Academic literature on the topic 'Moral and ethical aspects of Electronic behavior control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Moral and ethical aspects of Electronic behavior control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Moral and ethical aspects of Electronic behavior control"

1

Perko, Igor, Andreja Primec, and Robert Horvat. "Sharing business partner behavior." Kybernetes 44, no. 6/7 (2015): 1030–48. http://dx.doi.org/10.1108/k-12-2014-0282.

Full text
Abstract:
Purpose – The new concept of business partner behavior sharing practice is addressed from three perspectives: technical/technological, legal and ethical/moral with the aim to elaborate its sharing feasibility, value added, legal restrictions and moral considerations. Research results are synthetized to present an overview on business partners behavior sharing direct and indirect value added, costs and risks and proposing mitigation strategies. The paper aims to discuss these issues. Design/methodology/approach – To evaluate technical feasibility, a real-life sharing experiment is conducted. Using a sharing agency data are collected, summarized and reported. For the purpose of legal evaluation, relevant legislation is analyzed. Ethicality/morality is assessed utilizing theoretical applied-ethics analysis. Two major normative moral theories – teleology and deontology – are selected for this purpose. The synthesis of the research results is represented in system dynamics model. Findings – Results show no significant technical obstacles for the systematic business partner behavior sharing. Also, no major legal or ethical arguments against it are found, although some important conditions are identified that have to be met in order for the practice to be performed legally and to be qualified as ethical/moral. Research limitations/implications – Analysis of legality is limited to the EU and legislation of the Republic of Slovenia. Ethicality of the practice is assessed from the utilitarian and rights perspectives. Practical implications – Important technical, legal and ethical insights into business partner behavior sharing concepts and practices are provided. Originality/value – To the authors’ knowledge, this is the first time that the practice of business partner behavior sharing is addressed simultaneously from technical, legal and ethical perspectives using a real-life experiment. Therefore it is an important contribution to a more holistic account/insight of/into such a business practice.
APA, Harvard, Vancouver, ISO, and other styles
2

Bidabad, Bijan, and Mahshid Sherafati. "Operational ethical banking in Rastin Banking." International Journal of Law and Management 58, no. 4 (2016): 416–43. http://dx.doi.org/10.1108/ijlma-07-2015-0037.

Full text
Abstract:
Purpose This paper aims to discuss some of the operational Islamic banking features considered in ethical banking as the aspects of Rastin Banking. Ethical banking is a branch of “ethic economics” and a narrow expression of a number of Islamic banking aspects. Design/methodology/approach These features are often involved in the discussions under the topic of internal control and describe the operational characteristics of ethical banking within the framework of Rastin Banking. Findings This study refers to the principles of Rastin Banking, including operational, financial, economic, ethical, social, legal, international and organizational principles. Additionally, it takes into account some of the internal control systems. Research limitations/implications Converting ethical codes into executable laws and regulations needs sophistication, and the art of codification in this subject can be observed in the present paper. Practical implications As far as the ethical behaviour of the assessor and trustee is concerned, the necessities of honesty, belief, virtuosity, rectitude and compliance with moral values, as well as reward and punishment mechanisms, are operationally examined. Transparency, governance and disclosure of information are the other components. The methods of auditing, accounting, inspection and preservation of Rastin Banking achievements are amongst the other matters of concern. Social implications An assiduous attention to the operational details of each of the above-said discussions revealed that the Islamic banking components are capable of covering the topics and discussions beyond ethical banking. Originality/value This paper fulfils an identified need to solve the practical ethical problem in operational banking.
APA, Harvard, Vancouver, ISO, and other styles
3

Koskenvuori, Janika, Olivia Numminen, and Riitta Suhonen. "Ethical climate in nursing environment: A scoping review." Nursing Ethics 26, no. 2 (2017): 327–45. http://dx.doi.org/10.1177/0969733017712081.

Full text
Abstract:
Background: In the past two decades, interest in the concept of ethical climate and in its research has increased in healthcare. Ethical climate is viewed as a type of organizational work climate, and defined as the shared perception of ethically correct behavior, and how ethical issues should be handled in the organization. Ethical climate as an important element of nursing environment has been the focus of several studies. However, scoping reviews of ethical climate research in nursing have not been conducted to guide further research in this area. Objective: The purpose of this scoping review is to describe and analyze studies focusing on ethical climate in nursing environment to elicit an overall picture of the research in this field. Methods: A scoping review methodology guided by Arksey and O’Malley and Levac et al. was used. Studies were identified by conducting electronic searches on PubMed/MEDLINE, CINAHL, Web of Science Core Collection, PsycINFO, and Scopus and Philosophers’ Index databases. Of 1051 citations, 56 articles matched the inclusion criteria. Ethical considerations: This study was conducted according to good scientific guidelines. Findings: Ethical climate is a topical research area which has been explored with different methods and outcomes, in different environments, and has mainly been perceived positively. The focus of the studies was on finding associations between ethical climate and work-related factors such as job satisfaction, moral distress, and turnover intentions. Methodologically, research was rather homogeneous using quantitative, descriptive, and correlative research designs. Conclusion: Novel perspectives and more diverse methodological approaches paying attentions to issues affecting generalizability of the findings could expand our knowledge in this area.
APA, Harvard, Vancouver, ISO, and other styles
4

Aboujaoude, Elias. "Protecting privacy to protect mental health: the new ethical imperative." Journal of Medical Ethics 45, no. 9 (2019): 604–7. http://dx.doi.org/10.1136/medethics-2018-105313.

