Information Ethics

Total Page:16

File Type:pdf, Size:1020Kb

Information Ethics COMPUTER SOCIETY O INDIA Information Ethics Rafael Capurro* an emancipatory theory develops criticisms of moral I. oundations attitudes and traditions in the information field at Introduction an individual and collective level. It includes I.1 Information Ethics as Applied Ethics normative aspects. I.2 Information Ethics as a Descriptive and Information ethics explores and evaluates: Emancipatory Theory the development of moral values in the information I.3 Ethics for Information Specialists field, the creation of new power structures in the Introduction information field, We draw a distinction among: information myths, Morals: customs and traditions hidden contradictions and intentionalities in Ethics: critical reflection on morals information theories and practices, Law: norms formally approved by state power or the development of ethical conflicts in the international political bodies. information field. I.1 Information Ethics as Applied Ethics I.3 Ethics for Information Specialists Information ethics deals with ethical questions Educational goals: particularly: to be able to recognize and articulate ethical in the Internet (cyberethics; information ethics conflicts in the information field, in a narrower sense) to activate the sense of responsibility with regard in computer science (computer ethics) to the consequences of individual and collective in the biological and medical sciences interactions in the information field, (bioinformation ethics) to improve the qualification for intercultural in the mass media (media ethics) dialogue on the basis of the recognition of in the library and information science field different kinds of information cultures and (library ethics) values, in the business field (business information to provide basic knowledge about ethical ethics) theories and concepts and about their relevance in everyday information work. I.2 Information Ethics as a Descriptive and Emancipatory Theory II. Historical Aspects Information ethics as: Introduction a descriptive theory explores the power structures II.1 The Western Tradition influencing informational attitudes and traditions in different cultures and epochs. II.2 Other Traditions *Guest Editor CSI Communications 7 JUNE 2005 COMPUTER SOCIETY O INDIA Introduction Communication as well as the contributions to the The study of information ethics within different cultural International ICIE Symposium in the International traditions,i.e., what can be called intercultural Review of Information Ethics (IRIE 2004/2). information ethics, is an open task. The following text See also the contributions to the World Summit on gives some hints about the Western tradition. the Information Society (WSIS) II.1 The Western Tradition III Systematic Aspects In the Western tradition information ethics has its Introduction roots in the oral culture of ancient Greece. Agora (marketplace and meeting place) and freedom of III.1 Human Rights and Responsibility speech (Greek: parrhesia) were essential to Athenian III.2 Ethical Issues of Information Production democracy. The cynics cultivated freedom of speech as a special form of expression. Socrates (469-399 III.3 Ethical Issues of Information Collection and B.C.) practised his thinking in public places and Classification never published his arguments. Plato (427-347 B.C.) III.4 Ethical Issues of Information Access and discusses in his dialogues the transition from an Dissemination oral to a written culture. Under the influence of III.5 Prospects Christianity a book culture was developed which was mainly centered on one book, namely the Bible. Introduction The invention of printing by Gutenberg in 1455 The following ideas were originally inspired by the and the Reformation, which profited from it, brought research done by Thomas J. Eroehlich: Survey and back, in the Modern period, the idea of freedom of Analysis of the Major Ethical and Legal Issues Eacing communication, which implied the freedom of Library and Information Services. IELA Publication 78, communicating ideas to others not just in a written München 1997, a survey prepared under contract no. but in a printed form. 401.723.4 for the General Information Programme (PGI) of UNESCO. The Erench Revolution brought about the transformation of the private libraries owned by See also the contributions to the World Summit on the nobility as well as by the church into common Information Society (WSIS) property. Projects like