Computer Ethics

Edited by Lavinia Marin (Delft University of Technology)
Related

Contents
246 found
Order:
1 — 50 / 246
Material to categorize
  1. A moving target in AI-assisted decision-making: Model updating, dataset shift, and the problem of update opacity.Joshua Hatherley - forthcoming - Ethics and Information Technology.
    Machine learning (ML) systems are vulnerable to performance decline over time due to dataset shift. To address this problem, experts often suggest that ML systems should be regularly updated to ensure ongoing performance stability. Some scholarly literature has begun to address the epistemic and ethical challenges associated with different updating methodologies. Thus far, however, little attention has been paid to the impact of model updating on the ML-assisted decision-making process itself, particularly in the AI ethics and AI epistemology literatures. This (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. The Attention Economy and The Right to Attention: Some Lessons from Theravāda and Mahāyāna Thought.Mark Fortney - 2025 - Journal of Buddhist Ethics 32.
    Much of the work in the rapidly growing field of computer ethics relies on the concepts and theories of Western philosophy. With this article my aim is to help stimulate conversations that draw on a wider range of ethical perspectives. I build on recent work on the sense in which the regular operations of the attention economy might violate our right to attention, and I do so through looking to a range of Theravāda and Mahāyāna Buddhist texts. As I argue, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. Cultural analytics to discover regularities in cultural movements: A book review.Manh-Tung Ho - manuscript
    In Cultural Analytics, Lev Manovich (2020) outlines the recent developments and the historical roots of a new, exciting research field called cultural analytics. Cultural analytics emerges as a discipline that utilizes methods from computer science, data visualization, and media arts for the exploration and analysis of cultural objects and their user interactions. Manovich continuously admonishes future researchers to think hard about the challenges of how cultural phenomenon can be represented as data to avoid the reductivism trap, as he quotes Gitelman (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  4. The Testimony Gap: Machines and Reasons.Robert Sparrow & Gene Flenady - 2025 - Minds and Machines 35 (1):1-16.
    Most people who have considered the matter have concluded that machines cannot be moral agents. Responsibility for acting on the outputs of machines must always rest with a human being. A key problem for the ethical use of AI, then, is to ensure that it does not block the attribution of responsibility to humans or lead to individuals being unfairly held responsible for things over which they had no control. This is the “responsibility gap”. In this paper, we argue that (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. Disembodied friendship: virtual friends and the tendencies of technologically mediated friendship.Daniel Grasso - 2025 - Ethics and Information Technology 27 (1):1-11.
    This paper engages the ongoing debate around the possibility of virtue friendships in the Aristotelian sense through online mediation. However, I argue that since the current literature has remained overly focused on the mere possibility of virtual friendship, it has obscured the more common phenomena of using digital communication to sustain previous in-person friendships which are now at a distance. While I agree with those who argue that entirely virtual friendship is possible, I argue that the current rebuttals to the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. Diving into Fair Pools: Algorithmic Fairness, Ensemble Forecasting, and the Wisdom of Crowds.Rush T. Stewart & Lee Elkin - forthcoming - Analysis.
