Virtue Ethics

Total Page:16

File Type:pdf, Size:1020Kb

Virtue Ethics Nova Southeastern University NSUWorks CEC Theses and Dissertations College of Engineering and Computing 2015 Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions John Max Gray Nova Southeastern University, [email protected] This document is a product of extensive research conducted at the Nova Southeastern University College of Engineering and Computing. For more information on research and degree programs at the NSU College of Engineering and Computing, please click here. Follow this and additional works at: https://nsuworks.nova.edu/gscis_etd Part of the Business Law, Public Responsibility, and Ethics Commons, Databases and Information Systems Commons, Ethics and Political Philosophy Commons, and the Information Security Commons Share Feedback About This Item NSUWorks Citation John Max Gray. 2015. Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, College of Engineering and Computing. (364) https://nsuworks.nova.edu/gscis_etd/364. This Dissertation is brought to you by the College of Engineering and Computing at NSUWorks. It has been accepted for inclusion in CEC Theses and Dissertations by an authorized administrator of NSUWorks. For more information, please contact [email protected]. Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions by John Gray A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Systems College of Engineering and Computing Nova Southeastern University 2015 An Abstract of a Dissertation Submitted to Nova Southeastern University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions by John Gray October 2015 Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s character strengths have been linked to positive personal development, but there has been very little research into how the positive characteristics of virtue ethics, exhibited through the character development of information systems workers, can contribute to improving system security. This research aimed to address this gap by examining factors that affect and shape the ethical perspectives of individuals entrusted with privileged access to information. This study builds upon prior research and theoretical frameworks on institutionalizing ethics into organizations and Information Ethics to propose a new theoretical model which demonstrates the influences on Information Systems Security (ISS) trusted worker ethical behavior within an organization. Components of the research model include ISS virtue ethics based constructs, organizational based internal influences, societal based external influences, and trusted worker ethical behavior. This study used data collected from 395 professionals in an ISS organization to empirically assess the model. Partial Least Squares Structural Equation Modeling was employed to analyze the indicators, constructs, and path relationships. Various statistical tests determined validity and reliability, with mixed but adequate results. All of the relationships between constructs were positive, although some were stronger and more significant. The expectation of the researcher in this study was to better understand the character of individuals who pose an insider threat by validating the proposed model, thereby providing a conceptual analysis of the character traits which influence the ethical behavior of trusted workers and ultimately information system security. Acknowledgements First and foremost I would like to thank Dr. Gurvirender Tejay for guiding my interest in ethics into a specific area that has applicability to information system security and refocusing me when my ideas took me out into left field. His mentorship, advice, uncompromising standards, and commitment to quality and relevance contributed immeasurability to this work. Thanks to my committee members, Dr. Cohen and Dr. Terrell. The quality of this dissertation is a direct reflection of their timely and valuable feedback. To all of the DISS students termed as “Tejay’s disciples” who participated in countless meetings at the Flight Deck and local area restaurants discussing information system security issues and research ideas late into many an evening. Dr. Tejay’s facilitation and guidance of those discussions eventually provided that “a-ha” moment which crystalized not only my own research idea, but that of many other of his students, ultimately leading to their dissertation topic. In some ways these after-hours brain storming sessions contributed more to completing this work than any of the in-class activities. Thanks to the Masonic fraternity and specifically my brothers in William H. Upton Naval and Military Lodge #206 for teaching me, albeit unknowingly, the concepts and power of virtue ethics. The lessons taught me through the various allegories of the fraternity improved me immeasurably. Halfway into this research I realized that the gentle lessons of the craft had a significant impact on this work and, as it should be - my life. I want to express my gratitude to my colleagues in the NUWC Keyport IA and Cyber-Security Branch who patiently endured my discussions of ethics and provided invaluable input and critique of my ideas. I would like to specifically thank the management team of the Advanced Skills Management (ASM) software project, whose work practices inspired