首页 > 最新文献

Journal of Information Ethics最新文献

英文 中文
The Handbook of Information and Computer Ethics 信息与计算机伦理手册
Q2 Arts and Humanities Pub Date : 2011-10-01 DOI: 10.5860/choice.46-0931
J. S. Fulda
The Handbook of Information and Computer Ethics is not a handbook, but a voluminous twenty- seven piece anthology, which is devoted mostly to the intersection between information ethics and computer ethics, rather than to their union. Indeed, infor - mation ethics is (re)defined strangely here, in a way quite different from that envisioned by the field's principal founder and guiding light, Robert Hauptman. This is confirmed, first, by the Library of Congress Cataloging- in- Publication data which has only one subject: Electronic Data Processing-Moral and ethical aspects, and, second, by the single most frequently occurring reference here being the journal Ethics and Information Technology.That having been noted, everything in the ethics of information and communications technology is covered here-and comprehensively. But this may be too much of a good thing, depending on the purpose of the enterprise: This reviewer's eyes blurred repeatedly at the barrage of names, acronyms, references, points, and counterpoints in essays which are almost all way too long to be digested easily in a single sitting. Moreover, familiarity with the issues involved-despite long definitional preludes before any ethical analysis starts-is presupposed. These factors make it hard for me to see how this book could be usefully adopted in the classroom. Additionally, at a U.S. retail sticker price of $140 (Books in Print), while not unusual for a hardcover book of this length, something over which the editors had no control, Wiley declined to send this journal a review copy. Because of time and space considerations, I will give detailed remarks on just nine of these essays, chosen by their title (which, if the old adage is right, is much the same as randomly). These include three of the more general and six of the more topical essays.First, the more general essays.Luciano Floridi on Information Ethics. Floridi introduces a tripartite explanatory model, treating information as a resource, a target, or a product of human and machine action, only to conclude correctly that the model is inadequate because it eliminates the complexity of interactions among these three intertwining roles of information. For example, when one lies to protect his privacy, one produces information to protect information as a resource and this may change others' information targets.He then veers to a discussion of entropy1 and ecology in the infosphere and "information objects," words taken from science and computing that, as I see it, contribute little to understanding the ethical issues. Floridi himself says that his discussion might be considered too philosophical in the worst sense; he may be right on that score, but I would characterize the final part of the discussion as scientistic2 in a way that good, precise analytic philosophy is not. If precision, logical analysis, and rigor aid in the understanding, well and good; if they obscure issues, the charge of scientism becomes palpable. The same
《信息与计算机伦理手册》不是一本手册,而是一本27篇的文集,主要致力于信息伦理与计算机伦理的交叉,而不是它们的结合。的确,这里对信息伦理的定义很奇怪,与该领域的主要创始人和指路明灯罗伯特·豪普特曼(Robert Hauptman)所设想的完全不同。这一点得到了证实,首先,美国国会图书馆的出版数据编目只有一个主题:电子数据处理——道德和伦理方面,其次,这里最常出现的参考文献是《伦理与信息技术》杂志。已经注意到,这里涵盖了信息和通信技术伦理的所有内容-而且是全面的。但这可能是一件好事,这取决于企业的目的:这个评论家的眼睛在一连串的名字、首字母缩写、参考文献、观点和对应物中反复模糊,这些文章几乎都太长了,一次消化不了。此外,对相关问题的熟悉——尽管在任何伦理分析开始之前有很长的定义前奏——是先决条件。这些因素使我很难看出这本书如何能有效地应用于课堂。此外,这本书在美国的零售价是140美元(印刷版图书),虽然对于这么长的精装书来说并不罕见,但编辑们无法控制,威利拒绝给这本杂志寄书评。由于时间和空间的考虑,我将只对其中的九篇文章进行详细的评论,这些文章是根据它们的标题选择的(如果古老的格言是正确的,那么这几乎等同于随机)。其中包括三篇更一般的文章和六篇更主题的文章。首先,更一般的文章。卢西亚诺·弗洛里迪谈信息伦理。弗洛里迪引入了一个三方解释模型,将信息视为资源、目标或人类和机器行为的产物,只是正确地得出结论,该模型是不充分的,因为它消除了信息这三个相互交织的角色之间相互作用的复杂性。例如,当一个人为了保护自己的隐私而撒谎时,他就会把保护信息作为一种资源而产生信息,这可能会改变别人的信息目标。然后,他转向讨论信息圈中的熵和生态以及“信息对象”,这些词来自科学和计算,在我看来,对理解伦理问题贡献不大。弗洛里迪自己说,从最坏的意义上说,他的讨论可能被认为过于哲学化;在这一点上,他也许是对的,但我认为讨论的最后一部分是科学的,这是好的、精确的分析哲学所不具备的。如果精确、逻辑分析和严谨有助于理解,那就很好;如果他们掩盖问题,对科学主义的指控就会变得显而易见。一般来说,模型和类比也是如此。不管它是什么,ie的第四条“法则”——信息实体作为整个信息领域的繁荣应该通过保护、培养和丰富它们的属性来促进——对任何道德问题的澄清都没有什么帮助。不过,可以说的是,弗洛里迪的方法没有他自己没有预料到的问题,这在作品中形成了一种有趣的内在张力。此外,弗洛里迪在信息伦理背景下对希腊和英国文学的处理令人愉快,他在这个领域读了很多书,也发表了很多文章。(书中有超过三页的参考资料,其中不止一页是他自己的作品。)道德方法论与信息技术。作者很好地涵盖了在应用伦理学背景下讨论道德方法论的通常基础,并解释了计算机伦理学的独特之处。…
{"title":"The Handbook of Information and Computer Ethics","authors":"J. S. Fulda","doi":"10.5860/choice.46-0931","DOIUrl":"https://doi.org/10.5860/choice.46-0931","url":null,"abstract":"The Handbook of Information and Computer Ethics is not a handbook, but a voluminous twenty- seven piece anthology, which is devoted mostly to the intersection between information ethics and computer ethics, rather than to their union. Indeed, infor - mation ethics is (re)defined strangely here, in a way quite different from that envisioned by the field's principal founder and guiding light, Robert Hauptman. This is confirmed, first, by the Library of Congress Cataloging- in- Publication data which has only one subject: Electronic Data Processing-Moral and ethical aspects, and, second, by the single most frequently occurring reference here being the journal Ethics and Information Technology.That having been noted, everything in the ethics of information and communications technology is covered here-and comprehensively. But this may be too much of a good thing, depending on the purpose of the enterprise: This reviewer's eyes blurred repeatedly at the barrage of names, acronyms, references, points, and counterpoints in essays which are almost all way too long to be digested easily in a single sitting. Moreover, familiarity with the issues involved-despite long definitional preludes before any ethical analysis starts-is presupposed. These factors make it hard for me to see how this book could be usefully adopted in the classroom. Additionally, at a U.S. retail sticker price of $140 (Books in Print), while not unusual for a hardcover book of this length, something over which the editors had no control, Wiley declined to send this journal a review copy. Because of time and space considerations, I will give detailed remarks on just nine of these essays, chosen by their title (which, if the old adage is right, is much the same as randomly). These include three of the more general and six of the more topical essays.First, the more general essays.Luciano Floridi on Information Ethics. Floridi introduces a tripartite explanatory model, treating information as a resource, a target, or a product of human and machine action, only to conclude correctly that the model is inadequate because it eliminates the complexity of interactions among these three intertwining roles of information. For example, when one lies to protect his privacy, one produces information to protect information as a resource and this may change others' information targets.He then veers to a discussion of entropy1 and ecology in the infosphere and \"information objects,\" words taken from science and computing that, as I see it, contribute little to understanding the ethical issues. Floridi himself says that his discussion might be considered too philosophical in the worst sense; he may be right on that score, but I would characterize the final part of the discussion as scientistic2 in a way that good, precise analytic philosophy is not. If precision, logical analysis, and rigor aid in the understanding, well and good; if they obscure issues, the charge of scientism becomes palpable. The same ","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"161"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71122298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
The Privacy Advocates: Resisting the Spread of Surveillance 隐私权倡导者:抵制监控的蔓延
Q2 Arts and Humanities Pub Date : 2011-10-01 DOI: 10.5860/choice.46-5880
T. Lipinski
The Privacy Advocates: Resisting the Spread of Surveillance Colin J. Bennett. Cambridge, MA: MIT Press, 2008. 259 pp. $28.00The author is no stranger to monographs on the topic of privacy either as solo author or as a co-author (most recently, a review of his Governance of Privacy: Policy Instruments in Global Perspective [2003] [written with Charles D. Raab] appeared in the Spring, 2008 issue of the Journal of Information Ethics [pp. 86-87]). Bennett (and at times with co-authors) has made consistent contributions to the literature on privacy. The latest offering, however, differs from his previous efforts, or others for that matter, in that instead of exploring some aspect of privacy rights, protection, invasion, etc., this book focuses on the "individuals and groups that have emerged from civil society" as privacy advocates not "those within the state or the market" nor those members of civil society who have self-identified as such advocates (p. iv). True to his training in political science, Bennett is interested in not only the "who" but the "how": how do these advocates identify problems, strategize, and mobilize responses, etc.? The "data" is drawn from observation, a documentary review of various sources, and thirty key informant interviews (the list of those interviewed appears in several places) with actors from North America, Europe, and Australia.The presentation proceeds logically as if it were an extended journal article or dissertation but it was in fact funded by a grant from the Social Sciences and Humanities Research Council of Canada. The first chapter identifies the research problem while subsequent chapters discuss the advocacy groups and the contrasting following chapters cover the actors as individuals. The strategies both groups and actors have developed and case studies or "key conflicts" constitute the next two chapters; discussion of how these advocates have formed social networks and whether privacy might in the future become a social movement conclude the seven chapters of the book. A list of the deceptively simple interview questions is included in an appendix. As is typical of the author's work, a detailed bibliography of the relevant literature appears but it also includes, as would be expected given the task at hand, numerous references to popular and news sources that help identify the "key conflicts" and advocacy responses as reported in the mass media.The surveillance grid or typology offered in the first chapter is very useful as is the overview that accompanies it; it is concise, to-the-point, yet referential to selected prior work. Bennett recognizes that to some extent he is studying himself here since he admits that he is a privacy advocate, a "perennial" scholar. Bennett offers a taxonomy of actor categories: activists, researchers, consultants, technologists, journalists, and artists. The exposition offers a refreshing view of the all-too-familiar strands of privacy problems by providing perspectives dr
隐私权倡导者:抵制监控的蔓延科林·j·贝内特。剑桥,马萨诸塞州:麻省理工学院出版社,2008。作者对隐私主题的专著并不陌生,无论是作为单独作者还是作为合著者(最近的一篇评论他的隐私治理:全球视角下的政策工具[2003][与查尔斯·d·拉布合著]出现在2008年春季的《信息伦理学杂志》[第86-87页])。贝内特(有时和他的合著者)对隐私方面的文献做出了持续的贡献。然而,最新的这本书不同于他之前的著作,也不同于其他著作,因为这本书没有探讨隐私权、保护、侵犯等方面,而是关注“从公民社会中涌现出来的个人和团体”作为隐私权倡导者,而不是“那些在国家或市场内部的人”,也不是那些自认为是隐私权倡导者的公民社会成员(第iv页)。班尼特不仅对“谁”感兴趣,而且对“如何”感兴趣:这些倡导者如何识别问题、制定战略、动员响应等等?这些“数据”来自观察、对各种来源的文献回顾,以及对来自北美、欧洲和澳大利亚的演员的30个关键线人的采访(被采访人的名单出现在几个地方)。这篇演讲的逻辑进行,就好像它是一篇延伸的期刊文章或论文,但实际上它是由加拿大社会科学和人文科学研究委员会资助的。第一章确定了研究问题,而随后的章节讨论了倡导团体,对比之后的章节涵盖了作为个体的行动者。小组和行动者都制定了战略,案例研究或“关键冲突”构成了接下来的两章;关于这些倡导者是如何形成社交网络的,以及隐私在未来是否会成为一种社会运动的讨论结束了这本书的七个章节。一个看似简单的面试问题列表包含在附录中。作为作者的典型作品,出现了相关文献的详细参考书目,但考虑到手头的任务,它也包括大量参考大众和新闻来源,以帮助确定大众媒体报道的“关键冲突”和倡导反应。第一章中提供的监视网格或类型学非常有用,伴随它的概述也非常有用;它是简洁的,切中要害的,但参考了选定的先前的工作。班尼特承认,在某种程度上,他是在研究自己,因为他承认自己是一个隐私倡导者,一个“常年”的学者。班尼特对演员进行了分类:活动家、研究人员、顾问、技术专家、记者和艺术家。通过提供从倡导者自己的清单中得出的观点,该博览会提供了对熟悉的隐私问题的全新看法。隐私组的讨论被组织成专门讨论隐私或仅以隐私为中心的组(e. ...)
