It is now thirty years since the first issue of Processed World (PW) hit the streets of San Francisco. Hunt around on the net, and you can find a snippet of film footage showing three editors of PW pacing the Financial District sidewalk, dressed in outlandish costumes (a computer terminal, a can of nuts, and something else-a punch card? the corporate ladder?), waving copies of their magazine (Shaping San Francisco 1982). A year or so later, the PW collective would organize a lively bus tour of Silicon Valley, visiting points of interest that made plain the military connections and dubious management practices of the rising computer industry. But to fail to look beyond this, dismissing PW as no more than a zany eighties "anti- tech" revisiting of the Merry Pranksters (Besher 1984), is to misunderstand the project altogether. From its inception, the journal "with a bad attitude" worked to promote workplace rebellion among "the majority of the work force, i.e., information handlers" (Cabins 1983a, p. 9), employed-typically in an office setting-to "file, sort, type, track, process, duplicate and triplicate the ever expanding mass of "information" necessary to operate the global corporate economy" (Athanasiou 1981, p. 16). While ultimately failing in its goal, PW proved to be an innovative undertaking on a number of levels, from its critical account of information work for capital and the resistance this engendered, to the ways in which the journal sought to mobilize the printed word and graphic design to its ends.Within the space of a few short years, as the Reagan era ushered in a new phase of conformity in both workplace and society, it became clear to editors and readers alike that the premises that had originally inspired Processed World were more and more difficult to realize in practice, at least in the short term. Without abandoning either its leftlibertarian stance or its concern for the sphere of paid work, its editors chose to broaden their field of view in search of what one of them would call an "aesthetics of resistance" (Med- O 1986, p. 53). Issues continued to appear into the nineties and beyond, although with decreasing regularity (the latest was published in 2006, after a five year hiatus, and may have been the last).Processed World's circulation may never have topped 5,000 (Gee 1993, p. 245), although that figure was respectable for a publication positioned outside the mainstream culture and media of its time. A continuing if subterranean influence within leftlibertarian circles in North America and beyond, the journal has since been remembered as part of "a little- recognized punk culture golden age for alternative publishing" (Solnit and Schwartzenberg 2000, p. 35), and as a "legendary magazine [that] covered the growing pains of white- collar office work in the pre-Internet information economy throughout the 1980s" (Ross 2003, p. 267). In terms of its contributions to popular visual culture, Processed World can also lay claim to
自第一期《加工世界》(PW)在旧金山问世至今,已经过去了30年。在网上搜索一下,你可以找到一段电影片段,显示《PW》的三位编辑在金融区的人行道上踱步,他们穿着奇装异服(一台电脑终端,一罐坚果,还有别的东西——打孔卡?),挥舞着他们的杂志(1982年的《旧金山整形》)。大约一年后,PW集体组织了一次热闹的硅谷巴士之旅,参观了一些有趣的景点,这些景点清楚地展示了正在崛起的计算机行业与军方的联系和可疑的管理做法。但如果不能超越这一点,将PW视为80年代滑稽的“反科技”重播的《快乐的恶作剧者》(Merry Pranksters, 1984),那就完全误解了这个项目。从一开始,这份“态度恶劣”的杂志就致力于在“大多数劳动力,即信息处理者”(卡恩斯1983a,第9页)中促进工作场所的反叛,这些人通常在办公室环境中受雇,“归档、分类、打字、跟踪、处理、复制和复制不断扩大的大量“信息”,这些“信息”是运营全球企业经济所必需的”(阿塔纳西乌1981,第16页)。虽然最终未能实现其目标,但《PW》在许多层面上被证明是一项创新事业,从它对资本信息工作的批判性描述和由此产生的阻力,到该杂志试图动员印刷文字和平面设计达到目的的方式。在短短几年的时间里,随着里根时代在工作场所和社会中迎来了一个新的一致性阶段,编辑和读者都清楚地认识到,最初启发《加工世界》的前提越来越难以在实践中实现,至少在短期内是这样。在没有放弃其左翼自由主义立场或对有偿工作领域的关注的情况下,它的编辑选择拓宽他们的视野,以寻找他们中的一个人所说的“抵抗美学”(Med- O 1986,第53页)。九十年代以后,这些问题继续出现,尽管频率越来越低(最近一期是在2006年出版的,在中断了五年之后,可能是最后一次)。《加工世界》的发行量可能永远不会超过5000份(Gee 1993,第245页),尽管这个数字对于一份处于当时主流文化和媒体之外的出版物来说是值得尊敬的。该杂志在北美及其他地区的左翼自由主义圈子里有着持续的地下影响,它被认为是“另类出版的一个鲜为人知的朋克文化黄金时代”的一部分(索尔尼特和施瓦森伯格2000年,第35页),也是一本“覆盖了整个20世纪80年代互联网前信息经济中白领办公室工作日益增长的痛苦的传奇杂志”(罗斯2003年,第267页)。就其对流行视觉文化的贡献而言,加工世界也可以声称拥有一些最早的漫画家的作品,如“明日汤姆”(丹·珀金斯)和泰德·拉尔。然而,《加工世界》并不仅仅具有历史意义。从2011年的角度来看,可以说,在出版之初提出的关于信息工作和工作者的许多问题仍然是相关的,因此它们的重新审视是及时的因为不仅信息和信息技术继续注入当今的工作环境,而且那种矛盾的感觉——关于一个人的身份、“职业”的前景、与同事的交流,实际上是在有偿工作中找到满足感的可能性和/或愿望——支撑着《加工世界》中文字的流动,仍然是当今信息工作的一个太普遍的特征(Armano 2010)。本文将探讨出现在《加工世界》前15期左右的办公室职员形象,它的编辑和读者试图以新一代临时工(临时工)为中心,然后被招募到不断膨胀的白领员工队伍中。…
{"title":"Beyond a bad attitude? Information workers and their prospects through the pages of Processed World","authors":"S. Wright","doi":"10.3172/JIE.20.2.127","DOIUrl":"https://doi.org/10.3172/JIE.20.2.127","url":null,"abstract":"It is now thirty years since the first issue of Processed World (PW) hit the streets of San Francisco. Hunt around on the net, and you can find a snippet of film footage showing three editors of PW pacing the Financial District sidewalk, dressed in outlandish costumes (a computer terminal, a can of nuts, and something else-a punch card? the corporate ladder?), waving copies of their magazine (Shaping San Francisco 1982). A year or so later, the PW collective would organize a lively bus tour of Silicon Valley, visiting points of interest that made plain the military connections and dubious management practices of the rising computer industry. But to fail to look beyond this, dismissing PW as no more than a zany eighties \"anti- tech\" revisiting of the Merry Pranksters (Besher 1984), is to misunderstand the project altogether. From its inception, the journal \"with a bad attitude\" worked to promote workplace rebellion among \"the majority of the work force, i.e., information handlers\" (Cabins 1983a, p. 9), employed-typically in an office setting-to \"file, sort, type, track, process, duplicate and triplicate the ever expanding mass of \"information\" necessary to operate the global corporate economy\" (Athanasiou 1981, p. 16). While ultimately failing in its goal, PW proved to be an innovative undertaking on a number of levels, from its critical account of information work for capital and the resistance this engendered, to the ways in which the journal sought to mobilize the printed word and graphic design to its ends.Within the space of a few short years, as the Reagan era ushered in a new phase of conformity in both workplace and society, it became clear to editors and readers alike that the premises that had originally inspired Processed World were more and more difficult to realize in practice, at least in the short term. Without abandoning either its leftlibertarian stance or its concern for the sphere of paid work, its editors chose to broaden their field of view in search of what one of them would call an \"aesthetics of resistance\" (Med- O 1986, p. 53). Issues continued to appear into the nineties and beyond, although with decreasing regularity (the latest was published in 2006, after a five year hiatus, and may have been the last).Processed World's circulation may never have topped 5,000 (Gee 1993, p. 245), although that figure was respectable for a publication positioned outside the mainstream culture and media of its time. A continuing if subterranean influence within leftlibertarian circles in North