The Theory of Responsibility and Information Systems

Author(s):  
Bernd Carsten Stahl

In the broadest possible sense, responsibility is “but a set of practices that we use to describe and understand individual and social behaviour” (French, 1992, p. IX). In order to understand how we can use the term as a description and what results from the description, one must be aware of possible definitions, implications, dimensions, conditions, etc. In this chapter we will therefore attempt to describe all these different features of the word. In a first step we will look at the overall definitions that can be found in the literature and the implied objectives of its use. This part will also contain a first reflection on how responsibility relates to ethics and morality. The next part of this chapter will analyse the conditions that are commonly named for the ascription of responsibility. This will then allow us to discuss the classical dimensions, namely subject, object, and instance. From there we will proceed to take a look at the other relevant determinants of responsibility such as type, temporal dimension, sort of imputation, and the limits of ascription. As a summary we will extract the implications that most sorts and definitions of responsibility share. In total this chapter will lay the theoretical groundwork needed for addressing the problems that responsibility in information systems pose, which will then be discussed in the following chapters.

Author(s):  
Ali Shirzad ◽  
Shaban Mohammadi ◽  
Hamedesmaeili Oghaz

Dependence on information and rapidly changing technology can be seen in many organizations, with proper security and intelligence systems to protect themselves. But success in providing security depends on the awareness of managers and employees. The accounting information systems in organizations are the most important element. One of the factors threatening their system is virus. Malware are computer viruses that can cause a variety of disorders, including loss of data and accounting information systems are impaired in such case. On the other hand, one of the main objectives of the viruses is to steal financial information. In this paper, one of the main factors threatening the security of accounting information systems, the viruses are described.


Proceedings ◽  
2020 ◽  
Vol 47 (1) ◽  
pp. 55
Author(s):  
Shan Zhang

By applying the concept of natural science to the study of music, on the one hand, we can understand the structure of music macroscopically, on the other, we can reflect on the history of music to a certain extent. Throughout the history of western music, from the classical period to the 20th century, music seems to have gone from order to disorder, but it is still orderly if analyzed carefully. Using the concept of complex information systems can give a good answer in the essence.


2021 ◽  
Vol 331 ◽  
pp. 06004
Author(s):  
Bambang Sujatmoko ◽  
Rangga Fernando ◽  
Andy Hendri

Floods in Pekanbaru City have often hit the region along the Siak river, including the Rumbai subdistrict. Disasters such as floods have detrimental impacts on society, including a massive loss of lives. However, several strategies can minimize the impacts of flooding, including making a plan evacuation route mapping with Geographic Information Systems (GIS). This is a planning-based analysis of data using the algorithm djikstra for result pathways for efficient and effective evacuation. The evacuation routes involve seven simulation parameter modeling, specifically flood, length path, wide roads, road conditions, road materials, presence or absence of bridges, and the road’s direction. These parameters are processed using algoritma djikstra to generate the appropriate evacuation routes based on study area conditions. The analysis focuses on one evacuation route in Palas and the other six in Sri Meranti Village. The routes in Palas Village lead to the evacuation place of the Al-Jihad Mosque, while those in Sri Meranti Village heads to Al-Ikhlas Mosque, MDA Aula Rumbai, Nurul Haq Mosque, M Nurul Mosque, vacant land, and Stadium Parking Area.


2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Daniel Perovich ◽  
Leonardo Rodrıguez Rodrıguez ◽  
Andres Vignaga

Component-based development can be addressed from two different fronts, or more precisely, from two different levels. One of them regards the technology used for system implementation, and the other is a previous and more abstract level, where the focus is set to the logical structure of the solution and where technological issues are not considered. Model Driven Architecture promotes such separation by distinguishing platform independent models from platform specific models. In alignment with this approach, this article proposes a mapping from the tiered and platform independent architecture for information systems resulting from the application of a widely known methodological approach, to the available constructs in the J2EE platform. This mapping allows the definition of transformations between platform independent models, resulting from the referred methodology where it is possible to abstractly reason about the solution, and platform specific models which are aligned with technological constructs and are directly implemented.