{"title":"The Privacy Advocates: Resisting the Spread of Surveillance","authors":"T. Lipinski","doi":"10.5860/choice.46-5880","DOIUrl":"https://doi.org/10.5860/choice.46-5880","url":null,"abstract":"The Privacy Advocates: Resisting the Spread of Surveillance Colin J. Bennett. Cambridge, MA: MIT Press, 2008. 259 pp. $28.00The author is no stranger to monographs on the topic of privacy either as solo author or as a co-author (most recently, a review of his Governance of Privacy: Policy Instruments in Global Perspective [2003] [written with Charles D. Raab] appeared in the Spring, 2008 issue of the Journal of Information Ethics [pp. 86-87]). Bennett (and at times with co-authors) has made consistent contributions to the literature on privacy. The latest offering, however, differs from his previous efforts, or others for that matter, in that instead of exploring some aspect of privacy rights, protection, invasion, etc., this book focuses on the \"individuals and groups that have emerged from civil society\" as privacy advocates not \"those within the state or the market\" nor those members of civil society who have self-identified as such advocates (p. iv). True to his training in political science, Bennett is interested in not only the \"who\" but the \"how\": how do these advocates identify problems, strategize, and mobilize responses, etc.? The \"data\" is drawn from observation, a documentary review of various sources, and thirty key informant interviews (the list of those interviewed appears in several places) with actors from North America, Europe, and Australia.The presentation proceeds logically as if it were an extended journal article or dissertation but it was in fact funded by a grant from the Social Sciences and Humanities Research Council of Canada. The first chapter identifies the research problem while subsequent chapters discuss the advocacy groups and the contrasting following chapters cover the actors as individuals. The strategies both groups and actors have developed and case studies or \"key conflicts\" constitute the next two chapters; discussion of how these advocates have formed social networks and whether privacy might in the future become a social movement conclude the seven chapters of the book. A list of the deceptively simple interview questions is included in an appendix. As is typical of the author's work, a detailed bibliography of the relevant literature appears but it also includes, as would be expected given the task at hand, numerous references to popular and news sources that help identify the \"key conflicts\" and advocacy responses as reported in the mass media.The surveillance grid or typology offered in the first chapter is very useful as is the overview that accompanies it; it is concise, to-the-point, yet referential to selected prior work. Bennett recognizes that to some extent he is studying himself here since he admits that he is a privacy advocate, a \"perennial\" scholar. Bennett offers a taxonomy of actor categories: activists, researchers, consultants, technologists, journalists, and artists. The exposition offers a refreshing view of the all-too-familiar strands of privacy problems by providing perspectives dr","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"169"},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71124800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
You Can't Polish a Pumpkin: Scattered Speculations on the Development of Information Ethics 南瓜擦亮不了:关于信息伦理发展的零散思考
Q2 Arts and Humanities Pub Date : 2011-09-01 DOI: 10.3172/JIE.20.2.103
Nathaniel F. Enright
In the opening of his Ethics: An Essay on the Understanding of Evil, the French philosopher Alain Badiou (2001, p.1) remarks that "Certain scholarly words, after long confinement in dictionaries and in academic prose, have the good fortune, or the misfortune ... of sudden exposure to the bright light of day," unexpectedly catapulting such words to "centre stage." Ethics, Badiou contends, is undoubtedly one such word. And although we wish to resist the banal and tiresome process of academic list- making, the word information indubitably and unequivocally belongs next to ethics in and under the spotlight of post- modernity. Of course, Badiou plucks "ethics" from the darkness of philosophical obscurity only in order to show how the post- modern obsession with ethics simply reflects and reinforces "the logic of a capitalist economy" (2001, p.4). Similarly, the current essay attempts to rescue "information" from those who would reduce its essential contestability to so many "semantic quirks" (Machlup 1983, p.641). In so doing, it attempts to make explicit the proposition put forth by Robbins and Webster (1988, p.70) that "information is not a thing, an entity; it is a social relation, and in contemporary capitalist societies it expresses the characteristic and prevailing relations of power." And so, despite the many recent attempts at theoretical illumination the only point that seems to have been clarified is the essential contestability of both these concepts. Yet taken together, especially in Library and Information Science (LIS), information ethics is understood in a very general sense to be a self- verifying good and as such something that must be unquestionably defended, supported and promoted.The purpose of this essay therefore is to highlight the manifold limitations of information ethics in the specific context of Library and Information Science (LIS). In particular, we wish to suggest that in a world characterized by the commodity form of information an ethics of information is at once both imperative and impossible. This impossibility and this necessity originate from the very same source: capital-the definite social relation by which the means of production are transformed into the means of exploitation. Although information ethics is purported to analyze the "relationship between the creation, organization, dissemination and use of information and the ethical standards and moral codes governing human conduct" (Reitz 2004, p.356) this has not led, on the whole, to any sustained process of consideration of the social meaning of the production and commodification of information. While there have been a smattering of exemplary and engaging critiques (Frohmann 2004; Stiglitz 2000; Schiller 1997; Enright 2008) dealing with the implications flowing from the generalization of the commodification of information, very few attempts have been made to comprehend the impetus that underpins the ceaseless movement toward ever more commodification. That i
法国哲学家阿兰·巴迪欧(Alain Badiou, 2001, p.1)在他的《伦理学:一篇关于理解恶的文章》(Ethics: An Essay on Understanding of Evil)的开篇中评论道:“某些学术词汇,在词典和学术散文中被长期禁锢之后,要么幸运,要么不幸……突然暴露在明亮的日光下,”意外地将这些词弹射到“中心舞台”。巴迪欧认为,道德无疑就是这样一个词。尽管我们希望抵制学术榜单的陈腐和令人厌烦的过程,但信息这个词无疑和毫不含糊地属于后现代性的聚光灯下的伦理学。当然,巴迪欧将“伦理学”从哲学的黑暗中拔出来,只是为了展示后现代对伦理学的痴迷如何简单地反映和强化“资本主义经济的逻辑”(2001年,第4页)。同样,当前的文章试图从那些将“信息”本质上的可争议性降低到如此多的“语义怪癖”的人那里拯救“信息”(Machlup 1983, p.641)。通过这样做,它试图明确罗宾斯和韦伯斯特(1988,第70页)提出的命题,即“信息不是一个东西,一个实体;它是一种社会关系,在当代资本主义社会中,它表达了权力关系的特征和主流。”因此,尽管最近有许多理论解释的尝试,但似乎唯一被澄清的一点是,这两个概念的基本可争议性。然而,总的来说,特别是在图书馆和信息科学(LIS),信息伦理被理解为一个非常普遍的意义上的自我验证的好,这样的东西必须毫无疑问地捍卫,支持和促进。因此,本文的目的是强调在图书馆情报学的特定背景下,信息伦理的多方面局限性。我们特别要指出,在一个以信息的商品形式为特征的世界里,信息伦理既是必要的,又是不可能的。这种不可能性和这种必然性都是出于同一个根源,即资本,即生产资料借以转化为剥削资料的一定的社会关系。虽然信息伦理学旨在分析“信息的创造、组织、传播和使用与管理人类行为的伦理标准和道德规范之间的关系”(Reitz 2004,第356页),但总体而言,这并没有导致对信息生产和商品化的社会意义的任何持续考虑过程。虽然有一些典型的和引人入胜的批评(Frohmann 2004;斯蒂格利茨(joseph Stiglitz) 2000;席勒1997;Enright 2008)处理信息商品化普遍化的影响,很少有人尝试去理解支撑不断走向商品化的动力。也就是说,商品形式本身倾向于被毫无疑问地视为一个预先给定的类别,似乎从哪里出现的。因此,对于那些认为自己是“批判性图书馆员”的人来说,有一种倾向是把“信息伦理”的出现,甚至是分析的优先级,简单地当作一种给定的东西,作为任何适当激进理论的起点。在这里,我们很想重申斯塔尔(2008,第348页)批评的一部分,因为他认为信息伦理可以导致“辩论的结束和意义和理解的具体化”,但我们当然可以断言,在抵制“信息伦理”的过程中,或者至少是将“信息伦理”问题化的过程中,我们没有看到任何回归到“中立性”的过程,而信息伦理是一种批判,甚至是必要的批判(Hauptman 1988)。虽然接受“信息”的含义似乎也没有用,例如,从产生其存在的特定资本主义社会关系中抽象存在的“信息”版本,政治史的反生产版本,因为它需要将政治和理论标准分解为几乎道德化的简单性的划分和分类。…
{"title":"You Can't Polish a Pumpkin: Scattered Speculations on the Development of Information Ethics","authors":"Nathaniel F. Enright","doi":"10.3172/JIE.20.2.103","DOIUrl":"https://doi.org/10.3172/JIE.20.2.103","url":null,"abstract":"In the opening of his Ethics: An Essay on the Understanding of Evil, the French philosopher Alain Badiou (2001, p.1) remarks that \"Certain scholarly words, after long confinement in dictionaries and in academic prose, have the good fortune, or the misfortune ... of sudden exposure to the bright light of day,\" unexpectedly catapulting such words to \"centre stage.\" Ethics, Badiou contends, is undoubtedly one such word. And although we wish to resist the banal and tiresome process of academic list- making, the word information indubitably and unequivocally belongs next to ethics in and under the spotlight of post- modernity. Of course, Badiou plucks \"ethics\" from the darkness of philosophical obscurity only in order to show how the post- modern obsession with ethics simply reflects and reinforces \"the logic of a capitalist economy\" (2001, p.4). Similarly, the current essay attempts to rescue \"information\" from those who would reduce its essential contestability to so many \"semantic quirks\" (Machlup 1983, p.641). In so doing, it attempts to make explicit the proposition put forth by Robbins and Webster (1988, p.70) that \"information is not a thing, an entity; it is a social relation, and in contemporary capitalist societies it expresses the characteristic and prevailing relations of power.