me to consider how ethics affected information system security. Thanks to all the individuals who participated in my survey. I have a newfound respect for the effort involved in obtaining the required number of participants. To the makers of craft beer and cigars, my indulgence of which provided me the quiet time to contemplate many ideas which manifested themselves in this research. Thanks to my wife Bethany for patiently accepting that a portion of her life would be sacrificed in support of a goal of mine. I am forever grateful for your support. I promise – no more school! Also to my mother, Judith Sullivan of Spencer, IN, who inspired me to excel. Rest in peace Mom. Finally, thanks to God for giving me the inner strength to complete what at times seemed an insurmountable task. “Remember now thy creator in the days of thy youth…” "To educate a man in mind and not in morals is to educate a menace to society." - Theodore Roosevelt "Waste no more time arguing about what a good man should be. Be one." - Marcus Aurelius Table of Contents Abstract iii Acknowledgements iv Table of Contents v List of Tables vii List of Figures viii Chapters 1. Introduction 1 1.1 Background 1 1.2 Research Problem and Argument 5 1.3 Importance of Research Problem 7 1.4 Definition of Key Terms 9 1.5 Summary 14 2. Literature Review 15 2.1 Introduction 15 2.2 Organizational Ethics 16 2.3 Virtue Ethics 18 2.4 Ethics is Applicable to Information System Security 27 2.5 Virtue Ethics is Important to Information System Security 30 2.6 Technical Controls, Formal Procedures, and Policies are Ineffective 34 2.7 Information System Violations by Trusted Workers 40 2.8 Summary 43 3. Methodology 46 3.1 Introduction 46 3.2 Theoretical Basis 47 3.3 Research Model 51 3.4 Research Hypotheses 76 3.5 Research Method 79 3.5.1 Instrument Development 81 3.5.2 Phases of Research Study 87 3.5.3 Data Collection 95 3.5.4 Data Analysis 102 3.6 Miscellaneous 125 3.7 Summary 126 4. Results 128 4.1 Introduction 128 v 4.2 Data Analysis 128 4.2.1 Demographic Data 128 4.2.2 Measurement Model Data Analysis Results 130 4.2.3 Structural Model Data Analysis Results 149 4.3 Findings 157 4.4 Summary of Results 160 5. Conclusions, Implications, Recommendations, and Summary 162 5.1 Introduction 162 5.2 Conclusions 163 5.3 Implications 166 5.4 Limitations 168 5.5 Recommendations for Future Research 170 5.6 Summary 171 Appendices A. Acronyms 174 B. Research Model Variables and Indicators 175 C. Survey Instrument 178 D. IRB Approval from Nova Southeastern University 189 E. Survey Response Frequency and Percentage Information 190 F. Copyright Permissions 210 References 213 vi List of Tables Tables 1. ISS Trusted Worker Ethical Behavior Constructs 62 2. ISS Theoretical Construct and Definition Summary 66 3 TWEB Model Categories 68 4 ISS Construct Conceptual Domains 84 5. ISS Construct Conceptual Theme Attributes 85 6. Study Sample Size Determination 98 7. Measurement Model Analysis Procedures 119 8. Summary of Fit Index Significance Levels for Measurement Model 120 9. Summary of Fit Index Significance Levels for Structural Model 124 10. Research Study Assumptions 126 11. Survey Participant Demographic Data 129 12. TWEB Outer Model Goodness of Fit Results 131 13. Reflective Construct Goodness
Recommended publications
  • Information Ethics in the Context of Information Literacy
    Proinflow: časopis pro informační vědy 2/2016 Information ethics in the context of information Literacy Františka Tomoriová Comenius University on Bratislava, Department of Library and Information Science Abstract The concept of information ethics is quite extensive. It is necessary to deal with it also with regard to information literacy, as prove recent and traditional concepts and definitions of information literacy with incorporated ethical espects. Information ethics and information literacy are closely connected, as illustrates the RPT (R-Resource, P-Product, T-Target) model of information ethics created by Luciano Floridi1, Christine Bruce's model of Seven Faces of information literacy, which deals with ethical aspects in connection with wise use of information2 and Nancy Tuana's concept of moral literacy3. Critical thinking is perceived as necessary in the context of both information literacy and information ethics. As Richard Paul4 stresses, information ethics without critical thinking can lead to indoctrination. On the basis of these approaches were created visualizations of connection between information ethics and information literacy. Keywords: information ethics, information literacy, crithical thinking 1 FLORIDI, Luciano. 2013. The Ethics of Information. United States of America: Oxford University Press. ISBN 9780199641321. 2 BRUCE, Christine. The Seven Faces of Information Literacy. Australia: Auslib Press, 1997. ISBN 978- 1875145430. 3 TUANA, Nancy. Conceptualizing Moral Literacy. Journal of Educational Administration [online]. 2007, 45(4), 364-378 [cit. 2016-06-16]. Retrieved from: http://site.ebrary.com/lib/uniba/reader.action?docID=10196373 4 PAUL, Richard. Ethics Without Indoctrination. In: The Critical Thinking Community [online]. 2013 [cit. 2016- 06-16]. Retrieved from: http://www.criticalthinking.org/pages/ethics-without-indoctrination/494 85 Františka Tomoriová Information ethics in the context..
