的事,在另一个人的心中未必如此。本文的目的并不是就职业责任或适当的道德反应来建议对所有人来说什么是“对”或“错”,因为不同的立场可以被阐明,如果没有辩护的话。相反,重点是要证明现行法律包含了许多变化的例子。有时,法律可能会走得太远,为侵权使用受版权保护的材料提供了可能,施加了过多的隐私限制,可能会影响访问政府活动的权利,或者允许一些人可能认为有害的言论。在其他时候,法律可能会向另一个方向延伸得太远,限制访问和使用受版权保护的内容,未能保护隐私,或允许发表有力的评论。然而,有时法律虽然远非完美,但却更接近目标,法律和责任感,无论是专业的还是其他的,更紧密地结合在一起。此外,本讨论将重点放在作为信息环境中访问仲裁者的中介实体上。本出版物的读者最感兴趣的是图书馆和教育机构,如学校、学院和大学。这类中介机构往往处于便利获取、教育和使其成员对知识掌握自如的最佳位置:通常受版权保护的知识、辩论主题的知识、需要对其进行自由探究的权利的知识,以及可能需要将隐私权扩展到获取或使用记录的知识。然后,中介可能会提醒赞助人、学生等注意我们的法律所追求的东西与特定时刻或特定情况下的特定法律之间的摩擦点。最后,这里提供的例子也可以加强教师和学生之间关于法律、伦理和政策的讨论,提出法律既不是“全坏”也不是“全好”的立场,而是在这样一个连续体中提供冲突或对比点。一般来说,人们发现,当法律走得不够远时,就会产生学习相遇的机会或所谓的教学时刻。中介机构可能发现的回应符合其教育或加强信息体验的目标。法律做得不够的例子的一个特点是,法律所创造的权利之间的冲突可能会影响到其他权利,如言论自由、自我责任或为了他人的利益而自我约束。下面的第一个例子来自版权法。再一次,这里的重点不是说法律应该改变,而是暗示存在选择。一会儿谴责著作权人的权利,呼吁废除著作权法,一会儿又躲在著作权法背后,这不是虚伪吗?在某些情况下,法律可能走得不够远;它允许但不要求,简单的一点是,在某些情况下,职业责任感可能比法律要求的更多。在其他例子中,版权法要求太多,挑战了与用户、赞助人、学生、订阅者等互动的传统规范。最后,法律可能刚刚好,通过被动手段促进知识创造激励、传播和获取以及合理尊重他人财产的目标。版权情形一:允许侵权的赞助人行为法律有时并不鼓励或支持最好的整体行为。…
{"title":"Law vs. Ethics: Conflict and Contrast in Laws Affecting the Role of Libraries, Schools, and Other Information Intermediaries","authors":"T. Lipinski","doi":"10.3172/JIE.21.2.71","DOIUrl":"https://doi.org/10.3172/JIE.21.2.71","url":null,"abstract":"This article discusses the legal landscape of copyright (and contract, i.e., licensing), privacy, and free speech laws in the United States and assesses this landscape on a continuum, contrasting what is legal with what might be thought to be right, formed from a sense of ethical or professional responsibility. Of course, what is right in the mind of one is not so in the mind of another. The purpose of this article is not to suggest what is \"right\" or \"wrong\" for all, in terms of professional responsibility or the proper ethical response, as differing positions can be articulated, if not also defended. Rather the point is to demonstrate that the present law contains numerous examples of variation. At times the law perhaps goes too far, offering the potential for infringing use of copyrighted material, imposing excessive privacy restrictions that can impact access rights to government activity or allowing speech that some might view as harmful. At other times the law may extend too far in the other direction, curtailing access and use of copyrighted content, failing to protect privacy, or to allow for robust comment. There may, however, be times when the law though far from perfect comes much closer to the mark, with the law and a sense of responsibility, professional or otherwise, more closely aligned.Further, this discussion brings into focus the intermediary entity as arbiter of access within the information landscape. Of most interest to the readership of this publication is the focus on libraries and educational institutions such as schools, colleges, and universities. Such intermediaries are often in the best position to facilitate access, to educate, and to make fluent its constituents with respect to knowledge: knowledge that is often protected by copyright, knowledge that is the subject of debate, knowledge that necessitates the rights of free inquiry regarding it, and knowledge that may require rights of privacy extended to a record of its access or use. The intermediary may then be in a position to alert the patron, student, et al. to the points of friction between what our laws aspire to be and what a given law is at a given moment or in a given situation.Finally, the examples provided here may also enhance discussion among teachers and students of law, ethics, and policy, presenting the position that the law is neither \"all-bad\" or \"all-good\" but offering points of conflict or contrast along such a continuum. In general, it is found that when the law does not go far enough, the opportunity for a learning encounter or so-called teaching moment is created. A response to which the intermediary may find is consistent with its goals of educating or enhancing the information experience. A characteristic of examples where the law does not go far enough is often the conflict of rights created by the law that may impact other rights such as free speech, self- responsibility, or self- restraint for the benefit of others.The first examples below","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"21 1","pages":"71-103"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Rights: Moral and Legal Foundations 隐私权:道德和法律基础
Q2 Arts and Humanities Pub Date : 2012-04-01 DOI: 10.5860/choice.48-4145
T. Lipinski
Privacy Rights: Moral and Legal FoundationsAdam D. Moore. University Park: Pennsylvania State University Press, 2010. 248 pp. $65.00.Moore has written extensively on the topic of privacy from its moral and legal underpinnings to its value both inherent and in practice. This body of work is reflected in this offering. The book is not a mere recounting of the threat to privacy in present society. Rather, the author presents a series of arguments in favor of privacy protection ("my goal is to provide a philosophically rigorous defense of privacy rights" p. 4), its moral foundation, and its legal shortcomings as well as possibilities. Thus a normative approach is his goal; i.e., one based upon "moral claims" (p. 16) as opposed to one based on the condition of privacy, tending to be descriptive. Elements from many chapters have appeared in Moore's previous writings and presentations. True to the philosopher in Moore, there are numerous and variable cases or thought-exercises (most involving two actors, Fred and Ginger) and prove to be to some the most useful content presented. Moore knows his law too, a feature missing in many works on this and inter-related topics such as free speech and copyright. Discussion of these legal concepts is