\" And so, despite the many recent attempts at theoretical illumination the only point that seems to have been clarified is the essential contestability of both these concepts. Yet taken together, especially in Library and Information Science (LIS), information ethics is understood in a very general sense to be a self- verifying good and as such something that must be unquestionably defended, supported and promoted.The purpose of this essay therefore is to highlight the manifold limitations of information ethics in the specific context of Library and Information Science (LIS). In particular, we wish to suggest that in a world characterized by the commodity form of information an ethics of information is at once both imperative and impossible. This impossibility and this necessity originate from the very same source: capital-the definite social relation by which the means of production are transformed into the means of exploitation. Although information ethics is purported to analyze the \"relationship between the creation, organization, dissemination and use of information and the ethical standards and moral codes governing human conduct\" (Reitz 2004, p.356) this has not led, on the whole, to any sustained process of consideration of the social meaning of the production and commodification of information. While there have been a smattering of exemplary and engaging critiques (Frohmann 2004; Stiglitz 2000; Schiller 1997; Enright 2008) dealing with the implications flowing from the generalization of the commodification of information, very few attempts have been made to comprehend the impetus that underpins the ceaseless movement toward ever more commodification. That i","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"103-126"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
From Advocates to Terrorists: Ideology, the State of Exception and the State of Emergency, and Political Ethics 从倡导者到恐怖分子:意识形态、例外状态和紧急状态以及政治伦理
Q2 Arts and Humanities Pub Date : 2011-09-01 DOI: 10.3172/JIE.20.2.65
R. Day
IntroductionPolitical information, like much of what is comprehended as information, today, is often understood in a rather passive sense of being expressions that are consulted for understanding. This is a liberalist view that sees persons as choosers and consumers of information. In this article, we would like to go beyond this epistemology and discuss information from an expressive viewpoint, namely, that of an agent's expressive actions in relation to the State. Our discussion will pass through the topics of ideology, States of exception and States of emergency, and the distinctions between morals and ethics, law and justice. Far from being passive or synonymous with "facts," information will be understood as expressions by agents, both institutional and personal. Our final discussion in this article will be in regard to the writings of the political theorist and activist Antonio Negri in the context of his imprisonment and trial on terror charges from 1979 to 1983 (the writings issue from 1983-the year in which his case actually began to be tried). Here, we will suggest the dissonance between States and social movements as expressive agents and forces. Here we will see the denial of the ethical by the moral, justice by legal right, and the denial of a more open future for a nation by classes that control a State.Today, these topics could not be more timely. "Intellectual Freedom" and "Freedom of information" form core value for the Western library tradition, but as I write this the Library of Congress, as well as all other United States government agencies, have been forbidden by the federal government to allow access to U.S. diplomatic dispatches or "cables" made public by an internet organization named Wikileaks. As I write this, the founder of Wikileaks, Julian Assange, has been under legal threat by the U.S. Attorney General, Eric Holder, and several leading politicians in the U.S. have urged his arrest and trial for treason (despite his being an Australian citizen), with several other leading political and media figures also calling for his assassination as a "terrorist." The Vice President of the United States, Joseph Biden, on December 19, 2010, referred to Assange on a popular Sunday news program as a "hi- tech terrorist"1 and the commercial media has largely continued this view of Assange, echoing the dominant government line. The accused leaker of this material, a U.S. Army private, Bradley Manning, has been held for over seven months at the time of this writing in harsh solitary confinement without trial or conviction. Further, Senator Joseph Lieberman, Chair of the Senate Homeland Security and Governmental Affairs Committee, on December 7, 2010, said that the U.S. Justice Department should extend the investigation of these leaks to the New York Times, which published reports based on the Wikileaks releases.2 While the press coverage of the contents of the leaks has been relatively sparse in the U.S. press, European and other worl
政治信息,就像今天很多被理解为信息的东西一样,通常被理解为一种相当被动的表达方式,是为了理解而咨询的。这是一种自由主义观点,认为人是信息的选择者和消费者。在这篇文章中,我们想超越这种认识论,从表达的角度来讨论信息,也就是说,一个主体的表达行为与国家的关系。我们的讨论将涉及意识形态、例外状态和紧急状态以及道德与伦理、法律与正义之间的区别等主题。信息不再是被动的或“事实”的同义词,信息将被理解为机构和个人代理人的表达。我们在这篇文章中最后的讨论将是关于政治理论家和活动家安东尼奥·内格里(Antonio Negri)在1979年至1983年因恐怖指控被监禁和审判的背景下的作品(他的作品发行于1983年——他的案件实际上开始审理的那一年)。在这里,我们将提出国家与社会运动之间作为表达主体和力量的不协调。在这里,我们将看到道德否定伦理,法律权利否定正义,控制国家的阶级否定一个民族更开放的未来。今天,这些话题再及时不过了。“知识自由”和“信息自由”构成了西方图书馆传统的核心价值,但就在我写这篇文章的时候,国会图书馆以及所有其他美国政府机构都被联邦政府禁止查阅由互联网组织“维基解密”公开的美国外交电报或“电报”。在我写这篇文章的时候,维基解密的创始人朱利安·阿桑奇(Julian Assange)正受到美国司法部长埃里克·霍尔德(Eric Holder)的法律威胁,美国几位主要政客敦促以叛国罪逮捕他并对他进行审判(尽管他是澳大利亚公民),其他几位主要政治和媒体人物也呼吁将他作为“恐怖分子”暗杀。2010年12月19日,美国副总统约瑟夫·拜登(Joseph Biden)在一个受欢迎的周日新闻节目中称阿桑奇为“高科技恐怖分子”,商业媒体在很大程度上延续了对阿桑奇的这一看法,呼应了占主导地位的政府路线。被控泄露这些材料的美国士兵布拉德利·曼宁(Bradley Manning)在撰写本文时已被关押在严酷的单独监禁中七个多月,未经审判或定罪。此外,参议院国土安全和政府事务委员会主席约瑟夫·利伯曼参议员于2010年12月7日表示,美国司法部应将对这些泄密事件的调查范围扩大到《纽约时报》,因为《纽约时报》在维基解密的基础上发表了相关报道虽然美国媒体对泄密内容的报道相对较少,但欧洲和世界其他地区的媒体从第一次泄密开始就一直在报道这些内容。在很大程度上,与欧洲主要报纸相比,美国媒体——包括《纽约时报》——更关注维基解密创始人的个人生活和所谓的性生活,以及瑞典对后者的刑事调查,而不是“电报”的内容,这一点并不公平。在我编辑这篇文章的时候,这些“电报”的披露为推翻突尼斯和埃及的独裁政府做出了贡献。埃及的胡斯尼•穆巴拉克(Hosni Mubarak)政府在很大程度上依靠封锁互联网和移动通信媒体作为阻止民众反抗的手段,但没有成功。与此同时,美国参议院早些时候提出的一项法案将在2011年由参议员约瑟夫·利伯曼(Joseph Lieberman)和苏珊·柯林斯(Susan Collins)重新提出,该法案将赋予行政部门权力,在发生“国家网络紧急情况”时,无需司法审查就能控制国家互联网网络基础设施的“关键”部分。…
{"title":"From Advocates to Terrorists: Ideology, the State of Exception and the State of Emergency, and Political Ethics","authors":"R. Day","doi":"10.3172/JIE.20.2.65","DOIUrl":"https://doi.org/10.3172/JIE.20.2.65","url":null,"abstract":"IntroductionPolitical information, like much of what is comprehended as information, today, is often understood in a rather passive sense of being expressions that are consulted for understanding. This is a liberalist view that sees persons as choosers and consumers of information. In this article, we would like to go beyond this epistemology and discuss information from an expressive viewpoint, namely, that of an agent's expressive actions in relation to the State. Our discussion will pass through the topics of ideology, States of exception and States of emergency, and the distinctions between morals and ethics, law and justice. Far from being passive or synonymous with \"facts,\" information will be understood as expressions by agents, both institutional and personal. Our final discussion in this article will be in regard to the writings of the political theorist and activist Antonio Negri in the context of his imprisonment and trial on terror charges from 1979 to 1983 (the writings issue from 1983-the year in which his case actually began to be tried). Here, we will suggest the dissonance between States and social movements as expressive agents and forces. Here we will see the denial of the ethical by the moral, justice by legal right, and the denial of a more open future for a nation by classes that control a State.Today, these topics could not be more timely. \"Intellectual Freedom\" and \"Freedom of information\" form core value for the Western library tradition, but as I write this the Library of Congress, as well as all other United States government agencies, have been forbidden by the federal government to allow access to U.S. diplomatic dispatches or \"cables\" made public by an internet organization named Wikileaks. As I write this, the founder of Wikileaks, Julian Assange, has been under legal threat by the U.S. Attorney General, Eric Holder, and several leading politicians in the U.S. have urged his arrest and trial for treason (despite his being an Australian citizen), with several other leading political and media figures also calling for his assassination as a \"terrorist.\" The Vice President of the United States, Joseph Biden, on December 19, 2010, referred to Assange on a popular Sunday news program as a \"hi- tech terrorist\"1 and the commercial media has largely continued this view of Assange, echoing the dominant government line. The accused leaker of this material, a U.S. Army private, Bradley Manning, has been held for over seven months at the time of this writing in harsh solitary confinement without trial or conviction. Further, Senator Joseph Lieberman, Chair of the Senate Homeland Security and Governmental Affairs Committee, on December 7, 2010, said that the U.S. Justice Department should extend the investigation of these leaks to the New York Times, which published reports based on the Wikileaks releases.2 While the press coverage of the contents of the leaks has been relatively sparse in the U.S. press, European and other worl","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"65-84"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Beginnings of Information Ethics: Reflections on Memory and Meaning 信息伦理的开端:对记忆与意义的反思
