School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 584, Information Ethics
Fall 2013

Accuracy of Information/Software

Accuracy of Information

Arsenault, A., & Castells, M. (2006). Conquering the minds, conquering Iraq: The social production of misinformation in the United States -- A case study. Information, Communication, & Society, 9(3), 284-307. [UNC libraries]

Barsumyan, S. (1990). Can your client sue you for misinformation? In Mintz, A. P. (Ed.), Information Ethics: Concerns for Librarianship and the Information Industry. Jefferson, NC: McFarland, 32-52. [SILS - Z682.35 .P75 I53 1990]

Beghtol, C. (2005). Ethical decision-making for knowledge representation and organizational systems for global use. Journal of the American Society for Information Science & Technology, 56(9), 903-912. [UNC libraries]

Hafner, A. W. (1990). Medical information, health sciences, and professional liability. Special Libraries, 81(4), 305-08. [UNC libraries]

Healey, P.D. (2008). Professional Liability Issues for Librarians and Information Professionals. New York: Neal-Schuman. [SILS - KF4316 .H43 2008]

Laudon, K. C. (1986). Data quality and due process in large interorganizational record systems [FBI criminal records system]. Communications of the ACM, 29(1), 4-11. [ACM Digital Libraries] Reprinted in Dejoie, R., Fowler, G., & Paradice, D. (Eds.). (1991). Ethical Issues in Information Systems. Boston: Boyd & Fraser, 140-154. [SILS - QA76.9 .M65 E83 1991]

Samuelson, P. (1993). Liability for defective electronic information. Communications of the ACM, 36(1), 21-26. [ACM Digital Libraries] Reprinted in Johnson, D. G. & Nissenbaum, H. (Eds.). (1995). Computers, Ethics, and Social Values. Englewood Cliffs, NJ: Prentice-Hall, 539-548. [Davis - QA76.9 .A25 C6665 1995]

Shenk, D. (1997). The first law of data smog. In Data Smog: Surviving the Information Glut. San Francisco: Harper-SanFrancisco. [Davis - HM221 .S515 1997] (Also reprinted in Bucy, E. P. (2005). Living in the Information Age: A New Media Reader. 2nd edition. Wadsworth/Thomson Learning, 157-161. [SILS - P91.25 .L58 2005])

Vedder, A. (2008). Responsibilities for information on the Internet. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 339-359. [UNC libraries]

Accuracy of Software

Bowen, J. (2000). The ethics of safety-critical systems. Communications of the ACM, 43(4), 91-97. [ACM Digital Library]

Cantwell Smith, B. (1995). The limits of correctness in computers. In D. Johnson & H. Nissenbaum (Eds.), Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 456-469. [Davis - QA76.9 .A25 C6665 1995]

Collins, W. R., Miller, K. W., Spielman, B. J., & Wherry, P. (1994). How good is good enough? An ethical analysis of software construction and use. Communications of the ACM, 37(1), 81-91. [ACM Digital Library]

Takanen, A., Vuorijärvi, P., Laakso, M., & Röning, J. (2004). Agents of responsibility in software vulnerability processes. Ethics and Information Technology, 6(2), 93-110. [UNC libraries]

Ethics/Values Embodied in System Design and Design Processes

Birrer, F. A. J. (1999). Understanding values and biases in I.T. Computers and Society, 29(1), 16-21. [ACM Digital Library]

Flanagan, M., Howe, D.C., & Nissenbaum, H. (2008). Embodying values in technology: Theory and practice. In van den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press, 322-353. [Davis Library - T58.5 .I53745 2008]

Friedman, B., Kahn, P.H., Jr., & Borning, A. (2008). Value sensitive design and information systems. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 69-101. [UNC libraries]

Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems, 14(3), 330-347. [ACM Digital Library]

Gandy, O.H., Jr. (2012). Matrix multiplication and the digital divide. In Nakamura, L., & Chow-White, P.A. (eds.), Race After the Internet. New York: Routledge, 128-145. [Davis - HT1523 .R25123 2012]

Grinter, B. (2013). A big data confession. interactions, 20(4), 10-11. [UNC libraries]

Harris, I., Jennings, R.C., Pullinger, D., Rogerson, S., & Duquenoy, P. (2011). Ethical assessment of new technologies: A meta-methodology. Journal of Information, Communication & Ethics in Society, 99(1), 49-64. [UNC libraries]

Huff, C. (1996). Unintentional power in the design of computing systems. Computers and Society, 16(4), 6-9. [ACM Digital Library] (Also reprinted in Spinello, R. A. (ed.), Readings in CyberEthics. 2nd ed. Sudbury, MA: Jones and Bartlett, 651-658. SILS - TK5105.5 .R3722 2004)

