Computer Ethics

Edited by Lavinia Marin (Delft University of Technology)
Related

Contents
221 found
Order:
1 — 50 / 221
Material to categorize
  1. Transformando la gobernanza municipal: Aplicación de Inteligencia Artificial para optimizar y mejorar los procesos de gestión documental en la Dirección de Avalúos y Catastros del GAD-Latacunga.Felix D. Andueza Araque & Alixon M. Chiluisa Sangoquiza - 2024 - Dissertation, Universidad de Las Américas (Udla)
    In the 21st century, transparency and efficiency in municipal management are essential. This study focusses on the GAD Municipal of Latacunga, Ecuador, assessing inefficiency in the Office of Valuation and Cadastres, proposing the use of AI to improve governance. The research reveals deficiencies in digitalization and transparency, identifying the need for effective mechanisms to optimize public services. AI is presented as a potential solution to automate tasks, detect irregularities, and increase administrative efficiency. This analysis, based on regional and local data, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. Framing the Gamer's Dilemma.Michael Hemmingsen - 2024 - Ethics and Information Technology 26 (59):1-10.
    The Gamer's Dilemma is a much-discussed issue in video game ethics which probes our seemingly conflicting intuitions about the moral acceptability of virtual murder compared to virtual child molestation. But how we approach this dilemma depends on how we frame it. With this in mind, I identify three ways the dilemma has been conceptualized: the Descriptive Gamer's Investigation, which focuses on empirically explaining the source of our intuitions; the Gamer's Puzzle, which uses the dilemma to explore and test moral or (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. A Portrait of the Artist as a Young Algorithm.Sofie Vlaad - 2024 - Ethics and Information Technology 26 (3):1-11.
    This article explores the question as to whether images generated by Artificial Intelligence such as DALL-E 2 can be considered artworks. After providing a brief primer on how technologies such as DALL-E 2 work in principle, I give an overview of three contemporary accounts of art and then show that there is at least one case where an AI-generated image meets the criteria for art membership under all three accounts. I suggest that our collective hesitancy to call AI-generated images art (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  4. A Formal Account of AI Trustworthiness: Connecting Intrinsic and Perceived Trustworthiness.Piercosma Bisconti, Letizia Aquilino, Antonella Marchetti & Daniele Nardi - forthcoming - Aies '24: Proceedings of the 2024 Aaai/Acmconference on Ai, Ethics, and Society.
    This paper proposes a formal account of AI trustworthiness, connecting both intrinsic and perceived trustworthiness in an operational schematization. We argue that trustworthiness extends beyond the inherent capabilities of an AI system to include significant influences from observers' perceptions, such as perceived transparency, agency locus, and human oversight. While the concept of perceived trustworthiness is discussed in the literature, few attempts have been made to connect it with the intrinsic trustworthiness of AI systems. Our analysis introduces a novel schematization to (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. Suicide, Social Media, and Artificial Intelligence.Susan Kennedy & Erick José Ramirez - forthcoming - In Michael Cholbi & Paolo Stellino (eds.), Oxford Handbook of the Philosophy of Suicide. Oxford University Press.
    Suicide is a complex act whose meanings, while sometimes tragic, vary widely. This chapter surveys the ethical landscape surrounding algorithmic methods of suicide prevention especially as it pertains to social media activity and to the moderation of online suicide communities. We begin with a typology of suicide, distinguishing between varied goals in which suicide may factor as a means. Suicides should be understood as an act with varied eliciting desires, meanings, consequences, and ethics. Further,while many suicides may be grounded on (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. (1 other version)INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  7. Meme-making: Poaching, Reappropriation, or Bricolage?Simon J. Evnine - manuscript
    Memes are a prominent example of a kind of digital artifact. It is widely agreed that an integral component of meme-making is the way in which it makes use of other existing material. In this paper, I examine three different ways of understanding this making use of. First, it has been seen in economic terms, as a kind of poaching. Secondly, the cultural concept of (re)appropriation has been deployed. Finally, Lévi-Strauss’s notion of bricolage is often mentioned. I argue that despite (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. Engineering the trust machine. Aligning the concept of trust in the context of blockchain applications.Eva Pöll - 2024 - Ethics and Information Technology 26 (2):1-16.