both fluid and informed.After a short introductory chapter, the author spends some time attempting to define privacy and its value. The remaining seven chapters develop the argument for privacy rights in bodies (self ) and locations (space), information (about self and space, including decisional privacy), legal privacy rights, conflicts between speech and privacy, workplace privacy, the conflict between intellectual property and privacy rights, and state (security) versus the individual (and his or her privacy).In chapter 2 Moore argues for a normative view in defense of privacy with the benefit that his conception is broad enough to encompass more singular conceptualizations, those based on personality ("grow personally") or autonomy, for example (p. 17). Control rather than liberty is key to Moore's conception, with "access to" and "use of" distinguishable. In addition, the privacy right extends to "use of bodies, locations, and personal information" (p. 25).Chapter 3 (The Value of Privacy), the most philosophically oriented of the book, discusses Rawls, Hume, et al., and while recognizing privacy as culturally variable also argues that privacy is somewhat inherent or universal in all but a few cases. Of course, exceptions are the bane of the philosopher and Moore's argument is no exception. While the chapter presents a number of important considerations, it remains in the reviewer's mind a less convincing articulation of the value of privacy.Chapter 4 and those that follow proceed quickly into specifics. Here Moore argues for privacy rights in bodies and more important, locations. This is one clear example where Moore and much legal thinking part company. He introduces a basic rule for evaluating privacy claims: A
隐私权:道德和法律基础。大学公园:宾夕法尼亚州立大学出版社,2010。248页,65.00美元。摩尔写了大量关于隐私的文章,从其道德和法律基础到其内在和实践价值。这个主体的工作是反映在这个产品。这本书不仅仅讲述了当今社会对隐私的威胁。相反,作者提出了一系列支持隐私保护的论点(“我的目标是为隐私权提供一个哲学上严格的辩护”第4页),它的道德基础,它的法律缺陷以及可能性。因此,规范性的方法是他的目标;也就是说,一种基于“道德要求”(第16页),而另一种基于隐私条件,倾向于描述性。摩尔以前的著作和演讲中也出现过许多章节的内容。正如摩尔的哲学家一样,有许多不同的案例或思维练习(大多数涉及两个演员,弗雷德和金格),并被证明是一些最有用的内容。摩尔也知道他的定律,这是许多关于这个以及言论自由和版权等相互关联的话题的著作所缺少的一个特征。对这些法律概念的讨论既灵活又见多识广。在简短的介绍性章节之后,作者花了一些时间试图定义隐私及其价值。剩下的七章论述了主体(自我)和地点(空间)、信息(关于自我和空间,包括决策隐私)、法律隐私权、言论和隐私之间的冲突、工作场所隐私、知识产权和隐私权之间的冲突,以及国家(安全)与个人(及其隐私)之间的冲突。在第二章中,Moore提出了一种规范的观点来捍卫隐私,其好处是他的概念足够广泛,可以包含更单一的概念,例如那些基于个性(“个人成长”)或自主性的概念(第17页)。控制而不是自由是摩尔概念的关键,“获得”和“使用”是可区分的。此外,隐私权还延伸到"对尸体、地点和个人信息的使用"(第25页)。第3章(隐私的价值)是本书最具哲学导向的部分,讨论了罗尔斯、休谟等人,虽然承认隐私在文化上是可变的,但也认为隐私在除少数情况外的所有情况下都是固有的或普遍的。当然,例外是哲学家的祸根,摩尔的论点也不例外。虽然这一章提出了一些重要的考虑,但在审稿人的心目中,它仍然是对隐私价值的不那么令人信服的阐述。第4章和后面的章节会很快进入细节。在这里,摩尔主张身体的隐私权,更重要的是,地点的隐私权。这是一个明显的例子,说明摩尔与许多法律思想有分歧。他介绍了一个评估隐私要求的基本规则:所谓的“无伤害,无犯规”规则(第62页),在某种程度上与经济学上的帕累托最优效率有关,他认为这可能是一个“基本的道德原则”(第79页)。他还讨论了其他人的观点,如戈蒂尔和诺齐克,然后将他的概念应用到前面发布的各种案例研究或场景中。第五章讨论了我们这个技术时代的信息隐私,并论证了侵犯隐私的不同,不仅在程度上,而且在种类上。摩尔讨论了使用和占有主张、访问控制权、物理和知识产权以及合同自由;这些“权利、要求和自由为信息隐私提供了基础”(第95页)。第6章讨论了隐私保护的法律基础(该方法显然是基于美国法律),其差距和潜力。这一章主要描述了普通法上的隐私侵权、宪法保护和法定途径,并以非法律读者会欣赏的方式很好地讨论了相关的判例法。…
{"title":"Privacy Rights: Moral and Legal Foundations","authors":"T. Lipinski","doi":"10.5860/choice.48-4145","DOIUrl":"https://doi.org/10.5860/choice.48-4145","url":null,"abstract":"Privacy Rights: Moral and Legal FoundationsAdam D. Moore. University Park: Pennsylvania State University Press, 2010. 248 pp. $65.00.Moore has written extensively on the topic of privacy from its moral and legal underpinnings to its value both inherent and in practice. This body of work is reflected in this offering. The book is not a mere recounting of the threat to privacy in present society. Rather, the author presents a series of arguments in favor of privacy protection (\"my goal is to provide a philosophically rigorous defense of privacy rights\" p. 4), its moral foundation, and its legal shortcomings as well as possibilities. Thus a normative approach is his goal; i.e., one based upon \"moral claims\" (p. 16) as opposed to one based on the condition of privacy, tending to be descriptive. Elements from many chapters have appeared in Moore's previous writings and presentations. True to the philosopher in Moore, there are numerous and variable cases or thought-exercises (most involving two actors, Fred and Ginger) and prove to be to some the most useful content presented. Moore knows his law too, a feature missing in many works on this and inter-related topics such as free speech and copyright. Discussion of these legal concepts is both fluid and informed.After a short introductory chapter, the author spends some time attempting to define privacy and its value. The remaining seven chapters develop the argument for privacy rights in bodies (self ) and locations (space), information (about self and space, including decisional privacy), legal privacy rights, conflicts between speech and privacy, workplace privacy, the conflict between intellectual property and privacy rights, and state (security) versus the individual (and his or her privacy).In chapter 2 Moore argues for a normative view in defense of privacy with the benefit that his conception is broad enough to encompass more singular conceptualizations, those based on personality (\"grow personally\") or autonomy, for example (p. 17). Control rather than liberty is key to Moore's conception, with \"access to\" and \"use of\" distinguishable. In addition, the privacy right extends to \"use of bodies, locations, and personal information\" (p. 25).Chapter 3 (The Value of Privacy), the most philosophically oriented of the book, discusses Rawls, Hume, et al., and while recognizing privacy as culturally variable also argues that privacy is somewhat inherent or universal in all but a few cases. Of course, exceptions are the bane of the philosopher and Moore's argument is no exception. While the chapter presents a number of important considerations, it remains in the reviewer's mind a less convincing articulation of the value of privacy.Chapter 4 and those that follow proceed quickly into specifics. Here Moore argues for privacy rights in bodies and more important, locations. This is one clear example where Moore and much legal thinking part company. He introduces a basic rule for evaluating privacy claims: A ","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"9 1","pages":"83"},"PeriodicalIF":0.0,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71132786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
