Ethics, lies and videotape…

Videotape has become one of the CHI community's most useful technologies: it allows us to analyze users' interactions with computers, prototype new interfaces, and present the results of our research and technical innovations to others. But video is a double-edged sword. It is often misused, however unintentionally. How can we use it well, without compromising our integrity? This paper presents actual examples of questionable videotaping practices. Next, it explains why we cannot simply borrow ethical guidelines from other professions. It concludes with a proposal for developing usable ethical guidelines for the capture, analysis and presentation of video.

[1]  John Ladd,et al.  The quest for a code of professional ethics: an intellectual and moral confusion , 1985 .

[2]  Heinz C. Luegenbiehl,et al.  Computer professionals: Moral autonomy and a code of ethics , 1992, J. Syst. Softw..

[3]  Pamela Samuelson,et al.  Copyright's fair use doctrine and digital data , 1994, CACM.

[4]  C. Greaves Journalism ethics. , 1975, Journalism Conference And Workshop.

[5]  Wendy E. Mackay,et al.  INTRODUCTION TO THE SPECIAL ISSUE ON VIDEO AS A RESEARCH AND DESIGN TOOL , 1989, SGCH.

[6]  Göran Collste Expert systems in medicine and moral responsibility , 1992, J. Syst. Softw..

[7]  R. Alley Television: Ethics for hire? , 1977 .

[8]  Donald Gotterbarn The captain knows best , 1993, CSOC.

[9]  D. Causey Duties and Liabilities of Public Accountants , 1979 .

[10]  Stanley Rothman,et al.  Computers and Society , 1972 .

[11]  S Milgram,et al.  Some Conditions of Obedience and Disobedience to Authority , 1965 .

[12]  R. Kling,et al.  Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .

[13]  R. Kling Computerization and Controversy , 1997 .

[14]  Tom Carey,et al.  ACM SIGCHI Curricula for Human-Computer Interaction , 1992 .

[15]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[16]  John L. Hulteng The Messenger's Motives: Ethical Problems of the News Media , 1985 .

[17]  Mark W. Hall Broadcast journalism : an introduction to news writing , 1971 .

[18]  Gitta Salomon,et al.  Designing casual-user hypertext: the CHI'89 InfoBooth , 1990, CHI '90.

[19]  Herbert H. Clark,et al.  Contributing to Discourse , 1989, Cogn. Sci..

[20]  H. Hollingworth The American Psychological Society , 1914, Science.

[21]  Amitai Etzioni Some conditions of obedience and disobedience to authority. A model of significent research. , 1968, International journal of psychiatry.

[22]  Derek Bok,et al.  Beyond the Ivory Tower: Social Responsibilities of the Modern University , 1982 .

[23]  Ronald E. Anderson ACM code of ethics and professional conduct , 1992, CACM.

[24]  D. Bok,et al.  Beyond the Ivory Tower: Social Responsibilities of the Modern University , 1983 .

[25]  A. Perl,et al.  Code of Ethics , 1963, Science.

[26]  Mark S. Frankel,et al.  Professional codes: Why, how, and with what impact? , 1989 .

[27]  Deborah G. Johnson Computer Ethics , 1985 .

[28]  R. Macklin Mortal Choices: Bioethics in Today's World , 1987 .

[29]  MORAL IMPERATIVES,et al.  ACM code of ethics and professional conduct , 1991, CSOC.

[30]  Keith Jackson,et al.  Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .

[31]  Donald Gotterbarn,et al.  Using the new ACM code of ethics in decision making , 1993, CACM.