Computer Ethics

Edited by Lavinia Marin (Delft University of Technology)
Related

Contents
203 found
Order:
1 — 50 / 203
Material to categorize
  1. NHỮNG TRIẾT LÝ NHÂN VĂN TRONG TẦM NHÌN XÃ HỘI 5.0 TẠI NHẬT BẢN VÀ MỘT VÀI GỢI Ý CHO VIỆT NAM.Manh-Tung Ho & Phuong Thao Luu - manuscript
    Bài viết này tóm lược các điểm quan trọng và những triết lý xã hội trong Tầm nhìn Xã hội 5.0 (Society 5.0) của Nhật Bản, đồng thời đưa ra bài học cho Việt Nam trong việc hình thành một xã hội “lấy dân làm gốc”, được hiện thực hoá bởi trí tuệ nhân tạo (AI). Nhằm tiến tới một xã hội nơi con người được đặt làm trung tâm đồng thời chung sống hài hoà với công nghệ ngày càng (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. The Four Fundamental Components for Intelligibility and Interpretability in AI Ethics.Moto Kamiura - forthcoming - American Philosophical Quarterly.
    Intelligibility and interpretability related to artificial intelligence (AI) are crucial for enabling explicability, which is vital for establishing constructive communication and agreement among various stakeholders, including users and designers of AI. It is essential to overcome the challenges of sharing an understanding of the details of the various structures of diverse AI systems, to facilitate effective communication and collaboration. In this paper, we propose four fundamental terms: “I/O,” “Constraints,” “Objectives,” and “Architecture.” These terms help mitigate the challenges associated with intelligibility (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry 4.0. This research (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  4. Mark Weiser and the Origins of Ubiquitous Computing. [REVIEW]Dustin Gray - 2024 - Metascience.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. Telepresence as a social-historical mode of being. ChatGPT and the ontological dimensions of digital representation.Alexandros Schismenos - 2024 - Lessico di Etica Pubblica (1-2/2023):37-52.
    Nel 1956, in piena guerra fredda, una conferenza di scienziati al Dartmouth College negli Stati Uniti annunciò il lancio di un audace progetto scientifico, l’Intelligenza Artificiale (I.A.). Dopo l’iniziale fallimento degli sforzi della “Hard AI” di produrre un’intelligenza simile a quella umana, alla fine del XX secolo è emerso il movimento della “Soft AI”. Invece di essere orientato a imitare il comportamento umano in relazione a compiti specifici, ha preferito cercare modi alternativi di eseguire i compiti basati sulle particolari funzioni (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. The Duty to Promote Digital Minimalism in Group Agents.Timothy Aylsworth & Clinton Castro - 2024 - In Kantian Ethics and the Attention Economy: Duty and Distraction. Palgrave Macmillan.
    In this chapter, we turn our attention to the effects of the attention economy on our ability to act autonomously as a group. We begin by clarifying which sorts of groups we are concerned with, which are structured groups (groups sufficiently organized that it makes sense to attribute agency to the group itself). Drawing on recent work by Purves and Davis (2022), we describe the essential roles of trust (i.e., depending on groups to fulfill their commitments) and trustworthiness (i.e., the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  7. The Metaverse: Virtual Metaphysics, Virtual Governance, and Virtual Abundance.Cody Turner - 2023 - Philosophy and Technology 36 (4):1-8.
    In his article ‘The Metaverse: Surveillant Physics, Virtual Realist Governance, and the Missing Commons,’ Andrew McStay addresses an entwinement of ethical, political, and metaphysical concerns surrounding the Metaverse, arguing that the Metaverse is not being designed to further the public good but is instead being created to serve the plutocratic ends of technology corporations. He advances the notion of ‘surveillant physics’ to capture this insight and introduces the concept of ‘virtual realist governance’ as a theoretical framework that ought to guide (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Can E-Sport Gamers Permissibly Engage with Off-Limits Virtual Wrongdoings?Thomas Montefiore & Paul Formosa - 2023 - Philosophy and Technology 36 (4):1-3.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. Peru facing the Fourth Industrial Revolution.Piero Gayozzo (ed.) - 2022 - Lima: Sociedad Secular Humanista del Perú.