For the Sake of One Child: Privacy, Anonymity, and Confidentiality in Libraries 为了一个孩子:图书馆的隐私、匿名和保密
Q2 Arts and Humanities Pub Date : 2012-04-01 DOI: 10.3172/JIE.21.1.12
Martin L. Garnar
What are the ethical considerations of providing anonymous access to the Internet in an age when child pornographers are using this technology to share illegal materials? The perennial dilemma of an open society is striking a balance between liberty and safety. Too much liberty, and people are free to commit horrible acts. Too much safety, and people are constrained in what they can think, say, and do. The balance tilts toward safety in times of war, or when fears (real or perceived) take hold in the popular imagination. When threats to children are involved, safety almost always wins out over liberty, as the concept of protecting even one child from harm, regardless of the cost, is a powerful rhetorical tool. As a 2007 case in Colorado will demonstrate, this balance poses a challenge for libraries offering public access to the Internet, especially if that access may facilitate criminal activity.While librarians often talk about protecting user privacy, it is user ano - nymity and confidentiality that are ultimately at stake. Distinctions among the three terms are necessary before continuing. A private act is not known to anyone except the person committing the act. Others can know about an anonymous act, but the actor's identity is unknown. Confidential acts are known by those, and only those, who need to know the actor's identity. A truly private act in a library is to take a book offthe shelf, read it in the library, and replace it without being observed by anyone. Even if an item is checked out using a self- check system and is never handled by a library employee, the library creates and keeps a confidential record for as long as the item is in use. Anonymous uses of the library include reading materials in view of others, whether staffor other users, and using computers that do not require a personally identifiable login.Colorado and ConfidentialityLibrary users in Colorado have good reason to expect protection of their confidentiality. As noted in its own annotations, the Colorado Constitution provides stronger privacy protections than the Constitution of the United States: "The Colorado proscription against unreasonable searches and seizures protects a greater range of privacy interests than does its federal counterpart" (Colo. Const. art. II, § 7). Additionally, an expectation of confidentiality in libraries is explicitly spelled out in the Colorado Revised Statutes: "[A] publiclysupported library shall not disclose any record or other information that identifies a person as having requested or obtained specific materials or service or as otherwise having used the library" (emphasis added) (Privacy of User Records, 2010; see Appendix A for the complete statute). The law provides the usual exceptions for responding to court orders and for "reasonable" administration of the library, but it is important to note the sweeping scope of what is protected. This legislation was adopted following John Hinckley Jr.'s attempted assassination of Presi
在一个儿童色情业者利用这项技术分享非法资料的时代,提供匿名上网服务有什么道德考量?一个开放社会的长期困境是如何在自由与安全之间取得平衡。太多的自由,人们就会自由地做出可怕的行为。过于安全,人们的所思、所言、所行都会受到限制。在战争时期,或者当恐惧(真实的或想象的)在大众的想象中占据主导地位时,平衡倾向于安全。当涉及到对儿童的威胁时,安全几乎总是胜过自由,因为不惜代价保护哪怕一个孩子不受伤害的概念是一种强有力的修辞工具。正如2007年科罗拉多州的一个案例所表明的那样,这种平衡对提供公共互联网访问的图书馆提出了挑战,特别是如果这种访问可能会促进犯罪活动。虽然图书管理员经常谈论保护用户隐私,但最终受到威胁的是用户匿名性和保密性。在继续之前,有必要区分这三个术语。除了实施行为的人之外,任何人都不知道私人行为。其他人可以知道一个匿名行为,但演员的身份是未知的。保密行为只有那些需要知道演员身份的人才知道。在图书馆里,真正的私人行为是从书架上取下一本书,在图书馆里阅读,然后不被任何人发现地放回原处。即使一件物品是通过自检系统借出的,而且从未由图书馆员工处理过,只要该物品在使用中,图书馆就会创建并保存一份保密记录。匿名使用图书馆的情况包括:在他人的视野内阅读资料,无论是员工还是其他用户,以及使用不需要个人身份识别登录的计算机。科罗拉多州和保密性科罗拉多州的图书馆用户有充分的理由期望他们的保密性得到保护。正如在其自己的注释中所指出的那样,科罗拉多州宪法比美国宪法提供了更强有力的隐私保护:“科罗拉多州禁止不合理的搜查和扣押,比其联邦对手保护更大范围的隐私利益”(Colo. Const。艺术。此外,《科罗拉多州修订法规》明确规定了图书馆的保密义务:“[A]公共支持的图书馆不得披露任何记录或其他信息,这些记录或信息表明某人曾请求或获得特定材料或服务,或曾以其他方式使用过图书馆”(强调添加)(《用户记录隐私》,2010;完整的法规见附录A)。法律为响应法院命令和图书馆的“合理”管理提供了通常的例外情况,但重要的是要注意受保护的广泛范围。这项立法是在小约翰·欣克利企图暗杀罗纳德·里根总统之后通过的。1981年欣克利被捕时,在他的钱包里发现的身份证明之一是他的杰斐逊县(科罗拉多州)图书馆借书证(Falsone, 1987)。记者们纷纷向图书馆索要欣克利的记录,想看看他都借了些什么。虽然图书馆最初拒绝公布这些信息,但县检察官建议,这些请求必须根据《科罗拉多公开记录法案》(2010年)填写。作为回应,科罗拉多州图书馆界研究了其他州的保密法律,并最终于1983年通过了《科罗拉多州用户记录隐私法》(Falsone, 1987)。随后的一个法庭案件进一步加强了对科罗拉多州图书馆保密的期望。在2002年的破烂封面公司诉桑顿市案中,科罗拉多州最高法院裁定,不能强迫书店公布犯罪嫌疑人的购物信息,因为执法机构没有充分证明需要这些记录。…