Full text
Abstract:
Confidentiality is a central bioethical principle governing the provider–patient relationship. Dating back to Hippocrates, new laws have interpreted it for the age of precision medicine and electronic medical records. This is where the discussion of privacy and technology often ends in the scientific health literature when Internet-related technologies have made privacy a much more complex challenge with broad psychological and clinical implications. Beyond the recognised moral duty to protect patients’ health information, clinicians should now advocate a basic right to privacy as a means to safeguard psychological health. The article reviews empirical research into the functions of privacy, the implications for psychological development and the resigned sentiment taking hold regarding the ability to control personal data. The article concludes with a call for legislative, educational and research steps to readjust the equilibrium between the individual and ‘Big Data’.
APA, Harvard, Vancouver, ISO, and other styles
5

Choudhury, Masudul. "Integrity: a systemic philosophico-economic abstraction." Kybernetes 44, no. 3 (2015): 368–83. http://dx.doi.org/10.1108/k-03-2014-0054.

Full text
Abstract:
Purpose – A brief critical review of the existing literature on the topic of integrity opens up the scope for a detailed approach to the meaning of social integrity, or integrity in its social relational sense. The tenor of explanation of this concept is then taken up as a subspace of the meaning of the supreme good and therein the concept of goodness. The paper aims to discuss these issues. Design/methodology/approach – All such concepts are studied in the relational sense of epistemic origin of values. Such ethical values arise from the epistemic ontology of the moral law. They are contrasted with the contrary meanings under the episteme of rationalism. Findings – Rationalism as philosophy of mind and matter devoid of a substantive acceptance of the divinely inspired functional ontology of the moral law is also critically and formally studied. Research limitations/implications – More empirical work needed and which indeed can be done both statistically as well as by quantitative mathematical models. The scope for this extension remains wide open in the paper. Practical implications – The paper presents an immense import in the study of cognitive economics, behavioral finance, and decision making in the area of ethical finance and organizational behavior as a conscious institution. An example is provided. Many more areas are indicated. Altogether a vast scope of conception and applications in the area of endogenous ethics and socio-scientific field remains open. Originality/value – The paper is truly original crossing the boundaries of social cybernetics and systems into mathematical algorithmic treatment exemplified by a game-theoretic example of the imminent place of the meanings of the good, goodness, and the trait of integrity in social behavior. All these are together embedded in the study of embedded social system and cybernetic study. This is a foundationally original field of research investigation playing out its analytical part in the study of social system and cybernetic.
APA, Harvard, Vancouver, ISO, and other styles
6

Gerber, Scott Douglas. "Law and Religion in Plymouth Colony." British Journal of American Legal Studies 8, no. 2 (2019): 167–91. http://dx.doi.org/10.2478/bjals-2019-0016.

Full text
Abstract:
Abstract 2020 marks the 400th anniversary of the planting of Plymouth Colony. Although the literature about Plymouth is voluminous, the discussion about law and religion has been inappropriately superficial to date. This article addresses the Pilgrims’ conception of law on matters of religion and the new insights into the Pilgrims’ story that can be ascertained by focusing on law. “Law” has been defined in many different ways by many different people throughout history. Aristotle, Cicero, Thomas Aquinas, and other proponents of natural law argued that law is the exercise of reason to deduce binding rules of moral behavior from nature’s or God’s creation. The renowned English positivist John Austin, in contrast, maintained that law is the command of the sovereign. To Karl von Savigny and other proponents of the so-called historical school, law is the unconscious embodiment of the common will of the people. To the philosophical school, law is the expression of idealized ethical custom. The dominant contemporary view seems to be that law is the reflection of social, political, and economic interests. For the Pilgrims of Plymouth Colony, law was both the memorialization of their commitment to the Word of God and an instrument for exercising social control so as to effectuate that commitment. The Pilgrims, of course, used law to regulate the more mundane aspects of life as well. Indeed, quantitatively speaking, more laws were enacted by the Pilgrims that addressed the day-to-day activities of life in Plymouth Colony than memorialized the Pilgrims’ commitment to eternal glory in the afterlife, but the latter was unquestionably more important, qualitatively speaking, than the former. In the oft-quoted words of a young William Bradford, “to keep a good conscience, and walk in such a way as God has prescribed in his Word, is a thing which I must prefer before you all, and above life itself.”
APA, Harvard, Vancouver, ISO, and other styles
7

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:

 
 
 There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. 
 
 
 
 Citation reference for this article
 
 MLA Style
 Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style
 Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>. 
APA, Harvard, Vancouver, ISO, and other styles
8

Krylova, Natalia, and Inna Rybalkina. "Young Africans. Peculiarities of Social Practices and their Role in the Formation of the Young Generation." Journal of the Institute for African Studies, September 20, 2018, 83–99. http://dx.doi.org/10.31132/2412-5717-2018-44-3-83-99.

Full text
Abstract:
For the first time in African studies, conducted in Russia, the authors generalize and analyze the experience of centuries-old socialization practices in conjunction with the latest trends in this field. The problem of childhood has long occupied an independent place in the wide range of scientific disciplines that to some extent examine the image of man. It is difficult to avoid standard phrases expressing the possibilities of studying this stage of a person’s life, all those institutions, rules and codes, traditions, customs and innovations, models of morality and culture that are laid in this unique period of life when mental essence and civil image are formed. One of the main factors of the sociocultural nature that forms a young African is the influence of community norms and traditions of values that hold down a person and tie him to a given social group. In a traditional African society, the family has always been (and remains) the main institution of socialization; for the individual it has been that very sociocultural field within which the personality has been formed. In a large African family, the problem boiles down to the development of a very simple model of behavior – to follow the precepts of the ancestors, to reproduce their experience and skills, to preserve their way of life. The formation of more or less close relations of the child with adults who take care of him/her – parents, relatives, friends of the family, etc. – turns the latter into the main agents of his/her socialization. At present, one of the most important factors of socialization is schooling. Often children combine study and work; in Africa, child labor is the most common in the world. Despite the official legal prohibition of the use of child labor, family control plays a key role in its practice. It depends mainly on the family whether the child continues to study or leaves school and engages only in labor activity, the latter primarily within the family. The problem of reducing and eradicating child labor has both moral, ethical, and socio-economic aspects. To solve it, it is necessary to expand access to schooling, increase incomes by achieving greater opportunities for employment and earnings for adult workers, and change attitudes towards child labor on the part of the whole society, and at the same time observe the laws regulating its use.
APA, Harvard, Vancouver, ISO, and other styles
9

"Epidemiology of Digital Addiction among Adolescent Cohorts, Understanding Contexts." International Journal of Psychiatry 5, no. 1 (2020). http://dx.doi.org/10.33140/ijp.05.01.03.