    La Cuarta Revolución Industrial es un conjunto de transformaciones sociales que están y seguirán siendo provocadas en los próximos años por la irrupción de tecnologías que parecieran propias de las narraciones de ciencia ficción. Se trata de un grupo de tecnologías convergentes, es decir, que tienden a complementarse y cubrir áreas más allá del rubro o disciplina desde y para el que fueron diseñadas. A partir del informe de los talleres sobre tecnologías convergentes impulsados por el National Science Foudnation (NSF) (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. Die Herkunft der digitalen Welt.Jörg Phil Friedrich - 2018 - Zeitschrift für Kulturphilosophie 2018 (1):13-21.
    Most of the processes subsumed under »digitalization« have in common that they permit switching and simultaneity of sender and recipient roles over a broad range of communications. Preeminently, such communications provide and process information. However, the progress of digitalization in modern lifeworlds is not primarily driven by the development of digital technology. Digital technology is but the appropriate medium for enabling the exchange of the respective formats of information. Its thrust is embedded in a cumulative history of translation of analogue (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  11. Norms and Causation in Artificial Morality.Laura Fearnley - forthcoming - Joint Proceedings of Acm Iui:1-4.
    There has been an increasing interest into how to build Artificial Moral Agents (AMAs) that make moral decisions on the basis of causation rather than mere correction. One promising avenue for achieving this is to use a causal modelling approach. This paper explores an open and important problem with such an approach; namely, the problem of what makes a causal model an appropriate model. I explore why we need to establish criteria for what makes a model appropriate, and offer-up such (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Technologies of artificial sensations.Alexey S. Bakhirev - manuscript
    Technologies based on emergence will allow to reproduce sensations on non-biological carriers by making devices feel. These technologies will change fundamentally not only the approach to the creation of artificial intelligence, but also create artificial worlds of a totally different level. Which, unlike virtual models, will really exist for themselves. This approach differs completely from the methods currently used in digital technologies. Possibly the principles described herein will give a rise to many new trends.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  14. The ethics of information transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
    The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be disclosed and what (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   57 citations  
  15. Editorial introduction – ethics of new information technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Trusting virtual trust.Paul B. de Laat - 2005 - Ethics and Information Technology 7 (3):167-180.
    Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   11 citations  
  17. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   38 citations  
  18. Information ethics: a reappraisal.Luciano Floridi - 2008 - Ethics and Information Technology 10 (2–3):189–204.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   16 citations  
  19. Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is the ethical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   114 citations  
  20. Mapping the foundationalist debate in computer ethics.Luciano Floridi & J. W. Sanders - 2002 - Ethics and Information Technology 4 (1):1-9.
    The paper provides a critical review of the debate on the foundations of Computer Ethics (CE). Starting from a discussion of Moor’s classic interpretation of the need for CE caused by a policy and conceptual vacuum, five positions in the literature are identified and discussed: the “no resolution approach”, according to which CE can have no foundation; the professional approach, according to which CE is solely a professional ethics; the radical approach, according to which CE deals with absolutely unique issues, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   27 citations  
  21. On the intrinsic value of information objects and the infosphere.Luciano Floridi - 2002 - Ethics and Information Technology 4 (4):287–304.
    What is the most general common set of attributes that characterises something as intrinsically valuable and hence as subject to some moral respect, and without which something would rightly be considered intrinsically worthless or even positively unworthy and therefore rightly to be disrespected in itself? This paper develops and supports the thesis that the minimal condition of possibility of an entity's least intrinsic value is to be identified with its ontological status as an information object. All entities, even when interpreted (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   69 citations  
  22. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   57 citations  
  23. The tragedy of the digital commons.Gian Maria Greco & Luciano Floridi - 2004 - Ethics and Information Technology 6 (2):73-81.
    In the paper it is argued that bridging the digital divide may cause a new ethical and social dilemma. Using Hardin's Tragedy of the Commons, we show that an improper opening and enlargement of the digital environment (Infosphere) is likely to produce a Tragedy of the Digital Commons (TDC). In the course of the analysis, we explain why Adar and Huberman's previous use of Hardin's Tragedy to interpret certain recent phenomena in the Infosphere (especially peer-to-peer communication) may not be entirely (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   13 citations  
  24. Loss of the world: A philosophical dialogue.Raymond Kolcaba - 2000 - Ethics and Information Technology 2 (1):3-9.
    Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, conservation of humanist ideals, andprudent (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  25. Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   19 citations  
  26. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   17 citations  
  27. My avatar, my self: Virtual harm and attachment.Jessica Wolfendale - 2007 - Ethics and Information Technology 9 (2):111-119.