Q2 Arts and Humanities Pub Date : 2011-09-01 DOI: 10.3172/JIE.20.2.15
M. M. Smith
These days in my encore career as a hospice chaplain, I have the satisfaction of using my knowledge of information ethics in amazing new ways. As one of the pioneers in our field, I look back on the issues we tackled prior to becoming main stream and I am grateful to be able to continue my involvement in critical issues surrounding death and dying as professional, pastor, and a participant observer. In the world of health care and hospice, the stakes are high and decisions about life and death require careful use of information and information technologies. I often think of the model I presented in 1992 to detail the scope of information ethics and am pleased at how well it covers the significant issues I think about in my work today providing support for families before and after loss. My work is personal as well as professional with real people, death, grief, change, and hope. Information use and education is a huge part of what hospice provides patients and families in making the best choices in tough situations.The Scope of Information Ethics: The BeginningsWhen I began to think about information ethics in the late eighties, the closest field for comparison was computer ethics. The scope I had in mind was larger and included not only what was then called "information" but also the world of knowledge including the philosophy of knowledge. While exploring the philosophy of knowledge, I found the fields of philosophy of technology and the philosophy of science. Needing to attempt something, I started with five working categories to try on others. They were: Access, Ownership, Privacy, Security, and Community. They fit nicely in a star shape and provided a visual image to stimulate discussion.The five can be placed on the star in a variety of places and various comparisons can be made among them. Each one of the five highlights a key element uniting a wide variety of issues, problems, and dilemmas in the years since I first described it as a place to begin for the scope of information ethics and continues to be useful in my hospice work.Information is so very powerful in matters of patient care, family/caregiver education, government regulations, and public policy. Balancing patient autonomy and family responsibilities is not simple. Choosing hospice or palliative care rather than active treatment is a decision more gray than black or white. New drugs and treatments become available, as technologies and laws change quickly. Valuing both patient autonomy and family or physician decisionmaking get complicated by the need to prepare advanced directives and then to maintain informed consent at every step as the patient declines. My involvement now is close to the people who need good information and help using it under pressure. Having a very different angle from which to view information ethics issues and how much they matter to people in their last months is extremely rewarding. In this brief reflection, I hope to offer some insights from the early
这些天,在我作为临终关怀牧师的职业生涯中,我对以惊人的新方式使用我的信息伦理知识感到满意。作为该领域的先驱之一,我回顾了我们在成为主流之前解决的问题,我很感激能够继续以专业人士、牧师和参与者观察者的身份参与有关死亡和临终的关键问题。在医疗保健和临终关怀领域,风险很高,有关生与死的决定需要谨慎使用信息和信息技术。我经常想到我在1992年提出的模型,以详细说明信息伦理的范围,我很高兴它涵盖了我今天在工作中所考虑的重要问题,即为失去亲人之前和之后的家庭提供支持。我的作品是私人的,也是专业的,与真实的人,死亡,悲伤,变化和希望。信息的使用和教育是安宁疗护提供给病人和家属在艰难情况下做出最佳选择的重要部分。信息伦理的范围:开端当我在八十年代末开始思考信息伦理时,最接近的比较领域是计算机伦理。我心目中的范围更大,不仅包括当时所谓的“信息”,还包括知识的世界,包括知识的哲学。在探索知识哲学的过程中,我发现了技术哲学和科学哲学的领域。为了尝试一些东西,我从五个工作类别开始尝试。它们是:访问、所有权、隐私、安全和社区。它们很好地贴合在一个星形上,提供了一个视觉形象来激发讨论。这五颗星可以放在各种各样的地方,它们之间可以进行各种比较。自从我第一次将其描述为信息伦理范围的起点,并在我的临终关怀工作中继续发挥作用以来,这五个要点中的每一个都突出了一个关键因素,将各种各样的问题、问题和困境联系在一起。在病人护理、家庭/照顾者教育、政府法规和公共政策方面,信息是非常强大的。平衡病人自主权和家庭责任并不简单。选择安宁疗护或缓和疗护,而非积极治疗,是一个非黑即白的决定。随着技术和法律的迅速变化,新的药物和治疗方法变得可用。评估病人的自主权和家庭或医生的决定变得复杂,因为需要准备先进的指示,然后在病人衰落的每一步都保持知情同意。我现在的参与是接近那些需要好的信息并帮助他们在压力下使用这些信息的人。从一个非常不同的角度来看待信息伦理问题,以及它们对人们在生命的最后几个月有多重要,这是非常有益的。在这篇简短的反思中,我希望提供一些早期信息伦理的见解,并分享一些可供未来研究和反思的想法。背景和偏见在我积极参与高等教育,特别是神职人员和图书馆员的职业教育的这些年里,我很幸运地成为两个经历了重大变化的专业群体中的一名女性。当然,自从我1967年完成大学学业,1970年完成神学院学业以来,大量女性进入了神职人员的行列。在杜克大学(Duke),我是班里唯一一个从神学硕士项目毕业的女性。后来还有一些人毕业,但人数不多,但人数很快就上升了。今天,那些年在神学院的女性正在从长期的牧师和主教任期中退休。在罗马天主教会中,女性的角色也发生了变化。例如,罗马天主教的平信徒妇女现在有许多从事专业医院牧师和相关职业,如临终关怀或监狱牧师。对已发表的文献和会议上的演讲者的研究表明,妇女在宗教研究和与信仰有关的职业中产生了重大影响。…
{"title":"The Beginnings of Information Ethics: Reflections on Memory and Meaning","authors":"M. M. Smith","doi":"10.3172/JIE.20.2.15","DOIUrl":"https://doi.org/10.3172/JIE.20.2.15","url":null,"abstract":"These days in my encore career as a hospice chaplain, I have the satisfaction of using my knowledge of information ethics in amazing new ways. As one of the pioneers in our field, I look back on the issues we tackled prior to becoming main stream and I am grateful to be able to continue my involvement in critical issues surrounding death and dying as professional, pastor, and a participant observer. In the world of health care and hospice, the stakes are high and decisions about life and death require careful use of information and information technologies. I often think of the model I presented in 1992 to detail the scope of information ethics and am pleased at how well it covers the significant issues I think about in my work today providing support for families before and after loss. My work is personal as well as professional with real people, death, grief, change, and hope. Information use and education is a huge part of what hospice provides patients and families in making the best choices in tough situations.The Scope of Information Ethics: The BeginningsWhen I began to think about information ethics in the late eighties, the closest field for comparison was computer ethics. The scope I had in mind was larger and included not only what was then called \"information\" but also the world of knowledge including the philosophy of knowledge. While exploring the philosophy of knowledge, I found the fields of philosophy of technology and the philosophy of science. Needing to attempt something, I started with five working categories to try on others. They were: Access, Ownership, Privacy, Security, and Community. They fit nicely in a star shape and provided a visual image to stimulate discussion.The five can be placed on the star in a variety of places and various comparisons can be made among them. Each one of the five highlights a key element uniting a wide variety of issues, problems, and dilemmas in the years since I first described it as a place to begin for the scope of information ethics and continues to be useful in my hospice work.Information is so very powerful in matters of patient care, family/caregiver education, government regulations, and public policy. Balancing patient autonomy and family responsibilities is not simple. Choosing hospice or palliative care rather than active treatment is a decision more gray than black or white. New drugs and treatments become available, as technologies and laws change quickly. Valuing both patient autonomy and family or physician decisionmaking get complicated by the need to prepare advanced directives and then to maintain informed consent at every step as the patient declines. My involvement now is close to the people who need good information and help using it under pressure. Having a very different angle from which to view information ethics issues and how much they matter to people in their last months is extremely rewarding. In this brief reflection, I hope to offer some insights from the early","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"15-24"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inflexible Bodies: Metadata for Transgender Identities * 不灵活的身体:跨性别身份的元数据*
Q2 Arts and Humanities Pub Date : 2011-09-01 DOI: 10.3172/JIE.20.2.56
K. Roberto