Full text
Abstract:
Background: People with addiction do not have control over their behavior, actions or usage. Their addiction may reach to a point that it is harmful. Addiction does not only involve the physical aspects such as drugs or alcohol but also includes abstract things, often described as a behavioral addiction. The causes of addiction differ considerably and are seldom fully understood. They are generally caused by varying degrees of physical, mental, circumstantial and emotional factors. Objectives: To study the electronic devise profile among children and adolescent in modern global cities such as Dubai and to study the prevalence and size of the addiction phenomena. Methodology: This study was carried out in Dubai, United Arab Emirates during the Global School Health Survey in 2015. The sample included 7000 students who were randomly selected (multistage stratified random sample) from 10 private schools in Dubai. Data collection was carried out by standard questionnaire developed by the World Health Organization which includes different health domains (addiction, and addiction to electronic devices). Ethical issues were followed up to standards. The questionnaire and consent forms were given to the participants who met the inclusion criteria. An information sheet was attached to the questionnaire explaining the purpose of the study. The students were assured that the confidentiality and privacy of the answers were maintained. No names, phone numbers, and identification are required. Data coding, data entry and data analysis has been conducted by using SPSS 20 software. Results: The present study revealed that 56% of school children aged 13-15 years old spend three hours or more a day using electronic games, and this percentage rises to nearly 63% with the age group 16-17 years. The study showed that children, who excessively use these games might face social, emotional and behavioral problems such as isolation, anxiety and depression. Pointing out that children may complain of psychological pressure, stress or dehydration and burning eye, due to constant staring with bright light across the screens of devices. Most students (68.7%) said they were on social media between one and five hours daily, while 3.3 per cent said they spend less than an hour. 39.8% of students stayed without food or drink for a long time and 50.5 % tried to quit social media last year but failed. 15% of students spend 4-8 hours on social media and 1.6% spend more than 10 hours. When the students were asked about how they feel of the burden on their daily life and social commitments, 60% of them replied that social media decreases their interaction with the outside environment and family time, 55.6% said it interfered with their homework. The study showed that more than one quarter (26.7%) or almost one out of four reach up to more than 6 hours per day and could sometimes reach up to 10 in browsing and interacting with social media. The study reflected that more than 400 children showed the negative symptoms on the use of tablets. It appeared significantly on children who use them for more than two hours a day compared to their counterparts who do not use it at all or use it less than two hours. They have noticed that those who use it less have great language, motor and mental skills. Parents do not seem to be paying attention on how technology is taking their kids away from them. Children between the ages of 11 and 17 found out what really is keeping them so busy on all these addictive devices. Around 70% of them are most vulnerable to gaming addiction. They belong to the under-five age group, because parents are preoccupied with them. Conclusion: Electronic addiction among children and adolescents is a rapidly growing phenomena in the City of Dubai. It has a significant impact on the social and professional life and functions of this group, which necessitate intervention at many levels.
APA, Harvard, Vancouver, ISO, and other styles
10

Busse, Kristina, and Shannon Farley. "Remixing the Remix: Fannish Appropriation and the Limits of Unauthorised Use." M/C Journal 16, no. 4 (2013). http://dx.doi.org/10.5204/mcj.659.