    Multi-user online environments involve millions of participants world-wide. In these online communities participants can use their online personas – avatars – to chat, fight, make friends, have sex, kill monsters and even get married. Unfortunately participants can also use their avatars to stalk, kill, sexually assault, steal from and torture each other. Despite attempts to minimise the likelihood of interpersonal virtual harm, programmers cannot remove all possibility of online deviant behaviour. Participants are often greatly distressed when their avatars are harmed (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   13 citations  
Internet Ethics
  1. Tweet acts and quote-tweetable acts.Chris Cousens - 2023 - Synthese 202 (6):1-28.
    Online communication can often seem different to offline talk. Structural features of social media sites can shape the things we do with words. In this paper, I argue that the practice of ‘quote-tweeting’ can cause a single utterance that originally performed just one speech act to later perform several different speech acts. This describes a new type of illocutionary pluralism—the view that a single utterance can perform multiple illocutionary acts. Not only is this type more plural than others (if one (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. Cancel Culture, Then and Now: A Platonic Approach to the Shaming of People and the Exclusion of Ideas.Douglas R. Campbell - 2023 - Journal of Cyberspace Studies 7 (2):147-166.
    In this article, I approach some phenomena seen predominantly on social-media sites that are grouped together as cancel culture with guidance from two major themes in Plato’s thought. In the first section, I argue that shame can play a constructive and valuable role in a person’s improvement, just as we see Socrates throughout Plato’s dialogues use shame to help his interlocutors improve. This insight can help us understand the value of shaming people online for, among other things, their morally reprehensible (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. The socio-economic argument for the human right to internet access.Merten Reglitz - 2023 - Politics, Philosophy and Economics 22 (4): 441-469.
    This paper argues that Internet access should be recognised as a human right because it has become practically indispensable for having adequate opportunities to realise our socio-economic human rights. This argument is significant for a philosophically informed public understanding of the Internet and because it provides the basis for creating new duties. For instance, accepting a human right to Internet access minimally requires guaranteeing access for everyone and protecting Internet access and use from certain objectionable interferences (e.g. surveillance, censorship, online (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  4. Online consent: how much do we need to know?Bartek Chomanski & Lode Lauwaert - forthcoming - AI and Society.
    This paper argues, against the prevailing view, that consent to privacy policies that regular internet users usually give is largely unproblematic from the moral point of view. To substantiate this claim, we rely on the idea of the right not to know (RNTK), as developed by bioethicists. Defenders of the RNTK in bioethical literature on informed consent claim that patients generally have the right to refuse medically relevant information. In this article we extend the application of the RNTK to online (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. In Defense of (Some) Online Echo Chambers.Douglas R. Campbell - 2023 - Ethics and Information Technology 25 (3):1-11.
    In this article, I argue that online echo chambers are in some cases and in some respects good. I do not attempt to refute arguments that they are harmful, but I argue that they are sometimes beneficial. In the first section, I argue that it is sometimes good to be insulated from views with which one disagrees. In the second section, I argue that the software-design principles that give rise to online echo chambers have a lot to recommend them. Further, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. Emerging Technologies & Higher Education.Jake Burley & Alec Stubbs - 2023 - Ieet White Papers.
    Extended Reality (XR) and Large Language Model (LLM) technologies have the potential to significantly influence higher education practices and pedagogy in the coming years. As these emerging technologies reshape the educational landscape, it is crucial for educators and higher education professionals to understand their implications and make informed policy decisions for both individual courses and universities as a whole. -/- This paper has two parts. In the first half, we give an overview of XR technologies and their potential future role (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  7. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on data scientists, or data engineer (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. The Democratic Metaverse: Building an Extended Reality Safe for Citizens, Workers and Consumers.Alec Stubbs, James J. Hughes & Nir Eisikovits - 2023 - Ieet White Papers.
