ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 大学紀要
  2. 社会科学研究所
  3. 社会科学ジャーナル
  4. 90号 (2023.3)

プライバシーの文脈の多元性と情報倫理の関係 : SNSを用いたコミュニケーションに関する課題を中心として

https://doi.org/10.34577/00005235
https://doi.org/10.34577/00005235
be2c2ec8-fcb4-437b-b27e-79a9483fc70f
名前 / ファイル ライセンス アクション
JSS90号4萩原.pdf プライバシーの文脈の多元性と情報倫理の関係 ―SNSを用いたコミュニケーションに関する課題を中心として― (497.4 kB)
license.icon
Item type 紀要論文 / Departmental Bulletin Paper(1)
公開日 2023-04-07
タイトル
タイトル プライバシーの文脈の多元性と情報倫理の関係 : SNSを用いたコミュニケーションに関する課題を中心として
言語 ja
タイトル
タイトル The relationship between the plurality of the contexts of privacy and information ethics : focusing on the problems of communication with SNS
言語 en
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ departmental bulletin paper
ID登録
ID登録 10.34577/00005235
ID登録タイプ JaLC
アクセス権
アクセス権 open access
アクセス権URI http://purl.org/coar/access_right/c_abf2
著者 萩原, 優騎

× 萩原, 優騎

WEKO 8422

ja 萩原, 優騎

Search repository
抄録
内容記述タイプ Abstract
内容記述 Controlling privacy is important in communication with social media such as SNS (Social Networking Service). However, it is difficult for young people, especially teens, to succeed in doing so in many cases. The aim of this paper is to consider this difficulty by focusing on the relationship between the plurality of the contexts of privacy and information ethics.Some information ethicists claim the importance of the norms which can be applied to every context, which is a universalistic view, while the contexts of privacy are plural. Helen Nissenbaum points out the flow of information can be appropriate when its context is integrated. She says that almost everything happens in a context, whose integrity should be governed by norms. Contextual integrity is maintained when two types of norms are upheld, that is, norms of appropriateness and norms of distribution.Young people try to control the flow of information when they communicate with SNSs, but they do not necessarily succeed in their attempts. One of the main causes of this difficulty is the network status of contemporary public, as danah boyd discusses. The flow of information will be maintained as long as the true audience matches their imagined audience. For example, they upload pictures in the scene of playing a plank addressed to their friends as their imagined audience, but their parents and teachers who do not necessarily share their context may find the pictures, which is called context collapse.There are several strategies to avoid context collapse, such as using different SNSs for different contexts in accordance with the imagined audience. Of course, they can set their accounts private or block someone, but these choices may have a negative influence on their relationship. Another strategy young people often use is restricting information open to the public. The example given by boyd is creating a “light version” of one’s life, that is, sharing at least a little bit on SNSs affords one more privacy than sharing nothing at all. The appearance of unlimited sharing enables one to prevent the audience from asking about what is actually happening.However, boyd says that young people need to acquire the skills to be digitally savvy through active learning to control networked privacy properly. Privacy in the networked public is not a static construct but a process to have control over a social situation by managing the flow of information and its context. Therefore, applying the uniformed criteria paternalistically to every context is not useful anymore. Considering the plurality of the contexts, information ethics should be defined as a frame of reference that does not show one unique solution, with which people reconsider their contexts continuously through active learning so that they could achieve networked privacy.
書誌情報 ja : 社会科学ジャーナル

号 90, p. 77-98, 発行日 2023-03-31
出版者
出版者 国際基督教大学
言語 ja
ISSN
収録物識別子タイプ ISSN
収録物識別子 04542134
戻る
0
views
See details
Views

Versions

Ver.1 2023-05-15 09:44:33.003848
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3