Full text
Abstract:
In August 2006 the LiveJournal (hereafter LJ) community sga_flashfic posted its bimonthly challenge: a “Mission Report” challenge. Challenge communities are fandom-specific sites where moderators pick a theme or prompt to which writers respond and then post their specific fan works. The terms of this challenge were to encourage participants to invent a new mission and create a piece of fan fiction in the form of a mission report from the point of view of the Stargate Atlantis team of explorers. As an alternative possibility, and this is where the trouble started, the challenge also allowed to “take another author’s story and write a report” of its mission. Moderator Cesperanza then explained, “if you choose to write a mission report of somebody else’s story, we’ll ask you to credit them, but we won’t require you to ask their permission” (sga_flashfic LJ, 21 Aug. 2006, emphasis added). Whereas most announcement posts would only gather a few comments, this reached more than a hundred responses within hours, mostly complaints. Even though the community administrators quickly backtracked and posted a revision of the challenge not 12 hours later, the fannish LiveJournal sphere debated the challenge for days, reaching far beyond the specific fandom of Stargate Atlantis to discuss the ethical questions surrounding fannish appropriation and remix. At the center of the debate were the last eight words: “we won’t require you to ask their permission.” By encouraging fans to effectively write fan fiction of fan fiction and by not requiring permission, the moderators had violated an unwritten norm within this fannish community. Like all fan communities, western media fans have developed internal rules covering everything from what to include in a story header to how long to include a spoiler warning following aired episodes (for a definition and overview of western media fandom, see Coppa). In this example, the mods violated the fannish prohibition against the borrowing of original characters, settings, plot points, or narrative structures from other fan writers without permission—even though as fan fiction, the source of the inspiration engages in such borrowing itself. These kinds of normative rules can be altered, of course, but any change requires long and involved discussions. In this essay, we look at various debates that showcase how this fan community—media fandom on LiveJournal—creates and enforces but also discusses and changes its normative behavior. Fan fiction authors’ desire to prevent their work from being remixed may seem hypocritical, but we argue that underlying these conversations are complex negotiations of online privacy and control, affective aesthetics, and the value of fan labor. This is not to say that all fan communities address issues of remixing in the same way media fandom at this point in time did nor to suggest that they should; rather, we want to highlight a specific community’s internal ethics, the fervor with which members defend their rules, and the complex arguments that evolve from all sides when rules are questioned. Moreover, we suggest that these conversations offer insight into the specific relation many fan writers have to their stories and how it may differ from a more universal authorial affect. In order to fully understand the underlying motivations and the community ethos that spawned the sga_flashfic debates, we first want to differentiate between forms of unauthorised (re)uses and the legal, moral, and artistic concerns they create. Only with a clear definition of copyright infringement and plagiarism, as well as a clear understanding of who is affected (and in what ways) in any of these cases, can we fully understand the social and moral intersection of fan remixing of fan fiction. Only when sidestepping the legal and economic concerns surrounding remix can we focus on the ethical intricacies between copyright holders and fan writers and, more importantly, within fan communities. Fan communities differ greatly over time, between fandoms, and even depending on their central social interfaces (such as con-based zines, email-based listservs, journal-based online communities, etc.), and as a result they also develop a diverse range of internal community rules (Busse and Hellekson, “Works”; Busker). Much strife is caused when different traditions and their associated mores intersect. We’d argue, however, that the issues in the case of the Stargate Atlantis Remix Challenge were less the confrontation of different communities and more the slowly changing attitudes within one. In fact, looking at media fandom today, we may already be seeing changed attitudes—even as the debates continue over remix permission and unauthorised use. Why Remixes Are Not Copyright Infringement In discussing the limits of unauthorised use, it is important to distinguish plagiarism and copyright violation from forms of remix. While we are more concerned with the ethical issues surrounding plagiarism, we want to briefly address copyright infringement, simply because it often gets mixed into the ethics of remixes. Copyright is strictly defined as a matter of law; in many of the online debates in media fandom, it is often further restricted to U.S. Law, because a large number of the source texts are owned by U.S. companies. According to the U.S. Constitution (Article I, Section 8), Congress has the power to secure an “exclusive Right” “for limited Times.” Given that intellectual property rights have to be granted and are limited, legal scholars read this statute as a delicate balance between offering authors exclusive rights and allowing the public to flourish by building on these works. Over the years, however, intellectual property rights have been expanded and increased at the expense of the public commons (Lessig, Boyle). The main exception to this exclusive right is the concept of “fair use,” defined as use “for purposes such as criticism, comment, news reporting, teaching..., scholarship, or research” (§107). Case law circumscribes the limits of fair use, distinguishing works that are merely “derivative” from those that are “transformative” and thus add value (Chander and Sunder, Fiesler, Katyal, McCardle, Tushnet). The legal status of fan fiction remains undefined without a specific case that would test the fair use doctrine in regards to fan fiction, yet fair use and fan fiction advocates argue that fan fiction should be understood as eminently transformative and thus protected under fair use. The nonprofit fan advocacy group, the Organization for Transformative Works, in fact makes clear its position by including the legal term in their name, reflecting a changing understanding of both fans and scholars. Why Remixes Are Not Plagiarism Whereas copyright infringement is a legal concept that punishes violations between fan writers and commercial copyright holders, plagiarism instead is defined by the norms of the audience for which a piece is written: definitions of plagiarism thus differ from academic to journalist to literary contexts. Within fandom one of the most blatant (and most easily detectable) forms of plagiarism is when a fan copies another work wholesale and publishes it under their own name, either within the same fandom or by simply searching and replacing names to make it fit another fandom. Other times, fan writers may take selections of published pro or fan fiction and insert them into their works. Within fandom accusations of plagiarism are taken seriously, and fandom as a whole polices itself with regards to plagiarism: the LiveJournal community stop_plagiarism, for example, was