{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T07:11:11Z","timestamp":1724656271934},"reference-count":21,"publisher":"Association for Computing Machinery (ACM)","issue":"4","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[2000,12]]},"abstract":"This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a theoretical level, and an an application level.<\/jats:p>","DOI":"10.1145\/572260.572264","type":"journal-article","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T15:54:55Z","timestamp":1132070095000},"page":"10-16","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":100,"title":["Disclosive computer ethics"],"prefix":"10.1145","volume":"30","author":[{"given":"Philip","family":"Brey","sequence":"first","affiliation":[{"name":"University of Twente, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2000,12]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Human Values and the Design of Computer Technology","author":"Agre P.","year":"1997"},{"key":"e_1_2_1_2_1","volume-title":"Shaping Technology\/Building society: Studies in Sociotechnical Change (eds. W. Bijker, and J. Law)","author":"Akrich M.","year":"1992"},{"key":"e_1_2_1_3_1","unstructured":"Berlin I. (1969) Four Essays on Liberty. Oxford University Press Oxford. Berlin I. (1969) Four Essays on Liberty. Oxford University Press Oxford."},{"key":"e_1_2_1_4_1","unstructured":"Blanchette J. (1998) On the Social Discourse of Cryptology. Paper presented at CEPE98 London School of Economics and Political Science 14-15 December. Blanchette J. (1998) On the Social Discourse of Cryptology. Paper presented at CEPE98 London School of Economics and Political Science 14-15 December."},{"issue":"1","key":"e_1_2_1_5_1","first-page":"1","article-title":"New Media and the Quality of Life, Techn\u00e8","volume":"3","author":"Brey P.","year":"1997","journal-title":"Society for Philosophy and Technology Quarterly"},{"key":"e_1_2_1_6_1","volume-title":"Computer Ethics: Philosophical Enquiry","author":"Brey P.","year":"1998"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006199816737"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Dworkin G. (1988) The Theory and Practice of Autonomy Cambridge University Press Cambridge. Dworkin G. (1988) The Theory and Practice of Autonomy Cambridge University Press Cambridge.","DOI":"10.1017\/CBO9780511625206"},{"key":"e_1_2_1_9_1","unstructured":"Feenberg A. (1999) Questioning Technology. Routledge London and New York. Feenberg A. (1999) Questioning Technology. Routledge London and New York."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/278213"},{"key":"e_1_2_1_11_1","unstructured":"Hill T. (1991) Autonomy and Self-Respect. Cambridge Cambridge University Press. Hill T. (1991) Autonomy and Self-Respect. Cambridge Cambridge University Press."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9973.00053"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Introna L. and Nissenbaum H. (2000) The Public Good Vision of the Internet and The Politics of Search Engines Preferred Placement. Knowledge Politics on the Web (ed. R. Rogers) Jan van Eyck Akademie Editions Maastricht. Introna L. and Nissenbaum H. (2000) The Public Good Vision of the Internet and The Politics of Search Engines Preferred Placement. Knowledge Politics on the Web (ed. R. Rogers) Jan van Eyck Akademie Editions Maastricht.","DOI":"10.1109\/2.816269"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/270858.270865"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"e_1_2_1_16_1","unstructured":"Nissenbaum H. (1998) Can We Protect Privacy in Public? in Computer Ethics: Philosophical Enquiry (ed. J. van den Hoven) Rotterdam University Press Rotterdam. Nissenbaum H. (1998) Can We Protect Privacy in Public? in Computer Ethics: Philosophical Enquiry (ed. J. van den Hoven) Rotterdam University Press Rotterdam."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/016224399201700302"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Rawls J. (1971) A Theory of Justice Harvard University Press Cambridge MA. Rawls J. (1971) A Theory of Justice Harvard University Press Cambridge MA.","DOI":"10.4159\/9780674042605"},{"key":"e_1_2_1_19_1","unstructured":"Sclove R. (1995) Democracy and Technology Guilford Press New York. Sclove R. (1995) Democracy and Technology Guilford Press New York."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010063528863"},{"key":"e_1_2_1_21_1","first-page":"121","article-title":"Do Artifacts have Politics","volume":"109","author":"Winner L.","year":"1980","journal-title":"Daedalus"}],"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/572260.572264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T20:49:11Z","timestamp":1672692551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/572260.572264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,12]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2000,12]]}},"alternative-id":["10.1145\/572260.572264"],"URL":"https:\/\/doi.org\/10.1145\/572260.572264","relation":{},"ISSN":["0095-2737"],"issn-type":[{"value":"0095-2737","type":"print"}],"subject":[],"published":{"date-parts":[[2000,12]]},"assertion":[{"value":"2000-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}