[T]he power relations that characterize any historically embedded society are never as transparently clear as the names we give to them imply.- Gordon, 1997, p. 3While librarians are strongly encouraged to "offer materials from a variety of identity perspectives" (J. Taylor) to make library collections more welcoming to transgender people, the same level of attention is not always applied to terminology used to describe transgender- related topics, and even trans- people themselves. Is it possible for librarians to use controlled vocabulary to accurately describe people's lives? What pieces of identity are leftbehind? In traditional library cataloging models, hierarchical taxonomic and classification structures are used to describe pieces of information. These schemas are lacking in any sort of mechanism to acknowledge people's sometimes amorphous and often fluid identities. This paper will specifically address Library of Congress-based cataloging practices, including classification, and their role in enforcing normative boundaries for queer sexualities and gender. Through the use of inaccurate language in the Library of Congress Subject Headings (LCSH) and problematic classification schemes, catalogers often unwittingly contribute to the creation of library environments that are passively hostile to transgender users.The idea that Library of Congress subject headings do a poor job of codifying reality is not new. Sanford Berman first addressed this issue in the late 1960s. He wrote, in Prejudices and Antipathies:[...] the LC list can only "satisfy" parochial, jingoistic Europeans and North Americans, white- hued, at least nominally Christian (and preferably Protestant) in faith, comfortably situated in the middle- and higher- income brackets, largely domiciled in suburbia, fundamentally loyal to the Established Order, and heavily imbued with the transcendent, incomparable glory of Western civilization (3).He is far from alone in this sentiment; in their 2001 analysis, Hope Olson and Rose Schegl found 68 works discussing negative bias in LCSH. Many of these works were critical of the way the Library of Congress (LC) provides access to materials about women, African studies, people with disabilities, and LGBT people (Olson and Schegl 61). This paper focuses on the latter.Queers or Sexual Minorities?It is simultaneously essential and impossible to extricate transgender identities from lesbian, gay, and bisexual identities; queer- identified transgender people certainly exist, though LGBTQ advocacy work has not always been inclusive of both sexual and gender diversity. As mainstream gay and lesbian groups in the 1950s and 1960s began presenting as "normally" as possible in order to gain widespread acceptance, transgender identities were often considered deviant and misaligned with the groups' goals (Stryker 151). In other decades, such as the 1970s and 1990s, transgender and queer activists often aligned in the hopes of creating "an imagined politic
作为任何历史嵌入社会特征的权力关系,从来都不像我们给它们起的名字所暗示的那样清晰透明。——Gordon, 1997, p. 3虽然图书馆员被强烈鼓励“从不同的身份角度提供资料”(J. Taylor),以使图书馆的藏书更受跨性别者的欢迎,但对于用于描述跨性别相关话题的术语,甚至跨性别者本身,却没有得到同样的关注。图书馆员是否有可能使用可控的词汇来准确地描述人们的生活?留下了哪些身份碎片?在传统的图书馆编目模型中,采用分层的分类和分类结构来描述信息片段。这些图式缺乏任何一种机制来承认人们有时是无定形的、经常是流动的身份。本文将特别讨论国会图书馆的编目实践,包括分类,以及它们在执行酷儿性行为和性别的规范界限方面的作用。通过在国会图书馆的主题标题(LCSH)中使用不准确的语言和有问题的分类方案,编目人员经常在不知不觉中促成了对跨性别用户被动敌对的图书馆环境的创造。国会图书馆的主题标题在编纂现实方面做得很差,这种想法并不新鲜。桑福德·伯曼在20世纪60年代末首次提出了这个问题。他在《偏见与反感》中写道:[…]LC名单只能“满足”狭隘的、沙文主义的欧洲人和北美人,他们是白人,至少名义上信仰基督教(最好是新教),舒适地生活在中高收入阶层,大部分居住在郊区,从根本上忠于现存秩序,并深深浸染着西方文明的卓越和无与伦比的荣耀。霍普·奥尔森(Hope Olson)和罗斯·舍格尔(Rose Schegl)在2001年的分析中发现,有68篇文章讨论了LCSH中的负面偏见。这些作品中的许多都是对国会图书馆(LC)提供有关妇女、非洲研究、残疾人和LGBT人群的资料的方式的批评(Olson和Schegl 61)。本文的研究重点是后者。酷儿还是性少数?将跨性别者的身份从女同性恋、男同性恋和双性恋身份中解脱出来既必要又不可能;酷儿认同的跨性别者当然存在,尽管LGBTQ的倡导工作并不总是包括性和性别的多样性。20世纪50年代和60年代,主流男女同性恋群体为了获得广泛的接受,开始尽可能地表现得“正常”,跨性别身份通常被认为是不正常的,与群体的目标不一致(Stryker 151)。在其他的几十年里,比如20世纪70年代和90年代,跨性别者和酷儿活动家经常联合起来,希望创造一个“所有可能形式的性别反信息主义的想象中的政治联盟”(146)。在不同类型的LGBTQ修辞中,这些策略的回声仍然非常普遍,而受控制的图书馆词汇显然也不能幸免。在本文中,“酷儿”被定义为一种以同性取向为中心的政治化身份。“酷儿”这个词有很复杂的含义。在20世纪早期,这是一个内部术语,由社区内的人使用,直到20世纪50年代才成为一种侮辱(施奈尔和阿维夫)。在20世纪80年代末和90年代初,“酷儿”重新流行起来,代表了对同化的“同性恋”语言的抵制(Warner xxi)。目前,它仍然保留着一些激进的内涵,威胁着“同性恋政治的基础,分裂了‘性少数’和‘同性恋社区’的概念,分裂了‘同性恋’和‘女同性恋’的概念,甚至分裂了‘男人’和‘女人’的概念”。’”(Gamson 249)。酷儿身份在LCSH中没有明确的地位。…
{"title":"Inflexible Bodies: Metadata for Transgender Identities *","authors":"K. Roberto","doi":"10.3172/JIE.20.2.56","DOIUrl":"https://doi.org/10.3172/JIE.20.2.56","url":null,"abstract":"[T]he power relations that characterize any historically embedded society are never as transparently clear as the names we give to them imply.- Gordon, 1997, p. 3While librarians are strongly encouraged to \"offer materials from a variety of identity perspectives\" (J. Taylor) to make library collections more welcoming to transgender people, the same level of attention is not always applied to terminology used to describe transgender- related topics, and even trans- people themselves. Is it possible for librarians to use controlled vocabulary to accurately describe people's lives? What pieces of identity are leftbehind? In traditional library cataloging models, hierarchical taxonomic and classification structures are used to describe pieces of information. These schemas are lacking in any sort of mechanism to acknowledge people's sometimes amorphous and often fluid identities. This paper will specifically address Library of Congress-based cataloging practices, including classification, and their role in enforcing normative boundaries for queer sexualities and gender. Through the use of inaccurate language in the Library of Congress Subject Headings (LCSH) and problematic classification schemes, catalogers often unwittingly contribute to the creation of library environments that are passively hostile to transgender users.The idea that Library of Congress subject headings do a poor job of codifying reality is not new. Sanford Berman first addressed this issue in the late 1960s. He wrote, in Prejudices and Antipathies:[...] the LC list can only \"satisfy\" parochial, jingoistic Europeans and North Americans, white- hued, at least nominally Christian (and preferably Protestant) in faith, comfortably situated in the middle- and higher- income brackets, largely domiciled in suburbia, fundamentally loyal to the Established Order, and heavily imbued with the transcendent, incomparable glory of Western civilization (3).He is far from alone in this sentiment; in their 2001 analysis, Hope Olson and Rose Schegl found 68 works discussing negative bias in LCSH. Many of these works were critical of the way the Library of Congress (LC) provides access to materials about women, African studies, people with disabilities, and LGBT people (Olson and Schegl 61). This paper focuses on the latter.Queers or Sexual Minorities?It is simultaneously essential and impossible to extricate transgender identities from lesbian, gay, and bisexual identities; queer- identified transgender people certainly exist, though LGBTQ advocacy work has not always been inclusive of both sexual and gender diversity. As mainstream gay and lesbian groups in the 1950s and 1960s began presenting as \"normally\" as possible in order to gain widespread acceptance, transgender identities were often considered deviant and misaligned with the groups' goals (Stryker 151). In other decades, such as the 1970s and 1990s, transgender and queer activists often aligned in the hopes of creating \"an imagined politic","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"56-64"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
A Passport to Trouble: Bureaucratic Incompetence as Censorship 麻烦的通行证:官僚无能的审查制度
Q2 Arts and Humanities Pub Date : 2011-09-01 DOI: 10.3172/JIE.20.2.85
Lane R. Mandlis
IntroductionAccess to government issued identity documentation (ID) is not readily available for all Canadians. Trans- identified Canadians1 are one particular group that has a significant amount of difficultly accessing ID. The ramifications of the barriers to obtaining ID are significant and far reaching; and for transidentified people, can function as a justification for other forms of exclusion and violence based in transphobia. Transphobia consists of actions, behaviors or beliefs that are driven by an understanding (consciously or not) of the trans-body as less real than the non- trans body (Prosser, 1998). These actions, behaviors and beliefs function as forms of violence, whether explicit or implicit, intentional or otherwise, that are often thought to stem from fear. "Common sense" assumptions about gender-that everyone identifies as the sex they were assigned at birth and that norms of masculinity and femininity naturally follow these birth assignments-are used to justify transphobia in the form of stigmatization, discrimination, and various types of violence (Spade, 2008). Thinking about transphobia in this way, it is easy to see that policies that enact barriers to ID access for trans- people are an excellent example of institutional transphobia.Barriers to ID access for trans- people in Canada occur in a myriad of ways, and this article will look specifically at access issues in relation to passports. As trans legal scholar Dean Spade (2008, p. 749) notes: "the literature has thus far failed to look at the range of administrative gender reclassification policies and practices-including birth certificates, DMV policies, policies of sex- segregated facilities, and federal identity document policies-side by side, which has meant that the significance of the incoherence of these policies as a group has been obscured." This article will not go so far as to attempt such a lofty endeavor; however, through an examination of the barriers to information regarding gender reclassification, this article offers a different trajectory towards a similar goal. While the significance of these incoherencies is incredibly important, so too are the erasures of gender reclassification policies that occur through the lack of access to information regarding them, and the impact these erasures have on the interconnected government policies that affect trans- people (such as access to ID, placement in sex- segregated facilities, and access to healthcare). Moreover, these erasures perform a significantly more important function than simply an extension of institutional transphobia; they also function to naturalize and reify "common sense" assumptions about gender that underpin both the policies and transphobia, as well as various forms of misogyny.Through a consideration of the relationship between legal discourses and citizenship discourses as they relate to the transsexed body and the passport, this article undermines the commonsensical assumptions that unde