created in 2005 specifically to report and pursue accusations of plagiarism within fandom. The community keeps a list of known plagiarisers that include the names of over 100 fan writers. Fan fiction plagiarism can only be determined on a case-by-case basis—and fans remain hypervigilant simply because they are all too often falsely accused as merely plagiarising when instead they are interpreting, translating, and transforming. There is another form of fannish offense that does not actually constitute plagiarism but is closely connected to it, namely the wholesale reposting of stories with attributions intact. This practice is frowned upon for two main reasons. Writers like to maintain at least some control over their works, often deriving from anxieties over being able to delete one’s digital footprint if desired or necessary. Archiving stories without authorial permission strips authors of this ability. More importantly, media fandom is a gift economy, in which labor is not reimbursed economically but rather rewarded with feedback (such as comments and kudos) and the growth of a writer’s reputation (Hellekson, Scott). Hosting a story in a place where readers cannot easily give thanks and feedback to the author, the rewards for the writer’s fan labor are effectively taken from her. Reposting thus removes the story from the fannish gift exchange—or, worse, inserts the archivist in lieu of the author as the recipient of thanks and comments. Unauthorised reposting is not plagiarism, as the author’s name remains attached, but it tends to go against fannish mores nonetheless as it deprives the writer of her “payment” of feedback and recognition. When Copyright Holders Object to Fan Fiction A small group of professional authors vocally proclaim fan fiction as unethical, illegal, or both. In her “Fan Fiction Rant” Robin Hobbs declares that “Fan fiction is to writing what a cake mix is to gourmet cooking” and then calls it outright theft: “Fan fiction is like any other form of identity theft. It injures the name of the party whose identity is stolen.” Anne Rice shares her feelings about fan fiction on her web site with a permanent message: “I do not allow fan fiction. The characters are copyrighted. It upsets me terribly to even think about fan fiction with my characters. I advise my readers to write your own original stories with your own characters. It is absolutely essential that you respect my wishes.” Diana Gabaldon calls fan fiction immoral and describes, “it makes me want to barf whenever I’ve inadvertently encountered some of it involving my characters.” Moreover, in a move shared by other anti-fan fiction writers, she compares her characters to family members: “I wouldn’t like people writing sex fantasies for public consumption about me or members of my family—why would I be all right with them doing it to the intimate creations of my imagination and personality?” George R.R. Martin similarly evokes familial intimacy when he writes, “My characters are my children, I have been heard to say. I don’t want people making off with them.” What is interesting in these—and other authors’—articulations of why they disapprove of fan fiction of their works is that their strongest and ultimate argument is neither legal nor economic reasoning but an emotional plea: being a good fan means coloring within the lines laid out by the initial creator, putting one’s toys back exactly as one found them, and never ever getting creative or transformative with them. Many fan fiction writers respect these wishes and do not write in book fandoms where the authors have expressed their desires clearly. Sometimes entire archives respect an author’s desires: fanfiction.net, the largest repository of fic online, removed all stories based on Rice’s work and does not allow any new ones to be posted. However, fandom is a heterogeneous culture with no centralised authority, and it is not difficult to find fic based on Rice’s characters and settings if one knows where to look. Most of these debates are restricted to book fandoms, likely for two reasons: (1) film and TV fan fiction alters the medium, so that there is no possibility that the two works might be mistaken for one another; and (2) film and TV authorship tends to be collaborative and thus lowers the individual sense of ownership (Mann, Sellors). How Fannish Remixes Are like Fan Fiction Most fan fiction writers strongly dismiss accusations of plagiarism and theft, two accusations that all too easily are raised against fan fiction and yet, as we have shown, such accusations actually misdefine terms. Fans extensively debate the artistic values of fan fiction, often drawing from classical literary discussions and examples. Clearly echoing Wilde’s creed that “there is no such thing as a moral or immoral book,” Kalichan, for example, argues in one LJ conversation that “whenever I hear about writers asserting that other writing is immoral, I become violently ill. Aside from this, morality & legality are far from necessarily connected. Lots of things are immoral and legal, illegal and moral and so on, in every permutation imaginable, so let’s just not confuse the two, shall we” (Kalichan LJ, 3 May 2010). Aja Romano concludes an epic list of remixed works ranging from the Aeneid to The Wind Done Gone, from All’s Well That Ends Well to Wicked with a passionate appeal to authors objecting to fan fiction: the story is not defined by the barriers you place around it. The moment you gave it to us, those walls broke. You may hate the fact people are imagining more to your story than what you put there. But if I were you, I’d be grateful that I got the chance to create a story that has a culture around it, a story that people want to keep talking about, reworking, remixing, living in, fantasizing about, thinking about, writing about. (Bookshop LJ, 3 May 2010)Many fan writers view their own remixes as part of a larger cultural movement that appropriates found objects and culturally relevant materials to create new things, much like larger twentieth century movements that include Dada and Pop Art, as well as feminist and postcolonial challenges to the literary canon. Finally, fan fiction partakes in 21st century ideas of social anarchy to create a cultural creative commons of openly shared ideas. Fan Cupidsbow describes strong parallels and cross-connection between all sorts of different movements, from Warhol to opensource, DeviantArt to AMV, fanfiction to mashups, sampling to critique and review. All these things are about how people are interacting with technology every day, and not just digital technology, but pens and paper and clothes and food fusions and everything else. (Cupidsbow LJ, 20 May 2009) Legally, of course, these reuses of collectively shared materials are often treated quite differently, which is why fan fiction advocates often maintain that all remixes be treated equally—regardless of whether their source text is film, TV, literature, or fan fiction. The Archive of Our Own, a project of the Organization for Transformative Works, for example, does not distinguish in its Content and Abuse Policy section between commercial and fan works in regard to plagiarism and copyright. Returning to the initial case of the Stargate Atlantis Mission Report Challenge, we can thus see how the moderator clearly positions herself within a framework that considers all remixes equally remixable. Even after changing the guidelines to require permission for the remixing of existing fan stories, moderator Cesperanza notes that she “remain[s] philosophically committed to the idea that people have the right to make art based