America and beyond, the journal has since been remembered as part of \"a little- recognized punk culture golden age for alternative publishing\" (Solnit and Schwartzenberg 2000, p. 35), and as a \"legendary magazine [that] covered the growing pains of white- collar office work in the pre-Internet information economy throughout the 1980s\" (Ross 2003, p. 267). In terms of its contributions to popular visual culture, Processed World can also lay claim to ","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"127-156"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tom (not his real name; all names are changed) had a stroke. I learned a lot about this case and see various medical and legal realities that reflect possible ethical concerns. I present the case history below, and number the possible ethical issues involved.Tom's stroke occurred when he worked in the retail store of a large U.S. corporation and the person doing clean-up accidentally splashed toxic chemicals on him. Tom eventually had to be taken to the hospital where they failed to diagnose that he had a stroke (possible ethical issue #1). Later, they figured out that he had a stroke, but misdiagnosed the kind of stroke (possible ethical issue #2). Regarding 1 and 2, are these ethical issues when a hospital gets the diagnosis wrong? Should medical practitioners know better or should we conclude that anyone-including professionals-can make a mistake? Certainly, professionals cannot always be accurate. I almost laugh when people say things like, "How could the parole board let him out?" after someone goes on to commit more crimes. The answer is that one cannot be close to 100 percent accurate in predicting which prisoner will or will not commit future crimes. However, there are minimal standards that any professional-such as hospital personnel-should attain, and sometimes the failure to attain these minimal standards is an issue of ethics, e.g., when due to neglect of something that is known or should be known. But hospitals and other agencies protect themselves by claiming to be operating according to their code of ethics (Hauptman & Hill, 1991; Konner, 1988; Wallace, 2010; van Meijl, 2000).Ethical issue #3 occurred when Dr. Dollar referred Tom to the rehabilitation center where Dr. Dollar has a financial interest and apparently gets money for referrals. Is that unethical? If the answer is "no," what if Dr. Dollar refers people who do not need that service, but is motivated by the money he will make? Is that not clearly unethical? The rehab center had Tom doing exercises that caused horrible pain and yet another stroke. When Dr. Hasty heard about this, he was furious at Dr. Dollar and yelled at him, "Why did you have him doing exercise? He had a stroke. He should not be exercising."Ethical issue #4 occurred when the hospital finally figured out what kind of stroke Tom had and rediagnosed him AND changed the earlier diagnoses to make it seem that they had it right all along. It seems to me to be clearly unethical and probably criminal. It makes me wonder, How often does this occur in hospitals and in medical practice and in other contexts?Ethical issue #5 was the inadequate treatment Tom received in the hospital, even after the correct diagnosis. In fact, they informed his wife that he would probably not live for more than a few days. Fortunately, his friend Jack visited Tom in the hospital. Jack was in medical school (though older than most of his fellow medical students) and knew about strokes. He looked at Tom's charts and other information abo
汤姆(这不是他的真名;所有的名字都改了)中风了。我从这个案子中学到了很多,也看到了各种各样的医学和法律现实,反映了可能存在的伦理问题。我在下面介绍了这个案例的历史,并对可能涉及的伦理问题进行了编号。汤姆的中风发生在他在一家美国大公司的零售商店工作的时候,一个打扫卫生的人不小心把有毒化学物质溅到了他身上。汤姆最终不得不被送往医院,但他们未能诊断出他中风了(可能的道德问题#1)。后来,他们发现他得了中风,但误诊了中风的类型(可能的道德问题#2)。关于第1条和第2条,当医院做出错误的诊断时,这些是伦理问题吗?医生是应该更清楚,还是我们应该得出结论,任何人——包括专业人士——都可能犯错误?当然,专业人士不可能总是准确无误。当有人继续犯下更多罪行时,人们说:“假释委员会怎么能让他出狱?”我几乎要笑了。答案是,我们不可能百分之百准确地预测哪个囚犯将来会或不会犯罪。然而,任何专业人员(如医院人员)都应该达到一些最低标准,有时未能达到这些最低标准是一个道德问题,例如,由于忽视了已知或应该知道的事情。但医院和其他机构通过声称按照其道德准则运作来保护自己(Hauptman & Hill, 1991;康纳现在是,1988;华莱士,2010;van Meijl, 2000)。第三个道德问题发生在杜勒医生将汤姆转介到康复中心时,杜勒医生在康复中心有经济利益,显然可以从转诊中获得金钱。这样不道德吗?如果答案是否定的,那么如果杜勒博士指的是那些不需要这项服务,但被他将赚到的钱所激励的人呢?这不是很不道德吗?康复中心让汤姆做运动,结果引起了可怕的疼痛和又一次中风。当哈斯蒂医生听说这件事后,他对杜勒医生非常生气,并对他大喊:“你为什么要让他做运动?他中风了。他不应该在锻炼。伦理问题4发生在医院最终弄清楚汤姆患的是哪种中风,并对他进行了重新诊断,并改变了早期的诊断,使他们看起来一直都是正确的。在我看来,这显然是不道德的,甚至可能是犯罪。这让我想知道,这种情况在医院、医疗实践和其他环境中发生的频率有多高?伦理问题5是汤姆在医院接受的治疗不充分,即使是在正确的诊断之后。事实上,他们告诉他的妻子,他可能活不过几天了。幸运的是,他的朋友杰克去医院看望了汤姆。杰克在医学院读书(虽然比他的大多数医学院同学年纪都大),了解中风。他看了看汤姆的病历和其他有关他的治疗的信息,断定他受到了虐待。他联系了海斯蒂医生,海斯蒂医生说他很乐意接手汤姆的治疗,但首先汤姆的妻子必须解雇他现在的医生。她照做了,海斯蒂医生接手了,改变了汤姆接受的治疗方式,汤姆活了下来。中风的后果中风给汤姆的生活带来了可怕的后果。他必须重新学习走路、说话、吞咽食物等等。虽然他还有点视力,但在法律上他是盲人。中风会影响大脑,对任何人都是有害的,尽管汤姆似乎不幸地接受了糟糕的医疗,而泰勒(2009)也不幸地中风了,但自从她在哈佛医学院工作以来,她接受了一流的治疗。汤姆和一位律师谈过,这位律师对汤姆曾经工作过的公司提起了诉讼。他在寻求数百万美元。后来,其他律师听说了这起诉讼,并询问他们是否可以参与其中。…
{"title":"Having a Stroke: Ethical Issues in Medicine and Law","authors":"R. Eisenman","doi":"10.3172/JIE.20.2.5","DOIUrl":"https://doi.org/10.3172/JIE.20.2.5","url":null,"abstract":"Tom (not his real name; all names are changed) had a stroke. I learned a lot about this case and see various medical and legal realities that reflect possible ethical concerns. I present the case history below, and number the possible ethical issues involved.Tom's stroke occurred when he worked in the retail store of a large U.S. corporation and the person doing clean-up accidentally splashed toxic chemicals on him. Tom eventually had to be taken to the hospital where they failed to diagnose that he had a stroke (possible ethical issue #1). Later, they figured out that he had a stroke, but misdiagnosed the kind of stroke (possible ethical issue #2). Regarding 1 and 2, are these ethical issues when a hospital gets the diagnosis wrong? Should medical practitioners know better or should we conclude that anyone-including professionals-can make a mistake? Certainly, professionals cannot always be accurate. I almost laugh when people say things like, \"How could the parole board let him out?\" after someone goes on to commit more crimes. The answer is that one cannot be close to 100 percent accurate in predicting which prisoner will or will not commit future crimes. However, there are minimal standards that any professional-such as hospital personnel-should attain, and sometimes the failure to attain these minimal standards is an issue of ethics, e.g., when due to neglect of something that is known or should be known. But hospitals and other agencies protect themselves by claiming to be operating according to their code of ethics (Hauptman & Hill, 1991; Konner, 1988; Wallace, 2010; van Meijl, 2000).Ethical issue #3 occurred when Dr. Dollar referred Tom to the rehabilitation center where Dr. Dollar has a financial interest and apparently gets money for referrals. Is that unethical? If the answer is \"no,\" what if Dr. Dollar refers people who do not need that service, but is motivated by the money he will make? Is that not clearly unethical? The rehab center had Tom doing exercises that caused horrible pain and yet another stroke. When Dr. Hasty heard about this, he was furious at Dr. Dollar and yelled at him, \"Why did you have him doing exercise? He had a stroke. He should not be exercising.