并非所有加拿大人都能轻易获得政府颁发的身份证件。变性身份的加拿大人是一个特殊的群体,他们的身份证件很难获取。获得身份证的障碍的后果是重大和深远的;对于变性人来说,这可以作为其他形式的排斥和基于变性恐惧症的暴力的理由。跨性别恐惧症是由一种理解(有意识或无意识地)驱动的行动、行为或信仰,这种理解认为跨性别者比非跨性别者更不真实(Prosser, 1998)。这些行动、行为和信仰都是暴力的形式,无论是显性的还是隐性的,有意的还是无意的,通常被认为是源于恐惧。关于性别的“常识”假设——每个人都认同他们出生时被分配的性别,男性和女性气质的规范自然遵循这些出生分配——被用来证明变性恐惧症的正当性,其形式是污名化、歧视和各种类型的暴力(Spade, 2008)。以这种方式思考跨性别恐惧症,很容易看出,为跨性别者制定身份获取障碍的政策是制度性跨性别恐惧症的一个很好的例子。在加拿大,跨性别者获得身份证的障碍有很多,这篇文章将特别关注与护照有关的访问问题。正如跨性别法律学者Dean Spade(2008,第749页)所指出的那样:“迄今为止,文献未能将行政性别重新分类政策和实践的范围——包括出生证明、DMV政策、性别隔离设施政策和联邦身份证件政策——并排看待,这意味着这些政策作为一个群体的不一致性的重要性被掩盖了。”本文并不打算做这样崇高的尝试;然而,通过对有关性别重新分类的信息障碍的检查,本文提供了实现类似目标的不同轨迹。虽然这些不一致性的重要性非常重要,但由于缺乏相关信息而出现的性别重新分类政策的删除,以及这些删除对影响跨性别者的相互关联的政府政策的影响(例如获得身份证,在性别隔离设施的安置,以及获得医疗保健)也同样重要。此外,这些消除的作用远比制度性跨性别恐惧症的延伸重要得多;它们还起着自然化和具体化关于性别的“常识性”假设的作用,这些假设支撑着政策和跨性别恐惧症,以及各种形式的厌女症。通过对涉及变性身体和护照的法律话语和公民话语之间关系的考虑,本文破坏了支撑社会正义和人权问题的常识性假设。通过明确考虑信息获取的缺乏如何使某些主体成为可能,而另一些主体成为不可能,同时为这些(不)可能的主体产生不同形式的公民身份,政府颁发的身份证成为制度性跨性别恐惧症和性别差异自然化的基础。揭露这种制度上根深蒂固的跨性别恐惧症仅仅是Spade提出的更大项目的第一步,因为政策之间不连贯的重要性也被这些政策中包含的信息的获取障碍所掩盖。本文通过对单一加拿大护照表格的批判性和严格检查,使用该表格产生的正式和非正式档案,民族志故事以及加拿大护照所表达的授权和理解来揭示有关性别重新分类的信息的不可访问性。…
{"title":"A Passport to Trouble: Bureaucratic Incompetence as Censorship","authors":"Lane R. Mandlis","doi":"10.3172/JIE.20.2.85","DOIUrl":"https://doi.org/10.3172/JIE.20.2.85","url":null,"abstract":"IntroductionAccess to government issued identity documentation (ID) is not readily available for all Canadians. Trans- identified Canadians1 are one particular group that has a significant amount of difficultly accessing ID. The ramifications of the barriers to obtaining ID are significant and far reaching; and for transidentified people, can function as a justification for other forms of exclusion and violence based in transphobia. Transphobia consists of actions, behaviors or beliefs that are driven by an understanding (consciously or not) of the trans-body as less real than the non- trans body (Prosser, 1998). These actions, behaviors and beliefs function as forms of violence, whether explicit or implicit, intentional or otherwise, that are often thought to stem from fear. \"Common sense\" assumptions about gender-that everyone identifies as the sex they were assigned at birth and that norms of masculinity and femininity naturally follow these birth assignments-are used to justify transphobia in the form of stigmatization, discrimination, and various types of violence (Spade, 2008). Thinking about transphobia in this way, it is easy to see that policies that enact barriers to ID access for trans- people are an excellent example of institutional transphobia.Barriers to ID access for trans- people in Canada occur in a myriad of ways, and this article will look specifically at access issues in relation to passports. As trans legal scholar Dean Spade (2008, p. 749) notes: \"the literature has thus far failed to look at the range of administrative gender reclassification policies and practices-including birth certificates, DMV policies, policies of sex- segregated facilities, and federal identity document policies-side by side, which has meant that the significance of the incoherence of these policies as a group has been obscured.\" This article will not go so far as to attempt such a lofty endeavor; however, through an examination of the barriers to information regarding gender reclassification, this article offers a different trajectory towards a similar goal. While the significance of these incoherencies is incredibly important, so too are the erasures of gender reclassification policies that occur through the lack of access to information regarding them, and the impact these erasures have on the interconnected government policies that affect trans- people (such as access to ID, placement in sex- segregated facilities, and access to healthcare). Moreover, these erasures perform a significantly more important function than simply an extension of institutional transphobia; they also function to naturalize and reify \"common sense\" assumptions about gender that underpin both the policies and transphobia, as well as various forms of misogyny.Through a consideration of the relationship between legal discourses and citizenship discourses as they relate to the transsexed body and the passport, this article undermines the commonsensical assumptions that unde","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"85-102"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Global Information Ethics in LIS: An Examination of Select National Library Association English- Language Codes of Ethics 美国图书馆的全球信息伦理:国家图书馆协会英文道德规范的审查
Q2 Arts and Humanities Pub Date : 2011-09-01 DOI: 10.3172/JIE.20.2.25
Jane Robertson Zaïane
Even the most rational approach to ethics is defenseless if there isn't the will to do what is right.-Aleksandr Solzhenitsyn (1918-2008)Ethics, or moral philosophy, derived from ethos, is the principle, character, and behavior of knowing and doing what is right and just. Defined by the Oxford English Dictionary as "the science of morals; the department of study concerned with the principles of human duty" and "the rules of conduct recognized in certain associations," professional ethical responsibilities have long been expected of many professions including teaching, medicine, finance, and law, yet formal ethical standards for library and information professionals have only recently, relative to the age of the profession, been considered, developed, and published.Information ethics in library and information science, a term first expressed in 1988 (Hauptman, 1988, p. 3; Capurro, 1998), refers to the "production, dissemination, storage, retrieval, security and application of information within an ethical context" (Hauptman, 2002, p. 121). The ethical and moral obligations, challenges and conflicts which may result when people, information, and facilitators (i.e., librarians) interact, demonstrate the need for ethical standards to guide the facilitator, and indeed to ensure the optimal conditions for information to be created, used, and preserved. They are statements to guide and define ideals and standards of librarianship in the particular societal contexts in which they are formulated.Yet, information ethics standards must first be governed by national, federal, and local laws, covering aspects such as labor standards (what is a librarian required to do, or to not do?), technology (what technology can be used/ accessed, and how, especially at the tax-payers' expense?), information laws (what limits have been placed on access to information about potentially controversial subjects?), audience (who may or may not access a library's services and why? and how (or is) the privacy of the user ensured?). The American Library Association (ALA) Library Bill of Rights, for example, provides an ideal statement of principles, and refines those principles to refer specifically to intellectual freedom in the Code of Ethics; however, any conflicts, challenges or obligation in ensuring those standards and ideals would be governed by American law, making the code unenforceable (Wiegand, 1996, p. 84) at the professional level, and thus remaining hopeful ideals. The importance of recognizing ethical standards is not in question, yet the need for often unenforceable codes must be examined; why are formal codes necessary, what makes a code effective, and how can rhetoric, rights, responsibility, and reality be reconciled in the context of information ethics in library and information science?The ALA Code of Ethics includes the following in its short preamble: "...we recognize the importance of codifying and making known to the profession and to the general public th
如果没有做正确的事情的意愿,即使是最理性的伦理方法也是毫无防备的。-亚历山大·索尔仁尼琴(1918-2008)伦理,或道德哲学,源于精神,是认识和做正确和公正的原则、性格和行为。牛津英语词典将其定义为“道德科学;作为研究“人类责任原则”和“某些协会认可的行为准则”的部门,职业道德责任长期以来一直被期望包括教学、医学、金融和法律在内的许多职业,然而,图书馆和信息专业人员的正式道德标准直到最近才被考虑、制定和出版,这与该职业的年龄有关。图书馆情报学中的信息伦理,这一术语于1988年首次提出(Hauptman, 1988, p. 3;Capurro, 1998),指的是“在伦理背景下信息的生产、传播、存储、检索、安全和应用”(Hauptman, 2002, p. 121)。当人、信息和促进者(即图书馆员)相互作用时,可能产生的伦理和道德义务、挑战和冲突表明,需要道德标准来指导促进者,并确保信息被创造、使用和保存的最佳条件。它们是在特定的社会背景下指导和定义图书馆事业理想和标准的声明。然而,信息伦理标准必须首先受到国家、联邦和地方法律的约束,涵盖诸如劳动标准(图书管理员需要做什么,不需要做什么?)、技术(什么技术可以使用/访问,以及如何使用,特别是在纳税人的费用下?)、信息法律(对可能有争议的主题的信息访问设置了什么限制?)、受众(谁可以或不可以访问图书馆的服务,以及为什么?)以及如何(或如何)确保用户的隐私?例如,美国图书馆协会(ALA)的《图书馆权利法案》提供了一个理想的原则声明,并对这些原则进行了提炼,使其在《道德守则》中特别提到知识自由;然而,在确保这些标准和理想的过程中,任何冲突、挑战或义务都将受到美国法律的管辖,这使得守则在专业层面上无法执行(Wiegand, 1996, p. 84),因此仍然是有希望的理想。承认道德标准的重要性是毋庸置疑的,但必须审查通常无法执行的守则的必要性;为什么正式规范是必要的,什么使规范有效,如何在图书馆和信息科学的信息伦理背景下协调修辞、权利、责任和现实?美国ALA道德准则在其简短的序言中包括以下内容:“……我们认识到将指导图书馆员工作的道德原则编纂成文,并使之为专业人士和公众所知的重要性……”;图书馆和信息专业人员能否超越原则上的道德理想,有意识地应用和实施?许多国家图书馆/图书馆员协会的正式道德准则涉及国家章程、宪法或类似文件,有时直接或间接涉及全球人权,有些特别涉及《世界人权宣言》(UDHR)的内容。虽然《世界人权宣言》也没有法律约束力,但可以用来在道德或政治上影响违反宣言原则的国家、民族、领导人或政府,尽管文件的语言是主观的。道德准则是否应该以《世界人权宣言》为基础,即使它没有法律权威?一个代码可以适用于所有的信息(鲍德温,1996),无论技术或格式?代码能否适应未知的隐私或安全问题(Moor, 2005)?代码是否可以出于某种原因排除任何人?…
