$B%U%#%j%C%W!&%V%l%$!V%3%s%T%e!<%?NQM}3X$K$*$1$kJ}K!!'J#?tCJ3,$N3X:]E*%"%W%m!<%A$K8~$1$F!W(B
$B;0NX(B $B635W(B
$B=PE5!'(BPhilip Brey,$B!H(BMethod in computer ethics: Towards a multi-level interdisciplinary approach$B!I(B, Ethics and Information Technology, $B#2!'(Bpp.125-129$B!$(B2000
$B%-!<%o!<%I(B
$B3+<(E*%3%s%T%e!<%?NQM}3X!J(Bdisclosive computer ethics$B!K(B
$BJ#?tCJ3,$G3X:]E*$J%"%W%m!<%A!J(Ba multi-level interdisciplinary approach$B!K(B
$BMW(B $BLs(B
$BK\O@$G$O%3%s%T%e!<%?NQM}3X$NJ}K!O@E*B&LL$K$D$$$F9M$(!"$$$o$f$k3+<(E*%3%s%T%e!<%?NQM}3X$NCf?4E*Lr3d$r2L$?$9J#?tCJ3,$G3X:]E*$J%"%W%m!<%A$r;Y;}$9$k5DO@$r9T$&!#3+<(E*%3%s%T%e!<%?NQM}3X$O%3%s%T%e!<%?%7%9%F%`$d$=$N1~MQ!"2A$,9T$o$l$k!#(B
$B#1!%%3%s%T%e!<%?NQM}3X!'L\E*!"
$BK\>O$G$O!"%3%s%T%e!<%?NQM}3X$NJ}K!O@E*5DO@$,!"%3%s%T%e!<%?NQM}3X$NL\E*$H$B!V%3%s%T%e!<%?NQM}3X$H$O2?$+!W$H$$$&O@J8$NCf$G!"%3%s%T%e!<%?NQM}3X$N$B%3%s%T%e!<%?NQM}3X$Nr7o$*$h$SN)K!$N%W%m%;%9!O$NJ,@O$H$OFHN)$K!"$=$NF;FAE*FbMF$K$D$$$FJ,@O$9$k$3$H$,$G$-$k!#(B
$B$NJ,Ln$HF1MM$K!"8!F$$NBP>]$H$J$k$B$7$+$7!"F;FAM}O@$N1~MQ$O%3%s%T%e!<%?NQM}3XWFM$,5/$3$j!"?7$?$JF;FAE*%8%l%s%^$,@8$8$k!#$=$N;~!"8=B8$NF;FAM}O@$O!"=t2ACM$N>WFM$d?7$7$$2ACM$rE,@Z$KM}O@2=$7$F$$$J$$$3$H$,$o$+$k$@$m$&!#%W%i%$%P%7!<$O$=$N0lNc$G$"$k!#%W%i%$%P%7!<$O!"F;FAM}O@$K$*$$$F0JA0$K9M$($i$l$F$$$?$h$j$bCm0U$rMW$9$k$3$H$H$7$FB?$/$N%3%s%T%e!<%?NQM}3X$B%3%s%T%e!<%?NQM}3X$N2]Bj$N0lIt$OF;FAM}O@$NE83+$H1~MQ$G$"$k$,!"N>$B5-=RE*8&5f$N=EMW@-$O%`!<%"$K$h$C$F$"$kDxEY$^$G8@5Z$5$l$F$$$k!#%`!<%"$K$h$k$H!"!V%3%s%T%e!<%?NQM}3X$N=EMW$J;E;v$NB?$/$O!"%3%s%T%e!<%?5;=Q$r4^$`NQM}E*LdBj$rM}2r$9$k$?$a$N35G0E*OHAH$_$r<($9$3$H$K8~$1$i$l$F$$$k!#!WL@$i$+$K%`!<%"$O!"%3%s%T%e!