skip to main content
research-article

Gandhigiri in cyberspace: a novel approach to information ethics

Published:01 August 2012Publication History
Skip Abstract Section

Abstract

The interpretation of the terms 'information' and 'ethics' is often culturally situated. A common understanding is contingent to facilitating dialogue concerning the novel ethical issues we face during computer-mediated interactions. Developing a nuanced understanding of information ethics is critical at a point when the number of information and communication technology (ICT)-enabled interactions may soon exceed traditional human interactions. Utilitarianism and deontology, the two major schools of ethics are based in a western perspective. We contribute to the existing discourse on information ethics by arguing for the inclusion of Gandhian notions of non-violence and confrontation. These are particularly relevant to cyberspace, which does not always lend itself to coercion due to legal, political and economic limitations. We address the applicability of ahimsa, satyagraha, and swaraj to cyberspace. We discuss a Gandhian approach to system design. Finally, we use case studies to illuminate the application of Gandhian notions as well as their limitations.

References

  1. Anderson, R. 1992. ACM code of ethics and professional conduct. Communications of the ACM 35, 5, 94--99. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Batra, S. et al. 1984. The quintessence of Gandhi in his own words. Madhu Muskan.Google ScholarGoogle Scholar
  3. Bijker, W. 2006. The vulnerability of technological culture. Cultures of Technology and the Quest for Innovation, 52--69.Google ScholarGoogle Scholar
  4. Bose, N. 1962. Studies in Gandhism. Navjivan Publishing House, Ahmedabad, India.Google ScholarGoogle Scholar
  5. Brafman, O. and Beckstrom, R. 2006. The starfish and the spider: The unstoppable power of leaderless organizations. Vol. 332. Portfolio (Hardcover).Google ScholarGoogle Scholar
  6. Camp, L. and Anderson, B. 1999. Grameen phone: empowering the poor through connectivity. Information Impacts Magazine, 13--27.Google ScholarGoogle Scholar
  7. Campbell, M. 2005. Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling 15, 1, 68--76.Google ScholarGoogle ScholarCross RefCross Ref
  8. Capurro, R. 2008. Intercultural information ethics: foundations and applications. Journal of Information, Communication and Ethics in Society 6, 2, 116--126.Google ScholarGoogle ScholarCross RefCross Ref
  9. Desanctis, G. and Poole, M. 1994. Capturing the complexity in advanced technology use: Adaptive structuration theory. Organization science, 121--147.Google ScholarGoogle Scholar
  10. Ellison, L. and Akdeniz, Y. 1998. Cyber-stalking: the regulation of harassment on the internet. Criminal Law Review 29, 29--48.Google ScholarGoogle Scholar
  11. Ensemble, C. 1994. Electronic civil disobedience. Critical Art Ensemble.Google ScholarGoogle Scholar
  12. Floridi, L. 1999. Information ethics: on the philosophical foundation of computer ethics. Ethics and information technology 1, 1, 33--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Floridi, L. 2002. On the intrinsic value of information objects and the infosphere. Ethics and Information Technology 4, 4, 287--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Floridi, L. 2005. Information ethics, its nature and scope. ACM SIGCAS Computers and Society 35, 2, 3--3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Froomkin, A. 1997. Empire strikes back, the. Chicago Kent Law Review 73, 1101.Google ScholarGoogle Scholar
  16. Furnell, S. and Warren, M. 1999. Computer hacking and cyber terrorism: The real threats in the new millennium? Computers & Security 18, 1, 28--34.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Gandhi, M. K. 1907. Benefits of passive resistance. Indian Opinion 7, 183--185.Google ScholarGoogle Scholar
  18. Gandhi, M. K. 1909. Hind Swaraj or Indian home rule.Google ScholarGoogle Scholar
  19. Giddens, A. 1984. The constitution of society: Outline of the theory of structuration. University of California Press.Google ScholarGoogle Scholar
  20. Hardiman, D. 2003. Gandhi in his time and ours. Orient Blackswan.Google ScholarGoogle Scholar
  21. Harrington, S. 1996. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly 20, 3, 257--278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Introna, L. 2007. Maintaining the reversibility of foldings: Making the ethics (politics) of information technology visible. Ethics and Information Technology 9, 1, 11--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jankowski, P. and Nyerges, T. 2001. Geographic information systems for group decision making: towards a participatory, geographic information science. CRC.Google ScholarGoogle Scholar