{"title":"Global Information Ethics in LIS: An Examination of Select National Library Association English- Language Codes of Ethics","authors":"Jane Robertson Zaïane","doi":"10.3172/JIE.20.2.25","DOIUrl":"https://doi.org/10.3172/JIE.20.2.25","url":null,"abstract":"Even the most rational approach to ethics is defenseless if there isn't the will to do what is right.-Aleksandr Solzhenitsyn (1918-2008)Ethics, or moral philosophy, derived from ethos, is the principle, character, and behavior of knowing and doing what is right and just. Defined by the Oxford English Dictionary as \"the science of morals; the department of study concerned with the principles of human duty\" and \"the rules of conduct recognized in certain associations,\" professional ethical responsibilities have long been expected of many professions including teaching, medicine, finance, and law, yet formal ethical standards for library and information professionals have only recently, relative to the age of the profession, been considered, developed, and published.Information ethics in library and information science, a term first expressed in 1988 (Hauptman, 1988, p. 3; Capurro, 1998), refers to the \"production, dissemination, storage, retrieval, security and application of information within an ethical context\" (Hauptman, 2002, p. 121). The ethical and moral obligations, challenges and conflicts which may result when people, information, and facilitators (i.e., librarians) interact, demonstrate the need for ethical standards to guide the facilitator, and indeed to ensure the optimal conditions for information to be created, used, and preserved. They are statements to guide and define ideals and standards of librarianship in the particular societal contexts in which they are formulated.Yet, information ethics standards must first be governed by national, federal, and local laws, covering aspects such as labor standards (what is a librarian required to do, or to not do?), technology (what technology can be used/ accessed, and how, especially at the tax-payers' expense?), information laws (what limits have been placed on access to information about potentially controversial subjects?), audience (who may or may not access a library's services and why? and how (or is) the privacy of the user ensured?). The American Library Association (ALA) Library Bill of Rights, for example, provides an ideal statement of principles, and refines those principles to refer specifically to intellectual freedom in the Code of Ethics; however, any conflicts, challenges or obligation in ensuring those standards and ideals would be governed by American law, making the code unenforceable (Wiegand, 1996, p. 84) at the professional level, and thus remaining hopeful ideals. The importance of recognizing ethical standards is not in question, yet the need for often unenforceable codes must be examined; why are formal codes necessary, what makes a code effective, and how can rhetoric, rights, responsibility, and reality be reconciled in the context of information ethics in library and information science?The ALA Code of Ethics includes the following in its short preamble: \"...we recognize the importance of codifying and making known to the profession and to the general public th","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"25-41"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Teaching Other Tongues: Addressing the Problem of "Other" Languages in the Library 外语教学:解决图书馆中“其他”语言的问题
Q2 Arts and Humanities Pub Date : 2011-09-01 DOI: 10.3172/JIE.20.2.42
Emily Drabinski
Language-the words we use, our syntax and our grammar-is always deployed in a context. We might refer to a collective group as y'all in one context (casually, among friends) but simply as you in another. When students enter our library instruction classrooms, they also enter a new discursive context, this one marked by Boolean syntax, arcane controlled vocabularies, and Aristotelian classification structures that divide the universe of knowledge in ways foreign to the naive user. For example, nothing about using Library of Congress Subject Headings (LCSH) or SocINDEX database descriptors is natural, nor is the use of and and or as formal structures. Students who seek use of library resources inevitably must learn to navigate these strange new linguistic worlds.Library instructors must balance the demand to teach students how to search successfully in these formal linguistic contexts against a desire to respect the languages and modes of thought students bring from elsewhere into the classroom. As advocates for equity of access to materials, librarians must negotiate the realities of dominant, standard structures of language and organization-often our discursive homes-with the diversity of linguistic and cognitive approaches of our students. These politically and ethically impelled negotiations require us to teach library research as a context in which language struggles take place, rather than as an arena where some words and phrases are simply and acontextually correct. Indeed, when students are taught that only one language variety is "correct," instructors consciously and unconsciously reinscribe systems of linguistic dominance that allocate access, opportunity, and reward unevenly among social groups.Composition Studies has long explored this difficult balancing act. In the pages that follow, this article articulates the work done by composition scholars to understand and politicize the problem of multiple discourses in the classroom, as well as conceptualize a potential solution. Rather than arguing for or against the use of different language varieties, Composition Studies has used the concept of the contact zone to imagine the classroom as a space of dialogic struggle where no single language is "better" or "correct." Instead, the classroom and the blank page become sites of interpretive struggle for meaning.Following this discussion of the contact zone in the writing classroom, I suggest that teaching librarians might re-conceptualize the contact zone in our own field. Library advocacy work on the problem of standardized language has primarily worked to perfect and change that standard language so that it better reflects a pluralist embrace of the language of our users. While a vital part of an ethical linguistic practice, the focus on "correcting" library language reinscribes the idea that any language can ever be "correct" outside the context of its use. Curiously, the library field has paid less attention to conceptualizing the concret
语言——我们使用的单词,我们的语法和语法——总是在一个上下文中部署的。我们可能会在一种情况下(在朋友之间)把一个集体称为“y’all”,但在另一种情况下,我们会简单地称之为“you”。当学生进入我们的图书馆教学教室时,他们也进入了一个新的话语环境,这个环境以布尔语法、神秘的受控词汇和亚里士多德式的分类结构为标志,这些分类结构以一种对天真的用户来说陌生的方式划分了知识的世界。例如,使用国会图书馆主题标题(LCSH)或SocINDEX数据库描述符是不自然的,使用and和or作为正式结构也是不自然的。寻求利用图书馆资源的学生不可避免地必须学会驾驭这些陌生的新语言世界。图书馆教师必须在教导学生如何在这些正式的语言语境中成功地进行搜索的需求与尊重学生从其他地方带入课堂的语言和思维模式的愿望之间取得平衡。作为公平获取资料的倡导者,图书馆员必须与学生语言和认知方法的多样性进行协商,以适应语言和组织的主导、标准结构(通常是我们的话语家园)的现实。这些政治上和道德上推动的谈判要求我们把图书馆研究作为语言斗争发生的背景来教授,而不是作为一些单词和短语简单和上下文正确的舞台。事实上,当学生被教导只有一种语言是“正确的”时,教师会有意无意地重新建立语言优势系统,在社会群体中分配机会、机会和奖励。构图研究长期以来一直在探索这种困难的平衡行为。在接下来的几页中,本文阐述了作文学者所做的工作,以理解和政治化课堂上的多重话语问题,并概念化潜在的解决方案。“作文研究”并没有争论支持或反对使用不同的语言变体,而是利用“接触区”的概念,把课堂想象成一个对话斗争的空间,在这个空间里,没有哪一种语言是“更好”或“正确”的。取而代之的是,教室和空白页变成了为意义进行解释斗争的场所。在讨论了写作课堂中的接触区之后,我建议图书馆员在我们自己的领域中重新定义接触区。图书馆在标准化语言问题上的倡导工作主要是为了完善和改变标准语言,以便更好地反映我们用户对语言的多元拥抱。虽然这是道德语言学实践的重要组成部分,但对“纠正”图书馆语言的关注重新体现了这样一种观点,即任何语言在其使用环境之外都可以“正确”。奇怪的是,图书馆领域很少注意概念化这些语言斗争发生的具体空间:我们数据库和opac中的搜索框。特别是当我们教学生如何处理他们自己的词汇和图书馆资源的受控词汇时,我们已经在一个接触区教学了。通过阐明和概念化数据库搜索界面作为接触区域的概念,本文建议教学图书馆员可以中断主导语言和知识方案的力量,而不是通过我们的教学实践将它们重新铭文为正确的。在向接触区部署一种批判性的方法时,图书馆教学可以成为我们的用户和我们都可能寻求改变的主导话语系统之间富有成效的斗争的场所。第一次进入大学的学生所接触到的不仅仅是新的物理设施。他们也进入了新的话语社区。大学教学的主要角色之一就是向学生介绍这些特定的话语。…
{"title":"Teaching Other Tongues: Addressing the Problem of \"Other\" Languages in the Library","authors":"Emily Drabinski","doi":"10.3172/JIE.20.2.42","DOIUrl":"https://doi.org/10.3172/JIE.20.2.42","url":null,"abstract":"Language-the words we use, our syntax and our grammar-is always deployed in a context. We might refer to a collective group as y'all in one context (casually, among friends) but simply as you in another. When students enter our library instruction classrooms, they also enter a new discursive context, this one marked by Boolean syntax, arcane controlled vocabularies, and Aristotelian classification structures that divide the universe of knowledge in ways foreign to the naive user. For example, nothing about using Library of Congress Subject Headings (LCSH) or SocINDEX database descriptors is natural, nor is the use of and and or as formal structures. Students who seek use of library resources inevitably must learn to navigate these strange new linguistic worlds.Library instructors must balance the demand to teach students how to search successfully in these formal linguistic contexts against a desire to respect the languages and modes of thought students bring from elsewhere into the classroom. As advocates for equity of access to materials, librarians must negotiate the realities of dominant, standard structures of language and organization-often our discursive homes-with the diversity of linguistic and cognitive approaches of our students. These politically and ethically impelled negotiations require us to teach library research as a context in which language struggles take place, rather than as an arena where some words and phrases are simply and acontextually correct. Indeed, when students are taught that only one language variety is \"correct,\" instructors consciously and unconsciously reinscribe systems of linguistic dominance that allocate access, opportunity, and reward unevenly among social groups.Composition Studies has long explored this difficult balancing act. In the pages that follow, this article articulates the work done by composition scholars to understand and politicize the problem of multiple discourses in the classroom, as well as conceptualize a potential solution. Rather than arguing for or against the use of different language varieties, Composition Studies has used the concept of the contact zone to imagine the classroom as a space of dialogic struggle where no single language is \"better\" or \"correct.