{"title":"For the Sake of One Child: Privacy, Anonymity, and Confidentiality in Libraries","authors":"Martin L. Garnar","doi":"10.3172/JIE.21.1.12","DOIUrl":"https://doi.org/10.3172/JIE.21.1.12","url":null,"abstract":"What are the ethical considerations of providing anonymous access to the Internet in an age when child pornographers are using this technology to share illegal materials? The perennial dilemma of an open society is striking a balance between liberty and safety. Too much liberty, and people are free to commit horrible acts. Too much safety, and people are constrained in what they can think, say, and do. The balance tilts toward safety in times of war, or when fears (real or perceived) take hold in the popular imagination. When threats to children are involved, safety almost always wins out over liberty, as the concept of protecting even one child from harm, regardless of the cost, is a powerful rhetorical tool. As a 2007 case in Colorado will demonstrate, this balance poses a challenge for libraries offering public access to the Internet, especially if that access may facilitate criminal activity.While librarians often talk about protecting user privacy, it is user ano - nymity and confidentiality that are ultimately at stake. Distinctions among the three terms are necessary before continuing. A private act is not known to anyone except the person committing the act. Others can know about an anonymous act, but the actor's identity is unknown. Confidential acts are known by those, and only those, who need to know the actor's identity. A truly private act in a library is to take a book offthe shelf, read it in the library, and replace it without being observed by anyone. Even if an item is checked out using a self- check system and is never handled by a library employee, the library creates and keeps a confidential record for as long as the item is in use. Anonymous uses of the library include reading materials in view of others, whether staffor other users, and using computers that do not require a personally identifiable login.Colorado and ConfidentialityLibrary users in Colorado have good reason to expect protection of their confidentiality. As noted in its own annotations, the Colorado Constitution provides stronger privacy protections than the Constitution of the United States: \"The Colorado proscription against unreasonable searches and seizures protects a greater range of privacy interests than does its federal counterpart\" (Colo. Const. art. II, § 7). Additionally, an expectation of confidentiality in libraries is explicitly spelled out in the Colorado Revised Statutes: \"[A] publiclysupported library shall not disclose any record or other information that identifies a person as having requested or obtained specific materials or service or as otherwise having used the library\" (emphasis added) (Privacy of User Records, 2010; see Appendix A for the complete statute). The law provides the usual exceptions for responding to court orders and for \"reasonable\" administration of the library, but it is important to note the sweeping scope of what is protected. This legislation was adopted following John Hinckley Jr.'s attempted assassination of Presi","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"21 1","pages":"12-20"},"PeriodicalIF":0.0,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Authorial Vanities II 作者虚荣心2
Q2 Arts and Humanities Pub Date : 2012-04-01 DOI: 10.3172/JIE.21.1.7
J. S. Fulda
{"title":"Authorial Vanities II","authors":"J. S. Fulda","doi":"10.3172/JIE.21.1.7","DOIUrl":"https://doi.org/10.3172/JIE.21.1.7","url":null,"abstract":"","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"21 1","pages":"7-8"},"PeriodicalIF":0.0,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Elephant in the Server Room: Confronting the Need for an Ethics Officer in the IT Function 服务器室里的大象:面对IT职能中对道德官员的需求
Q2 Arts and Humanities Pub Date : 2012-04-01 DOI: 10.3172/JIE.21.1.27
S. Ponelis, J. Britz
IntroductionOrganizations tend to view governance, risk management, and compliance (GRC) as an overhead but a poor economy increases the likelihood of fraud, bribery, and corruption for individuals beyond the pressure of reaching often unrealistic organizational targets. Governance is the process by which policies are set and decision-making is executed; risk management ensures that important business processes and behaviors remain within the tolerances associated with those policies and decisions, going beyond that which creates an unacceptable potential for loss; and compliance is the process of adherence to policies and decisions. The massive public failures in GRC around the globe in recent years as evidenced by Enron, WorldCom, Fannie Mae, Freddie Mac, and Lehman Brothers mean that organizations and employees are under increasing pressure to conduct their business operations not only effectively and profitably but also ethically-and be able to prove it to regulators, in the courts, to the press, and to the public. The risks associated with inappropriate ethical behavior have grown in number, likelihood, and severity. Ensuring ethical behavior among employees can gain organizations the goodwill and trust of their stakeholders and clients, avoid unfavorable publicity, and protect them and their employees from legal action. Although the importance of ethics in IT has been recognized for several decades in the IT field, to date very little consideration has been given to the need for an ethics specialized role dedicated to the IT function. At the same time, the broader culture within a country influences its business culture that in turn influences organizational cultures as well as its legislation, which impacts how ethical behavior in organizations is viewed and promoted.In this paper we argue for such a specialized role in IT in the form of an ethics officer using the U.S. as point of departure. To this end this paper is structured as follows: first, we provide a brief overview of the drivers for initiatives to promote ethics in organizations. Second, we examine the reasons why ethics in the IT function in particular is of especial importance to establish and maintain an ethical culture in organizations. The paper concludes with our argument that an Ethics Officer in the IT function is needed to contribute to an ethical culture in an organization.Promoting an Ethical Culture in OrganizationsSo why is ethics so important to organizations today? In the United States, Chapter 8 Part B of the 2005 Federal Sentencing Guidelines entitled Remedying Harm From Criminal Conduct, and Effective Compliance and Ethics Programs (U.S. Sentencing Commission, 2005) necessitates an effective compliance and ethics program which should be "designed to prevent and detect criminal conduct." It notes that this particular section is in response to section 805(a)(2)(5) of the Sarbanes-Oxley Act of 2002 (U.S. House of Representatives, 2002) in which the U.S. Sentencing
