Kursus i etisk argumentation - med særligt henblik på udvikling og brug af informationsteknologi

Her præsenteres materiale til et online kursus i etisk argumentation med særligt henblik på analyse af problemer ved udvikling og brug af informationsteknologi. Materialet er på engelsk, og det har været afprøvet på kandidatuddannelsen informationsarkitektur, AAU, i foråret 2018, hvor det sammen med vejledning, opgaver og gruppediskussion har været grundstammen i et modul på uddannelsen.
 
Kurset omfatter: Introduktion til forskellige former for etisk argumentation set i filosofisk og systematisk perspektiv –især i forhold til ikt som anvendelsesområde. Konkret har der været fokus på en række etiske problemer knyttet til udvikling og anvendelse af informationsteknologi. Det gælder især følgende temaer og anvendelsesområder:
 

  • Overvågning, kontrol/registrering, privathed –især med henblik på bekæmpelse af organiseret kriminalitet
  • Ikt i sundhedssektoren
  • Menneske-maskine interaktion
  • Robotteknologi
Der er samlet en litteraturliste (se nedenfor) af relevant læsestof til området.
 
Forelæsningerne kan følges som video eller lydfiler med tilhørende slides
 
Materialet er udviklet og arrangeret af Peter Øhrstrøm, Jørgen Albretsen samt Simon Pacis. Desuden er der inddraget en række forelæsere (se nedenfor).
 
Materialet under forelæsninger er frit tilgængeligt, men må ikke uden særlig tilladelse fra Peter Øhrstrøm yderligere distribueres.

 
 
 
Litteraturliste

Anderson, C. (2008), The End of Theory: The Data Deluge Makes the Scientific Method Obsolete, http://archive.wired.com/science/discoveries/magazine/16-07/pb_theory
Ansoff, H. I. (1975) “Managing Strategic Surprise by Response to Weak Signals”. California Management Review, XVIII: 2, 21–33.
Beken, T. V. (2004) “Risky Business: A risk-based methodology to measure organized crime”. Crime, Law & Social Change No. 41, pp. 471-516.
Benn, S. (1971) “Privacy, Freedom and Respect for Persons”, J. R. Pennock, J. W. Chapman (eds.)Privacy, Atherton Press, New York, pp. 1-27.
Biehn, N. (2013) “The Missing V's in Big Data: Viability and Value”, http://www.wired.com/insights/2013/05/the-missing-vs-in-big-data-viability-and-value/
Boyd, D., & Crawford, K. (2012) “CRITICAL QUESTIONS FOR BIG DATA”, Information, Communication & Society, 15:5, 662-679.
Brewster, B., Polovina, S., Rankin, G., Andrews, S. (2014) “Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime”, N. Hernandez et al. (eds.), ICCS 2014, LNAI 8577, 104-117.
Callanan, C., Gercke, M., De Marco, E., Dries-Ziekenheiner, H. (2009) “Internet Blocking – balancing cybercrime responses in democratic societies”, http://www.aconite.com/sites/default/files/Internet_blocking_and_Democracy.pdf
Clarke, R. 2013. “Introduction to Dataveillance and Information Privacy, and Definitions of Terms”. [accessed Nov. 11, 2016]: http://www.rogerclarke.com/DV/
Choo, C. W. (1999) “The Art of Scanning the Environment”, Bulletin of the American Society for Information Science , February/March 1999, 21-24.
Floridi, L. (2012) “Big Data and Their Epistemological Challenge”, Philos. Technol. 25:435-437.
Fried, C. (1968) “Privacy: a Moral Analysis”, Yale Law Journal, Vol. 1, No 77, 475-493.
Gerdes, A. (2014) “A Privacy Preserving Design Framework in Relation to an Environmental Scanning System for Fighting Organized Crime”, K. Kimppa, D. Whitehouse, T. Kuusela & J. Phahlamohlaka (eds.), ICT and Society: 11th IFIP TC9 International Conference on Human Choice and Computers, HCC11, 2014 Turku, Finland, July 30 - August 1, 2014. Springer-VS, 226-239.
Hilbert, M. (2016) “Big Data for Development: A review of Promises and Challenges”, Development Policy Review, 2016, 34 (1): 135-174.
IOCTA (2015) “Internet Organized Crime Threat Assessment 2015”, https://www.europol.europa.eu/content/internet-organised-crime-threat-assessment-iocta-2015
Jespersen, J.L. et al.: ”Surveillance, Persuasion, and Panopticon”. Persuasive 2007, Springer. In de Kort, Y. et al. (editors): Persuasive 2007, LNCS 4744, Springer Verlag, Berlin, 109-120.
Jonas, J. & Harper, J (2006) “Effective Counterterrorism and the Limited Role of Predictive Data Mining”. Policy Analysis no. 584: December 11, 2006. 1-11.
Liotta, P. H. (2002) “Boomerang Effect: the Convergence of National and Human Security”, SAGE Publications, Vol. 33(4), 473-488.
PCAST (2014) “Report to the President – BIG DATA AND PRIVACY: A TECHNOLOGICAL PERSPECTIVE”. Executive Office of the President’s Council of Advisors on Science and Technology, https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf
Peissl, W. (2003) “Surveillance and Security: A Dodgy Relationship”, Journal of Contingencies and Crises Management, Vol. 1, No. 11, 19-24.
Perry, W. L., McInnis, B., Price, C. C., Smith, S. C., & Hollywood, J. S. (2013). "Predictive Policing. The Role of Crime Forecasting in Law Enforcement Operation”. RAND Corporation, Safety and Justice Program RAND Corporation, http://www.rand.org/pubs/research_reports/RR233.html
Rachels, J. (1995) “Why Privacy is Important”, Philosophy & Public Affairs, Vol. 4, No. 4, 323-333.
Reiman, J. H. (1995). “Driving to the Panopticon: A Philosophical Exporation of the Risks to Privacy Posed by the Highway Technology of the Future”. Santa Clara High Technology Law Journal, 11 (1), 27-44.
SOCTA (2016) “Serious Organized Crime Threat Assessment 2015”, https://www.europol.europa.eu/latest_publications/31
Van den Hoven, J. (1997) “Privacy and the Varieties of Informational Wrongdoing”, Computers and Society, 33-37.
Warren, S. D., Brandeis, L. D. 1890. “The Right to Privacy”, Harvard Law Review Vol. 4, no. 5 (Dec. 5, 1890), 193-2002.
Øhrstrøm, P. & Dyhrberg, J. (2007): “Problems Inherent in Psychological Research based on Internet Communication as Stored Information”. Theoretical Medicine and Bioethics, vol. 28, nr. 3, 221-241.
Øhrstrøm, P., Helping Autism-Diagnosed Teenagers Navigate and Develop Socially Using E-Learning Based on Mobile Persuasion, International Review of Research in Open and Distance Learning , Vol. 12.4 May – 2011, 54-71
Virtue ethics, https://plato.stanford.edu/entries/ethics-virtue/
Deontological Ethics, https://plato.stanford.edu/entries/ethics-deontological/
Consequentialism, https://plato.stanford.edu/entries/consequentialism/
Mill's Moral and Political Philosophy, https://plato.stanford.edu/entries/mill-moral-political/

 
 
Aalborg University