the one of the Erench Encyclopédie and the public access to libraries III.1 Human Rights and Responsibility created a new awareness of freedom of information A basis for ethical thinking on the responsibility of which culminated in the principle of freedom of information specialists are the following articles of the press as one of the foundations of modern the Universal Declaration of Human Rights (UDHR): democracies. Respect for the dignity of human beings (Art. 1) The Western tradition of information ethics from Confidentiality (Art. 1, 2, 3, 6) ancient Greece until the beginning of the 20th century is characterized by two ideas: Equality of opportunity (Art. 2, 7) freedom of speech, Privacy (Art. 3, 12) freedom of printed works and particularly Right to freedom of opinion and expression (Art. freedom of the press. A third element arises 19) now, in the age of a networked world of Right to participate in the cultural life of the electronic information, namely community (Art. 27) freedom of access / right to communicate. Right to the protection of the moral and material interests concerning any scientific, literary or II.2 Other Traditions artistic production (Art. 27) Information See the contributions to the CATaC Conferences on specialists have a moral responsibility with Cultural Attitudes Towards Technology and CSI Communications 8 JUNE 2005 COMPUTER SOCIETY O INDIA regard to the users at a micro (individuals), meso new situation gives rise to questions such as: Should (institutions) and macro (society) level. information (content and/or software) be regarded as an intellectual property? Should the notion of III.2 Ethical Issues of Information Production knowledge sharing become predominant with regard The question concerning the protection of the to the notion of ownership? How can the public intellectual property is one of the most important access to electronic information be guaranteed? and difficult ethical, moral and legal ones in the field of information production. Different traditions III.3 Ethical Issues of Information Collection and with regard to technologies and products have lead Classification to different protection laws in different regions of Ethical questions concerning collection and the world: classification of information are related to censorship and control. The answers to these questions vary The European tradition emphasizes the moral historically according to the interests of political, rights of the authors (droit dauteur). These are economic, religious and military power using and related to the person of the author and concern abusing of censorship and control. Cultural and the integrity and authorship of her/his work as moral traditions play also an important role well as her/his reputation. concerning for instance what is considered as The Anglo-American tradition emphasizes the offensive. We draw a distinction between censorship property or economic rights (copyright). These and selection: rights can be transferred. According to this Censorship means the active exclusion of tradition original works of authorship in any information based on religious, political, moral tangible means of expression (17 U.S.C. sect. or other grounds. 102(a)) should be protected. Selection concerns the activity of choosing The Asian tradition(s) consider copying as a information according to the objectives of an matter of emulation of the master. Conflicts arise institution. when national and international laws and moral traditions protect different aspects of various Selection procedures may be biased with regard to media. certain groups of subject matters. This leads to a loss of ethical balance. Ways of harmonization : The Berne Convention (1886, revisions) Protects: books, sculptures, The main ethical question in this field may be architecture... Duration of a copyright: the life of formulated as follows: Are there limits to intellectual the author plus 50 years. It makes a difference freedom? between economic and moral rights: In case I grant The will to exclude bad information is itself an economic grants to another person this does not ethical paradox as far as any exclusion, limiting include moral rights. The USA joined the convention intellectual freedom, should be avoided. in 1989. There is a tendency in liberal societies to less Universal Copyright Convention (1952) (UCC). control. But this leads to ethical as well as moral The protection is national and concerns the and legal conflicts. Codes of Ethics as well as official rights of reproduction. Duration of protection: international statements and agreements may help the life of the author plus 25 years. Both treaties against arbitrary censorship and selection pressures. are administrated by the World Intellectual Property Organization (WIPO). Classification systems, thesauri, search engines and the like are not neutral. This non-neutrality concerns Copyrights directives from national and not just the fact that they are necessarily biased but multinational parliaments (such as the EU). that specific unethical prejudices are not recognized