    Is the pool of fair predictive algorithms fair? It depends, naturally, on both the criteria of fairness and on how we pool. We catalog the relevant facts for some of the most prominent statistical criteria of algorithmic fairness and the dominant approaches to pooling forecasts: linear, geometric, and multiplicative. Only linear pooling, a format at the heart of ensemble methods, preserves any of the central criteria we consider. Drawing on work in the social sciences and social epistemology on the theoretical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  7. AI Mimicry and Human Dignity: Chatbot Use as a Violation of Self-Respect.Jan-Willem van der Rijt, Dimitri Coelho Mollo & Bram Vaassen - manuscript
    This paper investigates how human interactions with AI-powered chatbots may offend human dignity. Current chatbots, driven by large language models (LLMs), mimic human linguistic behaviour but lack the moral and rational capacities essential for genuine interpersonal respect. Human beings are prone to anthropomorphise chatbots—indeed, chatbots appear to be deliberately designed to elicit that response. As a result, human beings’ behaviour toward chatbots often resembles behaviours typical of interaction between moral agents. Drawing on a second-personal, relational account of dignity, we argue (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. Two Types of AI Existential Risk: Decisive and Accumulative.Atoosa Kasirzadeh - manuscript
    The conventional discourse on existential risks (x-risks) from AI typically focuses on abrupt, dire events caused by advanced AI systems, particularly those that might achieve or surpass human-level intelligence. These events have severe consequences that either lead to human extinction or irreversibly cripple human civilization to a point beyond recovery. This discourse, however, often neglects the serious possibility of AI x-risks manifesting incrementally through a series of smaller yet interconnected disruptions, gradually crossing critical thresholds over time. This paper contrasts the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Who Should obey Asimov’s Laws of Robotics? A Question of Responsibility.Maria Hedlund & Erik Persson - 2024 - In Spyridon Stelios & Kostas Theologou, The Ethics Gap in the Engineering of the Future. Emerald Publishing. pp. 9-25.
    The aim of this chapter is to explore the safety value of implementing Asimov’s Laws of Robotics as a future general framework that humans should obey. Asimov formulated laws to make explicit the safeguards of the robots in his stories: (1) A robot may not injure or harm a human being or, through inaction, allow a human being to come to harm; (2) A robot must obey the orders given to it by human beings except where such orders would conflict (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. “Emergent Abilities,” AI, and Biosecurity: Conceptual Ambiguity, Stability, and Policy.Alex John London - 2024 - Disincentivizing Bioweapons: Theory and Policy Approaches.
    Recent claims that artificial intelligence (AI) systems demonstrate “emergent abilities” have fueled excitement but also fear grounded in the prospect that such systems may enable a wider range of parties to make unprecedented advances in areas that include the development of chemical or biological weapons. Ambiguity surrounding the term “emergent abilities” has added avoidable uncertainty to a topic that has the potential to destabilize the strategic landscape, including the perception of key parties about the viability of nonproliferation efforts. To avert (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  11. Ethical principles shaping values-based cybersecurity decision-making.Joseph Fenech, Deborah Richards & Paul Formosa - 2024 - Computers and Society 140 (103795).
    The human factor in information systems is a large vulnerability when implementing cybersecurity, and many approaches, including technical and policy driven solutions, seek to mitigate this vulnerability. Decisions to apply technical or policy solutions must consider how an individual’s values and moral stance influence their responses to these implementations. Our research aims to evaluate how individuals prioritise different ethical principles when making cybersecurity sensitive decisions and how much perceived choice they have when doing so. Further, we sought to use participants’ (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. Posthumanist Phenomenology and Artificial Intelligence.Avery Rijos - 2024 - Philosophy Papers (Philpapers).
    This paper examines the ontological and epistemological implications of artificial intelligence (AI) through posthumanist philosophy, integrating the works of Deleuze, Foucault, and Haraway with contemporary computational methodologies. It introduces concepts such as negative augmentation, praxes of revealing, and desedimentation, while extending ideas like affirmative cartographies, ethics of alterity, and planes of immanence to critique anthropocentric assumptions about identity, cognition, and agency. By redefining AI systems as dynamic assemblages emerging through networks of interaction and co-creation, the paper challenges traditional dichotomies such (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. Privacy: scepticism, normative approaches and legal protection. A review of the theoretical debate and a discussion of recent developments in the EU.Elisa Orrù - 2022 - Dpce Online 52 (2):779–800.
    Digitalisation has lent the right to privacy increasing philosophical and legal relevance. However, privacy’s epistemic status and associated normative values are constantly subject to radical criticisms. This article investigates the validity, in theory and practice, of three radical critiques of privacy. A review of the philosophical and interdisciplinary discourse on privacy during the last half century is followed by analyses of recent legal developments within the EU. Privacy emerges as a highly differentiated and powerful tool to protect individuals and social (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  14. Trust in AI: Progress, Challenges, and Future Directions.Saleh Afroogh, Ali Akbari, Emmie Malone, Mohammadali Kargar & Hananeh Alambeigi - forthcoming - Nature Humanities and Social Sciences Communications.
