Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Large companies' engineering design process rarely considers the ethical and moral dimensions of innovation projects. This need for ethics is increasingly felt, particularly with the advent of digital technologies. Our research mainly focuses on product designers in large companies during the innovation/creativity phase. We propose and evaluate the efficiency of a method allowing them to consider ethics from this first stage of product development. A specific database incorporating ethical categories and problems from the early stages of idea generation supports this study. This database is inspired by a research project funded by the European Commission called ETICA. We evaluate our proposal with a detailed case study in a large automotive company. This case study highlights the contribution of our extended ethical design method from an ethical point of view and a financial one for the company. We believe that our proposal will boost creativity by addressing innovative product designers' usual fixations. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 0-0 PubDate: 2022-01-01T05:00:00Z DOI: 10.4018/IJT.302628 Issue No:Vol. 13, No. 1 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Philosopher Jeremy Weissman theorizes a new approach to social media surveillance by utilizing a familiar theoretical model: the Panopticon. In effect, Weissman argues that social media has transformed ordinary people into prison guards within the Panopticon’s public watchtower and endowed ordinary individuals with the power to track, survey, and discipline elite officials, once shielded from public scrutiny. This new power, however, comes with a catch. Social media subsumes individuals within an anonymous, de-individualized public which erases individual difference while simultaneously and paradoxically promising to amplify that very difference. This review critically examines this paradoxical tension and the ethical concerns and challenges raised by social media’s propensity to elicit anonymity. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 0-0 PubDate: 2022-01-01T05:00:00Z DOI: 10.4018/IJT.302627 Issue No:Vol. 13, No. 1 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: This research investigated the cross-cultural perspectives on control-sharing in ethical decision-making when both human and AI-enabled auto-driven vehicles to involve. We reviewed the current practices. We then illustrated a survey we conducted related to this topic on a total of 771 subjects from three nations, the U.S., India, and Nigeria. We found participants from individualistic culture tend to emphasize personal choice and human control. We also found though most subjects prefer human drivers to take full control, India's subjects were more ambivalent in their attitude due to lower uncertainty avoidance. Also, subjects with higher incomes were more likely to cede control. There was consistent proportional distribution across nations in the control sharing configuration, with 2/3 chose full customization, and 1/3 chose limited customization. Car owners are more likely to have more control and full customization. Our findings shed important insights on both research in this domain and industry practitioners. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 0-0 PubDate: 2022-01-01T05:00:00Z DOI: 10.4018/IJT.302629 Issue No:Vol. 13, No. 1 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Cohen-Almagor; Raphael Pages: 1 - 17 Abstract: The Internet's design and raison d'être are complete freedom, but complete freedom might lead to anarchy and to harmful and anti-social activities. In this paper I address the concepts of moral and social responsibility, applying them to the Internet realm in considering the most troubling phenomenon of cyberbullying that results in loss of life. Specifically, I probe the moral and social responsibilities of Internet users (agents), of parents and of the education system in fighting cyberbullying. Balance needs to be struck between two most important principles: freedom of expression and social responsibility. Illustrative examples in which this disturbing and harmful phenomenon of cyberbullying had cost young life are mentioned. It is argued that all relevant stakeholders need to think of the consequences of their conduct, that Internet abusers should be accountable for their wrongdoing and be penalized, and that people who have the ability to stop or at least reduce the risk of cyberbullying should take proactive steps, exhibiting zero tolerance to cyberbullying. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-17 PubDate: 2022-01-01T05:00:00Z DOI: 10.4018/IJT.291552 Issue No:Vol. 13, No. 1 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Fossa; Fabio, Arrigoni, Stefano, Caruso, Giandomenico, Cholakkal, Hafeez Husain, Dahal, Pragyan, Matteucci, Matteo, Cheli, Federico Pages: 1 - 20 Abstract: In response to the many social impacts of automated mobility, in September 2020 the European Commission published Ethics of Connected and Automated Vehicles, a report in which recommendations on road safety, privacy, fairness, explainability, and responsibility are drawn from a set of eight overarching principles. This paper presents the results of an interdisciplinary research where philosophers and engineers joined efforts to operationalize the guidelines advanced in the report. To this aim, we endorse a function-based working approach to support the implementation of values and recommendations into the design of automated vehicle technologies. Based on this, we develop methodological tools to tackle issues related to personal autonomy, explainability, and privacy as domains that most urgently require fine-grained guidance due to the associated ethical risks. Even though each tool still requires further inquiry, we believe that our work might already prove the productivity of the function-based approach and foster its adoption in the CAV scientific community. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-20 PubDate: 2022-01-01T05:00:00Z DOI: 10.4018/IJT.291553 Issue No:Vol. 13, No. 1 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Kong; Lu, Li, Jihua Pages: 1 - 11 Abstract: Value sensitive design is a new method to embed moral value into the design process and possesses broad research prospects. However, there is a gap between the industrial application and the practical application of VSD since its practical application focuses on human-computer interaction and medical ethics. In this paper, the conceptual, empirical, and technical investigation of VSD are analyzed, and the feasibility of VSD for production line design is demonstrated. It was applied to the production line design process in Shenyang, Liaoning Province, China. Then, specific design issues such as environmental sustainability and safety are solved by analyzing the value demands of stakeholders and balancing the value tension. Thus, the human value of the production line becomes more sensitive, and the value conflict between natural and technical artifact is alleviated. In this process, we reflect on the design problems to be solved and obtain valuable opinions, enabling VSD to better adapt to the industrial production line design. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-11 PubDate: 2022-01-01T05:00:00Z DOI: 10.4018/IJT.291550 Issue No:Vol. 13, No. 1 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Marrone; Pierpaolo Pages: 1 - 14 Abstract: In this article I examine the structure of four deliberative models: epistemic democracy, epistocracy, dystopic algocracy, and utopian algocracy. Epistocracy and algocracy (which in its two versions is an extremization of epistocracy) represent a challenge to the alleged epistemic superiority of democracy: epistocracy for its emphasis on the role of experts; algocracy for its emphasis on technique as a cognitively and ethically superior tool. In the concluding remarks I will advance the thesis that these challenges can only be answered by emphasizing the value of citizens’ political participation, which can also represent both an increase in their cognitive abilities and a value for public ethics. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-14 PubDate: 2022-01-01T05:00:00Z DOI: 10.4018/IJT.291551 Issue No:Vol. 13, No. 1 (2022)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Shelley; Cameron, Shelley, Cameron Pages: 1 - 16 Abstract: As modern life becomes ever more mediated by technology, technology assessment becomes ever more important. Tools that help to anticipate and evaluate social impacts of technological designs are crucial to understanding this relationship. This paper presents an assessment tool called the Fairness Impact Assessment (FIA). For present purposes, fairness refers to conflicts of interest between social groups that result from the configuration of technological designs. In these situations, designs operate in a way such that advantages they provide to one social group impose disadvantages on another. The FIA helps to make clear the nature of these conflicts and possibilities for their resolution. As a broad, qualitative framework, the FIA can be applied more generally than specifically quantitative frameworks currently being explored in the field of machine learning. Though not a formula for solving difficult social issues, the FIA provides a systematic means for the investigation of fairness problems in technology design that are otherwise not always well understood or addressed. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-16 PubDate: 2022-01-01T05:00:00Z DOI: 10.4018/IJT.291554 Issue No:Vol. 13, No. 1 (2022)