\" Instead, the classroom and the blank page become sites of interpretive struggle for meaning.Following this discussion of the contact zone in the writing classroom, I suggest that teaching librarians might re-conceptualize the contact zone in our own field. Library advocacy work on the problem of standardized language has primarily worked to perfect and change that standard language so that it better reflects a pluralist embrace of the language of our users. While a vital part of an ethical linguistic practice, the focus on \"correcting\" library language reinscribes the idea that any language can ever be \"correct\" outside the context of its use. Curiously, the library field has paid less attention to conceptualizing the concret","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"42-55"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Looking Back, Looking Forward, and Transformation in Information Ethics 回顾、展望与信息伦理的变革
Q2 Arts and Humanities Pub Date : 2011-09-01 DOI: 10.3172/JIE.20.2.157
E. Buchanan
This issue represents a unique perspective in information ethics at this moment in time. There is a change occurring; indeed, a transition has been under way for some time, from those who set the path, those who defined this field, to a newly minted body of scholars who see the context for the parameters of information ethics in a vastly different way. We, this field of information ethics, still grapple with the same fundamental definitions of information ethics as were presented in the 1980s, the "inception" of this discipline. We still think about issues of creation, access, control, and dissemination of information. Yet, what constitutes the definition of "information" and what constitutes those activities around information is dramatically different. James Moor was one of the first to call attention to the different nature of "computer" data, describing it as greased and malleable; he called attention to the "policy vacuums" and "conceptual muddles" created by digital data. Those characteristics articulated in the 1980s have indeed proven true, and even Moor may be surprised at the extent to which those very characteristics have transformed not only research and scholarship but individuals and societies themselves. We have seen such arguments for "everything is miscellaneous," and "the world is flat"-those are indicative of the collapsing parameters resultant from the ways in which we create, use, and disseminate information in this moment. This forces us to a broader question.Where is the discipline of information ethics? It is increasingly diffused. It is, simultaneously more important and less important than ever. It is ever important because every discipline essentially grapples now with information ethics issues, and because of that, its "significance" as a "stand- alone discipline" is called into question. Scholars from across an array of disciplines are engaging more directly with issues of data integrity, ethical research practices, privacy, autonomy, identity, trust, reality, data sharing, data manipulation, fragmentation, orientation. Information ethicists have made these issues explicit over the years, but increasingly, disciplinary specificity is collapsing and these issues certainly do not reside in any one clear domain. This is happening because of the nature of digital data which is causing every scholar, researcher, bureaucrat, and individual to think differently about their relationship with the world, in both physical and virtual realms. Information ethics scholarship is changing, pushing boundaries in its scope and reach. A physicist, Vlatko Vedra, recently described the theory of quantum information, that everything, the universe itself, is information. Information is superior. If we follow his lead, everything, then, is information ethics? With that, one might also argue that nothing is information ethics, a stance I do not support.Information ethics has co- existed along with other "ethics" for many years: computer ethic
这个问题代表了当前信息伦理的一个独特视角。有一个变化正在发生;事实上,一个转变已经进行了一段时间,从那些设定道路的人,那些定义这个领域的人,到一个新形成的学者群体,他们以一种截然不同的方式看待信息伦理参数的背景。我们,这个信息伦理领域,仍然在努力解决信息伦理的基本定义,就像在20世纪80年代,这个学科的“开始”。我们仍然在思考信息的创造、获取、控制和传播等问题。然而,构成“信息”定义的内容和构成围绕信息的活动的内容是截然不同的。詹姆斯·摩尔(James Moor)是最早提醒人们注意“计算机”数据的不同本质的人之一,他将其描述为润滑的、可延展的;他呼吁人们注意数字数据造成的“政策真空”和“概念混乱”。这些在20世纪80年代阐述的特征确实被证明是正确的,甚至摩尔也可能会惊讶于这些特征不仅改变了研究和学术,而且改变了个人和社会本身。我们已经看到了“一切都是杂的”和“世界是平的”这样的论点——这些都表明了我们在这个时刻创造、使用和传播信息的方式所导致的参数崩溃。这迫使我们提出一个更广泛的问题。信息伦理的学科在哪里?它正日益扩散。它比以往任何时候都更重要,同时也更不重要。这是非常重要的,因为现在每个学科本质上都在与信息伦理问题作斗争,正因为如此,它作为一门“独立学科”的“意义”受到了质疑。来自不同学科的学者更直接地参与数据完整性、伦理研究实践、隐私、自治、身份、信任、现实、数据共享、数据操纵、碎片化、定向等问题。多年来,信息伦理学家已经明确提出了这些问题,但越来越多的是,学科的特殊性正在崩溃,这些问题当然不存在于任何一个明确的领域。这种情况的发生是因为数字数据的本质,它导致每个学者、研究人员、官僚和个人在物理和虚拟领域中对他们与世界的关系进行不同的思考。信息伦理研究正在发生变化,在其范围和范围上不断突破界限。物理学家Vlatko Vedra最近描述了量子信息理论,认为一切,包括宇宙本身,都是信息。信息至上。如果我们跟随他的脚步,那么,一切都是信息伦理?因此,有人可能会说,没有什么是信息伦理,我不支持这种立场。信息伦理与计算机伦理、商业伦理、生命伦理等“伦理”并存已久。每一个都有一个相应的“学科家”。信息伦理在图书馆和信息学研究中有一个不稳定的家,值得注意的是考虑Enright对此的观点。同样值得注意的是,仍然没有伦理课程的美国大学项目的数量;有一个隐含的假设,即由于认证标准,道德将与课程交织在一起,我对这个假设表示质疑。尽管有认证标准,但在专业课程中,道德常常被视为事后的想法。其他学科,例如科学、技术、工程和数学(STEM),热烈地争论哪种模式最适合伦理教育——独立课程还是灌输模式。我在美国没有看到过同样的课程辩论。更常见的是,LIS伦理是通过标准的道德规范引入的。职业道德象征地体现在规范中——正如Zaiane所说,道德规范是普遍的指导性文件,但并不保证道德行为或专业精神。…
{"title":"Looking Back, Looking Forward, and Transformation in Information Ethics","authors":"E. Buchanan","doi":"10.3172/JIE.20.2.157","DOIUrl":"https://doi.org/10.3172/JIE.20.2.157","url":null,"abstract":"This issue represents a unique perspective in information ethics at this moment in time. There is a change occurring; indeed, a transition has been under way for some time, from those who set the path, those who defined this field, to a newly minted body of scholars who see the context for the parameters of information ethics in a vastly different way. We, this field of information ethics, still grapple with the same fundamental definitions of information ethics as were presented in the 1980s, the \"inception\" of this discipline. We still think about issues of creation, access, control, and dissemination of information. Yet, what constitutes the definition of \"information\" and what constitutes those activities around information is dramatically different. James Moor was one of the first to call attention to the different nature of \"computer\" data, describing it as greased and malleable; he called attention to the \"policy vacuums\" and \"conceptual muddles\" created by digital data. Those characteristics articulated in the 1980s have indeed proven true, and even Moor may be surprised at the extent to which those very characteristics have transformed not only research and scholarship but individuals and societies themselves. We have seen such arguments for \"everything is miscellaneous,\" and \"the world is flat\"-those are indicative of the collapsing parameters resultant from the ways in which we create, use, and disseminate information in this moment. This forces us to a broader question.Where is the discipline of information ethics? It is increasingly diffused. It is, simultaneously more important and less important than ever. It is ever important because every discipline essentially grapples now with information ethics issues, and because of that, its \"significance\" as a \"stand- alone discipline\" is called into question. Scholars from across an array of disciplines are engaging more directly with issues of data integrity, ethical research practices, privacy, autonomy, identity, trust, reality, data sharing, data manipulation, fragmentation, orientation. Information ethicists have made these issues explicit over the years, but increasingly, disciplinary specificity is collapsing and these issues certainly do not reside in any one clear domain. This is happening because of the nature of digital data which is causing every scholar, researcher, bureaucrat, and individual to think differently about their relationship with the world, in both physical and virtual realms. Information ethics scholarship is changing, pushing boundaries in its scope and reach. A physicist, Vlatko Vedra, recently described the theory of quantum information, that everything, the universe itself, is information. Information is superior. If we follow his lead, everything, then, is information ethics? With that, one might also argue that nothing is information ethics, a stance I do not support.Information ethics has co- existed along with other \"ethics\" for many years: computer ethic","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"157-160"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Information Ethics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1