<%?NQM}3X$N8&5f$KI,MW$H$5$l$k35G0E*J,@O$NBgItJ,$O5-=RE*35G0$NJ,@O$NCf$K8+=P$5$l$k$H9M$($F$$$k!#%`!<%"$,5s$2$F$$$kNc$K$h$l$P!"%3%s%T%e!<%?%W%m%0%i%`$rJ]8n$9$k@/:v$r$?$F$k$?$a$K$O!"$^$:;O$a$K!V%3%s%T%e!<%?%W%m%0%i%`$H$O2?$+!W$d!V%W%m%0%i%`$O8=e$NLdBj$KEz$($J$1$l$P$J$i$J$$!#F;FAM}O@$NE83+$*$h$S$=$N1~MQ$K$D$$$G!"%3%s%T%e!<%?NQM}3X$NBh;0$N=EMW$J8&5f3hF0$O!"5-=RE*35G0$N35G0E*J,@O$H!"4XO"$9$k7P83E*;v$B#2!%1#$5$l$?F;FA@-$H3+<(E*%3%s%T%e!<%?NQM}3X(B
$BDj$7$F$$$k$h$&$K;W$o$l$k!#%`!<%"$O!"!V%3%s%T%e!<%?NQM}3X$K$*$1$kE57?E*LdBj$,5/$3$k$N$O!"%3%s%T%e!<%?5;=Q$O$$$+$K$7$F;HMQ$5$l$k$Y$-$+$K$D$$$F$N;X?K$N6uGr!J(Ba policy vacuum$B!K$,$"$k$+$i$G$"$k!W$H=R$Y$F$$$k!#$3$N$h$&$J>l9g$K$J$9$Y$-$3$H$O!"F;FAE*LdBj$r0z$-5/$3$9$B%3%s%T%e!<%?5;=Q$,F;FAE*FC@-$r;}$A$&$k$H$$$&8+2r$O!"$=$l$,@/<#E*FC@-$r;}$A$&$k$H$$$&8+2r$N3HD%$G$"$k!J(BWinner 1980$B!$(BSclove 1995$B!$(BPffenberger 1992$B!$(BAkrich 1992$B!K!#%&%#!<%J!<$K$h$l$P!"5;=QE*$J?M9)J*$*$h$S%7%9%F%`$O$[$H$s$IK!N'$N$h$&$K5!G=$9$k!#9TF0$r@)8B$7!"8x6&Ca=x$NOHAH$_$H$7$FF/$/$3$H$K$h$C$F!"%9%/%i%V$O5;=QE*$J?M9)J*$r$N$B:G6a$N%3%s%T%e!<%?NQM}3X$NCx:n$NB?$/$O$B%3%s%T%e!<%?NQM}3X$K$*$1$k$3$N$h$&$JJ,@O$N=EMW@-$+$i!"$3$N%"%W%m!<%A$r3+<(E*%3%s%T%e!<%?NQM}3X$H;d$O8F$S$?$$!#%3%s%T%e!<%?NQM}3X$K$*$1$k3+<(E*8&5f$H$O!"%3%s%T%e!<%?%7%9%F%`$d%3%s%T%e!<%?$N1~MQ!"2A$9$k$3$H$K4X$9$k8&5f$N$3$H$G$"$k!#(B
$BL@$i$+$K!"5;=Q$d$C$F!"$h$j87L)$JF;FAE*I>2A$O3+<(E*J,@O$,$J$5$l$k$^$GBT$D$3$H$,$G$-$k!#(B
$B$3$&$7$F%3%s%T%e!<%?NQM}3X$N3+<(E*8&5f$OFsCJ3,$N%W%m%;%9$H$$$&7A<0$ro<1E*$JDj5A$@$1$,M?$($i$l$k!#$3$NJ,@O$+$i!"5;=Q#X$N$"$kFCD'$,FCDj$N;EJ}$G2ACM#Y$r8:$8$5$;$k!J$"$k$$$O!"2ACM#Y$r0];}$9$k!K$H$$$&2>@bE*$J7kO@$,F3$-=P$5$l$k$@$m$&!#Nc$($P!"%5!<%A%(%s%8%s$,>pJs%W%i%$%P%7!