Recommended publications
  • Information Ethics in the Context of Information Literacy
    Proinflow: časopis pro informační vědy 2/2016 Information ethics in the context of information Literacy Františka Tomoriová Comenius University on Bratislava, Department of Library and Information Science Abstract The concept of information ethics is quite extensive. It is necessary to deal with it also with regard to information literacy, as prove recent and traditional concepts and definitions of information literacy with incorporated ethical espects. Information ethics and information literacy are closely connected, as illustrates the RPT (R-Resource, P-Product, T-Target) model of information ethics created by Luciano Floridi1, Christine Bruce's model of Seven Faces of information literacy, which deals with ethical aspects in connection with wise use of information2 and Nancy Tuana's concept of moral literacy3. Critical thinking is perceived as necessary in the context of both information literacy and information ethics. As Richard Paul4 stresses, information ethics without critical thinking can lead to indoctrination. On the basis of these approaches were created visualizations of connection between information ethics and information literacy. Keywords: information ethics, information literacy, crithical thinking 1 FLORIDI, Luciano. 2013. The Ethics of Information. United States of America: Oxford University Press. ISBN 9780199641321. 2 BRUCE, Christine. The Seven Faces of Information Literacy. Australia: Auslib Press, 1997. ISBN 978- 1875145430. 3 TUANA, Nancy. Conceptualizing Moral Literacy. Journal of Educational Administration [online]. 2007, 45(4), 364-378 [cit. 2016-06-16]. Retrieved from: http://site.ebrary.com/lib/uniba/reader.action?docID=10196373 4 PAUL, Richard. Ethics Without Indoctrination. In: The Critical Thinking Community [online]. 2013 [cit. 2016- 06-16]. Retrieved from: http://www.criticalthinking.org/pages/ethics-without-indoctrination/494 85 Františka Tomoriová Information ethics in the context..
    [Show full text]
  • Classical Ethics in A/IS
    The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems Classical Ethics in A/IS We applied classical ethics methodologies to considerations of algorithmic design in autonomous and intelligent systems (A/IS) where machine learning may or may not reflect ethical outcomes that mimic human decision-making. To meet this goal, we drew from classical ethics theories and the disciplines of machine ethics, information ethics, and technology ethics. As direct control over tools becomes further removed, creators of autonomous systems must ask themselves how cultural and ethical presumptions bias artificially intelligent creations. Such introspection is more necessary than ever because the precise and deliberate design of algorithms in self-sustained digital systems will result in responses based on such design. By drawing from over two thousand years’ worth of classical ethics traditions, we explore established ethics systems, including both philosophical traditions (utilitarianism, virtue ethics, and deontological ethics) and religious and culture-based ethical systems (Buddhism, Confucianism, African Ubuntu traditions, and Japanese Shinto) and their stance on human morality in the digital age.1 In doing so, we critique assumptions around concepts such as good and evil, right and wrong, virtue and vice, and we attempt to carry these inquiries into artificial systems’ decision-making processes. Through reviewing the philosophical foundations that define autonomy and ontology, we address the potential for autonomous capacity of artificially intelligent systems, posing questions of morality in amoral systems and asking whether decisions made by amoral systems can have moral consequences. Ultimately, we address notions of responsibility and accountability for the decisions made by autonomous systems and other artificially intelligent technologies.