on other art provided that due credit is given the original artist” (sga_flashfic LJ, 21 Aug. 2006). Indeed, other fans agree with her position in the ensuing discussions, drawing attention to the hypocrisy of demanding different rules for what appears to be the exact same actions: “So explain to me how you can defend fanfiction as legitimate derivative work if it’s based on one type of source material (professional writing or TV shows), yet decry it as ‘stealing’ and plagiarism if it’s based on another type of source material (fanfiction)” (Marythefan LJ, 21 Aug. 2006). Many fans assert that all remixes should be tolerated by the creators of their respective source texts—be they pro or fan. Fans expect Rowling to be accepting of Harry Potter’s underage romance with a nice and insecure Severus Snape, and they expect Matthew Weiner to be accepting of stories that kill off Don Draper and have his (ex)wives join a commune together. So fans should equally accept fan fiction that presents the grand love of Rodney McKay and John Sheppard, the most popular non-canonical fan fiction pairing on Stargate Atlantis, to be transformed into an abusive and manipulative relationship or rewritten with one of them dying tragically. Lydiabell, for example, argues that “there’s [no]thing wrong with creating a piece of art that uses elements of another work to create something new, always assuming that proper credit is given to the original... even if your interpretation is at odds with everything the original artist wanted to convey” (Lydiabell LJ, 22 Aug. 2006). Transforming works can often move them into territory that is critical of the source text, mocks the source text, rearranges relationships, and alters characterisations. It is here that we reach the central issue of this article: many fans indeed do view intrafandom interactions as fundamentally different to their interactions with professional authors or commercial entertainment companies. While everyone agrees that there are no legal, economic, or even ultimately moral arguments to be made against remixing fan fiction (because any such argument would nullify the fan’s right to create their fan fiction in the first place), the discourses against open remixing tend to revolve around community norms, politeness, and respect. How Fannish Remixes Are Not like Fan Fiction At the heart of the debate lie issues of community norms: taking another fan’s stories as the basis for one’s own fiction is regarded as a violation of manners, at least the way certain sections of the community define them. This, in fact, is not unlike the way many fan academics engage with fandom research. While it may be perfectly legal to directly cite fans’ blog posts, and while it may even be in compliance with institutional ethical research requirements (such as Internal Review Boards at U.S. universities), the academic fan writing about her own community may indeed choose to take extra precautions to protect herself and that community. As Kristina Busse and Karen Hellekson have argued, fan studies often exists at the intersection of language and social studies, and thus written text may simultaneously be treated as artistic works and as utterances by human subjects (“Identity”). In this essay (and elsewhere), we thus limit direct linking into fannish spaces, instead giving site, date, and author, and we have consent from all fans we cite in this essay. The community of fans who write fic in a particular fandom is relatively small, and most of them are familiar with each other, or can trace a connection via one or two degrees of separation only. While writing fan fiction about Harry Potter may influence the way you and your particular circle of friends interpret the novels, it is unlikely to affect the overall reception of the work. During the remix debate, fan no_pseud articulates the differing power dynamic: When someone bases fanfic on another piece of fanfic, the balance of power in the relationship between the two things is completely different to the relationship between a piece of fanfic and the canon source. The two stories have exactly equal authority, exactly equal validity, exactly equal ‘reality’ in fandom. (nopseud LJ, 21 Aug. 2006) Within fandom, there are few stories that have the kind of reach that professional fiction does, and it is just as likely that a fan will come across an unauthorised remix of a piece of fan fiction as the original piece itself. In that way, the reception of fan fiction is more fragile, and fans are justifiably anxious about it. In a recent conversation about proper etiquette within Glee fandom, fan writer flaming_muse articulates her reasons for expecting different behavior from fandom writers who borrow ideas from each other: But there’s a huge difference between fanfic of media and fanfic of other fanfic authors. Part of it is a question of the relationship of the author to the source material … but part of it is just about not hurting or diminishing the other creative people around you. We aren’t hurting Glee by writing fic in their ‘verse; we are hurting other people if we write fanfic of fanfic. We’re taking away what’s special about their particular stories and all of the work they put into them. (Stoney321 LJ, 12 Feb. 2012)Flaming_muse brings together several concepts but underlying all is a sense of community. Thus she equates remixing within the community without permission as a violation of fannish etiquette. The sense of community also plays a role in another reason given by fans who prefer permission, which is the actual ease of getting it. Many fandoms are fairly small communities, which makes it more possible to ask for permission before doing a translation, adaptation, or other kind of rewrite of another person’s fic. Often a fan may have already given feedback to the story or shared some form of conversation with the writer, so that requesting permission seems fairly innocuous. Moreover, fandom is a community based on the economy of gifting and sharing (Hellekson), so that etiquette becomes that much more important. Unlike pro authors who are financially reimbursed for their works, feedback is effectively a fan writer’s only payment. Getting comments, kudos, or recommendations for their stories are ways in which readers reward and thank the writers for their work. Many fans feel that a gift economy functions only through the goodwill of all its participants, which remixing without permission violates. How Fan Writing May Differ From Pro Writing Fans have a different emotional investment in their creations, only partially connected to writing solely for love (as opposed to professional writers who may write for love but also write for their livelihood in the best-case scenarios). One fan, who writes both pro and fan fiction, describes her more distanced emotional involvement with her professional writing as follows, When I’m writing for money, I limit my emotional investment in the material I produce. Ultimately what I am producing does not belong to me. Someone else is buying it and I am serving their needs, not my own. (St_Crispins LJ, 27 Aug. 2006)The sense of writing for oneself as part of a community also comes through in a comment by pro and fan writer Matociquala, who describes the specificity and often quite limited audience of fan fiction as follows: Fanfiction is written in the expectation of being enjoyed in an open membership but tight-knit community, and the writer has an expectation of being included in the enjoyment and discussion. It is the difference, in other words, between throwing a fair on the high road, and a party in a back yard. Sure, you