    [Show full text]
  • Classical Ethics in A/IS
    The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems Classical Ethics in A/IS We applied classical ethics methodologies to considerations of algorithmic design in autonomous and intelligent systems (A/IS) where machine learning may or may not reflect ethical outcomes that mimic human decision-making. To meet this goal, we drew from classical ethics theories and the disciplines of machine ethics, information ethics, and technology ethics. As direct control over tools becomes further removed, creators of autonomous systems must ask themselves how cultural and ethical presumptions bias artificially intelligent creations. Such introspection is more necessary than ever because the precise and deliberate design of algorithms in self-sustained digital systems will result in responses based on such design. By drawing from over two thousand years’ worth of classical ethics traditions, we explore established ethics systems, including both philosophical traditions (utilitarianism, virtue ethics, and deontological ethics) and religious and culture-based ethical systems (Buddhism, Confucianism, African Ubuntu traditions, and Japanese Shinto) and their stance on human morality in the digital age.1 In doing so, we critique assumptions around concepts such as good and evil, right and wrong, virtue and vice, and we attempt to carry these inquiries into artificial systems’ decision-making processes. Through reviewing the philosophical foundations that define autonomy and ontology, we address the potential for autonomous capacity of artificially intelligent systems, posing questions of morality in amoral systems and asking whether decisions made by amoral systems can have moral consequences. Ultimately, we address notions of responsibility and accountability for the decisions made by autonomous systems and other artificially intelligent technologies.
    [Show full text]
  • Guide to the Raymond M. Herbenick Papers
    University of Dayton eCommons Guides to Archival and Special Collections University Libraries January 2014 Guide to the Raymond M. Herbenick papers Follow this and additional works at: https://ecommons.udayton.edu/finding_aid eCommons Citation "Guide to the Raymond M. Herbenick papers" (2014). Guides to Archival and Special Collections. 22. https://ecommons.udayton.edu/finding_aid/22 This Finding Aid is brought to you for free and open access by the University Libraries at eCommons. It has been accepted for inclusion in Guides to Archival and Special Collections by an authorized administrator of eCommons. For more information, please contact [email protected], [email protected]. Guide to the Raymond M. Herbenick papers, 1965-1998 UASC.025 Finding aid prepared by Rachel DeHart This finding aid was produced using the Archivists' Toolkit September 27, 2012 Describing Archives: A Content Standard University Archives and Special Collections University of Dayton 300 College Park Dayton, Ohio, 45469-1360 937-229-4256 [email protected] Guide to the Raymond M. Herbenick papers, 1965-1998 UASC.025 Table of Contents Summary Information ............................................................................................................................. 3 Biography of Raymond M. Herbenick..........................................................................................................4 Scope and Content.........................................................................................................................................4
    [Show full text]
  • An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D
    An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D. William J. Rewak, S.J. Professor of Philosophy, Santa Clara University TABLE OF CONTENTS Introduction 2-6 PART ONE: What are the important ethical issues in cybersecurity? 7-12 Case Study 1 13-15 PART TWO: Common ethical challenges for cybersecurity professionals 15-21 Case Study 2 21-24 Case Study 3 24-28 PART THREE: What are cybersecurity professionals’ obligations to the public? 29-34 Case Study 4 34-38 PART FOUR: What ethical frameworks can guide cybersecurity practice? 38-47 PART FIVE: What are ethical best practices in cybersecurity? 48-56 Case Study 5 57-60 Case Study 6 60-61 APPENDIX A: Relevant Professional Ethics Codes & Guidelines (Links) 62 APPENDIX B: Bibliography/Further Reading 63-65 1 An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D. William J. Rewak, S.J. Professor of Philosophy, Santa Clara University 1. What do we mean when we talk about ‘ethics’? Ethics in the broadest sense refers to the concern that humans have always had for figuring out how best to live. The philosopher Socrates is quoted as saying in 399 B.C. that “the most important thing is not life, but the good life.”1 We would all like to avoid a bad life, one that is shameful and sad, fundamentally lacking in worthy achievements, unredeemed by love, kindness, beauty, friendship, courage, honor, joy, or grace. Yet what is the best way to obtain the opposite of this – a life that is not only acceptable, but even excellent and worthy of admiration? How do we identify a good life, one worth choosing from among all the different ways of living that lay open to us? This is the question that the study of ethics attempts to answer.