组织倾向于将治理、风险管理和遵从性(GRC)视为一项开销,但是糟糕的经济增加了欺诈、贿赂和个人腐败的可能性,超出了实现通常不现实的组织目标的压力。治理是制定政策和执行决策的过程;风险管理确保重要的业务流程和行为保持在与这些政策和决策相关的容忍范围内,而不是超出造成不可接受的潜在损失的范围;合规是遵守政策和决策的过程。近年来,安然、世通、房利美、房地美和雷曼兄弟等公司在全球范围内的大规模GRC公共失败表明,组织和员工面临着越来越大的压力,他们不仅要有效、盈利,还要遵守道德规范,并能够向监管机构、法庭、媒体和公众证明这一点。与不当道德行为相关的风险在数量、可能性和严重程度上都有所增加。确保员工的道德行为可以为组织赢得利益相关者和客户的善意和信任,避免不利的宣传,并保护他们和他们的员工免受法律诉讼。尽管道德在IT领域的重要性在几十年前就已经被认识到,但迄今为止,很少有人考虑到在IT功能中需要一个专门的道德角色。与此同时,一个国家内部更广泛的文化影响其商业文化,进而影响组织文化以及立法,从而影响如何看待和促进组织中的道德行为。在本文中,我们将以美国为出发点,以道德官员的形式论证IT中的这种专门角色。为此,本文的结构如下:首先,我们简要概述了在组织中促进道德的举措的驱动因素。其次,我们考察了IT职能中的道德对于在组织中建立和维持道德文化特别重要的原因。本文总结了我们的论点,即IT职能中的道德官员需要为组织中的道德文化做出贡献。在组织中推广道德文化为什么道德对今天的组织如此重要?在美国,2005年联邦量刑指南第8章B部分题为“补救犯罪行为造成的伤害,以及有效的合规和道德计划”(美国量刑委员会,2005年)要求制定有效的合规和道德计划,该计划应“旨在预防和发现犯罪行为”。它指出,这一特定条款是对2002年《萨班斯-奥克斯利法案》(2002年美国众议院)第805(a)(2)(5)条的回应,其中美国量刑委员会被指示“酌情审查和修改指导方针和相关政策声明,以确保适用于本章组织的指导方针”足以阻止和惩罚组织的犯罪行为。萨班斯-奥克斯利法案(Sarbanes-Oxley Act,简称SOX)是2002年颁布的一项美国联邦法律,是对安然(Enron)和世通(WorldCom)等一系列重大企业和会计丑闻的回应。时任总统乔治·w·布什将其签署为法律,称该立法是“自富兰克林·德拉诺·罗斯福时代以来对美国商业实践最深远的改革”(引用自Bumiller, 2002)。萨班斯-奥克斯利法案不仅对美国组织的IT功能有影响,对非美国组织的IT功能也有影响。在美国证券交易所上市的企业(参见O’conor, 2005;Anand, 2008)。除了影响美国境内外组织的美国立法外,还有与组织道德(或缺乏道德)有关的国家立法和/或法规。…
{"title":"The Elephant in the Server Room: Confronting the Need for an Ethics Officer in the IT Function","authors":"S. Ponelis, J. Britz","doi":"10.3172/JIE.21.1.27","DOIUrl":"https://doi.org/10.3172/JIE.21.1.27","url":null,"abstract":"IntroductionOrganizations tend to view governance, risk management, and compliance (GRC) as an overhead but a poor economy increases the likelihood of fraud, bribery, and corruption for individuals beyond the pressure of reaching often unrealistic organizational targets. Governance is the process by which policies are set and decision-making is executed; risk management ensures that important business processes and behaviors remain within the tolerances associated with those policies and decisions, going beyond that which creates an unacceptable potential for loss; and compliance is the process of adherence to policies and decisions. The massive public failures in GRC around the globe in recent years as evidenced by Enron, WorldCom, Fannie Mae, Freddie Mac, and Lehman Brothers mean that organizations and employees are under increasing pressure to conduct their business operations not only effectively and profitably but also ethically-and be able to prove it to regulators, in the courts, to the press, and to the public. The risks associated with inappropriate ethical behavior have grown in number, likelihood, and severity. Ensuring ethical behavior among employees can gain organizations the goodwill and trust of their stakeholders and clients, avoid unfavorable publicity, and protect them and their employees from legal action. Although the importance of ethics in IT has been recognized for several decades in the IT field, to date very little consideration has been given to the need for an ethics specialized role dedicated to the IT function. At the same time, the broader culture within a country influences its business culture that in turn influences organizational cultures as well as its legislation, which impacts how ethical behavior in organizations is viewed and promoted.In this paper we argue for such a specialized role in IT in the form of an ethics officer using the U.S. as point of departure. To this end this paper is structured as follows: first, we provide a brief overview of the drivers for initiatives to promote ethics in organizations. Second, we examine the reasons why ethics in the IT function in particular is of especial importance to establish and maintain an ethical culture in organizations. The paper concludes with our argument that an Ethics Officer in the IT function is needed to contribute to an ethical culture in an organization.Promoting an Ethical Culture in OrganizationsSo why is ethics so important to organizations today? In the United States, Chapter 8 Part B of the 2005 Federal Sentencing Guidelines entitled Remedying Harm From Criminal Conduct, and Effective Compliance and Ethics Programs (U.S. Sentencing Commission, 2005) necessitates an effective compliance and ethics program which should be \"designed to prevent and detect criminal conduct.\" It notes that this particular section is in response to section 805(a)(2)(5) of the Sarbanes-Oxley Act of 2002 (U.S. House of Representatives, 2002) in which the U.S. Sentencing","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"21 1","pages":"27-39"},"PeriodicalIF":0.0,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ethical Issues Raised by Data Acquisition Methods in Digital Forensics Research 数字取证研究中数据采集方法引发的伦理问题
Q2 Arts and Humanities Pub Date : 2012-04-01 DOI: 10.3172/JIE.21.1.40
Brian Roux, Michael Falgoust