    Complex technology has become an essential aspect of everyday life. We rely on technology as part of basic infrastructure and repeatedly for tasks throughout the day. Yet, in many cases the relation surpasses mere reliance and evolves to trust in technology. A new, disruptive technology is blockchain. It claims to introduce trustless relationships among its users, aiming to eliminate the need for trust altogether—even being described as “the trust machine”. This paper presents a proposal to adjust the concept of trust (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry 4.0. This research (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. (1 other version)Mark Weiser and the Origins of Ubiquitous Computing.Dustin Gray - 2024 - Metascience.
    In today’s world, technology seems to touch every aspect of our lives. Our processes for so many things have become automated and digitalized. The use of networked computational devices by both end users and corporations has become, in a word, ubiquitous. In many ways, the era of rapid technological growth we find ourselves in currently can be traced back to the work of the pioneering computer scientist, Mark Weiser. It is widely accepted among technologists today that his original vision of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  11. Telepresence as a social-historical mode of being. ChatGPT and the ontological dimensions of digital representation.Alexandros Schismenos - 2024 - Lessico di Etica Pubblica (1-2/2023):37-52.
    Nel 1956, in piena guerra fredda, una conferenza di scienziati al Dartmouth College negli Stati Uniti annunciò il lancio di un audace progetto scientifico, l’Intelligenza Artificiale (I.A.). Dopo l’iniziale fallimento degli sforzi della “Hard AI” di produrre un’intelligenza simile a quella umana, alla fine del XX secolo è emerso il movimento della “Soft AI”. Invece di essere orientato a imitare il comportamento umano in relazione a compiti specifici, ha preferito cercare modi alternativi di eseguire i compiti basati sulle particolari funzioni (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. The Duty to Promote Digital Minimalism in Group Agents.Timothy Aylsworth & Clinton Castro - 2024 - In Timothy Aylsworth & Clinton Castro (eds.), Kantian Ethics and the Attention Economy. Palgrave Macmillan.
    In this chapter, we turn our attention to the effects of the attention economy on our ability to act autonomously as a group. We begin by clarifying which sorts of groups we are concerned with, which are structured groups (groups sufficiently organized that it makes sense to attribute agency to the group itself). Drawing on recent work by Purves and Davis (2022), we describe the essential roles of trust (i.e., depending on groups to fulfill their commitments) and trustworthiness (i.e., the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. The Metaverse: Virtual Metaphysics, Virtual Governance, and Virtual Abundance.Cody Turner - 2023 - Philosophy and Technology 36 (4):1-8.
    In his article ‘The Metaverse: Surveillant Physics, Virtual Realist Governance, and the Missing Commons,’ Andrew McStay addresses an entwinement of ethical, political, and metaphysical concerns surrounding the Metaverse, arguing that the Metaverse is not being designed to further the public good but is instead being created to serve the plutocratic ends of technology corporations. He advances the notion of ‘surveillant physics’ to capture this insight and introduces the concept of ‘virtual realist governance’ as a theoretical framework that ought to guide (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Can E-Sport Gamers Permissibly Engage with Off-Limits Virtual Wrongdoings?Thomas Montefiore & Paul Formosa - 2023 - Philosophy and Technology 36 (4):1-3.
    David Ekdahl (2023), in a constructive and thoughtful commentary, outlines both points of agreement with and suggestions for further research arising from our paper ‘Crossing the Fictional Line: Moral Graveness, the Gamer’s Dilemma, and the Paradox of Fictionally Going Too Far’ (Montefiore & Formosa, 2023).
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Peru facing the Fourth Industrial Revolution.Piero Gayozzo (ed.) - 2022 - Lima: Sociedad Secular Humanista del Perú.
    La Cuarta Revolución Industrial es un conjunto de transformaciones sociales que están y seguirán siendo provocadas en los próximos años por la irrupción de tecnologías que parecieran propias de las narraciones de ciencia ficción. Se trata de un grupo de tecnologías convergentes, es decir, que tienden a complementarse y cubrir áreas más allá del rubro o disciplina desde y para el que fueron diseñadas. A partir del informe de los talleres sobre tecnologías convergentes impulsados por el National Science Foudnation (NSF) (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  16. Die Herkunft der digitalen Welt.Jörg Phil Friedrich - 2018 - Zeitschrift für Kulturphilosophie 2018 (1):13-21.