Knight, J. (2008). Value-centred interaction design methods. Journal of Information, Communication & Ethics in Society, 6(4), 334-348. [Request on interlibrary loan or from instructor]

Knobel, C., & Bowker, G.C. (2011). Values in design [Computing ethics]. Communications of the ACM, 54(7), 26-28. [UNC libraries]

Light, B., & McGrath, K. (2010). Ethics and social networking sites: A disclosive analysis of Facebook. Information Technology & People, 23(4), 290-311. [UNC libraries]

Mager, A. (2012). Algorithmic ideology: How capitalist society shapes search engines. Information, Communication & Society, 15(5), 769-787. [UNC libraries]

Marez, C. (2012). Cesar Chavez, the United Farm Workers, and the history of Star Wars. In Nakamura, L., & Chow-White, P.A. (eds.), Race After the Internet. New York: Routledge, 85-108. [Davis - HT1523 .R25123 2012]

Nafus, D. (2011). 'Patches don't have gender': What is not open in open source software. New Media & Society, 14(4), 669-683. [UNC libraries]

Tonkinwise, C. (2004). Ethics by design, or the ethos of things. Design Philosophy Papers, 02. http://www.desphilosophy.com/dpp/dpp_journal/paper4/body.html.

Yetim, F. (2011). Bringing discourse ethics to value sensitive design: Pathways toward a deliberative future. AIS Transactions on Computer-Human Interaction, 3(2), 133-155. [UNC libraries]

Social Entrepreneurship

Acs, Z.J., & Sany, J. (2009). Measuring the social value of innovation: The cases of Muhammad Yunus, Grameen Bank and Bill Gates, Microsoft. In Libecap, G.D. (ed.), Measuring the Social Value of Innovation: A Link in the University Technology Transfer and Entrepreneurship Equation. Bingley, UK: Jai Press, 143-170. [Davis Library - HB615 .A38 2009]

Cho, A.H. (2009). Politics, values and social entrepreneurship: A critical appraisal. In Mair, J., Robinson, J., & Hockerts, K. (eds.), Social Entrepreneurship. Palgrave Macmillan, 34-56. [Online]

Choi, D.Y., & Gray, E.R. (2011). Values-Centered Entrepreneurs and Their Companies. New York: Routledge. [Davis Library - HD60 .C48 2011]

de Bruin, A. (2003). Electronic entrepreneurship. In de Bruin, A., & Dupuis, A. (eds.), Entrepreneurship: New Perspectives in a Global Age. Aldershot, England: Ashgate, 76-91. [Davis Library - HB615 .E63453 2003]

Etzkowitz, H. (2009). Normative change in science: From enterpreneurial science to social enterpreneurship. In Libecap, G.D. (ed.), Measuring the Social Value of Innovation: A Link in the University Technology Transfer and Entrepreneurship Equation. Bingley, UK: Jai Press, 29-50. [Davis Library - HB615 .A38 2009]

Harris, J.A. (2012). Transformative Entrepreneurs: How Walt Disney, Steve Jobs, Muhammad Yunus, and Other Innovators Succeeded. New York: Palgrave Macmillan. [Davis Library - HC29 .H35 2012]

Laurel, B. (2001). Utopian Entrepreneur. Cambridge: MIT Press. [SILS - HD60 .L347 2001]

Roper, J., & Cheney, G. (2005). The meanings of social entrepreneurship today. Corporate Governance, 5(3), 95-104. [UNC libraries]

Zahra, S.A., Gedajlovic, E., Neubaum, D.O., & Shulman, J.M. (2009). A typology of social entrepreneurs: Motives, search processes and ethical challenges. Journal of Business Ventures, 24(5), 519-532. [UNC libraries]

Accuracy of Information: Additional Readings

Beghtol, C. (2005). Ethical decision-making for knowledge representation and organization systems for global use. Journal of the American Society for Information Science & Technology, 56(9), 903-912. [UNC libraries]

Gray, J. A. (1989). The health science librarian's exposure to malpractice liability because of negligent provision of information. Bulletin of the Medical Library Association, 77(1), 33-37. [Online via PubMed]

Groen, F. (1983). Provision of health information has legal and ethical aspects. Canadian Library Journal, 40(6), 359-62. [SILS]