    The increasing use of artificial intelligence (AI) systems in our daily life through various applications, services, and products explains the significance of trust/distrust in AI from a user perspective. AI-driven systems have significantly diffused into various fields of our lives, serving as beneficial tools used by human agents. These systems are also evolving to act as co-assistants or semi-agents in specific domains, potentially influencing human thought, decision-making, and agency. Trust/distrust in AI plays the role of a regulator and could significantly (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  15. The virtues of interpretable medical AI.Joshua Hatherley, Robert Sparrow & Mark Howard - 2024 - Cambridge Quarterly of Healthcare Ethics 33 (3).
    Artificial intelligence (AI) systems have demonstrated impressive performance across a variety of clinical tasks. However, notoriously, sometimes these systems are “black boxes.” The initial response in the literature was a demand for “explainable AI.” However, recently, several authors have suggested that making AI more explainable or “interpretable” is likely to be at the cost of the accuracy of these systems and that prioritizing interpretability in medical AI may constitute a “lethal prejudice.” In this paper, we defend the value of interpretability (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Transformando la gobernanza municipal: Aplicación de Inteligencia Artificial para optimizar y mejorar los procesos de gestión documental en la Dirección de Avalúos y Catastros del GAD-Latacunga.Felix D. Andueza Araque & Alixon M. Chiluisa Sangoquiza - 2024 - Dissertation, Universidad de Las Américas (Udla)
    In the 21st century, transparency and efficiency in municipal management are essential. This study focusses on the GAD Municipal of Latacunga, Ecuador, assessing inefficiency in the Office of Valuation and Cadastres, proposing the use of AI to improve governance. The research reveals deficiencies in digitalization and transparency, identifying the need for effective mechanisms to optimize public services. AI is presented as a potential solution to automate tasks, detect irregularities, and increase administrative efficiency. This analysis, based on regional and local data, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  17. Framing the Gamer's Dilemma.Michael Hemmingsen - 2024 - Ethics and Information Technology 26 (59):1-10.
    The Gamer's Dilemma is a much-discussed issue in video game ethics which probes our seemingly conflicting intuitions about the moral acceptability of virtual murder compared to virtual child molestation. But how we approach this dilemma depends on how we frame it. With this in mind, I identify three ways the dilemma has been conceptualized: the Descriptive Gamer's Investigation, which focuses on empirically explaining the source of our intuitions; the Gamer's Puzzle, which uses the dilemma to explore and test moral or (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  18. A Portrait of the Artist as a Young Algorithm.Sofie Vlaad - 2024 - Ethics and Information Technology 26 (3):1-11.
    This article explores the question as to whether images generated by Artificial Intelligence such as DALL-E 2 can be considered artworks. After providing a brief primer on how technologies such as DALL-E 2 work in principle, I give an overview of three contemporary accounts of art and then show that there is at least one case where an AI-generated image meets the criteria for art membership under all three accounts. I suggest that our collective hesitancy to call AI-generated images art (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. A Formal Account of AI Trustworthiness: Connecting Intrinsic and Perceived Trustworthiness.Piercosma Bisconti, Letizia Aquilino, Antonella Marchetti & Daniele Nardi - forthcoming - Aies '24: Proceedings of the 2024 Aaai/Acmconference on Ai, Ethics, and Society.
    This paper proposes a formal account of AI trustworthiness, connecting both intrinsic and perceived trustworthiness in an operational schematization. We argue that trustworthiness extends beyond the inherent capabilities of an AI system to include significant influences from observers' perceptions, such as perceived transparency, agency locus, and human oversight. While the concept of perceived trustworthiness is discussed in the literature, few attempts have been made to connect it with the intrinsic trustworthiness of AI systems. Our analysis introduces a novel schematization to (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  20. Suicide, Social Media, and Artificial Intelligence.Susan Kennedy & Erick José Ramirez - forthcoming - In Michael Cholbi & Paolo Stellino, Oxford Handbook of the Philosophy of Suicide. Oxford University Press.