    Most of the processes subsumed under »digitalization« have in common that they permit switching and simultaneity of sender and recipient roles over a broad range of communications. Preeminently, such communications provide and process information. However, the progress of digitalization in modern lifeworlds is not primarily driven by the development of digital technology. Digital technology is but the appropriate medium for enabling the exchange of the respective formats of information. Its thrust is embedded in a cumulative history of translation of analogue (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  17. Norms and Causation in Artificial Morality.Laura Fearnley - forthcoming - Joint Proceedings of Acm Iui:1-4.
    There has been an increasing interest into how to build Artificial Moral Agents (AMAs) that make moral decisions on the basis of causation rather than mere correction. One promising avenue for achieving this is to use a causal modelling approach. This paper explores an open and important problem with such an approach; namely, the problem of what makes a causal model an appropriate model. I explore why we need to establish criteria for what makes a model appropriate, and offer-up such (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  18. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Technologies of artificial sensations.Alexey S. Bakhirev - manuscript
    Technologies based on emergence will allow to reproduce sensations on non-biological carriers by making devices feel. These technologies will change fundamentally not only the approach to the creation of artificial intelligence, but also create artificial worlds of a totally different level. Which, unlike virtual models, will really exist for themselves. This approach differs completely from the methods currently used in digital technologies. Possibly the principles described herein will give a rise to many new trends.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  20. The ethics of information transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
    The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be disclosed and what (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   58 citations  
  21. Editorial introduction – ethics of new information technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Trusting virtual trust.Paul B. de Laat - 2005 - Ethics and Information Technology 7 (3):167-180.
    Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   11 citations  
  23. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   39 citations  
  24. (1 other version)Information ethics: a reappraisal.Luciano Floridi - 2008 - Ethics and Information Technology 10 (2–3):189–204.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   17 citations  
  25. (1 other version)Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is the ethical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   118 citations  
  26. (1 other version)Mapping the foundationalist debate in computer ethics.Luciano Floridi & J. W. Sanders - 2002 - Ethics and Information Technology 4 (1):1-9.
    The paper provides a critical review of the debate on the foundations of Computer Ethics (CE). Starting from a discussion of Moor’s classic interpretation of the need for CE caused by a policy and conceptual vacuum, five positions in the literature are identified and discussed: the “no resolution approach”, according to which CE can have no foundation; the professional approach, according to which CE is solely a professional ethics; the radical approach, according to which CE deals with absolutely unique issues, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   27 citations  
  27. On the intrinsic value of information objects and the infosphere.Luciano Floridi - 2002 - Ethics and Information Technology 4 (4):287–304.
    What is the most general common set of attributes that characterises something as intrinsically valuable and hence as subject to some moral respect, and without which something would rightly be considered intrinsically worthless or even positively unworthy and therefore rightly to be disrespected in itself? This paper develops and supports the thesis that the minimal condition of possibility of an entity's least intrinsic value is to be identified with its ontological status as an information object. All entities, even when interpreted (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   69 citations  
  28. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   58 citations  
  29. The tragedy of the digital commons.Gian Maria Greco & Luciano Floridi - 2004 - Ethics and Information Technology 6 (2):73-81.
    In the paper it is argued that bridging the digital divide may cause a new ethical and social dilemma. Using Hardin's Tragedy of the Commons, we show that an improper opening and enlargement of the digital environment (Infosphere) is likely to produce a Tragedy of the Digital Commons (TDC). In the course of the analysis, we explain why Adar and Huberman's previous use of Hardin's Tragedy to interpret certain recent phenomena in the Infosphere (especially peer-to-peer communication) may not be entirely (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   13 citations  
  30. Loss of the world: A philosophical dialogue.Raymond Kolcaba - 2000 - Ethics and Information Technology 2 (1):3-9.
    Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, conservation of humanist ideals, andprudent (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  31. (1 other version)Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   20 citations  
  32. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   17 citations  
  33. My avatar, my self: Virtual harm and attachment.Jessica Wolfendale - 2007 - Ethics and Information Technology 9 (2):111-119.
    Multi-user online environments involve millions of participants world-wide. In these online communities participants can use their online personas – avatars – to chat, fight, make friends, have sex, kill monsters and even get married. Unfortunately participants can also use their avatars to stalk, kill, sexually assault, steal from and torture each other. Despite attempts to minimise the likelihood of interpersonal virtual harm, programmers cannot remove all possibility of online deviant behaviour. Participants are often greatly distressed when their avatars are harmed (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   13 citations  
Internet Ethics
  1. Regulating Misinformation: Political Irrationality as a Feasibility Constraint.Bartlomiej Chomanski - forthcoming - Topoi:1-16.