Moxley, D., Blake, J., & Maze, S. (2004). Pay-for-placement search engines and user consequences. In Mendina, T., & Britz, J. J. (eds.), Information Ethics in the Electronic Age: Current Issues in Africa and the World. Jefferson, NC: McFarland, 81-87. [SILS - Z665 .I5795 2004]

Protti, M. E. (1991). Dispensing law at the front lines: Ethical dilemmas in law librarianship. Library Trends, 40(2), 234-243. [SILS]

Wood, M. S. (1991). Public service ethics in health sciences libraries. Library Trends, 40(2), 244-257. [SILS]

Accuracy of Software: Additional Readings

Berdichevsky, D., & Neunschwander, E. (1999). Toward an ethics of persuasive technology. Communications of the ACM, 42(5), 51-58. [ACM Digital Library]

Corbato, F. J. (1991). On building systems that will fail. Communications of the ACM, 34(9), 73-81. [ACM Digital Library]

Hites, D. (1999). The ethics of software testing. Journal of Information Ethics, 8(1), 63-71. [SILS]

Huff, C., & Jawer, B. (1994). Toward a design ethic for computer professionals. In Huff, C., & Finholt, T. (Eds.), Social Issues in Computing: Putting Computing in its Place. New York: McGraw-Hill, 691-712. [Davis - QA76.9 .C66 S62 1994]

King, P., & Tester, J. (1999). The landscape of persuasive technologies. Communications of the ACM, 42(5), 31-38. [ACM Digital Library]

Littlewood, B., & Stringini, L. (1992, November). The risks of software. Scientific American, 62-75. Reprinted in Johnson, D. G. & Nissenbaum, H. (Eds.). (1995). Computers, Ethics, and Social Values. Englewood Cliffs, NJ: Prentice-Hall, 432-437. [Davis - QA76.9 .A25 C6665 1995]

Parnas, D., Schouwen, J., & Kwan, S. P. (1990). Evaluation of safety critical software. Communications of the ACM, 33(6), 636-648. [ACM Digital Library]

Taylor, M.J., & Moynihan, E. (2002). Analysing IT ethics. Systems Research and Behavioral Science, 19(1), 49-60. [UNC libraries]

Tseng, S., & Fogg, B. J. (1999). Credibility and computing technology. Communications of the ACM, 42(5), 39-44. [ACM Digital Library]

Scenarios of Ethical Decisions

Borning, A. (1995). Computer system reliability and nuclear war. In Johnson, D. G. & Nissenbaum, H. (Eds.), Computers, Ethics, and Social Values. Englewood Cliffs, NJ: Prentice-Hall, 398-421. [Davis - QA76.9 .A25 C6665 1995]

Epstein, R. G. (1994). Case study: the case of the killer robot (part 1). Computers & Society, 24(3), 20-28. [ACM Digital Library]

Epstein, R. G. (1994). Case study: the case of the killer robot (part 2). Computers & Society, 24(4), 12-32. [ACM Digital Library]

Joyce, E. (1987, May 15). Software bugs: a matter of life and liability [THERAC-25 case]. Datamation, 33(10), 88-92. [UNC libraries]

Kallmann, E. A., & Grillo, J. P. (1993). Credit woes. In Ethical Decision Making and Information Technology: An Introduction with Cases. 2nd ed. New York: McGraw-Hill, 61-62. [SILS - T58.5 .K34 1993]

Leveson, N., & Turner, C. S. (1993). An investigation of the Therac-25 accidents. IEEE Computer, 26(7), 18-41. [UNC libraries]

Oz, E. (1994). Obligations to clients. In Ethics for the Information Age: Cases. Dubuque, IA: Business & Educational Technologies, 11-13. [SILS - T58.5 .O9 1994 c.2]

Oz, E. (1994). Obligations to employer. In Ethics for the Information Age: Cases. Dubuque, IA: Business & Educational Technologies, 19-21. [SILS - T58.5 .O9 1994 c.2]

Spinello, R. A. (1997). Case 5.2, Data accuracy and the credit bureau industry. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 105-111. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 5.3, Medical records privacy and the MIB. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 111-115. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 8.3, NCR's Warehouse Manager. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 203-205. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 8.4, Intel's Pentium chip product. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 205-211. [Davis - QA76.9 .M65 S65 1997]

Tavani, H.T. (2004). Case illustration: The Aegis radar system. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 120. [SILS - TK5105.5 .T385 2004]


Return to INLS 584 Syllabus or INLS 584 Schedule


Creative Commons LicenseThe INLS 584 website, UNC-CH, 2013, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at wildemuth@unc.edu.
This page was last modified on August 28, 2013, by Barbara M. Wildemuth.