1. IntroductionDigital Forensics ("DF") is a relatively new area of Computer Science. Like forensic areas in other scientific fields, Digital Forensics seeks to discover evidence and reconstruct events based on an intimate knowledge of how computers, networks, and other electronic devices and communication systems function. As new as it is, DF is playing an increasingly important role not only in the expected area of criminal law, but now in civil law as well. With the changes to the Federal Rules of Civil Procedure in 2006, terms like Electronically Stored Information ("ESI") and Electronic Document/Data Discovery ("EDD") are entering the vocabulary of civil law firms with celerity.Despite its increasing importance, the DF field is still very young. At one extreme there are highly skilled researchers with strong backgrounds in computer science and mathematics pondering the esoteric inner workings of technology in order to develop new forensic tools and techniques; at the other end there is a frenzied market filled with service providers, software vendors, and other specialists offering any and every service that can even remotely be branded Digital Forensics by some contortion of logic. The EDD market itself was estimated to be 2.7 billion dollars in 2007 and projected to increase to 4.6 billion dollars by 2010 making it a quickly growing massive industry currently existing with minimal oversight (Socha 2008). While the field is moving full speed ahead it has not stopped to formally or substantively ponder the ethics which should underlie research and practice. Some certification bodies have sprung up and produced their own codes of ethics, but, aside from publishing an arbitrary list of rules primarily intended to govern certified members, no substantial discourse has been published to justify them. No substantial discourse has been published on the ethical usage of data in digital forensic research or on digital forensics in general. Our work, therefore, is novel in its application.In this paper we examine the ethical issues involved with procuring data storage media, primarily hard drives, from 3rd party sources such as eBay for use in Digital Forensic research. In Section 2, we give a background on research areas that benefit from real world data sources, outline related research making use of such sources, and briefly examine its contributions. In Section 3, we establish scenarios to frame the ethical analysis. In Section 4, we discuss the ethical issues and draw parallels to other fields with relevant similarities. In Section 5, we establish tests for determining ethical behavior. Finally, in Section 6, we conclude.2. Background and Related WorkFile Carving ("FC") is a DF technique for recovering data from media where the file system information is damaged or deleted. The technique relies upon the nature of the file it attempts to recover. Many file types contain sections which are static for all files of the given type; these invariant se
1. 数字取证(“DF”)是计算机科学的一个相对较新的领域。与其他科学领域的法医领域一样,数字法医寻求发现证据并基于对计算机、网络和其他电子设备和通信系统功能的深入了解来重建事件。作为一个新事物,DF不仅在刑法领域发挥着越来越重要的作用,而且现在在民法领域也发挥着越来越重要的作用。随着2006年《联邦民事诉讼规则》的修订,电子存储信息(“ESI”)和电子文档/数据发现(“EDD”)等术语正迅速进入民事律师事务所的词汇。尽管其重要性日益增加,但DF领域仍然非常年轻。在一个极端,有高技能的研究人员,他们在计算机科学和数学方面有很强的背景,思考着深奥的技术内部运作,以开发新的法医工具和技术;另一方面,一个疯狂的市场充斥着服务提供商、软件供应商和其他专家,他们提供任何服务,甚至可以通过一些逻辑扭曲来远程标记为数字取证。EDD市场本身在2007年估计为27亿美元,预计到2010年将增加到46亿美元,使其成为一个快速增长的庞大产业,目前存在的监管很少(Socha 2008)。虽然该领域正在全速前进,但它并没有停下来正式或实质性地思考应该作为研究和实践基础的伦理问题。一些认证机构如雨后之笋般涌现,并制定了自己的道德准则,但是,除了发布一份主要用于管理认证成员的武断规则清单外,还没有发表实质性的论述来证明这些准则的合理性。关于数字取证研究中数据的道德使用或一般数字取证的实质性论述尚未发表。因此,我们的工作在应用上是新颖的。在本文中,我们研究了从第三方来源(如eBay)购买数据存储介质(主要是硬盘驱动器)用于数字法医研究所涉及的伦理问题。在第2节中,我们给出了受益于真实世界数据源的研究领域的背景,概述了利用这些数据源的相关研究,并简要检查了其贡献。在第3节中,我们建立场景来框架伦理分析。在第4节中,我们讨论了伦理问题,并与其他具有相关相似性的领域进行了类比。在第5节中,我们建立了确定道德行为的测试。最后,在第6节中,我们得出结论。背景和相关工作文件雕刻(“FC”)是一种DF技术,用于从文件系统信息损坏或删除的介质中恢复数据。该技术依赖于它试图恢复的文件的性质。许多文件类型包含的节对于给定类型的所有文件都是静态的;这些不变节通常出现在文件的开头和结尾,形成页眉和页脚节。这可以简单到像由files命令解释的Linux/Unix“幻数”一样,或者是文件标准的一部分,表示文件的特定段的开始。一般的过程包括顺序地从驱动器读取数据块,同时注意遇到的任何页眉或页脚的位置和类型。在最私隐的形式中,文件雕刻器然后返回并在一对相同类型的页眉和页脚之间“雕刻”出数据,没有中间的页眉或页脚块。这个概念的更高级的版本试图重建驱动器上文件碎片的数据,使顺序雕刻无用。由于文件碎片的复杂性,该研究领域受益于真实世界的数据。模拟碎片不会显示随着时间的推移,在不同的使用模式、软件版本、驱动器利用率、操作系统、硬件配置等情况下创建的所有碎片模式。…
{"title":"Ethical Issues Raised by Data Acquisition Methods in Digital Forensics Research","authors":"Brian Roux, Michael Falgoust","doi":"10.3172/JIE.21.1.40","DOIUrl":"https://doi.org/10.3172/JIE.21.1.40","url":null,"abstract":"1. IntroductionDigital Forensics (\"DF\") is a relatively new area of Computer Science. Like forensic areas in other scientific fields, Digital Forensics seeks to discover evidence and reconstruct events based on an intimate knowledge of how computers, networks, and other electronic devices and communication systems function. As new as it is, DF is playing an increasingly important role not only in the expected area of criminal law, but now in civil law as well. With the changes to the Federal Rules of Civil Procedure in 2006, terms like Electronically Stored Information (\"ESI\") and Electronic Document/Data Discovery (\"EDD\") are entering the vocabulary of civil law firms with celerity.Despite its increasing importance, the DF field is still very young. At one extreme there are highly skilled researchers with strong backgrounds in computer science and mathematics pondering the esoteric inner workings of technology in order to develop new forensic tools and techniques; at the other end there is a frenzied market filled with service providers, software vendors, and other specialists offering any and every service that can even remotely be branded Digital Forensics by some contortion of logic. The EDD market itself was estimated to be 2.7 billion dollars in 2007 and projected to increase to 4.6 billion dollars by 2010 making it a quickly growing massive industry currently existing with minimal oversight (Socha 2008). While the field is moving full speed ahead it has not stopped to formally or substantively ponder the ethics which should underlie research and practice. Some certification bodies have sprung up and produced their own codes of ethics, but, aside from publishing an arbitrary list of rules primarily intended to govern certified