  24. Johnson, D. 1997. Ethics online. Communications of the ACM 40, 1, 60--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Lessig, L. 1999. Code and other laws of cyberspace. Basic books. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Limayem, M. and Desanctis, G. 2000. Providing decisional guidance for multicriteria decision making in groups. Information Systems Research 11, 4, 386--401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Maner, W. 1980. Starter kit in computer ethics. Originally self-published by the author in 1978.Google ScholarGoogle Scholar
  28. Manion, M. and Goodrum, A. 2000. Terrorism or civil disobedience: toward a hacktivist ethic. ACM SIGCAS Computers and Society 30, 2, 14--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mitra, S. and Rana, V. 2001. Children and the internet: Experiments with minimally invasive education in india. British Journal of Educational Technology 32, 2, 221--232.Google ScholarGoogle ScholarCross RefCross Ref
  30. Moor, J. 1985. What is computer ethics? Metaphilosophy 16, 4, 266--275.Google ScholarGoogle ScholarCross RefCross Ref
  31. Moor, J. 1998. Reason, relativity, and responsibility in computer ethics. Computers and Society 28, 14--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Nichols, M. 1992. Citizens and statesmen: a study of Aristotle's Politics. Rowman & Littlefield Pub Inc.Google ScholarGoogle Scholar
  33. Nijhof, A., Fisscher, O., and Looise, J. 2000. Coercion, guidance and mercifulness: The different influences of ethics programs on decision-making. Journal of Business Ethics 27, 1, 33--42.Google ScholarGoogle ScholarCross RefCross Ref
  34. Nissenbaum, H. 2001. How computer systems embody values. Computer 34, 3, 120--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Orlikowski, W. 2008. Using technology and constituting structures: A practice lens for studying technology in organizations. Resources, Co-Evolution and Artifacts, 255--305.Google ScholarGoogle Scholar
  36. Pantham, T. 1983. Thinking with Mahatma Gandhi: beyond liberal democracy. Political theory 11, 2, 165--188.Google ScholarGoogle Scholar
  37. Parel, A. 2006. Gandhi's Philosophy and the Quest for Harmony. Cambridge University Press.Google ScholarGoogle Scholar
  38. Parel, A. 2008. Gandhi and the emergence of the modern Indian political canon. The Review of Politics 70, 01, 40--63.Google ScholarGoogle ScholarCross RefCross Ref
  39. Post, D. 2000. Of black holes and decentralized law-making in cyberspace. Vand. J. Ent. L. & Prac. 2, 70.Google ScholarGoogle Scholar
  40. Rawls, J. 1971. A theory of social justice.Google ScholarGoogle Scholar
  41. Servance, R. 2003. Cyberbullying, cyber-harassment, and the conflict between schools and the first amendment. Wisconsin Law Review, 1213.Google ScholarGoogle Scholar
  42. Stallman, R., Gay, J., and Lessig, L. 2002. Free software, free society: selected essays of Richard M. Stallman. Free Software Foundation Boston, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Sugiyama, T. and Perry, M. 2006. NSA domestic surveillance program: An analysis of congressional over-sight during an era of one-party rule, the. U. Mich. JL Reform 40, 149.Google ScholarGoogle Scholar
  44. Vlahos, M. 1998. Entering the Infosphere. Journal of International Affairs 51, 2.Google ScholarGoogle Scholar
  45. Wagner, R. 2003. Information wants to be free: Intellectual property and the mythologies of control. Columbia Law Review 103, 995.Google ScholarGoogle ScholarCross RefCross Ref
  46. Weber, T. 1997. On the salt march: The historiography of Gandhi's march to Dandi. HarperCollins Publishers India.Google ScholarGoogle Scholar
  47. Wray, S. 1999. On electronic civil disobedience. Peace Review 11, 1, 107--111.Google ScholarGoogle ScholarCross RefCross Ref
  48. Zittrain, J. 1996. Rise and fall of sysopdom. Harvard Journal of Law & Technology 10, 495.Google ScholarGoogle Scholar

Index Terms

  1. Gandhigiri in cyberspace: a novel approach to information ethics

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGCAS Computers and Society
          ACM SIGCAS Computers and Society  Volume 42, Issue 1
          August 2012
          42 pages
          ISSN:0095-2737
          DOI:10.1145/2422512
          Issue’s Table of Contents

          Copyright © 2012 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 August 2012

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader