Doing the right thing: computer ethics pedagogy revisited

Author:

Jones Simon

Abstract

Purpose – This paper aims to critically reassess established approaches to the teaching and analysis of computer ethics, and to propose a revised methodology, drawing on the practical experience of teaching undergraduates in a culturally diverse, international learning environment. Design/methodology/approach – Theoretical in scope, reviewing concepts and methods in the existing literature and developing an alternative inter-disciplinary and multi-dimensional framework. Findings – Ethical analysis can benefit from broader, inter-disciplinary perspectives that take into account the social and economic context in which information and communication technologies (ICTs) are designed, deployed and used, and the complex forces that drive their development. A richer analysis of this context enables a better understanding of the specific properties and applications of ICTs which, in turn, foreground particular ethical issues. This can result in a more self-reflexive and rounded appreciation of the ethical, legal and professional issues invoked by ICTs. Originality/value – The paper develops a revised, flexible methodology for doing ethics which can be applied to any case study or domain of application. It outlines some of the key questions and major ethical principles that are generated by ICTs. The paper has pedagogical value for both teachers and students of computer ethics, but has relevance also for information technology professionals and practitioners.

Publisher

Emerald

Subject

Computer Networks and Communications,Sociology and Political Science,Philosophy,Communication

Reference54 articles.

1. Adams, A. and McCrindle, R. (2008), Pandora’s Box: Social and Professional Issues of the Information Age , John Wiley, Chichester.

2. Andrejevic, M. (2007), iSpy: Surveillance and Power in the Interactive Era , University Press of Kansas, Lawrence, KS.

3. Baase, S. (2009), A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet , Pearson, Upper Saddle River, NJ.

4. Benkler, Y. (2006), The Wealth of Networks , Yale University Press, New Haven, CT.

5. Berry, D. (2008), Copy, Rip, Burn: The Politics of Copyleft and Open Source , Pluto Press, London.

Cited by 9 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3