\"Ethical issue #4 occurred when the hospital finally figured out what kind of stroke Tom had and rediagnosed him AND changed the earlier diagnoses to make it seem that they had it right all along. It seems to me to be clearly unethical and probably criminal. It makes me wonder, How often does this occur in hospitals and in medical practice and in other contexts?Ethical issue #5 was the inadequate treatment Tom received in the hospital, even after the correct diagnosis. In fact, they informed his wife that he would probably not live for more than a few days. Fortunately, his friend Jack visited Tom in the hospital. Jack was in medical school (though older than most of his fellow medical students) and knew about strokes. He looked at Tom's charts and other information abo","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"5-8"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69756136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reviews. There are two genera of unfair reviews: those that critique a book or article for not having the aims the reviewer might wish it had and argue against the work under review for its other and different aims, and those that represent the author of the book or article under review as holding views or making arguments (or citing evidence in favor of either) that are neither in nor genuinely supported by the text. (Notice that the latter genus of unfair review can certainly redound to the reviewed author's considerable advantage, but to the ultimate detriment of the review's readers who must rely on the reviewer because they have not [yet] read the work under review. [See Fulda, 2006.])Extensive quotation-providing the reader with both text and substantial context-very nearly precludes both genera of unfair review. All that is necessary is disclosure of the aims and scope of the work under review by extensive quotation from the preface and for each substantial criticism - whether favorable or unfavorable-of a view or argument (or evidence cited for either), once again, extensive quotation of that view or argument with enough text so as to preserve context. Following that, the reader has what he really needs to judge for himself whether the reviewer is or is not on the mark as the reader sees it. The same is true of criticism, again whether favorable or unfavorable, of the writing: Show the reader; do not merely tell him. Of course, the reviewer is adjured not to give away the store, either! And the reviewer who does otherwise in this last regard is violating the author's moral rights and potentially his legal rights, by exceeding fair use and potentially "fair use."Yes, this method can and often will weigh down reviews-especially if the work under review is not well-written-not to mention that it will almost always make the reviews significantly longer. But it does provide a check on reviewers' tendencies to substitute their own aims for the reviewed author's and their own view of what the author says and means for what he actually says and means.1Citations. The situation with cited authors is quite different and much more complicated. Authors can fairly be quoted-and I have often done just that in selecting an epigraph-out of context, provided either the quoted author's aims are not represented-explicitly or implicitly, and that last is crucial-as being in accord with the quoting author, or the quoting author disclaims the same or similar aims, or both. But, then, quotation is the simplest and least ethically complicated type of citation, and not the usual type.Much more often, a cited author is not quoted, but is simply cited in support of or as contrary to a particular view or argument. In my experience, this is where the ethical problems usually lie. For oftentimes, a check indicates that the cited author does not actually hold the view as claimed or cannot easily be used to support or controvert the argument at issue. This has happened t
{"title":"The Ethical Importance of Extensive Quotation of Reviewed and Cited Authors","authors":"J. S. Fulda","doi":"10.3172/JIE.20.1.5","DOIUrl":"https://doi.org/10.3172/JIE.20.1.5","url":null,"abstract":"Reviews. There are two genera of unfair reviews: those that critique a book or article for not having the aims the reviewer might wish it had and argue against the work under review for its other and different aims, and those that represent the author of the book or article under review as holding views or making arguments (or citing evidence in favor of either) that are neither in nor genuinely supported by the text. (Notice that the latter genus of unfair review can certainly redound to the reviewed author's considerable advantage, but to the ultimate detriment of the review's readers who must rely on the reviewer because they have not [yet] read the work under review. [See Fulda, 2006.])Extensive quotation-providing the reader with both text and substantial context-very nearly precludes both genera of unfair review. All that is necessary is disclosure of the aims and scope of the work under review by extensive quotation from the preface and for each substantial criticism - whether favorable or unfavorable-of a view or argument (or evidence cited for either), once again, extensive quotation of that view or argument with enough text so as to preserve context. Following that, the reader has what he really needs to judge for himself whether the reviewer is or is not on the mark as the reader sees it. The same is true of criticism, again whether favorable or unfavorable, of the writing: Show the reader; do not merely tell him. Of course, the reviewer is adjured not to give away the store, either! And the reviewer who does otherwise in this last regard is violating the author's moral rights and potentially his legal rights, by exceeding fair use and potentially \"fair use.\"Yes, this method can and often will weigh down reviews-especially if the work under review is not well-written-not to mention that it will almost always make the reviews significantly longer. But it does provide a check on reviewers' tendencies to substitute their own aims for the reviewed author's and their own view of what the author says and means for what he actually says and means.1Citations. The situation with cited authors is quite different and much more complicated. Authors can fairly be quoted-and I have often done just that in selecting an epigraph-out of context, provided either the quoted author's aims are not represented-explicitly or implicitly, and that last is crucial-as being in accord with the quoting author, or the quoting author disclaims the same or similar aims, or both. But, then, quotation is the simplest and least ethically complicated type of citation, and not the usual type.Much more often, a cited author is not quoted, but is simply cited in support of or as contrary to a particular view or argument. In my experience, this