    [Show full text]
  • Guide to the Raymond M. Herbenick Papers
    University of Dayton eCommons Guides to Archival and Special Collections University Libraries January 2014 Guide to the Raymond M. Herbenick papers Follow this and additional works at: https://ecommons.udayton.edu/finding_aid eCommons Citation "Guide to the Raymond M. Herbenick papers" (2014). Guides to Archival and Special Collections. 22. https://ecommons.udayton.edu/finding_aid/22 This Finding Aid is brought to you for free and open access by the University Libraries at eCommons. It has been accepted for inclusion in Guides to Archival and Special Collections by an authorized administrator of eCommons. For more information, please contact [email protected], [email protected]. Guide to the Raymond M. Herbenick papers, 1965-1998 UASC.025 Finding aid prepared by Rachel DeHart This finding aid was produced using the Archivists' Toolkit September 27, 2012 Describing Archives: A Content Standard University Archives and Special Collections University of Dayton 300 College Park Dayton, Ohio, 45469-1360 937-229-4256 [email protected] Guide to the Raymond M. Herbenick papers, 1965-1998 UASC.025 Table of Contents Summary Information ............................................................................................................................. 3 Biography of Raymond M. Herbenick..........................................................................................................4 Scope and Content.........................................................................................................................................4
    [Show full text]
  • An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D
    An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D. William J. Rewak, S.J. Professor of Philosophy, Santa Clara University TABLE OF CONTENTS Introduction 2-6 PART ONE: What are the important ethical issues in cybersecurity? 7-12 Case Study 1 13-15 PART TWO: Common ethical challenges for cybersecurity professionals 15-21 Case Study 2 21-24 Case Study 3 24-28 PART THREE: What are cybersecurity professionals’ obligations to the public? 29-34 Case Study 4 34-38 PART FOUR: What ethical frameworks can guide cybersecurity practice? 38-47 PART FIVE: What are ethical best practices in cybersecurity? 48-56 Case Study 5 57-60 Case Study 6 60-61 APPENDIX A: Relevant Professional Ethics Codes & Guidelines (Links) 62 APPENDIX B: Bibliography/Further Reading 63-65 1 An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D. William J. Rewak, S.J. Professor of Philosophy, Santa Clara University 1. What do we mean when we talk about ‘ethics’? Ethics in the broadest sense refers to the concern that humans have always had for figuring out how best to live. The philosopher Socrates is quoted as saying in 399 B.C. that “the most important thing is not life, but the good life.”1 We would all like to avoid a bad life, one that is shameful and sad, fundamentally lacking in worthy achievements, unredeemed by love, kindness, beauty, friendship, courage, honor, joy, or grace. Yet what is the best way to obtain the opposite of this – a life that is not only acceptable, but even excellent and worthy of admiration? How do we identify a good life, one worth choosing from among all the different ways of living that lay open to us? This is the question that the study of ethics attempts to answer.
    [Show full text]
  • Computer Ethics: Job of Computer Scientist
    International Journals of Advanced Research in Research Article June Computer Science and Software Engineering 2017 ISSN: 2277-128X (Volume-7, Issue-6) Computer Ethics: Job of Computer Scientist Juneed Iqbal Bilal Maqbool Beigh Department of Computer science Department of Computer Science Mewar University cluster university of Kashmir Srinagar, India Srinagar, India DOI: 10.23956/ijarcsse/V7I6/0135 Abstract: This paper reiterates the fact that computer ethics is a job of computer scientist and not philosophers. This paper is divided into three sections. First section provides with a brief explanation and discussion on the weaknesses and shortcomings of classical ethical theories like Divine command theories, Ethical Egoism, Kantianism, Utilitarianism, Social Contract Theory and Virtue Ethics, which makes them unfit for the application of computer ethics. Second section discusses the ambiguity in theories proposed for foundation of computer ethics. Third section deals with professional ethics and discusses that Computer ethics is a domain of computer scientist. This article gives a clear picture of shortcoming of traditional ethical theories and need of new theory to deal with computer ethics. This article points out flaws in theories trying to give foundation for computer ethics. We suggest professional ethics as practical and preventive measure for computer ethics that caters to its requirements. We also explores the role of computer scientist for the application of computer ethics as a profession. Keywords: Computer ethics; computer scientist; professional ethics; foundational ambiguity; code of ethics. I. INTRODUCTION Modern day societies are driven by computing technologies and are critically dependent on it. Every aspect of society like health, finance, defense, education, transportation and an unending list of other systems which drive our society are dealing with computing technology and artefacts.