members, no substantial discourse has been published to justify them. No substantial discourse has been published on the ethical usage of data in digital forensic research or on digital forensics in general. Our work, therefore, is novel in its application.In this paper we examine the ethical issues involved with procuring data storage media, primarily hard drives, from 3rd party sources such as eBay for use in Digital Forensic research. In Section 2, we give a background on research areas that benefit from real world data sources, outline related research making use of such sources, and briefly examine its contributions. In Section 3, we establish scenarios to frame the ethical analysis. In Section 4, we discuss the ethical issues and draw parallels to other fields with relevant similarities. In Section 5, we establish tests for determining ethical behavior. Finally, in Section 6, we conclude.2. Background and Related WorkFile Carving (\"FC\") is a DF technique for recovering data from media where the file system information is damaged or deleted. The technique relies upon the nature of the file it attempts to recover. Many file types contain sections which are static for all files of the given type; these invariant se","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"21 1","pages":"40-60"},"PeriodicalIF":0.0,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Written for the Moment 为当下而写
Q2 Arts and Humanities Pub Date : 2012-04-01 DOI: 10.3172/JIE.21.1.21
J. S. Fulda
This article argues that the disclosure, dissemination, sale, and publication of text - such as text messages, e-mail's, and letters - addressed to anyone other than the public at large are gravely and profoundly immoral. The argument has two main strands, the first based on a conception of privacy largely due to Davis (2009) (but also to an earlier paper by Alfino), and the second based on the concept of authorial autonomy and its reverse, authorial dilution. The paper is an intersection between its main concern, ethics, and a secondary concern, the law keeping pace with ethics, specifically the law of copyright and the law of privacy.
这篇文章认为,披露、传播、销售和出版文本——比如短信、电子邮件和信件——给公众以外的任何人都是严重和极其不道德的。这个论点有两个主要方面,第一个是基于隐私的概念,这主要是由戴维斯(2009)提出的(但也来自阿尔菲诺(Alfino)早期的一篇论文),第二个是基于作者自治及其相反的作者稀释的概念。本文是其主要关注点伦理和次要关注点——与伦理保持同步的法律,特别是版权法和隐私权法之间的交叉。
{"title":"Written for the Moment","authors":"J. S. Fulda","doi":"10.3172/JIE.21.1.21","DOIUrl":"https://doi.org/10.3172/JIE.21.1.21","url":null,"abstract":"This article argues that the disclosure, dissemination, sale, and publication of text - such as text messages, e-mail's, and letters - addressed to anyone other than the public at large are gravely and profoundly immoral. The argument has two main strands, the first based on a conception of privacy largely due to Davis (2009) (but also to an earlier paper by Alfino), and the second based on the concept of authorial autonomy and its reverse, authorial dilution. The paper is an intersection between its main concern, ethics, and a secondary concern, the law keeping pace with ethics, specifically the law of copyright and the law of privacy.","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"21 1","pages":"21-26"},"PeriodicalIF":0.0,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Books on Trial: Red Scare in the Heartland 审判书籍:中心地带的红色恐慌
Q2 Arts and Humanities Pub Date : 2011-10-01 DOI: 10.5860/choice.45-3402
C. Badaracco
{"title":"Books on Trial: Red Scare in the Heartland","authors":"C. Badaracco","doi":"10.5860/choice.45-3402","DOIUrl":"https://doi.org/10.5860/choice.45-3402","url":null,"abstract":"","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"171"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71119063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Trouble with Medical Journals 医学期刊的麻烦
Q2 Arts and Humanities Pub Date : 2011-10-01 DOI: 10.5860/choice.44-3908
R. Hauptman
The Trouble with Medical Journals Richard Smith. London: Royal Society of Medicine Press, 2007. 292 pp. £19.95Very few laypersons read medical journals, especially the more pointed and esoteric variety, some of which deal with material of interest only to specialists in arcane areas such as neuropharmacology or forensic pathology or bizarre diseases such as kuru. But even if this were not the case and hundreds of millions of people who comprise the general public subscribed to BMG or JAMA, most of these readers would take little interest in the problems that beset these publications. Indeed, with only a handful of commonly articulated dilemmas (conflict of interest, the pharmaceutical industry's undue influence on research and patient choices, and misconduct), most readers are blithely unaware of the broad array of problems that Richard Smith discusses in this extraordinary and enticing study. As a former editor of BMG (originally, the British Medical Journal) and an articulate and incisively honest critic, Smith is the perfect person to offer these many often disturbing insights.The book is divided into seven sections (e.g., ethical accountability of researchers and journals) and 21 chapters (e.g., libel and medical journals). The trouble here is not always of an ethical nature, but even those problems that have to do, say, with leadership or the relationship between patients and journals are both intellectually stimulating and somehow ultimately do lead to an ethical subtext. But much of this study does concentrate on a plethora of ethical problems, most of which are not easily resolved. For example, editors were aware of researchers' conflicted interests decades ago, but only slowly have the major journals (BMG, The Lancet, JAMA, NEJM, The Annals of Internal Medicine) begun to stipulate that all financial