    Suicide is a complex act whose meanings, while sometimes tragic, vary widely. This chapter surveys the ethical landscape surrounding algorithmic methods of suicide prevention especially as it pertains to social media activity and to the moderation of online suicide communities. We begin with a typology of suicide, distinguishing between varied goals in which suicide may factor as a means. Suicides should be understood as an act with varied eliciting desires, meanings, consequences, and ethics. Further,while many suicides may be grounded on (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  21. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   111 citations  
  22. Engineering the trust machine. Aligning the concept of trust in the context of blockchain applications.Eva Pöll - 2024 - Ethics and Information Technology 26 (2):1-16.
    Complex technology has become an essential aspect of everyday life. We rely on technology as part of basic infrastructure and repeatedly for tasks throughout the day. Yet, in many cases the relation surpasses mere reliance and evolves to trust in technology. A new, disruptive technology is blockchain. It claims to introduce trustless relationships among its users, aiming to eliminate the need for trust altogether—even being described as “the trust machine”. This paper presents a proposal to adjust the concept of trust (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  23. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry 4.0. This research (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  24. (1 other version)Mark Weiser and the Origins of Ubiquitous Computing. [REVIEW]Dustin Gray - 2024 - Metascience 33:257–259.
    In today’s world, technology seems to touch every aspect of our lives. Our processes for so many things have become automated and digitalized. The use of networked computational devices by both end users and corporations has become, in a word, ubiquitous. In many ways, the era of rapid technological growth we find ourselves in currently can be traced back to the work of the pioneering computer scientist, Mark Weiser. It is widely accepted among technologists today that his original vision of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  25. Telepresence as a social-historical mode of being. ChatGPT and the ontological dimensions of digital representation.Alexandros Schismenos - 2024 - Lessico di Etica Pubblica (1-2/2023):37-52.
    Nel 1956, in piena guerra fredda, una conferenza di scienziati al Dartmouth College negli Stati Uniti annunciò il lancio di un audace progetto scientifico, l’Intelligenza Artificiale (I.A.). Dopo l’iniziale fallimento degli sforzi della “Hard AI” di produrre un’intelligenza simile a quella umana, alla fine del XX secolo è emerso il movimento della “Soft AI”. Invece di essere orientato a imitare il comportamento umano in relazione a compiti specifici, ha preferito cercare modi alternativi di eseguire i compiti basati sulle particolari funzioni (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. The Duty to Promote Digital Minimalism in Group Agents.Timothy Aylsworth & Clinton Castro - 2024 - In Timothy Aylsworth & Clinton Castro, Kantian Ethics and the Attention Economy. Palgrave Macmillan.
    In this chapter, we turn our attention to the effects of the attention economy on our ability to act autonomously as a group. We begin by clarifying which sorts of groups we are concerned with, which are structured groups (groups sufficiently organized that it makes sense to attribute agency to the group itself). Drawing on recent work by Purves and Davis (2022), we describe the essential roles of trust (i.e., depending on groups to fulfill their commitments) and trustworthiness (i.e., the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  27. The Metaverse: Virtual Metaphysics, Virtual Governance, and Virtual Abundance.Cody Turner - 2023 - Philosophy and Technology 36 (4):1-8.
    In his article ‘The Metaverse: Surveillant Physics, Virtual Realist Governance, and the Missing Commons,’ Andrew McStay addresses an entwinement of ethical, political, and metaphysical concerns surrounding the Metaverse, arguing that the Metaverse is not being designed to further the public good but is instead being created to serve the plutocratic ends of technology corporations. He advances the notion of ‘surveillant physics’ to capture this insight and introduces the concept of ‘virtual realist governance’ as a theoretical framework that ought to guide (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Can E-Sport Gamers Permissibly Engage with Off-Limits Virtual Wrongdoings?Thomas Montefiore & Paul Formosa - 2023 - Philosophy and Technology 36 (4):1-3.