    [Show full text]
  • Thinging Ethics for Software Engineers
    (IJCSIS) International Journal of Computer Science and Information Security, Vol. 16, No. 9, September 2018 Thinging Ethics for Software Engineers Sabah S. Al-Fedaghi Computer Engineering Department Kuwait University City, Kuwait [email protected] Abstract—Ethical systems are usually described as principles for The field of computer ethics is changing rapidly as distinguishing right from wrong and forming beliefs about concerns over the impact of information and communication proper conduct. Ethical topics are complex, with excessively technology on society mount. New problems of ethics emerge verbose accounts of mental models and intensely ingrained one after another, and old problems show themselves in new philosophical assumptions. From practical experience, in forms. Ethics is often tied to legal procedures and policies that, teaching ethics for software engineering students, an explanation if breached, can put an organization in the midst of trouble [6]. of ethics alone often cannot provide insights of behavior and In this context, we adopt the classical engineering method thought for students. Additionally, it seems that there has been of explaining a phenomenon through modeling. For example, no exploration into the development of a conceptual presentation in developing system requirements, a model-based approach is of ethics that appeals to computer engineers. This is particularly used to depict a system graphically at various levels of clear in the area of software engineering, which focuses on software and associated tools such as algorithms, diagramming, granularity and complexity. The resultant unified, conceptual documentation, modeling and design as applied to various types model facilitates communication among different stakeholders of data and conceptual artifacts.
    [Show full text]
  • Just Consequentialism and Computing
    Ethics and Information Technology 1: 65–69, 1999. © 1999 Kluwer Academic Publishers. Printed in the Netherlands. Just consequentialism and computing James H. Moor Department of Philosophy, Dartmouth College, NH, USA. E-mail: [email protected] Abstract. Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics. Introduction instance of a policy – in this kind of situation such and such action is allowed or required or forbidden. The malleability of computers allows them to be Understanding actions as exemplars of more general used in novel and unexpected ways, ways for which normative prescriptions promotes responsibility and we frequently do not have formulated policies for more careful reflection on conduct. The word “policy” controlling their use.1 Advancing computer techno- is intended to suggest both that there can be justified logy produces policy vacuums in its wake. And exemptions (policies are not absolute rules) and a level even when relevant policies do exist, they are often of obligation (policies are not mere suggestions). ambiguous or inadequate as they were designed for We want our policies for computing to be ethical, times with a less versatile technology than computing. but what should we look for when constructing ethical A basic job of computer ethics is to identify these computing policies? When we turn to traditional policy needs, clarify related conceptual confusions, ethical theories for help we discover a strong rivalry formulate appropriate new policies, and ethically exists between the leading contenders – consequen- justify them.
    [Show full text]
  • Will ICT Ethics Engage Organizational Transparency? Will the Evolution Of
    Will ICT ethics engage organizational transparency? Will the evolution of ICT ethics engage organizational transparency? Gonçalo Jorge Morais da Costa PhD Student, Centre for Computing and Social Responsibility, De Montfort University [email protected] +351- 919055965 Mary Prior Principal Lecturer, Centre for Computing and Social Responsibility, De Montfort University [email protected] +44- 116 207 8252 Ext 6747 Simon Rogerson Director, Centre for Computing and Social Responsibility, De Montfort University [email protected] +44- 116 257 7475 Ext 7475 Abstract In a world business context characterized by the central role that ICT plays, the need to analyze its ethical and moral dilemmas is crucial. At the same time, the exponential growth of business ethics also demonstrates the need for organizational transparency, as demonstrated by some well-known financial scandals. Currently society perceives ethics as “value added”; however, managers tend to disregard the link between ICT ethics and business ethics. The aim of this paper is to relate the evolution of computer ethics and the phenomenon of organizational transparency. This research work makes an important contribution to an area where there is a lack of existing literature. Keywords Corporate social responsibility, ICT, computer ethics, global ethics, transparency, organizational transparency Abbreviations Corporate social responsibility (CSR) Introduction The idea that business should be conducted ethically is not a new one. Neither is the idea that business should be conducted in socially responsible ways. For most of the last century, however, continuous failures seen through examples such as Enron raises important questions: what is corporate social responsibility? and does transparency means the same thing? Corporate social responsibility has variously been described as a “motherhood issue” ( R y a n 2002, p.