    We are likely to have immersive virtual reality and ubiquitous augmented reality in the coming decades. At least some people will use extended reality or “the metaverse” to work, play and shop. In order to achieve the best possible versions of this virtual future, however, we will need to learn from three decades of regulating the Internet. The new virtual world cannot consist of walled corporate fiefdoms ruled only by profitmaximization. The interests of workers, consumers and citizens in virtuality require (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. Algorithmic neutrality.Milo Phillips-Brown - manuscript
    Algorithms wield increasing control over our lives—over which jobs we get, whether we're granted loans, what information we're exposed to online, and so on. Algorithms can, and often do, wield their power in a biased way, and much work has been devoted to algorithmic bias. In contrast, algorithmic neutrality has gone largely neglected. I investigate three questions about algorithmic neutrality: What is it? Is it possible? And when we have it in mind, what can we learn about algorithmic bias?
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. The moral source of collective irrationality during COVID-19 vaccination campaigns.Cristina Voinea, Lavinia Marin & Constantin Vică - 2023 - Philosophical Psychology (5):949-968.
    Many hypotheses have been advanced to explain the collective irrationality of COVID-19 vaccine hesitancy, such as partisanship and ideology, exposure to misinformation and conspiracy theories or the effectiveness of public messaging. This paper presents a complementary explanation to epistemic accounts of collective irrationality, focusing on the moral reasons underlying people’s decisions regarding vaccination. We argue that the moralization of COVID-19 risk mitigation measures contributed to the polarization of groups along moral values, which ultimately led to the emergence of collective irrational (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Mental Integrity in the Attention Economy: in Search of the Right to Attention.Bartek Chomanski - forthcoming - Neuroethics.
    Is it wrong to distract? Is it wrong to direct others’ attention in ways they otherwise would not choose? If so, what are the grounds of this wrong – and, in expounding them, do we have to at once condemn large chunks of contemporary digital commerce (also known as the attention economy)? In what follows, I attempt to cast light on these questions. Specifically, I argue – following the pioneering work of Jasper Tran and Anuj Puri – that there is (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. Algorithmic Microaggressions.Emma McClure & Benjamin Wald - 2022 - Feminist Philosophy Quarterly 8 (3).
    We argue that machine learning algorithms can inflict microaggressions on members of marginalized groups and that recognizing these harms as instances of microaggressions is key to effectively addressing the problem. The concept of microaggression is also illuminated by being studied in algorithmic contexts. We contribute to the microaggression literature by expanding the category of environmental microaggressions and highlighting the unique issues of moral responsibility that arise when we focus on this category. We theorize two kinds of algorithmic microaggression, stereotyping and (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. Counterspeech.Bianca Cepollaro, Maxime Lepoutre & Robert Mark Simpson - 2022 - Philosophy Compass 18 (1):e12890.
    Counterspeech is communication that tries to counteract potential harm brought about by other speech. Theoretical interest in counterspeech partly derives from a libertarian ideal – as captured in the claim that the solution to bad speech is more speech – and partly from a recognition that well-meaning attempts to counteract harm through speech can easily misfire or backfire. Here we survey recent work on the question of what makes counterspeech effective at remedying or preventing harm, in those cases where it (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   9 citations  
  14. On Subtweeting.Eleonore Neufeld & Elise Woodard - forthcoming - In Patrick Connolly, Sanford C. Goldberg & Jennifer Saul (eds.), Conversations Online. Oxford University Press.
    In paradigmatic cases of subtweeting, one Twitter user critically or mockingly tweets about another person without mentioning their username or their name. In this chapter, we give an account of the strategic aims of subtweeting and the mechanics through which it achieves them. We thereby hope to shed light on the distinctive communicative and moral texture of subtweeting while filling in a gap in the philosophical literature on strategic speech in social media. We first specify what subtweets are and identify (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. The Moral Rights and Wrongs of Online Dating and Hook-Ups.Lily Frank & Michał Klincewicz - 2023 - In Carissa Véliz (ed.), The Oxford Handbook of Digital Ethics. Oxford University Press.
