Her præsenteres materiale til et online kursus i etisk argumentation med særligt henblik på analyse af problemer ved udvikling og brug af informationsteknologi. Materialet er på engelsk, og det har været afprøvet på kandidatuddannelsen informationsarkitektur, AAU, i foråret 2018, hvor det sammen med vejledning, opgaver og gruppediskussion har været grundstammen i et modul på uddannelsen.
Kurset omfatter: Introduktion til forskellige former for etisk argumentation set i filosofisk og systematisk perspektiv –især i forhold til ikt som anvendelsesområde. Konkret har der været fokus på en række etiske problemer knyttet til udvikling og anvendelse af informationsteknologi. Det gælder især følgende temaer og anvendelsesområder:
Anderson, C. (2008), “The End of Theory: The Data Deluge Makes the Scientific Method Obsolete”, http://archive.wired.com/science/discoveries/magazine/16-07/pb_theory |
Ansoff, H. I. (1975) “Managing Strategic Surprise by Response to Weak Signals”. California Management Review, XVIII: 2, 21–33. |
Beken, T. V. (2004) “Risky Business: A risk-based methodology to measure organized crime”. Crime, Law & Social Change No. 41, pp. 471-516. |
Benn, S. (1971) “Privacy, Freedom and Respect for Persons”, J. R. Pennock, J. W. Chapman (eds.)Privacy, Atherton Press, New York, pp. 1-27. |
Biehn, N. (2013) “The Missing V's in Big Data: Viability and Value”, http://www.wired.com/insights/2013/05/the-missing-vs-in-big-data-viability-and-value/ |
Boyd, D., & Crawford, K. (2012) “CRITICAL QUESTIONS FOR BIG DATA”, Information, Communication & Society, 15:5, 662-679. |
Brewster, B., Polovina, S., Rankin, G., Andrews, S. (2014) “Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime”, N. Hernandez et al. (eds.), ICCS 2014, LNAI 8577, 104-117. |
Callanan, C., Gercke, M., De Marco, E., Dries-Ziekenheiner, H. (2009) “Internet Blocking – balancing cybercrime responses in democratic societies”, http://www.aconite.com/sites/default/files/Internet_blocking_and_Democracy.pdf |
Clarke, R. 2013. “Introduction to Dataveillance and Information Privacy, and Definitions of Terms”. [accessed Nov. 11, 2016]: http://www.rogerclarke.com/DV/ |
Choo, C. W. (1999) “The Art of Scanning the Environment”, Bulletin of the American Society for Information Science , February/March 1999, 21-24. |
Floridi, L. (2012) “Big Data and Their Epistemological Challenge”, Philos. Technol. 25:435-437. |
Fried, C. (1968) “Privacy: a Moral Analysis”, Yale Law Journal, Vol. 1, No 77, 475-493. |
Gerdes, A. (2014) “A Privacy Preserving Design Framework in Relation to an Environmental Scanning System for Fighting Organized Crime”, K. Kimppa, D. Whitehouse, T. Kuusela & J. Phahlamohlaka (eds.), ICT and Society: 11th IFIP TC9 International Conference on Human Choice and Computers, HCC11, 2014 Turku, Finland, July 30 - August 1, 2014. Springer-VS, 226-239. |
Hilbert, M. (2016) “Big Data for Development: A review of Promises and Challenges”, Development Policy Review, 2016, 34 (1): 135-174. |
IOCTA (2015) “Internet Organized Crime Threat Assessment 2015”, https://www.europol.europa.eu/content/internet-organised-crime-threat-assessment-iocta-2015 |
Jespersen, J.L. et al.: ”Surveillance, Persuasion, and Panopticon”. Persuasive 2007, Springer. In de Kort, Y. et al. (editors): Persuasive 2007, LNCS 4744, Springer Verlag, Berlin, 109-120. |
Jonas, J. & Harper, J (2006) “Effective Counterterrorism and the Limited Role of Predictive Data Mining”. Policy Analysis no. 584: December 11, 2006. 1-11. |
Liotta, P. H. (2002) “Boomerang Effect: the Convergence of National and Human Security”, SAGE Publications, Vol. 33(4), 473-488. |
PCAST (2014) “Report to the President – BIG DATA AND PRIVACY: A TECHNOLOGICAL PERSPECTIVE”. Executive Office of the President’s Council of Advisors on Science and Technology, https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf |
Peissl, W. (2003) “Surveillance and Security: A Dodgy Relationship”, Journal of Contingencies and Crises Management, Vol. 1, No. 11, 19-24. |
Perry, W. L., McInnis, B., Price, C. C., Smith, S. C., & Hollywood, J. S. (2013). "Predictive Policing. The Role of Crime Forecasting in Law Enforcement Operation”. RAND Corporation, Safety and Justice Program RAND Corporation, http://www.rand.org/pubs/research_reports/RR233.html |
Rachels, J. (1995) “Why Privacy is Important”, Philosophy & Public Affairs, Vol. 4, No. 4, 323-333. |
Reiman, J. H. (1995). “Driving to the Panopticon: A Philosophical Exporation of the Risks to Privacy Posed by the Highway Technology of the Future”. Santa Clara High Technology Law Journal, 11 (1), 27-44. |
SOCTA (2016) “Serious Organized Crime Threat Assessment 2015”, https://www.europol.europa.eu/latest_publications/31 |
Van den Hoven, J. (1997) “Privacy and the Varieties of Informational Wrongdoing”, Computers and Society, 33-37. |
Warren, S. D., Brandeis, L. D. 1890. “The Right to Privacy”, Harvard Law Review Vol. 4, no. 5 (Dec. 5, 1890), 193-2002. |
Øhrstrøm, P. & Dyhrberg, J. (2007): “Problems Inherent in Psychological Research based on Internet Communication as Stored Information”. Theoretical Medicine and Bioethics, vol. 28, nr. 3, 221-241. |
Øhrstrøm, P., Helping Autism-Diagnosed Teenagers Navigate and Develop Socially Using E-Learning Based on Mobile Persuasion, International Review of Research in Open and Distance Learning , Vol. 12.4 May – 2011, 54-71 |
Virtue ethics, https://plato.stanford.edu/entries/ethics-virtue/ |
Deontological Ethics, https://plato.stanford.edu/entries/ethics-deontological/ |
Consequentialism, https://plato.stanford.edu/entries/consequentialism/ |
Mill's Moral and Political Philosophy, https://plato.stanford.edu/entries/mill-moral-political/ |