Movatterモバイル変換


[0]ホーム

URL:


PhilPapersPhilPeoplePhilArchivePhilEventsPhilJobs
Order:

1 filter applied
Disambiguations
Jenifer Sunrise Winter [4]Jenifer S. Winter [2]
  1.  42
    Information systems ethics – challenges and opportunities.Simon Rogerson,Keith W. Miller,Jenifer Sunrise Winter &David Larson -2019 -Journal of Information, Communication and Ethics in Society 17 (1):87-97.
    Purpose The purpose of this paper is to explore the ethical issues surrounding information systems practice with a view to encouraging greater involvement in this aspect of IS research. Information integrity relies upon the development and operation of computer-based information systems. Those who undertake the planning, development and operation of these information systems have obligations to assure information integrity and overall to contribute to the public good. This ethical dimension of information systems has attracted mixed attention in the IS academic (...) discipline. Design/methodology/approach The authors are a multidisciplinary team providing a rich, diverse experience which includes professional and information ethics, management information systems, software engineering, data repositories and information systems development. Each author has used this experience to review the IS ethics landscape, which provides four complimentary perspectives. These are synthesised to tease out trends and future pointers. Findings It is confirmed that there is a serious lack of research being undertaken relating to the ethical dimension of the Information Systems field. There is limited crossover between the well-established multidisciplinary community of Computer Ethics research and the traditional Information Systems research community. Originality/value An outline framework is offered which could provide an opportunity for rich and valuable dialogue across the two communities. This is proposed as the starting point for a proactive research and practice action plan for information systems ethics. (shrink)
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  58
    Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things.Jenifer Sunrise Winter -2014 -Ethics and Information Technology 16 (1):27-41.
    The Internet of Things (IoT) is an emerging global infrastructure that employs wireless sensors to collect, store, and exchange data. Increasingly, applications for marketing and advertising have been articulated as a means to enhance the consumer shopping experience, in addition to improving efficiency. However, privacy advocates have challenged the mass aggregation of personally-identifiable information in databases and geotracking, the use of location-based services to identify one’s precise location over time. This paper employs the framework of contextual integrity related to privacy (...) developed by Nissenbaum (Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, 2010) as a tool to understand citizen response to implementation IoT-related technology in the supermarket. The purpose of the study was to identify and understand specific changes in information practices brought about by the IoT that may be perceived as privacy violations. Citizens were interviewed, read a scenario of near-term IoT implementation, and were asked to reflect on changes in the key actors involved, information attributes, and principles of transmission. Areas where new practices may occur with the IoT were then highlighted as potential problems (privacy violations). Issues identified included the mining of medical data, invasive targeted advertising, and loss of autonomy through marketing profiles or personal affect monitoring. While there were numerous aspects deemed desirable by the participants, some developments appeared to tip the balance between consumer benefit and corporate gain. This surveillance power creates an imbalance between the consumer and the corporation that may also impact individual autonomy. The ethical dimensions of this problem are discussed. (shrink)
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  24
    Social and digital media monitoring for nonviolence: a distributed cognition perspective of the precariousness of peace work.Richard Noel Canevez,Jenifer Sunrise Winter &Joseph G. Bock -2023 -Journal of Information, Communication and Ethics in Society 21 (4):485-501.
    Purpose This paper aims to explore the technologization of peace work through “remote support monitors” that use social and digital media technologies like social media to alert local violence prevention actors to potentially violent situations during demonstrations. Design/methodology/approach Using a distributed cognition lens, the authors explore the information processing of monitors within peace organizations. The authors adopt a qualitative thematic analysis methodology composed of interviews with monitors and documents from their shared communication and discussion channels. The authors’ analysis seeks to (...) highlight how information is transformed between social and technical actors through the process of monitoring. Findings The authors’ analysis identifies that the technologization of monitoring for violence prevention to assist nonviolent activists produces two principal and related forms of transformation: appropriation and hidden attributes. Monitors “appropriate” information from sources to fit new ends and modes of representation throughout the process of detection, verification and dissemination. The verification and dissemination processes likewise render latent supporting informational elements, hiding the aggregative nature of information flow in monitoring. The authors connect the ideas of appropriation and hidden attributes to broader discourses in surveillance and trust that challenge monitoring and its place in peace work going forward. Originality/value To the best of the authors’ knowledge, this study is the first to focus on the communicative and information processes of remote support monitors. The authors demonstrate that adoption of social and digital media information of incipient violence and response processes for its mitigation suggests both a social and technical precarity for the role of monitoring. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  4.  25
    Emerging Policy Problems Related to Ubiquitous Computing: Negotiating Stakeholders’ Visions of the Future.Jenifer S. Winter -2008 -Knowledge, Technology & Policy 21 (4):191-203.
  5.  49
    Public involvement in technology policy: focus on the pervasive computing environment.Jenifer S. Winter -2006 -Acm Sigcas Computers and Society 36 (3):49-57.
    This paper examines the role of the general public in informing technology policy, observing that public involvement often occurs only through the electoral process or via feedback after plans have been implemented. Planners and policymakers are not necessarily in touch with the feelings and desires of the public who will be affected by their decisions. For this reason it is important to seek a clearer understanding of the views of citizens who are not typically involved in the planning or design (...) process in order to guide the evolution of technology, as well as to highlight areas where there may be some discrepancy between planners and the needs of everyday users. To broaden the inputs into discussion of emerging problems related to pervasive computing in the State of Hawaii, both information and communication technology specialists and members of the general population were invited to participate in a multi-phase study. Differences in perception between specialists and the general public were identified in all phases of research. Specialists were identified as being more focused on near-term issues related to barriers affecting the growth of high-technology industries within the State. Non-specialists showed greater concern for "human" issues, including issues related to the control of technology. Importantly, both groups independently described a need for increased public participation in the process of technological development. Analysis also revealed that both groups found the problem statements generated by non-specialists to be valuable contributions, arguing for their inclusion in the process of problem identification and further supporting the use of participatory planning methods. (shrink)
    Direct download(8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
Export
Limit to items.
Filters





Configure languageshere.Sign in to use this feature.

Viewing options


Open Category Editor
Off-campus access
Using PhilPapers from home?

Create an account to enable off-campus access through your institution's proxy server or OpenAthens.


[8]ページ先頭

©2009-2025 Movatter.jp