1 |
The Ethics of Workspace SurveillancePalm, Elin January 2008 (has links)
The general framework of this thesis is that of ethical Technology Assessment (eTA). Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I (written in collaboration with Sven Ove Hansson) is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We suggest that assessments should be conducted on the basis of nine crucial ethical aspects of technology. In Essay II an in-depth analysis of the meaning and value of privacy in the realm of work is undertaken. The meaning and value of privacy is explained as well as why it should be protected. It is argued that two dimensions of privacy should be safeguarded; “informational privacy” and “local privacy” for the reason that workers’ personal autonomy is protected thereby. Essay III is concerned with how workspace surveillance requires that job-applicants claim their privacy interests in employment negotiations to a much larger extent than what was previously the case. In most cases however, a dependency asymmetry between employer and job-candidate makes the latter ill-equipped for doing so. This asymmetry serves as the point of departure for an analysis of the conditions under which consent should be considered a criterion on moral acceptability with regard to employment contracting. The analysis suggests ways of rectifying this imbalance, raising demands on the quality of contractual consent. Essay IV discusses the extent to which it should be morally permissible for current or prospective employees to trade off their privacy in employment negotiations. The analysis starts out from, and questions, a libertarian case for voluntary self-enslavement. It is concluded that not even an orthodox libertarian can justify trade offs of a social good like liberty. Neither should employees be allowed to abstain informational privacy for the reason that such a trade-off could harm their future selves. In Essay V a dimensional analysis is proposed as a means to identify actually or potentially privacy invasive surveillance practices. It discusses ways in which different types of surveillance intrude upon employees’ privacy in order to guide the evaluation of such practice. Even though negative implications cannot be avoided altogether, by means of the proposed analysis, minimally intrusive means of monitoring can be identified. / QC 20100902
|
2 |
Holographic Communications Technologies : A qualitative study on the ethical and\or legal challenges based on the stakeholders' perspectivesGiogiou, Natalia January 2022 (has links)
Holographic communications technologies are a new digital technology being currently developed by companies to be available to the public in the near future. Through holographic communications technologies, the image of one user located in one place can be captured with special equipment from different angles, so that its three-dimensional depiction is created realistically. The 3D depiction is then transmitted in high-quality to another user located in some other remote place, creating a whole new experience of unconventional data communication. This new digital technology is planned to be deployed in several fields, such as marketing, education, medicine, business and entertainment. However, like any new technological tool that is introduced, also in the case of holographic communication technologies there are ethical and/or legal challenges that could emerge from its misuse and set in danger fundamental human rights. Hence, research was conducted as an interpretive qualitative study to explore the potential ethical and/or legal challenges of holographic communications technologies by considering the knowledge, opinions, experiences, and perspectives of legal experts, as well as experts on ethical issues. The empirical data was collected through individual semi-structured interviews from the selected participants, and from the review of mainly confidential documents, before being subjected to a thematic analysis. The analysis of the data gave prominence to five themes which were reviewed in the context of the research question and the proposed theoretical framework with the help of Ethical Technology Assessment (ETA). The discussion of the findings revealed that the most prominent challenges that could arise from the use of holographic communications technologies are privacy and data protection issues. It was further shown that existing digital technologies with similar features and the ethical and/or legal challenges confronted in the past about them can be of help to approach the ones regarding holographic communications technologies. The research indicated that the designing phase of a new digital technology, and accordingly holographic communication technologies, is important as decisions are being made about the technical features of it, as well as the capabilities it will offer to the end users. Hence, it plays a vital role to whether the use of the digital technology will be according to ethics and laws later on. It was also shown that the participation of end users in this phase is important to reflect their concerns and desires with the creators before the new digital technology is introduced, but it is still a challenge to decide who will be included and on what criteria they will be selected. The research showed that existing ethical and legal frameworks are important to form a corresponding framework for holographic communications technologies and can be built upon. However, this is also a challenge, as, according to the research, any new framework that will be constructed with regard to holographic communications technologies cannot possibly be unanimous as different norms and societal beliefs apply to different territories or domains, but should rather be “personalized” according to the targeted audience.
|
Page generated in 0.1104 seconds