    [Show full text]
  • Information Ethics: the Duty, Privilege and Challenge of Educating Information Professionals
    Information Ethics: The Duty, Privilege and Challenge of Educating Information Professionals TONICARBOAND STEPHENALMAGNO ABSTRACT QUESTIONSCONCERNING ETHICS AND HOW AN individual can act ethically when confronted with issues related to libraries, archives, and, more broadly, information have ever been present in our professional lives when- ever individuals considered their own principles and actions as related to creating, organizing, managing, using, disseminating, preserving, and providing access to information and documents in all forms. To address the duty, privilege, and challenge of educating librarians, archivists, and other information professionals to understand what ethics is and how to make ethical decisions in their personal lives and work, the School of In- formation Sciences at the University of Pittsburgh developed a Dean’s Forum on Information Ethics, a course offered twice a year, a Web site, and an information ethics program. This article describes the history and evolution of information ethics at the University of Pittsburgh and describes the course and its three com- ponents: an introduction addressing the reason and need for moral in- struction and ethical reflection; the necessary steps for facing up to and resolving a moral dilemma; and the ethical issues in librarianship, infor- mation technology, and management. The course and lecture series are considered within the broader context of the school’s curriculum and the multicultural international society. Toni Carbo, University of Pittsburgh, School of Information Sciences, 505 IS Building, 135 N. Bellefield Avenue, Pittsburgh, PA 15260 Stephen Almagno, University of Pittsburgh, School of Information Sciences, Department of Library and Information Science, 657 IS Building, 135 N. Bellefield Avenue, Pittsburgh, PA 15260 LIBRARY TRENDS, Vol.
    [Show full text]
  • The Ethics of Information Warfare Law, Governance and Technology Series
    The Ethics of Information Warfare Law, Governance and Technology Series VOLUME 14 Series Editors: POMPEU CASANOVAS, Institute of Law and Technology, UAB, Spain GIOVANNI SARTOR, University of Bologna (Faculty of Law – CIRSFID) and European, University Institute of Florence, Italy Scientific Advisory Board: GIANMARIA AJANI, University of Turin, Italy; KEVIN ASHLEY, University of Pittsburgh, USA; KATIE ATKINSON, University of Liverpool, UK; TREVOR J.M. BENCH-CAPON, University of Liv- erpool, UK; V. RICHARDS BENJAMINS, Telefonica, Spain; GUIDO BOELLA, Universita’ degli Studi di Torino, Italy; JOOST BREUKER, Universiteit van Amsterdam, The Netherlands; DANIÈLE BOUR- CIER, University of Paris 2-CERSA, France; TOM BRUCE, Cornell University, USA; NURIA CASEL- LAS, Institute of Law and Technology, UAB, Spain; CRISTIANO CASTELFRANCHI, ISTC-CNR, Italy; JACK G. CONRAD, Thomson Reuters, USA; ROSARIA CONTE, ISTC-CNR, Italy; FRAN- CESCO CONTINI, IRSIG-CNR, Italy; JESÚS CONTRERAS, iSOCO, Spain; JOHN DAVIES, British Telecommunications plc, UK; JOHN DOMINGUE, The Open University, UK; JAIME DELGADO, Uni- versitat Politécnica de Catalunya, Spain; MARCO FABRI, IRSIG-CNR, Italy; DIETER FENSEL, Uni- versity of Innsbruck, Austria; ENRICO FRANCESCONI, ITTIG-CNR, Italy; FERNANDO GALINDO, Universidad de Zaragoza, Spain; ALDO GANGEMI, ISTC-CNR, Italy; MICHAEL GENESERETH, Stanford University, USA; ASUNCIÓN GÓMEZ-PÉREZ, Universidad Politécnica de Madrid, Spain; THOMAS F. GORDON, Fraunhofer FOKUS, Germany; GUIDO GOVERNATORI, NICTA, Australia; GRAHAM GREENLEAF, The University
    [Show full text]
  • Information Ethics and Internet Research Ethics: an Interview with Rafael Capurro