    In this chapter we identify three potentially morally problematic behaviours that are common among users of dating and hook-up apps (DHAs) and provide arguments as to why they may or may not be considered (a) in a category of their own, distinct from similar behaviours outside of DHAs; (b) caused or facilitated by affordances and business logic of DHAs; (c) as indeed morally wrong. We also consider ways in which morally problematic behaviours can be anticipated, mitigated, or even prevented by (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  16. Dewey on Facebook: Who Should Regulate Social Media?Henry Lara-Steidel - 2022 - Philosophy of Education 78 (3):53-65.
    At the time of writing, social media is rife with misinformation and disinformation, having very real effects on our political processes and on the vaccination efforts of the COVID pandemic. As the effort to pass new laws and regulations on social media companies gains momentum, concerns remain about how to balance free speech rights and even who, if anyone, should be the one to regulate social media. Drawing on Dewey’s conception of the public, I argue for the regulation of social (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  17. Reclaiming Care and Privacy in the Age of Social Media.Hugh Desmond - 2022 - Royal Institute of Philosophy Supplement 92:45-66.
    Social media has invaded our private, professional, and public lives. While corporations continue to portray social media as a celebration of self-expression and freedom, public opinion, by contrast, seems to have decidedly turned against social media. Yet we continue to use it just the same. What is social media, and how should we live with it? Is it the promise of a happier and more interconnected humanity, or a vehicle for toxic self-promotion? In this essay I examine the very structure (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. How to Do Things with Information Online. A Conceptual Framework for Evaluating Social Networking Platforms as Epistemic Environments.Lavinia Marin - 2022 - Philsophy and Technology 35 (77).
    This paper proposes a conceptual framework for evaluating how social networking platforms fare as epistemic environments for human users. I begin by proposing a situated concept of epistemic agency as fundamental for evaluating epistemic environments. Next, I show that algorithmic personalisation of information makes social networking platforms problematic for users’ epistemic agency because these platforms do not allow users to adapt their behaviour sufficiently. Using the tracing principle inspired by the ethics of self-driving cars, I operationalise it here and identify (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Tracing app technology: an ethical review in the COVID-19 era and directions for post-COVID-19.Saleh Afroogh, Amir Esmalian, Ali Mostafavi, Ali Akbari, Kambiz Rasoulkhani, Shahriar Esmaeili & Ehsan Hajiramezanali - 2022 - Ethics and Information Technology 24 (3):1-15.
    We conducted a systematic literature review on the ethical considerations of the use of contact tracing app technology, which was extensively implemented during the COVID-19 pandemic. The rapid and extensive use of this technology during the COVID-19 pandemic, while benefting the public well-being by providing information about people’s mobility and movements to control the spread of the virus, raised several ethical concerns for the post-COVID-19 era. To investigate these concerns for the post-pandemic situation and provide direction for future events, we (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  21. Deepfakes, Deep Harms.Regina Rini & Leah Cohen - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Deepfakes are algorithmically modified video and audio recordings that project one person’s appearance on to that of another, creating an apparent recording of an event that never took place. Many scholars and journalists have begun attending to the political risks of deepfake deception. Here we investigate other ways in which deepfakes have the potential to cause deeper harms than have been appreciated. First, we consider a form of objectification that occurs in deepfaked ‘frankenporn’ that digitally fuses the parts of different (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22. Promoting Vices: Designing the Web for Manipulation.Lukas Schwengerer - 2022 - In Michael Klenk & Fleur Jongepier (eds.), The Philosophy of Online Manipulation. Routledge. pp. 292-310.
    This chapter discusses a problematic relation between user-friendly design and manipulation. Some specific features of the design of a website can make it a more or less potent tool for manipulation. In particular, features that can be summed up as creating a user-friendly experience are also manipulation-friendly. The ease of using a website also makes it easier to be manipulated via the website. The chapter provides an argument that this can be explained as a less intellectually virtuous engagement with websites (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. The Ethics of Quitting Social Media.Robert Mark Simpson - 2023 - In Carissa Véliz (ed.), The Oxford Handbook of Digital Ethics. Oxford University Press.
    There are prima facie ethical reasons and prudential reasons for people to avoid or withdraw from social media platforms. But in response to pushes for people to quit social media, a number of authors have argued that there is something ethically questionable about quitting social media: that it involves — typically, if not necessarily — an objectionable expression of privilege on the part of the quitter. In this paper I contextualise privilege-based objections to quitting social media and explain the underlying (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 203