    [Show full text]
  • Computer Ethics: Job of Computer Scientist
    International Journals of Advanced Research in Research Article June Computer Science and Software Engineering 2017 ISSN: 2277-128X (Volume-7, Issue-6) Computer Ethics: Job of Computer Scientist Juneed Iqbal Bilal Maqbool Beigh Department of Computer science Department of Computer Science Mewar University cluster university of Kashmir Srinagar, India Srinagar, India DOI: 10.23956/ijarcsse/V7I6/0135 Abstract: This paper reiterates the fact that computer ethics is a job of computer scientist and not philosophers. This paper is divided into three sections. First section provides with a brief explanation and discussion on the weaknesses and shortcomings of classical ethical theories like Divine command theories, Ethical Egoism, Kantianism, Utilitarianism, Social Contract Theory and Virtue Ethics, which makes them unfit for the application of computer ethics. Second section discusses the ambiguity in theories proposed for foundation of computer ethics. Third section deals with professional ethics and discusses that Computer ethics is a domain of computer scientist. This article gives a clear picture of shortcoming of traditional ethical theories and need of new theory to deal with computer ethics. This article points out flaws in theories trying to give foundation for computer ethics. We suggest professional ethics as practical and preventive measure for computer ethics that caters to its requirements. We also explores the role of computer scientist for the application of computer ethics as a profession. Keywords: Computer ethics; computer scientist; professional ethics; foundational ambiguity; code of ethics. I. INTRODUCTION Modern day societies are driven by computing technologies and are critically dependent on it. Every aspect of society like health, finance, defense, education, transportation and an unending list of other systems which drive our society are dealing with computing technology and artefacts.
    [Show full text]
  • Thinging Ethics for Software Engineers
    (IJCSIS) International Journal of Computer Science and Information Security, Vol. 16, No. 9, September 2018 Thinging Ethics for Software Engineers Sabah S. Al-Fedaghi Computer Engineering Department Kuwait University City, Kuwait [email protected] Abstract—Ethical systems are usually described as principles for The field of computer ethics is changing rapidly as distinguishing right from wrong and forming beliefs about concerns over the impact of information and communication proper conduct. Ethical topics are complex, with excessively technology on society mount. New problems of ethics emerge verbose accounts of mental models and intensely ingrained one after another, and old problems show themselves in new philosophical assumptions. From practical experience, in forms. Ethics is often tied to legal procedures and policies that, teaching ethics for software engineering students, an explanation if breached, can put an organization in the midst of trouble [6]. of ethics alone often cannot provide insights of behavior and In this context, we adopt the classical engineering method thought for students. Additionally, it seems that there has been of explaining a phenomenon through modeling. For example, no exploration into the development of a conceptual presentation in developing system requirements, a model-based approach is of ethics that appeals to computer engineers. This is particularly used to depict a system graphically at various levels of clear in the area of software engineering, which focuses on software and associated tools such as algorithms, diagramming, granularity and complexity. The resultant unified, conceptual documentation, modeling and design as applied to various types model facilitates communication among different stakeholders of data and conceptual artifacts.
    [Show full text]
  • Just Consequentialism and Computing
    Ethics and Information Technology 1: 65–69, 1999. © 1999 Kluwer Academic Publishers. Printed in the Netherlands. Just consequentialism and computing James H. Moor Department of Philosophy, Dartmouth College, NH, USA. E-mail: [email protected] Abstract. Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics. Introduction instance of a policy – in this kind of situation such and such action is allowed or required or forbidden. The malleability of computers allows them to be Understanding actions as exemplars of more general used in novel and unexpected ways, ways for which normative prescriptions promotes responsibility and we frequently do not have formulated policies for more careful reflection on conduct. The word “policy” controlling their use.1 Advancing computer techno- is intended to suggest both that there can be justified logy produces policy vacuums in its wake. And exemptions (policies are not absolute rules) and a level even when relevant policies do exist, they are often of obligation (policies are not mere suggestions). ambiguous or inadequate as they were designed for We want our policies for computing to be ethical, times with a less versatile technology than computing. but what should we look for when constructing ethical A basic job of computer ethics is to identify these computing policies? When we turn to traditional policy needs, clarify related conceptual confusions, ethical theories for help we discover a strong rivalry formulate appropriate new policies, and ethically exists between the leading contenders – consequen- justify them.