might be able to see what’s going on from the street, but you’re expected not to stare. (Matociquala LJ, 18 May 2006)What we find important here is the way both writers seem to suggest that fan fiction allows for a greater intimacy and immediacy on the whole. So while not all writers write to fulfill (their own or other’s) emotional and narrative desires, this seems to be more acceptable in fan fiction. Intimacy, i.e., the emotional and, often sexual, openness and vulnerability readers and writers exhibit in the stories and surrounding interaction, can thus constitute a central aspect for readers and writers alike. Again, none of these aspects are particular to fan fiction alone, but, unlike in much other writing, they are such a central component that the stories divorced from their context—textual, social, and emotional—may not be fully comprehensible. In a discussion several years ago, Ellen Fremedon coined the term Id Vortex, by which she refers to that very tailored and customised writing that caters to the writers’ and/or readers’ kinks, that creates stories that not only move us emotionally because we already care about the characters but also because it uses tropes, characterisations, and scenes that appeal very viscerally: In fandom, we’ve all got this agreement to just suspend shame. I mean, a lot of what we write is masturbation material, and we all know it, and so we can’t really pretend that we’re only trying to write for our readers’ most rarefied sensibilities, you know? We all know right where the Id Vortex is, and we have this agreement to approach it with caution, but without any shame at all. (Ellen Fremedon LJ, 2 Dec. 2004)Writing stories for a particular sexual kink may be the most obvious way fans tailor stories to their own (or others’) desires, but in general, fan stories often seem to be more immediate, more intimate, more revealing than most published writing. This attachment is only strengthened by fans’ immense emotional attachment to the characters, as they may spend years if not decades rewatching their show, discussing all its details, and reading and writing stories upon stories. From Community to Commons These norms and mores continue to evolve as fannish activity becomes more and more visible to the mainstream, and new generations of fans enter fandom within a culture where media is increasingly spreadable across social networks and all fannish activity is collectively described and recognised as “fandom” (Jenkins, Ford, and Green). The default mode of the mainstream often treats “found” material as disseminable, and interfaces encourage such engagement by inviting users to “share” on their collection of social networks. As a result, many new fans see remixing as not only part of their fannish right, but engage in their activity on platforms that make sharing with or without attribution both increasingly easy and normative. Tumblr is the most recent and obvious example of a platform in which reblogging other users’ posts, with or without commentary, is the normative mode. Instead of (or in addition to) uploading one’s story to an archive, a fan writer might post it on Tumblr and consider reblogs as another form of feedback. In fact, our case study and its associated differentiation of legal, moral, and artistic justifications for and against remixing fan works, may indeed be an historical artifact in its own right: media fandom as a small and well-defined community of fans with a common interest and a shared history is the exception rather than the norm in today’s fan culture. When access to stories and other fans required personal initiation, it was easy to teach and enforce a community ethos. Now, however, fan fiction tops Google searches for strings that include both Harry and Draco or Spock and Uhura, and fan art is readily reblogged by sites for shows ranging from MTV’s Teen Wolf to NBC’s Hannibal. Our essay thus must be understood as a brief glimpse into the internal debates of media fans at a particular historical juncture: showcasing not only the clear separation media fan writers make between professional and fan works, but also the strong ethos that online communities can hold and defend—if only for a little while. References Boyle, James. The Public Domain: Enclosing the Commons of the Mind. Ithaca: Yale University Press, 2008. Busker, Rebecca Lucy. “On Symposia: LiveJournal and the Shape of Fannish Discourse.” Transformative Works and Cultures 1 (2008). http://journal.transformativeworks.org/index.php/twc/article/view/49. Busse, Kristina, and Karen Hellekson. “Work in Progress.” In Karen Hellekson and Kristina Busse, eds., Fan Fiction and Fan Communities in the Age of the Internet: New Essays. Jefferson, N.C.: McFarland, 2006. 5–40. Busse, Kristina, and Karen Hellekson. “Identity, Ethics, and Fan Privacy.” In Katherine Larsen and Lynn Zubernis, eds., Fan Culture: Theory/Practice. Newcastle upon Tyne: Cambridge Scholars Publishing, 2012. 38-56. Chander, Anupam, and Madhavi Sunder. “Everyone’s a Superhero: A Cultural Theory of ‘Mary Sue’ Fan Fiction as Fair Use.” California Law Review 95 (2007): 597-626. Coppa, Francesca. “A Brief History of Media Fandom.” In Karen Hellekson and Kristina Busse, eds., Fan Fiction and Fan Communities in the Age of the Internet: New Essays. Jefferson, N.C.: McFarland, 2006. 41–59. Fiesler, Casey. “Everything I Need to Know I Learned from Fandom: How Existing Social Norms Can Help Shape the Next Generation of User-Generated Content.” Vanderbilt Journal of Entertainment and Technology Law 10 (2008): 729-62. Gabaldon, Diana. “Fan Fiction and Moral Conundrums.” Voyages of the Artemis. Blog. 3 May 2010. 7 May 2010 http://voyagesoftheartemis.blogspot.com/2010/05/fan-fiction-and-moral-conundrums.html. Hellekson, Karen. “A Fannish Field of Value: Online Fan Gift Culture.” Cinema Journal 48.4 (2009): 113–18. Hobbs, Robin. “The Fan Fiction Rant.” Robin Hobb’s Home. 2005. 14 May 2006 http://www.robinhobb.com/rant.html. Jenkins, Henry, Sam Ford, and Joshua Green. Spreadable Media: Creating Value and Meaning in a Networked Culture. New York: New York University Press, 2013. Katyal, Sonia. “Performance, Property, and the Slashing of Gender in Fan Fiction.” Journal of Gender, Social Policy, and the Law 14 (2006): 463-518. Lessig, Lawrence. Remix: Making Art and Commerce Thrive in a Hybrid Economy. New York: Penguin, 2008. Mann, Denise. “It’s Not TV, It’s Brand Management.” In Vicki Mayer, Miranda Banks, and John Thornton Caldwell, eds., Production Studies: Cultural Studies of Media Industries. New York: Routledge, 2009. 99-114. Martin, George R.R. “Someone is Angry on the Internet.” LiveJournal. 7 May 2010. 15 May 2013. http://grrm.livejournal.com/151914.html. McCardle, Meredith. “Fandom, Fan Fiction and Fanfare: What’s All the Fuss?” Boston University Journal of Science and Technology Law 9 (2003): 443-68. Rice, Anne. “Important Message From Anne on ‘Fan Fiction’.” n.d. 15 May 2013. http://www.annerice.com/readerinteraction-messagestofans.html. Scott, Suzanne. “Repackaging Fan Culture: The Regifting Economy of Ancillary Content Models.” Transformative Works and Cultures 3 (2009). http://dx.doi.org/10.3983/twc.2009.0150. Sellors, C. Paul. Film Authorship: Auteurs and Other Myths. London: Wallflower, 2010. Tushnet, Rebecca. “Copyright Law, Fan Practices, and the Rights of the Author.” In Jonathan Gray, Cornel Sandvoss, and C. Lee Harrington, eds., Fandom: Identities and Communities in a Mediated World. New York: New York University Press, 2007. 60-71.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Moral and ethical aspects of Electronic behavior control"