<$r8:$8$5$;$k798~$K$"$k$H$$$&$3$H$rA[Dj$7$h$&!#$3$N>l9g!">pJs%W%i%$%P%7!<$H$O!"8D?M$,<+J,<+?H$K4X$9$k>pJs$N3+<($KBP$7$F;}$D@)8f$H$7$F$f$k$d$+$KDj5A$5$l$k!#$3$NJ,@O$OBhFsCJ3,$NJ,@O$rB%$9!#BhFsCJ3,$G!">pJs%W%i%$%P%7!<$NM}O@$,1~MQ$5$l!"$5$i$KE83+$5$l!"7k2LE*$K%5!<%A%(%s%8%s$N%W%i%$%P%7!<$K4X$o$kB&LL$K$D$$$F$N$h$j8DJLE*$J5,HOE*I>2A$KE~C#$9$k$3$H$,$G$-$k!#(B
$B$b$A$m$s3+<(E*J,@O$O$h$jM}O@e$NNc$G$O!"FCDj$NF;FA86M}$r4^$`!">pJs%W%i%$%P%7!<$K$D$$$F$NF;FAM}O@$+$i;O$a$F!"%5!<%A%(%s%8%s$,$3$NF;FA86M}$r;Y;}$9$k$+!";Y;}$7$J$$$+$rJ,@O$7$F$$$k!#>l9g$K$h$C$F$O!"$3$NJ,@O$N7k2L$H$7$F!"%5!<%A%(%s%8%s$N%W%i%$%P%7!<$K4X$9$kB&LL$K$D$$$F?d>)$G$-$k@/:v$,F@$i$l$k$+$b$7$l$J$$!#(B
$B$3$l$iFs$D$N%"%W%m!<%A$O!"$I$A$i$bMFG'2DG=$J3+<(E*%3%s%T%e!<%?NQM}3X$NJ}K!$G$"$k!#$7$+$7!"M}O@/$J$/$H$bFs$D$"$k!#Bh0l$K!"M}O@pJs%W%i%$%P%7!<35G0$G$O!"8=:_$N%5!<%A%(%s%8%s$,>pJs%W%i%$%P%7!<$r?/32$7$F$$$k$3$H$,<($5$l$?$H$7$h$&!#$7$+$7!"$3$N$3$H$OM}O@#T$r5q@d$9$k?M$OG$BBhFs$K!"M}O@e$N5;=Q$"$k$$$ODj$r4^$`4Q;!2DG=$J8=>]$rJ,@O$9$k;~$K!"$9$G$K9bEY$KM}O@E*$J8lWC$,MQ$$$i$l$F$$$k$+$i$G$"$k!#4Q;!$K:]$7$F$O$h$jCfN)E*$J5-=R$,9%$^$7$$$N$@$,!"M}O@$B:G8e$K!"$I$N$h$&$JF;FAE*2ACM$d5,HO$,3+<(E*J,@O$G8&5f$5$l$k$Y$-$+!"$H$$$&Ld$$$,@8$8$k$G$"$m$&!#;d$N9M$($G$O!"$^$7$$!#$H$$$&$N$b!"$=$N$h$&$J2ACM$d5,HO$r?/32$9$k%3%s%T%e!<%?%7%9%F%`$"$k$$$O$=$N1~MQ$O!"L@$i$+$KF;FAE*$Ke$N!V8x@5!W$K$D$$$F3+<(E*$K8&5f$9$k$K$O!"$^$:!V8x@5!W$r9-$/>o<1E*$KDj5A$9$k$3$H$+$i;O$a!"$C$F!"$=$N%7%9%F%`$K$h$C$FIT8x@5$K07$o$l$k=8CD$,$"$k$+$I$&$+$ND4::$K$B#3!%J#?tCJ3,$N3X:]E*8&5f$NI,MW@-(B