    David Ekdahl (2023), in a constructive and thoughtful commentary, outlines both points of agreement with and suggestions for further research arising from our paper ‘Crossing the Fictional Line: Moral Graveness, the Gamer’s Dilemma, and the Paradox of Fictionally Going Too Far’ (Montefiore & Formosa, 2023).
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Peru facing the Fourth Industrial Revolution.Piero Gayozzo (ed.) - 2022 - Lima: Sociedad Secular Humanista del Perú.
    La Cuarta Revolución Industrial es un conjunto de transformaciones sociales que están y seguirán siendo provocadas en los próximos años por la irrupción de tecnologías que parecieran propias de las narraciones de ciencia ficción. Se trata de un grupo de tecnologías convergentes, es decir, que tienden a complementarse y cubrir áreas más allá del rubro o disciplina desde y para el que fueron diseñadas. A partir del informe de los talleres sobre tecnologías convergentes impulsados por el National Science Foudnation (NSF) (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  30. Die Herkunft der digitalen Welt.Jörg Phil Friedrich - 2018 - Zeitschrift für Kulturphilosophie 2018 (1):13-21.
    Most of the processes subsumed under »digitalization« have in common that they permit switching and simultaneity of sender and recipient roles over a broad range of communications. Preeminently, such communications provide and process information. However, the progress of digitalization in modern lifeworlds is not primarily driven by the development of digital technology. Digital technology is but the appropriate medium for enabling the exchange of the respective formats of information. Its thrust is embedded in a cumulative history of translation of analogue (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  31. Norms and Causation in Artificial Morality.Laura Fearnley - forthcoming - Joint Proceedings of Acm Iui:1-4.
    There has been an increasing interest into how to build Artificial Moral Agents (AMAs) that make moral decisions on the basis of causation rather than mere correction. One promising avenue for achieving this is to use a causal modelling approach. This paper explores an open and important problem with such an approach; namely, the problem of what makes a causal model an appropriate model. I explore why we need to establish criteria for what makes a model appropriate, and offer-up such (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  32. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore, Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Technologies of artificial sensations.Alexey S. Bakhirev - manuscript
    Technologies based on emergence will allow to reproduce sensations on non-biological carriers by making devices feel. These technologies will change fundamentally not only the approach to the creation of artificial intelligence, but also create artificial worlds of a totally different level. Which, unlike virtual models, will really exist for themselves. This approach differs completely from the methods currently used in digital technologies. Possibly the principles described herein will give a rise to many new trends.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  34. The ethics of information transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
    The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be disclosed and what (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   60 citations  
  35. Editorial introduction – ethics of new information technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Trusting virtual trust.Paul B. de Laat - 2005 - Ethics and Information Technology 7 (3):167-180.
    Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   11 citations  
  37. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   39 citations  
  38. Information ethics: a reappraisal.Luciano Floridi - 2008 - Ethics and Information Technology 10 (2–3):189–204.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   19 citations  
  39. (1 other version)Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is the ethical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   122 citations  
  40. On the intrinsic value of information objects and the infosphere.Luciano Floridi - 2002 - Ethics and Information Technology 4 (4):287–304.
    What is the most general common set of attributes that characterises something as intrinsically valuable and hence as subject to some moral respect, and without which something would rightly be considered intrinsically worthless or even positively unworthy and therefore rightly to be disrespected in itself? This paper develops and supports the thesis that the minimal condition of possibility of an entity's least intrinsic value is to be identified with its ontological status as an information object. All entities, even when interpreted (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   69 citations  
  41. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   60 citations  
  42. The tragedy of the digital commons.Gian Maria Greco & Luciano Floridi - 2004 - Ethics and Information Technology 6 (2):73-81.