    [Show full text]
  • Will ICT Ethics Engage Organizational Transparency? Will the Evolution Of
    Will ICT ethics engage organizational transparency? Will the evolution of ICT ethics engage organizational transparency? Gonçalo Jorge Morais da Costa PhD Student, Centre for Computing and Social Responsibility, De Montfort University [email protected] +351- 919055965 Mary Prior Principal Lecturer, Centre for Computing and Social Responsibility, De Montfort University [email protected] +44- 116 207 8252 Ext 6747 Simon Rogerson Director, Centre for Computing and Social Responsibility, De Montfort University [email protected] +44- 116 257 7475 Ext 7475 Abstract In a world business context characterized by the central role that ICT plays, the need to analyze its ethical and moral dilemmas is crucial. At the same time, the exponential growth of business ethics also demonstrates the need for organizational transparency, as demonstrated by some well-known financial scandals. Currently society perceives ethics as “value added”; however, managers tend to disregard the link between ICT ethics and business ethics. The aim of this paper is to relate the evolution of computer ethics and the phenomenon of organizational transparency. This research work makes an important contribution to an area where there is a lack of existing literature. Keywords Corporate social responsibility, ICT, computer ethics, global ethics, transparency, organizational transparency Abbreviations Corporate social responsibility (CSR) Introduction The idea that business should be conducted ethically is not a new one. Neither is the idea that business should be conducted in socially responsible ways. For most of the last century, however, continuous failures seen through examples such as Enron raises important questions: what is corporate social responsibility? and does transparency means the same thing? Corporate social responsibility has variously been described as a “motherhood issue” ( R y a n 2002, p.
    [Show full text]
  • Information Ethics: the Duty, Privilege and Challenge of Educating Information Professionals
    Information Ethics: The Duty, Privilege and Challenge of Educating Information Professionals TONICARBOAND STEPHENALMAGNO ABSTRACT QUESTIONSCONCERNING ETHICS AND HOW AN individual can act ethically when confronted with issues related to libraries, archives, and, more broadly, information have ever been present in our professional lives when- ever individuals considered their own principles and actions as related to creating, organizing, managing, using, disseminating, preserving, and providing access to information and documents in all forms. To address the duty, privilege, and challenge of educating librarians, archivists, and other information professionals to understand what ethics is and how to make ethical decisions in their personal lives and work, the School of In- formation Sciences at the University of Pittsburgh developed a Dean’s Forum on Information Ethics, a course offered twice a year, a Web site, and an information ethics program. This article describes the history and evolution of information ethics at the University of Pittsburgh and describes the course and its three com- ponents: an introduction addressing the reason and need for moral in- struction and ethical reflection; the necessary steps for facing up to and resolving a moral dilemma; and the ethical issues in librarianship, infor- mation technology, and management. The course and lecture series are considered within the broader context of the school’s curriculum and the multicultural international society. Toni Carbo, University of Pittsburgh, School of Information Sciences, 505 IS Building, 135 N. Bellefield Avenue, Pittsburgh, PA 15260 Stephen Almagno, University of Pittsburgh, School of Information Sciences, Department of Library and Information Science, 657 IS Building, 135 N. Bellefield Avenue, Pittsburgh, PA 15260 LIBRARY TRENDS, Vol.
    [Show full text]
  • Information Ethics
    COMPUTER SOCIETY O INDIA Information Ethics Rafael Capurro* an emancipatory theory develops criticisms of moral I. oundations attitudes and traditions in the information field at Introduction an individual and collective level. It includes I.1 Information Ethics as Applied Ethics normative aspects. I.2 Information Ethics as a Descriptive and Information ethics explores and evaluates: Emancipatory Theory the development of moral values in the information I.3 Ethics for Information Specialists field, the creation of new power structures in the Introduction information field, We draw a distinction among: information myths, Morals: customs and traditions hidden contradictions and intentionalities in Ethics: critical reflection on morals information theories and practices, Law: norms formally approved by state power or the development of ethical conflicts in the international political bodies. information field. I.1 Information Ethics as Applied Ethics I.3 Ethics for Information Specialists Information ethics deals with ethical questions Educational goals: particularly: to be able to recognize and articulate ethical in the Internet (cyberethics; information ethics conflicts in the information field, in a narrower sense) to activate the sense of responsibility with regard in computer science (computer ethics) to the consequences of individual and collective in the biological and medical sciences interactions in the information field, (bioinformation ethics) to improve the qualification for intercultural in the mass media (media ethics) dialogue on the basis of the recognition of in the library and information science field different kinds of information cultures and (library ethics) values, in the business field (business information to provide basic knowledge about ethical ethics) theories and concepts and about their relevance in everyday information work.