is where the ethical problems usually lie. For oftentimes, a check indicates that the cited author does not actually hold the view as claimed or cannot easily be used to support or controvert the argument at issue. This has happened t","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"5-8"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Our Daily Meds: How the Pharmaceutical Companies Transformed Themselves into Slick Marketing Machines and Hooked the Nation on Prescription Drugs","authors":"R. Hauptman","doi":"10.5860/choice.45-6210","DOIUrl":"https://doi.org/10.5860/choice.45-6210","url":null,"abstract":"","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"130"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71121455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In information professions, the ability and willingness of those in service to act with integrity and for the cause of the greater good is a point of pride to those serving and an area fundamental to the peace of mind of those seeking assistance. Librarians, in particular, work diligently to serve their communities and advocate the ideals that are crucial to the stability of a democratic society and an informed citizenry: freedom of speech, free flow of and access to information, awareness and protection of intellectual property rights, and equitable treatment of those seeking information. However, while these values are generally upheld by the Library and Information Science (LIS) field, there has always been some contention surrounding the idea of librarianship as a profession in the areas of job function and educational requirements (Edwards, 1975; Salonen, 2003; Smith, 2006; Gordon, 2008; Lonergan, 2009), professional image and status (Lancour and Rossi, 1961; Shaffer, 1968; Wilson, 1979; McDermott, 1984; Arant and Benefiel, 2003; Luthmann, 2007), and relevancy, enforceability and usefulness of the American Library Association (ALA) Code of Ethics (COE), (Goode, 1961; Murray, 1990; Finks, 1991; Hauptman, 2002; Sturgeon, 2007; ALA, 2009). Books about the evolution of librarianship as a profession (Ennis & Winger, 1961; Shaffer, 1968; Budd, 2008) and library ethics (Hauptman 1988; Hauptman 2002; Preer 2008) have been written; and conversations about all of these concerns have found their way into new venues of communication, like web logs (Houghton-Jan, 2008; R. Deschamps, 2010; Deschamps, 2010). Sometimes, ruminations about the COE have been combined with discussions about academic library values (Peterson, 1983; Dole & Hurych, 2001), always with heavy acknowledgement towards parity between meaningful ethical principles and LIS' legitimate claim to professional status.A quick review of the characteristics of a profession (body of theory, professional authority, community sanction, a binding code of ethics, and a professional culture) shows that librarianship still has quite a bit of ground to cover; however, some literature implies that it is librarians-not society-that keep them from enjoying the full benefits of professional status-namely, that the public easily recognizes librarianship as a profession (Schuman, 1990; Adams, 2000). Articles concerned with how librarians are perceived externally (and internally by other librarians) are numerous. Even the ALA's official publication, American Libraries, has a regular column titled "How the World Sees Us." However, upon closer inspection, we find that the negative archetypal image of the librarian may be decreasing (Kroll, 2004; Luthmann, 2007). Where there was once an old Caucasian spinster with a petty penchant for quiet and patron condescension, there is now the helpful guide on the side and bold adventurer. This change in public perception is crucial as we delve into issues of ethical behavi
{"title":"Impact of the Code of Ethics on Workplace Behavior in Academic Libraries","authors":"K. Kendrick, E. Leaver","doi":"10.3172/JIE.20.1.86","DOIUrl":"https://doi.org/10.3172/JIE.20.1.86","url":null,"abstract":"In information professions, the ability and willingness of those in service to act with integrity and for the cause of the greater good is a point of pride to those serving and an area fundamental to the peace of mind of those seeking assistance. Librarians, in particular, work diligently to serve their communities and advocate the ideals that are crucial to the stability of a democratic society and an informed citizenry: freedom of speech, free flow of and access to information, awareness and protection of intellectual property rights, and equitable treatment of those seeking information. However, while these values are generally upheld by the Library and Information Science (LIS) field, there has always been some contention surrounding the idea of librarianship as a profession in the areas of job function and educational requirements (Edwards, 1975; Salonen, 2003; Smith, 2006; Gordon, 2008; Lonergan, 2009), professional image and status (Lancour and Rossi, 1961; Shaffer, 1968; Wilson, 1979; McDermott, 1984; Arant and Benefiel, 2003; Luthmann, 2007), and relevancy, enforceability and usefulness of the American Library Association (ALA) Code of Ethics (COE), (Goode, 1961; Murray, 1990; Finks, 1991; Hauptman, 2002; Sturgeon, 2007; ALA, 2009). Books about the evolution of librarianship as a profession (Ennis & Winger, 1961; Shaffer, 1968; Budd, 2008) and library ethics (Hauptman 1988; Hauptman 2002; Preer 2008) have been written; and conversations about all of these concerns have found their way into new venues of communication, like web logs (Houghton-Jan, 2008; R. Deschamps, 2010; Deschamps, 2010). Sometimes, ruminations about the COE have been combined with discussions about academic library values (Peterson, 1983; Dole & Hurych, 2001), always with heavy acknowledgement towards parity between meaningful ethical principles and LIS' legitimate claim to professional status.A quick review of the characteristics of a profession (body of theory, professional authority, community sanction, a binding code of ethics, and a professional culture) shows that librarianship still has quite a bit of ground to cover; however, some literature implies that it is librarians-not society-that keep them from enjoying the full benefits of professional status-namely, that the public easily recognizes librarianship as a profession (Schuman, 1990; Adams, 2000). Articles concerned with how librarians are perceived externally (and internally by other librarians) are numerous. Even the ALA's official publication, American Libraries, has a regular column titled \"How the World Sees Us.