Related

Contents
63 found
Order:
1 — 50 / 63
  1. Ethics of Identity in the Time of Big Data - Delivered at 25th Annual International Vincentian Business Ethics Conference (IVBEC), 2018, St. John’s University, New York.James Brusseau - manuscript
    According to Facebook’s Mark Zuckerberg, big data reality means, “The days of having a different image for your co-workers and for others are coming to an end, which is good because having multiple identities represents a lack of integrity.” Two sets of questions follow. One centers on technology and asks how big data mechanisms collapse our various selves (work-self, family-self, romantic-self) into one personality. The second question set shifts from technology to ethics by asking whether we want the kind of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. Acceleration AI Ethics, the Debate between Innovation and Safety, and Stability AI’s Diffusion versus OpenAI’s Dall-E.James Brusseau - manuscript
    One objection to conventional AI ethics is that it slows innovation. This presentation responds by reconfiguring ethics as an innovation accelerator. The critical elements develop from a contrast between Stability AI’s Diffusion and OpenAI’s Dall-E. By analyzing the divergent values underlying their opposed strategies for development and deployment, five conceptions are identified as common to acceleration ethics. Uncertainty is understood as positive and encouraging, rather than discouraging. Innovation is conceived as intrinsically valuable, instead of worthwhile only as mediated by social (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. Legal aspects of Big Data - GDPR.Nicolae Sfetcu - manuscript
    The use of Big Data presents significant legal problems, especially in terms of data protection. The existing legal framework of the European Union based in particular on the Directive no. 46/95/EC and the General Regulation on the Protection of Personal Data provide adequate protection. But for Big Data, a comprehensive and global strategy is needed. The evolution over time was from the right to exclude others to the right to control their own data and, at present, to the rethinking of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  4. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student success (however defined). Learning (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. The philosophical basis of algorithmic recourse.Suresh Venkatasubramanian & Mark Alfano - forthcoming - Fairness, Accountability, and Transparency Conference 2020.
    Philosophers have established that certain ethically important val- ues are modally robust in the sense that they systematically deliver correlative benefits across a range of counterfactual scenarios. In this paper, we contend that recourse – the systematic process of reversing unfavorable decisions by algorithms and bureaucracies across a range of counterfactual scenarios – is such a modally ro- bust good. In particular, we argue that two essential components of a good life – temporally extended agency and trust – are under- (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   5 citations  
  7. Okay, Google, Can I Trust You? An Anti-trust Argument for Antitrust.Trystan S. Goetze - 2023 - In David Collins, Iris Vidmar Jovanović & Mark Alfano (eds.), The Moral Psychology of Trust. Lanham, MD: Lexington Books. pp. 237-257.
    In this chapter, I argue that it is impossible to trust the Big Tech companies, in an ethically important sense of trust. The argument is not that these companies are untrustworthy. Rather, I argue that the power to hold the trustee accountable is a necessary component of this sense of trust, and, because these companies are so powerful, they are immune to our attempts, as individuals or nation-states, to hold them to account. It is, therefore, literally impossible to trust Big (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. Integrating Ethics into Computer Science Education: Multi-, Inter-, and Transdisciplinary Approaches.Trystan S. Goetze - 2023 - Proceedings of the 54Th Acm Technical Symposium on Computer Science Education V. 1 (Sigcse 2023).
    While calls to integrate ethics into computer science education go back decades, recent high-profile ethical failures related to computing technology by large technology companies, governments, and academic institutions have accelerated the adoption of computer ethics education at all levels of instruction. Discussions of how to integrate ethics into existing computer science programmes often focus on the structure of the intervention—embedded modules or dedicated courses, humanists or computer scientists as ethics instructors—or on the specific content to be included—lists of case studies (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. The Effectiveness of Embedded Values Analysis Modules in Computer Science Education: An Empirical Study.Matthew Kopec, Meica Magnani, Vance Ricks, Roben Torosyan, John Basl, Nicholas Miklaucic, Felix Muzny, Ronald Sandler, Christo Wilson, Adam Wisniewski-Jensen, Cora Lundgren, Kevin Mills & Mark Wells - 2023 - Big Data and Society 10 (1).