conflicts must be articulated so that readers can immediately realize that what an author is discussing or advocating (even in the unsullied description of a randomized clinical trial) may be tainted. Since this has been going on for so long, one might have expected that by 2011, when every research article in JAMA, for example, offers a page of personal admissions, that the problem would have been resolved. But ongoing revealed conflicts indicate that authors are either naive, confused, or dishonest. On March 23 and again on March 28-29, 2009, David Armstrong, in The Wall Street Journal, reported that a university professor had failed to indicate, in a JAMA article, that he had received compensation from the company that produced the drug he had studied. The revelation by a third party produced a major brouhaha, because JAMA's editors were incensed by what they felt was a breach in confidentiality (although this appears to be untrue), and reacted badly.Medical journals publish both poor (soft) science, which biologists and chemists disrespect, as well as non-scientific materials in order to maintain interest among the broad array of readers
医学期刊的麻烦理查德·史密斯。伦敦:皇家医学学会出版社,2007。很少有外行阅读医学杂志,尤其是那些比较尖锐和深奥的杂志,其中一些只涉及深奥领域的专家感兴趣的材料,如神经药理学、法医病理学或奇怪的疾病,如库鲁病。但是,即使事实并非如此,数亿人组成的普通公众订阅了BMG或JAMA,这些读者中的大多数也不会对困扰这些出版物的问题感兴趣。事实上,只有少数几个常见的困境(利益冲突,制药行业对研究和患者选择的不当影响,以及不当行为),大多数读者都不知道理查德·史密斯在这本非凡而诱人的研究中讨论的广泛问题。作为《BMG》(原《英国医学杂志》)的前编辑和一位口齿伶俐、直言不讳的评论家,史密斯是提供这些经常令人不安的见解的最佳人选。这本书分为七个部分(例如,研究人员和期刊的道德责任)和21章(例如,诽谤和医学期刊)。这里的问题并不总是伦理性质的,但即使是那些与领导或患者与期刊之间的关系有关的问题,也都是智力上的刺激,并以某种方式最终导致道德潜台词。但这项研究的大部分确实集中在过多的伦理问题上,其中大多数都不容易解决。例如,编辑们在几十年前就意识到研究人员的利益冲突,但直到慢慢地,主要期刊(BMG、the Lancet、JAMA、NEJM、the Annals of Internal Medicine)才开始规定,所有的财务冲突都必须明确,这样读者才能立即意识到作者所讨论或倡导的内容(即使是在一项随机临床试验的干净描述中)可能受到了污染。由于这种情况已经持续了很长时间,人们可能会期望,到2011年,例如,当《美国医学会杂志》(JAMA)上的每篇研究文章都提供一页个人承认时,这个问题就会得到解决。但持续不断的冲突表明,作者要么天真,要么困惑,要么不诚实。2009年3月23日和3月28日至29日,《华尔街日报》的大卫·阿姆斯特朗(David Armstrong)报道,一位大学教授在《美国医学会杂志》(JAMA)的一篇文章中没有表明,他从生产他所研究的药物的公司那里获得了报酬。第三方的披露引起了轩然大波,因为《美国医学会杂志》的编辑们被他们认为违反了保密规定(尽管这似乎是不真实的)所激怒,并做出了糟糕的反应。医学期刊既发表生物学家和化学家不尊重的“软”科学,也发表非科学材料,以保持出版商希望吸引的广大读者的兴趣,因为读者越多,利润就越大,现在甚至非商业(组织)出版商也对赚钱感兴趣;利益冲突猖獗;制药公司及其研究赞助及其广告(有时与市场产品的研究相结合)不适当和不公平地影响特定药物的传播和使用;不端行为(伪造、捏造和抄袭)继续困扰着科学论文的发表;同行评议仍然是一个受污染的系统;作者身份的概念是非常混乱的,即使是作者;对于医学杂志的编辑来说,政治操纵和宣传是极具争议的,当涉及到国家医疗保险或其他敏感的社会话题时,他们被迫做出艰难的选择。…
{"title":"The Trouble with Medical Journals","authors":"R. Hauptman","doi":"10.5860/choice.44-3908","DOIUrl":"https://doi.org/10.5860/choice.44-3908","url":null,"abstract":"The Trouble with Medical Journals Richard Smith. London: Royal Society of Medicine Press, 2007. 292 pp. £19.95Very few laypersons read medical journals, especially the more pointed and esoteric variety, some of which deal with material of interest only to specialists in arcane areas such as neuropharmacology or forensic pathology or bizarre diseases such as kuru. But even if this were not the case and hundreds of millions of people who comprise the general public subscribed to BMG or JAMA, most of these readers would take little interest in the problems that beset these publications. Indeed, with only a handful of commonly articulated dilemmas (conflict of interest, the pharmaceutical industry's undue influence on research and patient choices, and misconduct), most readers are blithely unaware of the broad array of problems that Richard Smith discusses in this extraordinary and enticing study. As a former editor of BMG (originally, the British Medical Journal) and an articulate and incisively honest critic, Smith is the perfect person to offer these many often disturbing insights.The book is divided into seven sections (e.g., ethical accountability of researchers and journals) and 21 chapters (e.g., libel and medical journals). The trouble here is not always of an ethical nature, but even those problems that have to do, say, with leadership or the relationship between patients and journals are both intellectually stimulating and somehow ultimately do lead to an ethical subtext. But much of this study does concentrate on a plethora of ethical problems, most of which are not easily resolved. For example, editors were aware of researchers' conflicted interests decades ago, but only slowly have the major journals (BMG, The Lancet, JAMA, NEJM, The Annals of Internal Medicine) begun to stipulate that all financial conflicts must be articulated so that readers can immediately realize that what an author is discussing or advocating (even in the unsullied description of a randomized clinical trial) may be tainted. Since this has been going on for so long, one might have expected that by 2011, when every research article in JAMA, for example, offers a page of personal admissions, that the problem would have been resolved. But ongoing revealed conflicts indicate that authors are either naive, confused, or dishonest. On March 23 and again on March 28-29, 2009, David Armstrong, in The Wall Street Journal, reported that a university professor had failed to indicate, in a JAMA article, that he had received compensation from the company that produced the drug he had studied. The revelation by a third party produced a major brouhaha, because JAMA's editors were incensed by what they felt was a breach in confidentiality (although this appears to be untrue), and reacted badly.Medical journals publish both poor (soft) science, which biologists and chemists disrespect, as well as non-scientific materials in order to maintain interest among the broad array of readers ","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"172"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71114866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Ethics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1