$B3+<(E*%3%s%T%e!<%?NQM}3X$OJ#?tCJ3,$N3X:]E*$J%"%W%m!<%A$rMW5a$7!"$3$N%"%W%m!<%A$O;0$D$NCJ3,$+$i$J$k!#Bh0lCJ3,$O3+<(E*CJ3,$G$"$k!#$3$3$G$O3+<(E*%3%s%T%e!<%?NQM}3X$N8&5f$,;O$^$j!"$"$kpJs%W%i%$%P%7!pJs$H$N4X78$H$$$C$?LdBj$KBP$9$k$d$d4pACE*$J$3$N8&5f$O!"%3%s%T%e!<%?5;=Q$r4^$`?7$7$$$B%3%s%T%e!<%?NQM}3X8&5f$O!"M}O@E*CJ3,$K$*$$$F$N$_E/3XE*@lLgCN<1$rI,MW$H$7!"E/3X$B1~MQCJ3,$G$N8&5f$O!":F$SE/3X$N=EMW$J>pJs$r0lCW$5$;$k$3$H$,E/3XE*5;G=$rMW$9$k3hF0$G$"$k$H$7$F$b!"$3$NCJ3,$G8!F$$5$l$M$P$J$i$J$$>pJs$O!"BgItJ,$,HsE/3XE*$J$B3+<(E*CJ3,!"M}O@E*CJ3,!"1~MQCJ3,$H$$$&;0AX9=B$%b%G%k$O%3%s%T%e!<%?NQM}3X$K$*$1$k3+<(E*%"%W%m!<%A$KEv$F$O$^$k!#Hs3+<(E*%3%s%T%e!<%?NQM}3X$ODL>o!"M}O@E*CJ3,$H1~MQCJ3,$N$_$+$i@.$kFsCJ3,%b%G%k$K=>$C$F$$$k!#Hs3+<(E*%"%W%m!<%A$O!"$=$3$K4^$^$l$F$$$k5;=Q$do$K$O$C$-$j$H$7$F$$$k$,!"$3$l$i$N5;=Q$d2qOC$NNQM}$K$D$$$F$N8&5f$G$O!"$I$N$h$&$Jo$KA0$b$C$FL@$i$+$K$J$C$F$$$k!#$=$l$@$1$K3+<(E*CJ3,$G@.$5$l$k$Y$-;v$O$"$^$j$J$$!#$=$N$+$o$j$K$[$H$s$I$N;E;v$O35$7$F1~MQCJ3,$G$J$5$l$k$G$"$m$&!#6qBNE*$K$O!"8=:_$"$kF;FAM}O@!JNc$($P!"<+N'$NNQM}!K$r$B#4!%7kO@(B
$B3+<(E*%3%s%T%e!<%?NQM}3X$O!"1~MQNQM}3X$K$*$1$kEAE}E*$J%"%W%m!<%A$+$i$O0o$l$k$,!"%3%s%T%e!<%?NQM}3X$G$OHs>o$KI,MW$H$5$l$k%"%W%m!<%A$r9=@.$7$F$$$k!#1~MQNQM}3X$NEAE}E*$J%"%W%m!<%A$O5;=QE*%7%9%F%`$do$OL5;k$7$F$7$^$$!"0JA0$H$7$FF;FAM}O@$NDj<02=$d1~MQ$K@lG0$7$F$$$k!#$9$G$K5DO@$7$F$-$?$h$&$K!"3+<(E*%3%s%T%e!<%?NQM}3X$OM}O@GE@$rEv$F$k$Y$-$G$"$k!#;M$D$N80$H$J$k35G0$H$O@55A!"<+N'!"L1$NNN0h$G$b0lHL2=$5$l$k$N$OEvA3$N$3$H$G$"$k!#(B
$B3+<(E*%3%s%T%e!<%?NQM}3X$KI,MW$JJ}K!O@$OJ#?tCJ3,$N3X:]E*$J$b$N$G$"$k!#$=$N>l9g!"8&5f$O;0CJ3,$G9T$o$l$k!#3+<(E*CJ3,$G$OE/3X2A$r9T$&!#3+<(E*CJ3,$r$b$?$:!"1~MQCJ3,$HM}O@E*CJ3,$H$NFsCJ3,$N%W%m%;%9$@$1$+$i$J$kHs3+<(E*%3%s%T%e!<%?NQM}3X8&5f$O!"F;FAE*LdBj$rL@$i$+$K$9$k$3$H$K4X$o$i$J$$$,!"$=$l$i$NLdBj$rL@3N2=$7!"2r7h$9$k$H$$$&;n$_$K$=$N>GE@$rEv$F$F$$$k!#(B
$BI.