    This paper argues that the well-established fact of political irrationality imposes substantial constraints on how governments may combat the threat of political misinformation. Though attempts at regulating misinformation are becoming increasingly popular, both among policymakers and theorists, I intend to show that, for a wide range of anti-misinformation interventions (collectively termed “debunking” and “source labeling”), these attempts ought to be abandoned. My argument relies primarily on the fact that most people process politically-relevant information in biased and motivated ways. Since debunking (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for digital privacy: their (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. LA NARRATIVA TRANSMEDIÁTICA DE LA RED SOCIAL FACEBOOK EN LA CONSTRUCCIÓN SOCIAL DE LA SUBJETIVIDAD.Miguel Antonio Guevara - 2018 - Dissertation, Universidad Experimental de Los Llanos Occidentales
    La presente investigación se inscribe en el proceso de comprensión de las subjetividades sociales que emergen a partir de la narrativa transmediática. Hace una genealogía del concepto de subjetividad y su significado en la teoría sociológica, al mismo tiempo que indaga tras el entramado de significados que el especialista Henry Jetkins ha llamado narrativa transmedia. A partir de estas consideraciones se planteó un enfoque técnico-metodológico del estudio de la narrativa transmedia sirviéndose de la caracterización de las subjetividades más resaltantes por (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  4. Emotion and Ethics in Virtual Reality.Alex Fisher - forthcoming - Australasian Journal of Philosophy.
    It is controversial whether virtual reality should be considered fictional or real. Virtual fictionalists claim that objects and events within virtual reality are merely fictional: they are imagined and do not exist. Virtual realists argue that virtual objects and events really exist. This metaphysical debate might appear important for some of the practical questions that arise regarding how to morally evaluate and legally regulate virtual reality. For instance, one advantage claimed of virtual realism is that only by taking virtual objects (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. Reimagining Digital Well-Being. Report for Designers & Policymakers.Daan Annemans, Matthew Dennis, , Gunter Bombaerts, Lily E. Frank, Tom Hannes, Laura Moradbakhti, Anna Puzio, Lyanne Uhlhorn, Titiksha Vashist, , Anastasia Dedyukhina, Ellen Gilbert, Iliana Grosse-Buening & Kenneth Schlenker - 2024 - Report for Designers and Policymakers.
    This report aims to offer insights into cutting-edge research on digital well-being. Many of these insights come from a 2-day academic-impact event, The Future of Digital Well-Being, hosted by a team of researchers working with the Royal Netherlands Academy of Arts and Sciences (KNAW) in February 2024. Today, achieving and maintaining well-being in the face of online technologies is a multifaceted challenge that we believe requires using theoretical resources of different research disciplines. This report explores diverse perspectives on how digital (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. Building Epistemically Healthier Platforms.Dallas Amico-Korby, Maralee Harrell & David Danks - forthcoming - Episteme.
    When thinking about designing social media platforms, we often focus on factors such as usability, functionality, aesthetics, ethics, and so forth. Epistemic considerations have rarely been given the same level of attention in design discussions. This paper aims to rectify this neglect. We begin by arguing that there are epistemic norms that govern environments, including social media environments. Next, we provide a framework for applying these norms to the question of platform design. We then apply this framework to the real-world (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  7. Not Just A Tool: Why Social-Media Use Is Bad and Bad For Us, and The Duty to Quit.Douglas R. Campbell - 2024 - Journal of Global Ethics 20 (1):107-112.
    With an eye on the future of global ethics, I argue that social-media technologies are not morally neutral tools but are, for all intents and purposes, a kind of agent. They nudge us to do things that are bad for us. Moreover, I argue that we have a duty to quit using social-media platforms, not just on account of possible duties to preserve our own well-being but because users are akin to test subjects on whom developers are testing new nudges, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. Tweet acts and quote-tweetable acts.Chris Cousens - 2023 - Synthese 202 (6):1-28.
    Online communication can often seem different to offline talk. Structural features of social media sites can shape the things we do with words. In this paper, I argue that the practice of ‘quote-tweeting’ can cause a single utterance that originally performed just one speech act to later perform several different speech acts. This describes a new type of illocutionary pluralism—the view that a single utterance can perform multiple illocutionary acts. Not only is this type more plural than others (if one (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. Cancel Culture, Then and Now: A Platonic Approach to the Shaming of People and the Exclusion of Ideas.Douglas R. Campbell - 2023 - Journal of Cyberspace Studies 7 (2):147-166.
