No abstract available.
Cited By
- Xenaros A, Karampelas P and Lekea I Profiling individuals based on email analysis and ego networks Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1262-1269)
- Morton A and Sasse M Privacy is a process, not a PET Proceedings of the 2012 New Security Paradigms Workshop, (87-104)
- Richardson S, Courtney J and Haynes J (2006). Theoretical principles for knowledge management system design, Decision Support Systems, 42:3, (1321-1337), Online publication date: 1-Dec-2006.
- Fleischmann K and Wallace W (2005). A covenant with transparency, Communications of the ACM, 48:5, (93-97), Online publication date: 1-May-2005.
- Carsten Stahl B (2019). Information, Ethics, and Computers, Minds and Machines, 14:1, (67-83), Online publication date: 1-Feb-2004.
- Kim K A study of the conduct of Korean IT participants in ethical decision making Proceedings of the 2nd international conference on Human.society@internet, (64-74)
- Stahl B The moral and business value of information technology Creating business value with information technology, (187-202)
- Smith H (2002). Ethics and information systems, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 33:3, (8-22), Online publication date: 29-Aug-2002.
- Freeman L (2019). Information Systems Knowledge, Information Systems Frontiers, 3:2, (249-266), Online publication date: 1-Jun-2001.
- Linderman J and Schiano W (2000). Information ethics in a responsibility vacuum, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 32:1, (70-74), Online publication date: 31-Dec-2001.
- Sage A and Rouse W (1999). Information Systems Frontiers in Knowledge Management, Information Systems Frontiers, 1:3, (205-219), Online publication date: 1-Oct-1999.
- Smith H and Hasnas J (2018). Ethics and information systems, MIS Quarterly, 23:1, (109-127), Online publication date: 1-Mar-1999.
- Cappel J and Windsor J (1998). A comparative investigation of ethical decision making, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 29:2, (20-32), Online publication date: 1-Apr-1998.
- Shaw T Exploring the role of identification in the privacy decisions of webmasters Proceedings of the international conference on Information systems, (358-364)
- Pierce M and Henry J (2019). Computer ethics and social issues case analysis, ACM SIGCSE Bulletin, 28:4, (50-54), Online publication date: 1-Dec-1996.
- Mason R (1995). Applying ethics to information technology issues, Communications of the ACM, 38:12, (55-57), Online publication date: 1-Dec-1995.
Recommendations
Kant and information ethics
We begin with our reasons for seeking to bring Kant to bear on contemporary information and computing ethics (ICE). We highlight what each contributor to this special issue draws from Kant and then applies to contemporary matters in ICE. We conclude ...
Towards an ontological foundation of information ethics
The paper presents, firstly, a brief review of the long history of information ethics beginning with the Greek concept of parrhesia or freedom of speech as analyzed by Michel Foucault. The recent concept of information ethics is related particularly ...
Discourses on information ethics: The claim to universality
An important question one can ask of ethical theories is whether and how they aim to raise claims to universality. This refers to the subject area that they intend to describe or govern and also to the question whether they claim to be binding for all (...