P. Agre and C. Mailloux. Social Choice about Privacy: Intelligent Vehicle-Highway System in the United States. In B. Friedman, editor, Human Values and the Design of Computer Technology, Cambridge University Press, 1997.
M. Akrich. The Description of Technical Objects. In W. Bijker and J. Law, editors,Shaping Technology/Building Society: Studies in Sociotechnical Change. MIT Press, 1992.
J. Blanchette. On the Social Discourse of Cryptology, Paper presented at CEPE'98, London School of Economics and Political Science, 14-15 December, 1998.
P. Brey. New Media and the Quality of Life. Techne: Journal of the Society for Philosophy and Technology,3: 1-23, 1997.
P. Brey. The Politics of Computer System and the Ethics of Design. In J. van den Hoven, Editor, Computer Ethics:Philosophical Enquiry. Rotterdam University Press, 1998.$B!J!X>pJsNQM}3X8&5f;qNA=8-6!YJ88%>R2p!'%U%#%j%C%W!&%W%l%$!V%3%s%T%e!<%?%7%9%F%`$N@/<#$H%G%6%$%s$NNQM}!W!K(B
P. Brey. Worker Autonomy and the Drama of Digital Networks in Organizations. Journal of Business Ethics, 22: 15-25, 1999.
G. Dworkin. The Theory and Practice of Autonomy. Cambridge University Press, Cambridge, 1998.
B. Friedman and H. Nissenbaum. Bias in Computer Systems. In B. Friedman, editor, Human Values and the Design of Computer Technology. Cambridge University Press, 1997.
T. hill. Autonomy and Self-respect. Cambridge University Press, 1991.
J. van den Hoven. Computer Ethics and the Moral Methodology. Metaphysics, 28: 234-248, 1997.
L. Introna and H. Nssenbaum. The Public Good Vision of the Internet and the Politics of the Search Engines. In R. Rogers, editor, Preferred Placement. Knowledge Politics on the Web. Jan van Eyck Akademie Editions, Maastricht, 2000.
J. Moor. What is Computer Ethics? Metaphilosophy, 16: 266-275, 1985.$B!J!X>pJsNQM}3X8&5f;qNA=8-6!YK]Lu!'%8%'!<%`%:!H!%%`!<%"!V%3%s%T%e!<%?NQM}3X$H$O2?$+!W!K(B
H. Nissenbaum. Can We Protect Privacy in Public? In J. van den Hoven, editor, Computer Ethics:Philosophical Enquiry. Rotterdam University Press, 1998.$B!J!X>pJsNQM}3X8&5f;qNA=8-6!YJ88%>R2p!'%X%l%s!&%K%C%;%s%P%&%`!V8x6&$N>l$K$*$1$k%W%i%$%P%7!<$OB. Pfaffenberger. Technological Dramas. Science, Technology, and Human Values, 17: 282-312, 1992.
J. Rawls. A Theory of Justice. Harvard University Press, 1971.
R. Sclove. Democracy and Technology. Guilford press, New York, 1995.
H. Tavani. Informational Privacy, Data Mining, and the Internet. *Ethics and Information Technology, 1: 137-145, 1999.
L. Winner. Do Artifacts have Politics? Daedalus, 109: 121-136, 1980.
($B$_$o$?$+$R$5(B $B5~ETBg3XBg3X1!J83X8&5f2J(B)