    1 Webology, Volume 11, Number 2, December, 2014 Home Table of Contents Titles & Subject Index Authors Index Information ethics and Internet research ethics: An interview with Rafael Capurro Rahman Marefat Faculty Member, Department of Information Sciences and Knowledge Studies, Semnan University, Semnan, Iran. E-mail: rmarefat (at) semnan.ac.ir Mahmood Sangari PhD candidate, Department of Information Sciences and Knowledge Studies, Faculty of Psychology and Educational Science, Kharazmi University, Tehran, Iran. E-mail: msangary (at) gmail.com Received July 15, 2014; Accepted October 25, 2014 Abstract The emergence of the Internet and new technologies along with their challenges, have caused more attention to new and special aspects of ethics. This is an interview with Rafael Capurro on information ethics and Internet research ethics. This interview is given on the occasion of an invitation from Prof. Jafar Mehrad to visit the Islamic World Science Citation Center (ISC) and the Regional Information Center for Science and Technology (RICEST) in Shiraz (Iran) from September 30 to October 5, 2014, and to give a number of lectures on the information concept and on information ethics. Keywords Information ethics; Internet research ethics, World Wide Web How do you define Ethics? Ethics is a philosophical discipline dealing with a critical analysis of customs (mores) and rules of human behavior. The Greek term philosophia ethiké was coined in the Western tradition by Aristotle. In his Nicomachean Ethics he makes a difference between the ethos and the character of a person and philosophia ethiké as the reflection upon it. Aristotle divided http://www.webology.org/2014/v11n2/a128.pdf 2 'practical philosophy' (philosophia praktiké) into three sub-disciplines dealing with the formation of the individual character (ethiké), the issues of administration of the family or 'house' (oikos, oikonomiké) and the 'political' issues (politiké) corresponding to the subdivision of society in ancient Greece.
    [Show full text]
  • Floridi's “Open Problems in Philosophy of Information”
    Information 2011, 2, 327-359; doi:10.3390/info2020327 OPEN ACCESS information ISSN 2078-2489 www.mdpi.com/journal/information Article Floridi’s “Open Problems in Philosophy of Information”, Ten Years Later Gordana Dodig Crnkovic 1,* and Wolfgang Hofkirchner 2 1 Mälardalen University, School of Innovation, Design and Engineering, Box 883, SE-72123 Västerås, Sweden 2 University of Technology, Karlsplatz 13, 1040 Wien, Austria; E-Mail: [email protected] * Author to whom correspondence should be addressed; E-Mail: [email protected]. Received: 7 April 2011; in revised form: 2 May 2011 / Accepted: 12 May 2011 / Published: 23 May 2011 Abstract: In his article Open Problems in the Philosophy of Information [1] Luciano Floridi presented a Philosophy of Information research program in the form of eighteen open problems, covering the following fundamental areas: Information definition, information semantics, intelligence/cognition, informational universe/nature and values/ethics. We revisit Floridi’s program, highlighting some of the major advances, commenting on unsolved problems and rendering the new landscape of the Philosophy of Information (PI) emerging at present. As we analyze the progress of PI we try to situate Floridi’s program in the context of scientific and technological development that have been made last ten years. We emphasize that Philosophy of Information is a huge and vibrant research field, with its origins dating before Open Problems, and its domains extending even outside their scope. In this paper, we have been able only to sketch some of the developments during the past ten years. Our hope is that, even if fragmentary, this review may serve as a contribution to the effort of understanding the present state of the art and the paths of development of Philosophy of Information as seen through the lens of Open Problems.
    [Show full text]