    In this article, I approach some phenomena seen predominantly on social-media sites that are grouped together as cancel culture with guidance from two major themes in Plato’s thought. In the first section, I argue that shame can play a constructive and valuable role in a person’s improvement, just as we see Socrates throughout Plato’s dialogues use shame to help his interlocutors improve. This insight can help us understand the value of shaming people online for, among other things, their morally reprehensible (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. The socio-economic argument for the human right to internet access.Merten Reglitz - 2023 - Politics, Philosophy and Economics 22 (4): 441-469.
    This paper argues that Internet access should be recognised as a human right because it has become practically indispensable for having adequate opportunities to realise our socio-economic human rights. This argument is significant for a philosophically informed public understanding of the Internet and because it provides the basis for creating new duties. For instance, accepting a human right to Internet access minimally requires guaranteeing access for everyone and protecting Internet access and use from certain objectionable interferences (e.g. surveillance, censorship, online (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  11. Online consent: how much do we need to know?Bartek Chomanski & Lode Lauwaert - forthcoming - AI and Society.
    This paper argues, against the prevailing view, that consent to privacy policies that regular internet users usually give is largely unproblematic from the moral point of view. To substantiate this claim, we rely on the idea of the right not to know (RNTK), as developed by bioethicists. Defenders of the RNTK in bioethical literature on informed consent claim that patients generally have the right to refuse medically relevant information. In this article we extend the application of the RNTK to online (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. In Defense of (Some) Online Echo Chambers.Douglas R. Campbell - 2023 - Ethics and Information Technology 25 (3):1-11.
    In this article, I argue that online echo chambers are in some cases and in some respects good. I do not attempt to refute arguments that they are harmful, but I argue that they are sometimes beneficial. In the first section, I argue that it is sometimes good to be insulated from views with which one disagrees. In the second section, I argue that the software-design principles that give rise to online echo chambers have a lot to recommend them. Further, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Emerging Technologies & Higher Education.Jake Burley & Alec Stubbs - 2023 - Ieet White Papers.
    Extended Reality (XR) and Large Language Model (LLM) technologies have the potential to significantly influence higher education practices and pedagogy in the coming years. As these emerging technologies reshape the educational landscape, it is crucial for educators and higher education professionals to understand their implications and make informed policy decisions for both individual courses and universities as a whole. -/- This paper has two parts. In the first half, we give an overview of XR technologies and their potential future role (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  14. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on data scientists, or data engineer (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. The Democratic Metaverse: Building an Extended Reality Safe for Citizens, Workers and Consumers.Alec Stubbs, James J. Hughes, Nir Eisikovits & Jake Burley - 2023 - Ieet White Papers.
    We are likely to have immersive virtual reality and ubiquitous augmented reality in the coming decades. At least some people will use extended reality or “the metaverse” to work, play and shop. In order to achieve the best possible versions of this virtual future, however, we will need to learn from three decades of regulating the Internet. The new virtual world cannot consist of walled corporate fiefdoms ruled only by profitmaximization. The interests of workers, consumers and citizens in virtuality require (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  16. Algorithmic neutrality.Milo Phillips-Brown - manuscript
    Algorithms wield increasing control over our lives—over the jobs we get, the loans we're granted, the information we see online. Algorithms can and often do wield their power in a biased way, and much work has been devoted to algorithmic bias. In contrast, algorithmic neutrality has been largely neglected. I investigate algorithmic neutrality, tackling three questions: What is algorithmic neutrality? Is it possible? And when we have it in mind, what can we learn about algorithmic bias?
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. The moral source of collective irrationality during COVID-19 vaccination campaigns.Cristina Voinea, Lavinia Marin & Constantin Vică - 2023 - Philosophical Psychology (5):949-968.
    Many hypotheses have been advanced to explain the collective irrationality of COVID-19 vaccine hesitancy, such as partisanship and ideology, exposure to misinformation and conspiracy theories or the effectiveness of public messaging. This paper presents a complementary explanation to epistemic accounts of collective irrationality, focusing on the moral reasons underlying people’s decisions regarding vaccination. We argue that the moralization of COVID-19 risk mitigation measures contributed to the polarization of groups along moral values, which ultimately led to the emergence of collective irrational (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 221