    [Show full text]
  • The Ethics of Information Warfare Law, Governance and Technology Series
    The Ethics of Information Warfare Law, Governance and Technology Series VOLUME 14 Series Editors: POMPEU CASANOVAS, Institute of Law and Technology, UAB, Spain GIOVANNI SARTOR, University of Bologna (Faculty of Law – CIRSFID) and European, University Institute of Florence, Italy Scientific Advisory Board: GIANMARIA AJANI, University of Turin, Italy; KEVIN ASHLEY, University of Pittsburgh, USA; KATIE ATKINSON, University of Liverpool, UK; TREVOR J.M. BENCH-CAPON, University of Liv- erpool, UK; V. RICHARDS BENJAMINS, Telefonica, Spain; GUIDO BOELLA, Universita’ degli Studi di Torino, Italy; JOOST BREUKER, Universiteit van Amsterdam, The Netherlands; DANIÈLE BOUR- CIER, University of Paris 2-CERSA, France; TOM BRUCE, Cornell University, USA; NURIA CASEL- LAS, Institute of Law and Technology, UAB, Spain; CRISTIANO CASTELFRANCHI, ISTC-CNR, Italy; JACK G. CONRAD, Thomson Reuters, USA; ROSARIA CONTE, ISTC-CNR, Italy; FRAN- CESCO CONTINI, IRSIG-CNR, Italy; JESÚS CONTRERAS, iSOCO, Spain; JOHN DAVIES, British Telecommunications plc, UK; JOHN DOMINGUE, The Open University, UK; JAIME DELGADO, Uni- versitat Politécnica de Catalunya, Spain; MARCO FABRI, IRSIG-CNR, Italy; DIETER FENSEL, Uni- versity of Innsbruck, Austria; ENRICO FRANCESCONI, ITTIG-CNR, Italy; FERNANDO GALINDO, Universidad de Zaragoza, Spain; ALDO GANGEMI, ISTC-CNR, Italy; MICHAEL GENESERETH, Stanford University, USA; ASUNCIÓN GÓMEZ-PÉREZ, Universidad Politécnica de Madrid, Spain; THOMAS F. GORDON, Fraunhofer FOKUS, Germany; GUIDO GOVERNATORI, NICTA, Australia; GRAHAM GREENLEAF, The University
    [Show full text]
  • Information Ethics and Internet Research Ethics: an Interview with Rafael Capurro
    1 Webology, Volume 11, Number 2, December, 2014 Home Table of Contents Titles & Subject Index Authors Index Information ethics and Internet research ethics: An interview with Rafael Capurro Rahman Marefat Faculty Member, Department of Information Sciences and Knowledge Studies, Semnan University, Semnan, Iran. E-mail: rmarefat (at) semnan.ac.ir Mahmood Sangari PhD candidate, Department of Information Sciences and Knowledge Studies, Faculty of Psychology and Educational Science, Kharazmi University, Tehran, Iran. E-mail: msangary (at) gmail.com Received July 15, 2014; Accepted October 25, 2014 Abstract The emergence of the Internet and new technologies along with their challenges, have caused more attention to new and special aspects of ethics. This is an interview with Rafael Capurro on information ethics and Internet research ethics. This interview is given on the occasion of an invitation from Prof. Jafar Mehrad to visit the Islamic World Science Citation Center (ISC) and the Regional Information Center for Science and Technology (RICEST) in Shiraz (Iran) from September 30 to October 5, 2014, and to give a number of lectures on the information concept and on information ethics. Keywords Information ethics; Internet research ethics, World Wide Web How do you define Ethics? Ethics is a philosophical discipline dealing with a critical analysis of customs (mores) and rules of human behavior. The Greek term philosophia ethiké was coined in the Western tradition by Aristotle. In his Nicomachean Ethics he makes a difference between the ethos and the character of a person and philosophia ethiké as the reflection upon it. Aristotle divided http://www.webology.org/2014/v11n2/a128.pdf 2 'practical philosophy' (philosophia praktiké) into three sub-disciplines dealing with the formation of the individual character (ethiké), the issues of administration of the family or 'house' (oikos, oikonomiké) and the 'political' issues (politiké) corresponding to the subdivision of society in ancient Greece.
    [Show full text]