1

Wang, Jie. "Moral Judgment and Digital Piracy: Predicting Attitudes, Intention, and Behavior Regarding Digital Piracy Using a Modified Version of the Defining Issues Test." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc822761/.

Full text
Abstract:
Digital piracy, the illegal copying or downloading of copyrighted digital products without approval from the copyright holders, has brought great economic loss to the software and digital media industries. Previous studies using moral developmental theory have not found consistent relationships between moral judgment and attitudes towards digital piracy. While some researchers have developed individual test items to assess relationships between moral judgment and attitudes toward digital piracy, others have relied on the Defining Issues Test (DIT). However, in that the DIT represents a general measure of moral judgment based on broad social issues, it, too, may not adequately assess an individual’s reasoning specific to issues regarding digital piracy. The purpose of this study was to create a reliable instrument (i.e., DP-DIT) modeled after the DIT designed to assess moral judgment regarding digital piracy as well as to examine and compare the ability of both DP-DIT and DIT2-short to predict attitudes, intentions and behaviors regarding digital piracy of college students. Results indicated the reliability of both the DIT2-short and the DP-DIT were discounted, quite likely due to the small number of stories contained in each. DP-DIT appeared to have greater predictive ability due to its advantage in predicting attitudes toward digital piracy, especially using DP-DIT MNS. However, even though here DP-DIT MNS was the strongest predictor of attitudes toward digital piracy, it explained a limited amount of variance. Further research to improve reliability and validity of DP-DIT is warranted.
APA, Harvard, Vancouver, ISO, and other styles
2

Ihenacho, Kelechi Nkeiruka, and Christina Nicole Burden. "The influence of gender scripts on African American college student condom use." CSUSB ScholarWorks, 2011. https://scholarworks.lib.csusb.edu/etd-project/3329.

Full text
Abstract:
This study examines how African American gender scripts influence condom use for disease and pregnancy prevention. One-hundred African American California State University, San Bernardino (CSUSB) students were selected to participate in this study. Fifty African American males and fifty African American females were surveyed for this study to be representative of the African American community on campus.
APA, Harvard, Vancouver, ISO, and other styles
3

Plaatjie, Bulelwa. "The impact of HIV and AIDS on planned parenthood in the area of Mthatha." Diss., 2009. http://hdl.handle.net/10500/3092.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Moral and ethical aspects of Electronic behavior control"

1

Robertson, Diana C. Does opportunity make the thief?: An exploratory study of how control systems influence an industrial salesperson's ethical behavior. European Institute for Advanced Studies in Management, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

missing], [name. Making normal: Social regulation in Canada. Nelson Thomson Learning, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gaslighting, the double whammy, interrogation, and other methods of covert control in psychotherapy and psychoanalysis. J. Aronson, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ganascia, Jean-Gabriel. Voir et pouvoir, qui nous surveille? Le Pommier, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Governing lethal behavior in autonomous robots. Chapman & Hall/CRC Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Surveillance globale: Enquête sur les nouvelles formes de contrôle. Climats, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The reluctant alliance: Behaviorism and humanism. Prometheus Books, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Information communication technology law, protection, and access rights: Global approaches and issues. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Portela, Irene Maria. Information communication technology law, protection, and access rights: Global approaches and issues. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Roger, Herdman, and Institute of Medicine (U.S.). Division of Health Care Services., eds. Non-heart-beating organ transplantation: Medical and ethical issues in procurement. National Academy Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Moral and ethical aspects of Electronic behavior control"

1

Marshall, J. Alan. "Development of the Leader Integrity Assessment." In Online Instruments, Data Collection, and Electronic Measurements. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2172-5.ch013.

Full text
Abstract:
The purpose of this research is to develop a direct and concise perceived leader integrity instrument that is posed from a positive perspective. The integrity construct in this study is developed from the tradition of moral philosophy and virtue ethics. The integrity construct in this study incorporates two aspects of integrity found in the literature, namely value-behavior congruence and a requirement that this congruence be grounded in morality. The moral philosophy used in this study to ground the integrity construct is virtue ethics as proposed by ancient philosophy and later maintained by Christian virtue ethics in the middle ages. An expert panel was used to establish content validity and construct validity/reliability was established via analysis of three samples of Air Force personnel associated with the U-2 pilot community. Nomological validity is established by leveraging the resultant Leader Integrity Assessment 15 to investigate the hypothesized moderating effects on the relationship between leader prototypicality and follower trust in the leader as proposed in the Kalshoven and Den Hartog (2009) Ethical Leadership Model. Overall, the Leader Integrity Assessment 15 was found valid and reliable and the integrity construct was found unidimensional as hypothesized.
APA, Harvard, Vancouver, ISO, and other styles
2

Zedlacher, Eva, and Martina Hartner-Tiefenthaler. "Civility Values and Cyberbullying Prevention in the Digital Workspace." In Advances in Human Resources Management and Organizational Development. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4912-4.ch027.

Full text
Abstract:
In the digital workspace, new forms of (negative) interactions have emerged. Workplace cyberbullying can be pervasive, fast, and intrude the private sphere. These aspects make organizational surveillance and prevention challenging. In this conceptual chapter, the authors argue that for establishing an ethical digital workspace, civility values and ethical principles of individual responsibility and mutual respect are crucial. For prevention of workplace cyberbullying, formal systems like technological detection systems or policies are insufficient. Rather, organizations need to foster informal “social control.” The social norms in small workgroups and the leader's role-modeling behavior should guide the digital behavior of employees at and beyond work, and eventually create a climate of respect. This should also help to increase bystanders' moral awareness of allegedly minor uncivil incidents. Examples of different formal and informal preventive measures are discussed. The chapter ends with a brief discussion and outlook on future legal and technological advancements.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!