Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link. https://ebooknice.com/page/post?id=faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookNice Team
Status:
Available4.5
27 reviews(Ebook) Ethical IT Innovation A Value Based System Design Approach 1st Edition by Sarah Spiekermann - Ebook PDF Instant Download/Delivery: 9780429067938, 0429067933
Full download (Ebook) Ethical IT Innovation A Value Based System Design Approach 1st Edition after payment
Product details:
ISBN 10: 0429067933
ISBN 13: 9780429067938
Author: Sarah Spiekermann
(Ebook) Ethical IT Innovation A Value Based System Design Approach 1st Edition Table of contents:
1 Introduction
1.1 How This Book Frames Computer Ethics
1.2 The Ethical System Development Life Cycle (E-SDLC)
1.3 Value-Based IT Design: A Positive Message for IT Markets
1.4 Engineers, Managers, and “Ethical Machines”
References
2 IT Innovation
2.1 Human Growth and Eudemonia through IT
2.2 Human Nightmares Caused by IT and a Short Reflection on Good and Bad
2.3 End of IT Innovation Based on Functionality
2.4 Questioning “Function Hypes”
2.5 True Cost of Hype Cycles
2.6 Post Hype Cycles: Catering to Higher Human Values
2.7 Values in IT Design
2.8 Necessity for Value-Based Design
2.9 Envisioning the Value of IT Services
References
3 Future IT Environments: Five Scenarios
3.1 Personas Used in the Scenarios
3.2 Scenario 1: Future of Gaming
3.3 Scenario 2: Future of Work
3.4 Scenario 3: Future of Retail
3.5 Scenario 4: Future of University Education
3.6 Scenario 5: Future of Robotics
3.7 IT Innovation Lying Ahead
3.8 Positive Potential Outcomes of IT Innovation
3.9 Negative Potential Outcomes of IT Innovation
References
4 Value Ethics and IT
4.1 An Introduction to Values
4.2 What Is a Value?
4.3 Intrinsic versus Extrinsic Values
4.4 Intrinsic Values in Philosophy and Psychology
4.4.1 Nonmoral Values versus Moral Values
4.4.2 Values versus Virtues
4.4.3 Necessary Values for Human Growth
References
5 Ethical Knowledge for Ethical IT Innovation
5.1 What Is Knowledge?
5.2 Ethical Challenges in IT-Driven Knowledge Creation
5.3 Ethical Challenges in Data Collection
5.3.1 Informed Consent
5.3.2 User Control over Data Collection
5.4 Ethical Challenges in Information Aggregation and Knowledge Creation
5.4.1 Data Quality
5.4.2 Truth
5.4.3 Transparency
5.5 Ethical Challenges for Accessing Knowledge
5.5.1 Conditional Access to Knowledge and the Digital Divide
5.5.2 Objectivity versus Filter Bubbles
5.6 Ethical Uses of Information and Knowledge, a Privacy Issue
5.6.1 Contextual Integrity
5.6.2 Privacy Harms
5.6.3 Computer Bias and Fairness
5.7 Summing Up: Ethical Knowledge Management
References
6 Preserving Freedom in Future IT Environments
6.1 Negative Liberty and Machines
6.2 Positive Liberty and Machines
6.3 Technology Paternalism and Controllability
6.4 Autonomy vis-à-vis Machines
6.5 Attention-Sensitive Machines
6.5.1 Attention-Sensitive Interruption
6.6 Summing Up: Freedom and Liberty in Future IT Environments
References
7 Health and Strength in the Machine Age
7.1 Direct Effect of Machines on Physical Health and Strength
7.2 Long-Term Effect of Machines on Physical Health and Strength
7.3 Direct Effect of Machines on Mental Health and Strength
7.4 Indirect Effect of Machines on Mental Health
7.4.1 Mental Health Challenges in Response to Computer Use on the Job
7.5 Indirect Effect of Machines on Physical Health
References
8 Safety, Security, and Privacy in Future IT Environments
8.1 Safety versus Security
8.2 Safety, Cyberwar, and Cybercrime
8.3 Security and Privacy Principles in Machine Engineering
8.3.1 Information Security Goals
8.3.2 Auditability
8.3.2.1 Security Audits versus Privacy Efforts
8.3.2.2 Data Minimization for Security and Privacy Reasons
8.3.2.3 Audit Trails for Privacy Management
8.3.3 Accountability
8.4 Privacy and Surveillance
8.4.1 Surveillance and Dataveillance
8.4.2 Pros and Cons of Surveillance
8.4.3 Reaching Golden Means in Surveillance?
References
9 Trust in Future IT Environments
9.1 What Is Trust?
9.2 Distinguishing Trust from Confidence and Reliance
9.3 Trust Mechanisms in Machines
9.4 How Computer Scientists Understand Trust
9.5 Reputation Systems
References
10 Friendship in Future IT Environments
10.1 What Is Philia (Friendship)?
10.2 Machines as Mediators of Friendship
10.3 Shared Life and Learning in Virtual Worlds
10.4 Empathy in Virtual Worlds
10.5 Intimacy and Disinhibition in Online Environments