\" However, upon closer inspection, we find that the negative archetypal image of the librarian may be decreasing (Kroll, 2004; Luthmann, 2007). Where there was once an old Caucasian spinster with a petty penchant for quiet and patron condescension, there is now the helpful guide on the side and bold adventurer. This change in public perception is crucial as we delve into issues of ethical behavi","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"86-112"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Banned in Boston: The Watch and Ward Society's Crusade against Books, Burlesque, and the Social Evil","authors":"Judy Anderson","doi":"10.5860/choice.48-3465","DOIUrl":"https://doi.org/10.5860/choice.48-3465","url":null,"abstract":"","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"138"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71132169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We have been confronted in the last hundred years with a rapidly changing technological environment. This environment has brought with it great wealth and prosperity, and there is no doubt that emerging concepts and applications of intellectual property (IP) have aided our scientific, technological, and economic expansion. Copyrights and patents offer monopolistic rights to authors and inventors over their creations, ensuring profits for fixed terms, and providing fortune as well as fame for the most successful inventors and authors. Monopoly rights are strong incentives to create both utilitarian and aesthetic works.Recently, emerging technologies have challenged traditional IP theory and practice. Consider the rise of computerized phenomena, and the proliferation of software and instantaneous communications through the Internet. Software has been considered a kind of hybrid, treated both as a patentable invention and as copyrightable expressions. In my first book, The Ontology of Cyberspace, I consider how software has revealed that our distinctions between copyrightable and patentable objects are artificial and illogical. I argue that all intentionally produced, man-made objects are expressions, and that computerization has merely revealed how one expression is very much like another. More recently, I have considered the question of patenting un-modified genes. In the course of that discussion, I further criticize the application of existing IP to genomics and genetics, at least where patents have issued for unmodified genes or l ife-forms. In all of my work, I have sought to uncover the ontologies (descriptions of the objects and relations involved) of the underlying objects. I have done this believing that once we reveal the nature of things (like expressions, machines, software, and genes, as well as relations and social objects like property, ownership, and intentions) we could then sensibly sort out logical errors and inefficiencies in public policies.We are now on the cusp of a new engineering breakthrough that will once again challenge our relation to our technological world, and likely pose new challenges to the application of traditional IP. Nanotechnology involves the construction of materials and objects at the ?nano-scale,? beginning at the molecular level. Theoretically, this will mean cheap and abundant objects of any size and shape, more-or-less instantly created, with little-to-no waste, and constructed anywhere and at any time. The science-fiction notion of simply dialing up an object and having it constructed on the spot, molecule-by-molecule, may well be decades away or further, but it is the end-goal of many who pursue nanotechnology research. Even so, we will begin facing unique challenges about the nature of intellectual property as the dividing lines between ideas and expressions further blur, and matter itself becomes programmable.Intellectual property has become a major force economically and culturally, impelling in p
在过去的一百年里,我们面临着一个快速变化的技术环境。这种环境带来了巨大的财富和繁荣,毫无疑问,知识产权的新兴概念和应用有助于我们的科学、技术和经济发展。版权和专利为作者和发明家提供了对其创作的垄断权,确保了固定期限内的利润,并为最成功的发明家和作家提供了财富和名声。垄断权是创作功利性和审美性作品的强大动力。近年来,新兴技术对传统知识产权理论和实践提出了挑战。考虑到计算机化现象的兴起,以及通过互联网的软件和即时通信的扩散。软件一直被认为是一种混合体,既被视为可获得专利的发明,也被视为可获得版权的表达。在我的第一本书《网络空间本体论》(The Ontology of Cyberspace)中,我考虑了软件如何揭示了我们对可获得版权和可获得专利的对象的区分是人为的和不合逻辑的。我认为,所有有意制造的人造物体都是表达,计算机化只不过揭示了一种表达是如何与另一种表达非常相似。最近,我考虑了为未经修改的基因申请专利的问题。在讨论过程中,我进一步批评了将现有知识产权应用于基因组学和遗传学,至少在未修改基因或生命形式的专利中。在我所有的工作中,我都试图揭示底层对象的本体(对对象和所涉及的关系的描述)。我这样做是相信,一旦我们揭示了事物的本质(如表达、机器、软件和基因,以及关系和社会对象,如财产、所有权和意图),我们就可以明智地整理出公共政策中的逻辑错误和效率低下。我们现在正处于一个新的工程突破的尖端,这将再次挑战我们与技术世界的关系,并可能对传统知识产权的应用提出新的挑战。纳米技术涉及在纳米尺度上构建材料和物体。从分子水平开始。从理论上讲,这将意味着任何大小和形状的廉价和丰富的物体,或多或少是即时制造的,几乎没有浪费,可以随时随地建造。科幻小说中简单地把一个物体拨号,然后在现场一个分子一个分子地构建出来,这可能还需要几十年甚至更长时间,但这是许多从事纳米技术研究的人的最终目标。即便如此,随着思想和表达之间的分界线进一步模糊,物质本身变得可编程,我们将开始面临关于知识产权本质的独特挑战。知识产权已成为经济和文化上的一股重要力量,在一定程度上推动了我们上个世纪的双曲线经济和技术增长,并影响着世界各地的文化和经济。从历史上看,知识产权作为一类客体的出现相对较新。这类对象,包括可申请专利、可获得版权和可注册商标的东西,从一开始就发生了重大而迅速的变化。让我们简要地看一下知识产权法的演变、形式和目的,然后考虑新材料技术将如何以及在多大程度上挑战当前的知识产权概念。知识产权的出现人们常常错误地认为,知识产权保护思想的方式与普通物权法保护物品的方式大致相同。事实上,对思想本身从来没有任何法律认可的保护,而只是对各种形式的表达。大约从文艺复兴时期开始,在英国和意大利,对发明和原创作品的合法垄断出现了。…
{"title":"Things in Themselves: A Prolegomenon to Redefining Intellectual Property in the Nano-Age","authors":"D. Koepsell","doi":"10.3172/JIE.20.1.12","DOIUrl":"https://doi.org/10.3172/JIE.20.1.12","url":null,"abstract":"We have been confronted in the last hundred years with a rapidly changing technological environment. This environment has brought with it great wealth and prosperity, and there is no doubt that emerging concepts and applications of intellectual property (IP) have aided our scientific, technological, and economic expansion. Copyrights and patents offer monopolistic rights to authors and inventors over their creations, ensuring profits for fixed terms, and providing fortune as well as fame for the most successful inventors and authors. Monopoly rights are strong incentives to create both utilitarian and aesthetic works.Recently, emerging technologies have challenged traditional IP theory and practice. Consider the rise of computerized phenomena, and the proliferation of software and instantaneous communications through the Internet. Software has been considered a kind of hybrid, treated both as a patentable invention and as copyrightable expressions. In my first book, The Ontology of Cyberspace, I consider how software has revealed that our distinctions between copyrightable and patentable objects are artificial and illogical. I argue that all intentionally produced, man-made objects are expressions, and that computerization has merely revealed how one expression is very much like another. More recently, I have considered the question of patenting un-modified genes. In the course of that discussion, I further criticize the application of existing IP to genomics and genetics, at least where patents have issued for unmodified genes or l ife-forms. In all of my work, I have sought to uncover the ontologies (descriptions of the objects and relations involved) of the underlying objects. I have done this believing that once we reveal the nature of things (like expressions, machines, software, and genes, as well as relations and social objects like property, ownership, and intentions) we could then sensibly sort out logical errors and inefficiencies in public policies.We are now on the cusp of a new engineering breakthrough that will once again challenge our relation to our technological world, and likely pose new challenges to the application of traditional IP. Nanotechnology involves the construction of materials and objects at the ?nano-scale,? beginning at the molecular level. Theoretically, this will mean cheap and abundant objects of any size and shape, more-or-less instantly created, with little-to-no waste, and constructed anywhere and at any time. The science-fiction notion of simply dialing up an object and having it constructed on the spot, molecule-by-molecule, may well be decades away or further, but it is the end-goal of many who pursue nanotechnology research. Even so, we will begin facing unique challenges about the nature of intellectual property as the dividing lines between ideas and expressions further blur, and matter itself becomes programmable.Intellectual property has become a major force economically and culturally, impelling in p","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"12-27"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IntroductionTo say that Information and Communication Technology (ICT) has affected Saudis tremendously is an understatement. This is because ICT has in actual fact revolutionized every aspect of their lives including the way they communicate, the way they conduct business, the way they learn, and the way they work.There is strong evidence particularly from the local Saudi media that suggests that ICT has in fact subjected people in Saudi Arabia to circumstances they have never previously experienced and as a result challenged their understanding of how to behave ethically amidst competing demands from self, employer, clients, friends, and community. The invasion of privacy, for example, which employees suffer when their employers use video cameras to systemically monitor them without their consent or even knowledge, is considered by many employers in Saudi Arabia, even the most religious, as acceptable and not wrong and unethical.The massive rise in the adoption of ICT has seen the birth of many unethical behaviors including the use of Bluetooth on mobiles to spread obscenities or blackmail women, the use of Facebook to cyber-bully teenagers, the use of email to spam people, and the use of web-based forums to offend people or spread rumors. These of course are in addition to other typical unethical behaviors like the setting up of insecure networks, the delivery of software products that are behind schedule, over budget, and incompatible with customer requirements, the violation of intellectual property rights, and the use of bit torrent software to download copyrighted materials, among other things.The biggest ethical problem, however, that information and communication technologies have created is probably invading people's privacy through the use of these ICTs. The use of mobile cameras to photograph women or film them in ways that invades their privacy is a good example of these unethical behaviors. What has become a serious problem for Saudi women in recent times, as reported in the media, is when criminals threaten women to either submit to their sexual desires or face the consequences of having their photos or video clips posted on the internet or distributed publically using Bluetooth on mobiles causing serious damage to their family reputation. The recent case of an immigrant computer technician who discovered some personal photos of a female when he was fixing her computer and then blackmailed her is an example of these cases of extortion. It should be noted that the male honor and family reputation are to a large extent in the hands of the female members of the family. If it was discovered and became public that a woman committed adultery, for example, or engaged in an illicit sexual relationship with a man or just met secretly and privately with him in the real world, the family honor and reputation would be destroyed.Ethics is the cornerstone of the Islamic religion and there is no doubt that the Muslims' sacred book, Al-Quran, and
{"title":"Privacy from a Saudi Arabian Perspective: The Case of Students in a Private University","authors":"Yeslam Al‐Saggaf, J. Weckert","doi":"10.3172/JIE.20.1.34","DOIUrl":"https://doi.org/10.3172/JIE.20.1.34","url":null,"abstract":"IntroductionTo say that Information and Communication Technology (ICT) has affected Saudis tremendously is an understatement. This is because ICT has in actual fact revolutionized every aspect of their lives including the way they communicate, the way they conduct business, the way they learn, and the way they work.There is strong evidence particularly from the local Saudi media that suggests that ICT has in fact subjected people in Saudi Arabia to circumstances they have never previously experienced and as a result challenged their understanding of how to behave ethically amidst competing demands from self, employer, clients, friends, and community. The invasion of privacy, for example, which employees suffer when their employers use video cameras to systemically monitor them without their consent or even knowledge, is considered by many employers in Saudi Arabia, even the most religious, as acceptable and not wrong and unethical.The massive rise in the adoption of ICT has seen the birth of many unethical behaviors including the use of Bluetooth on mobiles to spread obscenities or blackmail women, the use of Facebook to cyber-bully teenagers, the use of email to spam people, and the use of web-based forums to offend people or spread rumors. These of course are in addition to other typical unethical behaviors like the setting up of insecure networks, the delivery of software products that are behind schedule, over budget, and incompatible with customer requirements, the violation of intellectual property rights, and the use of bit torrent software to download copyrighted materials, among other things.The biggest ethical problem, however, that information and communication technologies have created is probably invading people's privacy through the use of these ICTs. The use of mobile cameras to photograph women or film them in ways that invades their privacy is a good example of these unethical behaviors. What has become a serious problem for Saudi women in recent times, as reported in the media, is when criminals threaten women to either submit to their sexual desires or face the consequences of having their photos or video clips posted on the internet or distributed publically using Bluetooth on mobiles causing serious damage to their family reputation. The recent case of an immigrant computer technician who discovered some personal photos of a female when he was fixing her computer and then blackmailed her is an example of these cases of extortion. It should be noted that the male honor and family reputation are to a large extent in the hands of the female members of the family. If it was discovered and became public that a woman committed adultery, for example, or engaged in an illicit sexual relationship with a man or just met secretly and privately with him in the real world, the family honor and reputation would be destroyed.Ethics is the cornerstone of the Islamic religion and there is no doubt that the Muslims' sacred book, Al-Quran, and ","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"34-53"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IntroductionComputers and electronic communication facilitate a detached form of interaction among people, and are media through which people are able to send and receive information in an unpremeditated way, leading to changes in interpersonal relationships. Moreover, they represent a quick, low cost communication mechanism through which the copying and printing of intellectual property is easily done, making the violation of patent rights, residuary rights, copyright, and piracy rife, and the interception of messages and invasion of privacy commonplace. Such a communication channel provides considerable freedom and space for the innovative use and diffusion of information. The concept of information sharing runs counter to that of complete confidentiality and partial accessibility. For this reason, the principle of information ethics always contravenes the important value of freely accessible information. In view of this, the electronic age requires legal authentication to render unnecessary paper authorization and legitimization. Therefore, due to the unique difficulties and challenges of the IT developments outlined above, the principle and application of ethics must be adapted to accommodate the needs of information technology (IT) (Weiss, 1990; Martin, 2001; Davison et al., 2006).A well-designed code will help to educate several communities. If a code is sufficiently detailed, it will help to educate clients and society, and reduce the developer's tendency to take short-cuts. A detailed code can be used as a foundation for a malpractice suit against developers who intentionally fail to meet the standards specified in a code. A code also serves to educate its membership and potential membership about the standards of the profession (Gotterbarn, 1998). The Center for Business Ethics (1986) found that 83 to 93 percent of companies have an ethical code (Berenbeim, 1992), the manager of those companies believing that the code is instrumental in the prevention of unethical conduct among employees (Manley, 1991). As employees recognize the ethical code as a form of law and rule, it helps clarify the definition of the range of behavior unacceptable to the company, thus helping both to prevent computer abuse and to influence the moral judgment of employees (Bequai, 1983).The ethical code of NASW (National Association of Social Workers, 1996) includes a series expectant of the normative description of workers' attitude and behavior, most of which is context dependent. Due to the inhibitions of code, to resolve the conflict between situation factors and code, rule and standard should refer to the context. The hypothesis of the code is individuals of good character will behave responsibly in good faith. For this reason, social workers should consider cultural habits and adopt a flexible interpretation of the behavior of professionals (Goldstein, 1999).Although a number of scholars have studied information ethics (Schlegelmilch, 1989; Langlois and Schle
计算机和电子通信促进了人与人之间的一种超然的互动形式,并且是人们能够以一种未经深思熟虑的方式发送和接收信息的媒介,从而导致了人际关系的变化。此外,它们代表了一种快速、低成本的通信机制,通过这种机制,知识产权的复制和印刷很容易完成,使得侵犯专利权、剩余权、版权和盗版猖獗,截获信息和侵犯隐私司空见惯。这种通信渠道为信息的创新使用和传播提供了相当大的自由和空间。信息共享的概念与完全保密和部分可访问性的概念背道而驰。因此,信息伦理原则总是与信息自由获取的重要价值相矛盾。鉴于此,电子时代需要法律认证来提供不必要的纸质授权和合法化。因此,由于上述信息技术发展的独特困难和挑战,伦理原则和应用必须适应信息技术(IT)的需要(Weiss, 1990;马丁,2001;戴维森等人,2006)。设计良好的代码将有助于教育多个社区。如果代码足够详细,它将有助于教育客户和社会,并减少开发人员走捷径的倾向。详细的代码可以作为针对故意不符合代码中指定的标准的开发人员的渎职诉讼的基础。准则还用于教育其成员和潜在成员关于职业标准的知识(Gotterbarn, 1998)。商业道德中心(1986)发现,83%到93%的公司有道德准则(Berenbeim, 1992),这些公司的经理认为这些准则有助于防止员工的不道德行为(Manley, 1991)。由于员工认识到道德准则是一种法律和规则的形式,它有助于澄清公司不可接受的行为范围的定义,从而有助于防止滥用电脑和影响员工的道德判断(Bequai, 1983)。NASW(全国社会工作者协会,1996)的道德准则包括一系列对工作者态度和行为的规范描述,其中大部分是上下文相关的。由于规范的抑制作用,要解决情境因素与规范之间的冲突,规则和标准应参考语境。该准则的假设是,具有良好品格的个人将以诚信负责的态度行事。出于这个原因,社会工作者应该考虑文化习惯,并对专业人士的行为采取灵活的解释(Goldstein, 1999)。虽然一些学者已经研究过信息伦理(Schlegelmilch, 1989;Langlois and Schlegelmilch, 1990;Swinyard et al., 1990;Berenbeim, 1992;Whitman et al., 1998;Guillen et al., 2002;Wood et al., 2004;戴维森等人,2006;Mele et al., 2006;Hui et al., 2007),从文化角度使用纵向和定性方法的研究仍然很少(Chang, 2009)。根据Mason(1986)的观点,信息伦理(PAPA)有四个方面:隐私、可及性、属性和准确性。鉴于此,本文旨在解释台湾、香港和中国大陆chsystem(化名)中管理信息系统专业人员的不同反应过程,并从中国道德(Hwang, 1998)和Mason的PAPA(1986)的角度解释这些反应。它旨在为中国的道德视角提供新的视角,并为中国企业的道德规范创造新的方向。本文的结构如下:第一部分回顾了伦理规范重要性理论和中国道德观的相关文献。…
{"title":"The Significance of a Suitable Information Ethical Code: A Case Study of the Chinese Morality Perspective","authors":"C. Chang","doi":"10.3172/JIE.20.1.54","DOIUrl":"https://doi.org/10.3172/JIE.20.1.54","url":null,"abstract":"IntroductionComputers and electronic communication facilitate a detached form of interaction among people, and are media through which people are able to send and receive information in an unpremeditated way, leading to changes in interpersonal relationships. Moreover, they represent a quick, low cost communication mechanism through which the copying and printing of intellectual property is easily done, making the violation of patent rights, residuary rights, copyright, and piracy rife, and the interception of messages and invasion of privacy commonplace. Such a communication channel provides considerable freedom and space for the innovative use and diffusion of information. The concept of information sharing runs counter to that of complete confidentiality and partial accessibility. For this reason, the principle of information ethics always contravenes the important value of freely accessible information. In view of this, the electronic age requires legal authentication to render unnecessary paper authorization and legitimization. Therefore, due to the unique difficulties and challenges of the IT developments outlined above, the principle and application of ethics must be adapted to accommodate the needs of information technology (IT) (Weiss, 1990; Martin, 2001; Davison et al., 2006).A well-designed code will help to educate several communities. If a code is sufficiently detailed, it will help to educate clients and society, and reduce the developer's tendency to take short-cuts. A detailed code can be used as a foundation for a malpractice suit against developers who intentionally fail to meet the standards specified in a code. A code also serves to educate its membership and potential membership about the standards of the profession (Gotterbarn, 1998). The Center for Business Ethics (1986) found that 83 to 93 percent of companies have an ethical code (Berenbeim, 1992), the manager of those companies believing that the code is instrumental in the prevention of unethical conduct among employees (Manley, 1991). As employees recognize the ethical code as a form of law and rule, it helps clarify the definition of the range of behavior unacceptable to the company, thus helping both to prevent computer abuse and to influence the moral judgment of employees (Bequai, 1983).The ethical code of NASW (National Association of Social Workers, 1996) includes a series expectant of the normative description of workers' attitude and behavior, most of which is context dependent. Due to the inhibitions of code, to resolve the conflict between situation factors and code, rule and standard should refer to the context. The hypothesis of the code is individuals of good character will behave responsibly in good faith. For this reason, social workers should consider cultural habits and adopt a flexible interpretation of the behavior of professionals (Goldstein, 1999).Although a number of scholars have studied information ethics (Schlegelmilch, 1989; Langlois and Schle","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"20 1","pages":"54-85"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Freedom for the Thought That We Hate: A Biography of the First Amendment Anthony Lewis (New York: Basic Books, 2007). Hardcover edition. 