Author(s):  
Maria N. Koukovini ◽  
Eugenia I. Papagiannakopoulou ◽  
Georgios V. Lioudakis ◽  
Nikolaos L. Dellas ◽  
Dimitra I. Kaklamani ◽  
...  

Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.


2012 ◽  
pp. 631-641
Author(s):  
Paulo Teixeira ◽  
Patrícia Leite Brandão ◽  
Álvaro Rocha

The significant number of publications describing unsuccessful cases in the introduction of health information systems makes it advisable to analyze the factors that may be contributing to such failures. However, the very notion of success is not equally assumed in all publications. Based in a literature review, the authors argue that the introduction of systems must be based in an eclectic combination of knowledge fields, adopting methodologies that strengthen the role of organizational culture and human resources in this project, as a whole. On the other hand, the authors argue that the introduction of systems should be oriented by a previously defined matrix of factors, against which the success can be measured.


Author(s):  
Shigeki Sugiyama ◽  
Junji Suzuki

Society is in the era of globalization. Communication methods include transfers among commodities, facilities, information, systems, thought, knowledge, etc., causing many interactions among society. As a result of these situations, an individual’s world can be altered, causing multi dipoles. Currently, an individual is able to get as much information as he or she desires. But on the other hand, individuals are also losing information, goods, foods, etc., without recognizing how much is lost. The authors believe under these situations almost everything in the world may be interfering with one another in a multitude of ways. This phenomenon will aggressively continue. This paper studies the problems caused by these situations and proposes a method to resolve some of the problems caused by these situations: Accumulation and Integration in Seamless Knowledge.


1934 ◽  
Vol 53 ◽  
pp. 105-129 ◽  
Author(s):  
Louis Herrman ◽  
Lancelot Hogben

The characteristics of social behaviour in man are conditioned by previous experience. What is observed is the product on the one hand of a certain genetic constitution and on the other of an intricate, prolonged, and at present largely obscure, process of training and physical environment, including both the environment of the fœtus and family influences, social and physical. The experimental methods for detecting differences due to single gene substitutions cannot be applied directly. Indeed, we can see no immediate prospect of applying to social behaviour methods of genetic analysis such as have led to the mapping of the chromosomes in animals and in plants. With methods available at present, genetic inquiry can undertake to detect whether any gene differences are associated with observed differences, and whether such gene differences are recognisable throughout a comparatively wide or narrow range of social and physical environment.


Author(s):  
João Porto de Albuquerque ◽  
Edouard J. Simon ◽  
Jan-Hendrik Wahoff ◽  
Arno Rolf

Research in the Information Systems (IS) field has been characterised by the use of a variety of methods and theoretical underpinnings. This fact recently raised concerns about the rigour of scientific results of IS research and about the legitimacy of the IS academic field. On the other hand, a number of IS researchers have argued for a view that values diversity as a strength of the IS field. This chapter supports this viewpoint and analyzes the relation between IS research and concepts originating from theoretical debates around transdisciplinarity. We present results from a group of researchers of various disciplinary backgrounds towards an integrative platform for the orientation of transdisciplinary IS research. The Mikropolis platform provides researchers with a common language, allowing the integration of different perspectives through exchange of experiences and mutual understanding. We also discuss some practical issues that arise from the transdisciplinary cooperation in IS research.


Politics ◽  
2020 ◽  
pp. 026339572093377
Author(s):  
James Martin

What insights and advantages do rhetorical approaches offer over other methods of exploring social and political discourse? This article aims to clarify the contribution of rhetorical analysis by exploring its distinctive, hermeneutic attention to public speech. Public speaking is, accordingly, viewed as a practice of assembling meaningful interpretations in specific situations. Central here is a temporal dimension. Analysing rhetoric involves grasping discourse, on the one hand, as concretely situated in response to proximate constraints and, on the other hand, as a medium to move beyond the situation towards a future. Following John Caputo’s reading of Derrida, I argue that, examined rhetorically, public speech enacts a ‘negotiation’ of past and future, intertwining conditional – and hence partially calculable – positions with an ‘unconditional promise’ to prepare for what comes. Although compatible with other approaches, rhetorical analysis is uniquely attuned to this intrinsically ethical and political quality of discursive action.


Sign in / Sign up

Export Citation Format

Share Document