|
1-10 of 39 reviews |
Date Reviewed | |
|
Patiency is not a virtue: the design of intelligent systems and systems of ethics Bryson J. Ethics and Information Technology 20(1): 15-26, 2018. Type: Article
Do moral issues exist in dealing with artificial intelligence (AI) systems such as robots? The word “patiency” in the title refers to whether an AI system can be treated in a way that is morally “wrong.&am...
|
Oct 10 2019 |
|
|
Exploring the ethical, organisational and technological challenges of crime mapping: a critical approach to urban safety technologies Galdon Clavell G. Ethics and Information Technology 20(4): 265-277, 2018. Type: Article
Technological approaches to policing, which began with the use of databases, are becoming more popular. Two driving forces are the ability to integrate many data sources and the allure of using high technology. It appears as though &am...
|
Jan 24 2019 |
|
|
Should we welcome robot teachers? Sharkey A. Ethics and Information Technology 18(4): 283-297, 2016. Type: Article
The ethical concerns with robot teachers in primary schools are: privacy, attachment, deception, inappropriate dealings with humans, control, and accountability. Four roles for robot teachers are: classroom teacher, companion and peer,...
|
Mar 1 2017 |
|
|
AI assisted ethics Etzioni A., Etzioni O. Ethics and Information Technology 18(2): 149-156, 2016. Type: Article
Artificial intelligence (AI) implies that robots, machines, and instruments will make autonomous decisions, if only because they will make decisions much quicker than a human can intervene. Consider driverless cars. At least some contr...
|
Aug 31 2016 |
|
|
On the adoption of personal health records: some problematic issues for patient empowerment Vezyridis P., Timmons S. Ethics and Information Technology 17(2): 113-124, 2015. Type: Article
Some of the controversies involving the use of electronic personal health records (PHR) are discussed in this paper. Expected benefits from the use of PHR include cost containment by suppliers and empowerment of consumers (patients). A...
|
Oct 13 2015 |
|
|
From open-source software to Wikipedia: ‘backgrounding’ trust by collective monitoring and reputation tracking de Laat P. Ethics and Information Technology 16(2): 157-169, 2014. Type: Article
This paper by de Laat is a soft science view of trust mechanisms on open-source and crowd-sourced media. Particular attention is paid to Wikipedia’s curation mechanisms. The author suggests that there are three broad mechanis...
|
Mar 3 2015 |
|
|
Negotiating autonomy and responsibility in military robots Noorman M., Johnson D. Ethics and Information Technology 16(1): 51-62, 2014. Type: Article
A military robot’s autonomy and responsibility are of concern due to the substantial innovation introduced in real operations of devices that show some autonomy. Here, the authors argue that many of the positions so far taken...
|
Sep 30 2014 |
|
|
African youths and the dangers of social networking: a culture-centered approach to using social media Ephraim P. Ethics and Information Technology 15(4): 275-284, 2013. Type: Article
Social media usage is growing rapidly in Africa and the growth is led by young people. Chatting appears to be the main use among adolescents, and Facebook is hugely popular. Cyber bullying and cybercrime are also increasing....
|
Apr 7 2014 |
|
|
Capabilities in, capabilities out: overcoming digital divides by promoting corporate citizenship and fair ICT Busch T. Ethics and Information Technology 13(4): 339-353, 2011. Type: Article
The digital divide refers to the disparity of the access to knowledge from information and communications technologies (ICT), and can affect individuals, groups, or geographic regions. It can lead to negative consequences for those on ...
|
Feb 29 2012 |
|
|
How can contributors to open-source communities be trusted? On the assumption, inference, and substitution of trust de Laat P. Ethics and Information Technology 12(4): 327-341, 2010. Type: Article
The developers of open-source projects such as Mozilla or Wikipedia base their operation on trusting the contributors. The author concludes that “unquestioning trust in users has proved to be an unworkable assumption.R...
|
Mar 31 2011 |
|
|
|
|
|
|
|
|