221 pages. $25.00. ISBN-13: 978-0-465-03917-3; ISBN-10: 0-465-03917-0.From the Palmer Raids to the Patriot Act: A History of the Fight for Free Speech in America Christopher M. Finan (Boston: Beacon Press, 2007). Hardcover edition. 348 pages. $25.95. ISBN-13: 978-0-8070-4428-5; ISBN-10: 0-8070-4428-8.Darwin Day in America: How Our Politics and Culture Have Been Dehumanized in the Name of Science John G. West (Wilmington, DE: ISI Books, 2007). Hardcover edition. 495 pages. $28.00. ISBN-13: 978-1-933859-32-3; ISBN-10: 1-933859-32-6.At the beginning of the 21 st century, individuals in the United States typically take for granted the free-speech clause in the First Amendment of the Constitution. With few exceptions, such as in cases of blackmail or when speech, to quote Justice Oliver Wendell Holmes, Jr. in his 1919 dissent in Abrams v. United States, "produces and is intended to produce a clear and imminent danger that ... will bring about forthwith certain substantive evils," anything and everything-no matter how unseemly, inappropriate, loathsome, or vile it may appear to others-can be expressed without fear of government sanctions both at the federal and state levels. Or, as Justice William J. Brennan, Jr., put it in 1989 in Texas v. Johnson, "the government may not prohibit the expression of an idea simply because society finds the idea itself offensive or disagreeable," an opinion consistent with his view in 1957 in Roth v. United States that ideas with "even the slightest redeeming social importance-unorthodox ideas, controversial ideas, even ideas hateful to the prevailing climate of opinion" deserve First Amendment protection (qtd. in Lewis, pp. 28, 134, 165).But as Adam Liptak reminds us in "Unlike Others, U.S. Defends Freedom to Offend in Speech (The New York Times, June 12, 2008), the United States follows a "distinctive legal path" in its approach to what Holmes called "the thought that we hate." Numerous other countries, including Canada, England, France, Germany, the Netherlands, South Africa, Australia, and India, "have laws or signed international conventions banning hate speech," so much so that "[i]t is a crime to deny the Holocaust in Canada, Germany and France." Hate speech, of course, is not limited to Holocaust denial. In France, Liptak writes, "Brigitte Bardot, an animal rights activist, was fine $23,000 ... for provoking racial hatred by criticizing a Muslim ceremony involving the slaughter of sheep." In Canada, the weekly newsmagazine Maclean's was forced to defend itself before human rights tribunals in Ontario and British Columbia in 2007-2008 for publishing an article by Mark Steyn called "The Future Belongs to Islam," an excerpt from his book America Alone (Regnery, 2006), which argued that "the rise of Islam threatened Western values." In Canada, these laws "seem to stem from a desire
{"title":"Testing the Parameters of Free Speech in the First Amendment: A Review Essay","authors":"J. Dilevko","doi":"10.3172/jie.19.2.114","DOIUrl":"https://doi.org/10.3172/jie.19.2.114","url":null,"abstract":"Freedom for the Thought That We Hate: A Biography of the First Amendment Anthony Lewis (New York: Basic Books, 2007). Hardcover edition. 221 pages. $25.00. ISBN-13: 978-0-465-03917-3; ISBN-10: 0-465-03917-0.From the Palmer Raids to the Patriot Act: A History of the Fight for Free Speech in America Christopher M. Finan (Boston: Beacon Press, 2007). Hardcover edition. 348 pages. $25.95. ISBN-13: 978-0-8070-4428-5; ISBN-10: 0-8070-4428-8.Darwin Day in America: How Our Politics and Culture Have Been Dehumanized in the Name of Science John G. West (Wilmington, DE: ISI Books, 2007). Hardcover edition. 495 pages. $28.00. ISBN-13: 978-1-933859-32-3; ISBN-10: 1-933859-32-6.At the beginning of the 21 st century, individuals in the United States typically take for granted the free-speech clause in the First Amendment of the Constitution. With few exceptions, such as in cases of blackmail or when speech, to quote Justice Oliver Wendell Holmes, Jr. in his 1919 dissent in Abrams v. United States, \"produces and is intended to produce a clear and imminent danger that ... will bring about forthwith certain substantive evils,\" anything and everything-no matter how unseemly, inappropriate, loathsome, or vile it may appear to others-can be expressed without fear of government sanctions both at the federal and state levels. Or, as Justice William J. Brennan, Jr., put it in 1989 in Texas v. Johnson, \"the government may not prohibit the expression of an idea simply because society finds the idea itself offensive or disagreeable,\" an opinion consistent with his view in 1957 in Roth v. United States that ideas with \"even the slightest redeeming social importance-unorthodox ideas, controversial ideas, even ideas hateful to the prevailing climate of opinion\" deserve First Amendment protection (qtd. in Lewis, pp. 28, 134, 165).But as Adam Liptak reminds us in \"Unlike Others, U.S. Defends Freedom to Offend in Speech (The New York Times, June 12, 2008), the United States follows a \"distinctive legal path\" in its approach to what Holmes called \"the thought that we hate.\" Numerous other countries, including Canada, England, France, Germany, the Netherlands, South Africa, Australia, and India, \"have laws or signed international conventions banning hate speech,\" so much so that \"[i]t is a crime to deny the Holocaust in Canada, Germany and France.\" Hate speech, of course, is not limited to Holocaust denial. In France, Liptak writes, \"Brigitte Bardot, an animal rights activist, was fine $23,000 ... for provoking racial hatred by criticizing a Muslim ceremony involving the slaughter of sheep.\" In Canada, the weekly newsmagazine Maclean's was forced to defend itself before human rights tribunals in Ontario and British Columbia in 2007-2008 for publishing an article by Mark Steyn called \"The Future Belongs to Islam,\" an excerpt from his book America Alone (Regnery, 2006), which argued that \"the rise of Islam threatened Western values.\" In Canada, these laws \"seem to stem from a desire","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"14 1","pages":"114"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69754855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}