10.6 Intimacy with Artificial Beings
10.7 Final Thoughts on Friendship in Future IT Environments
References
11 Dignity and Respect in the Machine Age
11.1 Dignity and Respect
11.2 Respectful Machines
11.3 Polite Machines
11.4 Psychological Ownership in Future IT Environments
11.5 Self-Esteem through Open and Free Software
11.6 Influence of Patents and Copyrights on Human and Economic Growth
11.7 Outlook on Human “Doing”: Impact of Machines on Work
References
12 Privacy and a Summary of the Value Fabric
12.1 Privacy and Ethical Knowledge
12.2 Privacy and Freedom
12.3 Privacy Trade-Offs at All Levels of the Value Pyramid
12.4 Summing Up: Values in Future IT Environments
References
13 Ethical Value-Based IT System Design: An Overview
13.1 Management View of New Product Development
13.2 Engineering View of New IT Product Development
13.2.1 IT Project Identification and Selection
13.2.2 IT Project Initiation and Planning
13.2.3 System Analysis
13.2.4 System Design, Implementation, and Software Engineering
13.3 Computer Ethics and IT System Design
13.4 Value-Sensitive Design
13.4.1 Value Discovery
13.4.2 Value Conceptualization
13.4.3 Empirical Value Investigation
13.4.4 Technical Value Investigation
13.5 Stakeholder Involvement in Ethical IT System Design
13.5.1 Challenges and Rules in Stakeholder Processes
13.5.2 Choosing the Stakeholders
13.5.3 Rational Arguments and Ideal Speech Situations
References
14 Value Discovery for IT Project Selection
14.1 Envisioning with Cards
14.2 Envisioning with Scenarios
14.3 Critical Information Systems and Reflective Design
References
15 Wise Leadership in the IT Project Selection Phase
15.1 Why Should Leaders Care about the Ethical Design of IT?
15.2 Why Many Executives Still Ignore Ethics
15.3 Tough Decisions for Wise Leaders
15.3.1 What Is Philosophical Mode?
15.4 Utilitarian Reasoning
15.4.1 Act Utilitarian Reasoning
15.4.2 General Utilitarian Reasoning
15.4.3 Rule Utilitarian Reasoning
15.4.4 Problems with Utilitarian Reasoning
15.5 What Makes a Wise Leader?
15.6 Deontological Philosophical Reasoning
15.7 Rawls’s Theory of Justice and the Veil of Ignorance
15.8 Classical Virtue Ethics
15.9 Ethical Decision Making in the IT Selection Phase
15.9.1 Mapping IT Effects and Values
15.9.2 A Matrix for Ethical IT Decisions
15.10 Challenges for Leaders in the IT Selection Phase
15.10.1 Practical Challenges for Ethical Decision Making in the IT Selection Phase
15.10.1.1 Stating the Obvious: Catering IT Solutions to Mainstream Values
15.10.1.2 Functional Enthusiasm Leads to Embellishing the New IT Idea
15.10.2 Organizational Challenges for Wise Leadership
15.10.2.1 Inflated Trust in a Scientific Method for IT Investments
15.10.2.2 Leaders’ Lack of Time and Alienation from the Decision Base
15.10.2.3 The Idea That IT Is Merely a Support Function
15.10.2.4 “Being Good” Is Delegated to the Corporate Social Responsibility Department
References
16 Ethical IT Planning
16.1 Conceptual Value Analysis
16.2 Feasibility Analysis
16.2.1 Political Feasibility and Ethical Feasibility
16.2.2 Economic, Legal, and Ethical Feasibility
16.2.3 Technical and Operational Feasibility
References
17 Ethical IT System Analysis
17.1 Context Analysis
17.1.1 Physical Context Analysis
17.1.2 Technical Context Analysis
17.1.2.1 How Technical Context Influences IT Design
17.1.2.2 How IT Design Impacts the Technical Context
17.2 From Value Dams and Flows to Development Goals
17.3 Analyzing Ethical Priorities for System Design
17.3.1 Qualitative Persona Analysis
17.3.1.1 What Should a Persona Description Contain?
17.3.1.2 How Personas Can Be Used to Analyze Ethical Priorities
17.3.2 Quantitative Value Dams and Flows Analysis
17.3.3 Using Risk Analysis to Identify Ethical System Design Priorities
17.4 Operationalizing Development Goals
References
18 Ethical IT System Design
18.1 Threat and Control Analysis
18.2 Modeling and Understanding System Design Alternatives
18.3 System Implementation
References
19 Machine Ethics and Value-Based IT Design
19.1 Explicit Ethical Agents
19.2 Full Ethical Agents?
People also search for (Ebook) Ethical IT Innovation A Value Based System Design Approach 1st Edition:
ethical it innovation a value based system design approach
what is a value based model
what is ethical innovation
ethical innovation examples
ethical value systems
Tags: Sarah Spiekermann, Ethical IT Innovation, Design Approach