    In the paper it is argued that bridging the digital divide may cause a new ethical and social dilemma. Using Hardin's Tragedy of the Commons, we show that an improper opening and enlargement of the digital environment (Infosphere) is likely to produce a Tragedy of the Digital Commons (TDC). In the course of the analysis, we explain why Adar and Huberman's previous use of Hardin's Tragedy to interpret certain recent phenomena in the Infosphere (especially peer-to-peer communication) may not be entirely (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   13 citations  
  43. Loss of the world: A philosophical dialogue.Raymond Kolcaba - 2000 - Ethics and Information Technology 2 (1):3-9.
    Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, conservation of humanist ideals, andprudent (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  44. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   18 citations  
  45. My avatar, my self: Virtual harm and attachment.Jessica Wolfendale - 2007 - Ethics and Information Technology 9 (2):111-119.
    Multi-user online environments involve millions of participants world-wide. In these online communities participants can use their online personas – avatars – to chat, fight, make friends, have sex, kill monsters and even get married. Unfortunately participants can also use their avatars to stalk, kill, sexually assault, steal from and torture each other. Despite attempts to minimise the likelihood of interpersonal virtual harm, programmers cannot remove all possibility of online deviant behaviour. Participants are often greatly distressed when their avatars are harmed (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   14 citations  
Internet Ethics
  1. Why the marketplace of ideas needs more markets.Bartek Chomanski - 2025 - Episteme.
    It is frequently argued that false and misleading claims, spread primarily on social media, are a serious problem in need of urgent response. Current strategies to address the problem – relying on fact-checks, source labeling, limits on the visibility of certain claims, and, ultimately, content removals – face two serious shortcomings: they are ineffective and biased. Consequently, it is reasonable to want to seek alternatives. This paper provides one: to address the problems with misinformation, social media platforms should abandon third-party (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. Do It Yourself Content and the Wisdom of the Crowds.Dallas Amico-Korby, Maralee Harrell & David Danks - 2025 - Erkenntnis:1-29.
    Many social media platforms enable (nearly) anyone to post (nearly) anything. One clear downside of this permissiveness is that many people appear bad at determining who to trust online. Hacks, quacks, climate change deniers, vaccine skeptics, and election deniers have all gained massive followings in these free markets of ideas, and many of their followers seem to genuinely trust them. At the same time, there are many cases in which people seem to reliably determine who to trust online. Consider, for (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. Regulating Misinformation: Political Irrationality as a Feasibility Constraint.Bartlomiej Chomanski - 2024 - Topoi 43 (5):1389-1404.
    This paper argues that the well-established fact of political irrationality imposes substantial constraints on how governments may combat the threat of political misinformation. Though attempts at regulating misinformation are becoming increasingly popular, both among policymakers and theorists, I intend to show that, for a wide range of anti-misinformation interventions (collectively termed “debunking” and “source labeling”), these attempts ought to be abandoned. My argument relies primarily on the fact that most people process politically-relevant information in biased and motivated ways. Since debunking (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Critical Social Epistemology of Social Media and Epistemic Virtues.Lukas Schwengerer - forthcoming - Social Epistemology.
    This paper suggests that virtue epistemology can help decide how to respond to conflicts between different epistemic goals for social media. It is a contribution to critical epistemology of social media insofar as it supplements system-level consideration with insights from individualist epistemology. In particular, whereas the proposal of critical social epistemology of social media by Joshua Habgood-Coote suggests that conflicts between epistemic goals of social media have to be solved by ethical consideration, I suggest that virtue epistemology can also solve (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. Attending to the Online Other: A Phenomenology of Attention on Social Media Platforms.Lavinia Marin - 2024 - In Bas de Boer & Jochem Zwier, PHENOMENOLOGY AND THE PHILOSOPHY OF TECHNOLOGY. openbook publishers. pp. 215–240.
    Lavinia Marin draws from phenomenology to lay bare another aspect of the ubiquitous presence of social media. By taking the phenomenology of attention as a starting-point, she show that attention is – rather than only a scare resource as analysts departing from the perspective of the attention economy would have it – foundational for our moral relations to other beings. She argues that there is a distinctive form of other-oriented attention that enables us to perceive other beings as living beings (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 246