    Embedding ethics modules within computer science courses has become a popular response to the growing recognition that CS programs need to better equip their students to navigate the ethical dimensions of computing technologies like AI, machine learning, and big data analytics. However, the popularity of this approach has outpaced the evidence of its positive outcomes. To help close that gap, this empirical study reports positive results from Northeastern’s program that embeds values analysis modules into CS courses. The resulting data suggest (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. A Kantian response to the Gamer’s Dilemma.Samuel Ulbricht - 2023 - Ethics and Information Technology 25 (3):1-11.
    The Gamer’s Dilemma consists of three intuitively plausible but conflicting assertions: (i) Virtual murder is morally permissible. (ii) Virtual child molestation is morally forbidden. (iii) There is no relevant moral difference between virtual murder and virtual child molestation in computer games. Numerous attempts to resolve (or dissolve) the Gamer’s Dilemma line the field of computer game ethics. Mostly, the phenomenon is approached using expressivist argumentation: Reprehensible virtual actions express something immoral in their performance but are not immoral by themselves. Consequentialists, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Oggetti buoni: Per una tecnologia sensibile ai valori.Steven Umbrello - 2023 - Rome: Fandango.
    Non possiamo immaginare un mondo senza le nostre tecnologie e i nostri strumenti. In molti modi, le nostre tecnologie sono ciò che ci definisce come esseri umani, separandoci dal resto del regno animale. Tuttavia, pensare alle nostre tecnologie come semplici strumenti, strumenti che possono essere usati nel bene o nel male, ci rende vulnerabili agli effetti sistemici e duraturi che le tecnologie hanno sulla nostra società, sui comportamenti, e sulle generazioni future. Oggetti Buoni esplora come le tecnologie incarnano i valori (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. Tracing app technology: an ethical review in the COVID-19 era and directions for post-COVID-19.Saleh Afroogh, Amir Esmalian, Ali Mostafavi, Ali Akbari, Kambiz Rasoulkhani, Shahriar Esmaeili & Ehsan Hajiramezanali - 2022 - Ethics and Information Technology 24 (3):1-15.
    We conducted a systematic literature review on the ethical considerations of the use of contact tracing app technology, which was extensively implemented during the COVID-19 pandemic. The rapid and extensive use of this technology during the COVID-19 pandemic, while benefting the public well-being by providing information about people’s mobility and movements to control the spread of the virus, raised several ethical concerns for the post-COVID-19 era. To investigate these concerns for the post-pandemic situation and provide direction for future events, we (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  14. Quantum of Wisdom.Colin Allen & Brett Karlan - 2022 - In Greg Viggiano (ed.), Quantum Computing and AI: Social, Ethical, and Geo-Political Implications. pp. 157-166.
    Practical quantum computing devices and their applications to AI in particular are presently mostly speculative. Nevertheless, questions about whether this future technology, if achieved, presents any special ethical issues are beginning to take shape. As with any novel technology, one can be reasonably confident that the challenges presented by "quantum AI" will be a mixture of something new and something old. Other commentators (Sevilla & Moreno 2019), have emphasized continuity, arguing that quantum computing does not substantially affect approaches to value (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  15. Mind the Gap: Autonomous Systems, the Responsibility Gap, and Moral Entanglement.Trystan S. Goetze - 2022 - Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency (FAccT ’22).
    When a computer system causes harm, who is responsible? This question has renewed significance given the proliferation of autonomous systems enabled by modern artificial intelligence techniques. At the root of this problem is a philosophical difficulty known in the literature as the responsibility gap. That is to say, because of the causal distance between the designers of autonomous systems and the eventual outcomes of those systems, the dilution of agency within the large and complex teams that design autonomous systems, and (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Vices in Gaming: Virtue Ethics and Endorsement View.Deniz A. Kaya - 2022 - Journal of Value Inquiry:1-17.
    Can video games or the playing of such games be morally objectionable? Many attempts to justify our intuitions about the morality of certain games or game activities are either unsuccessful or fall short. This is mainly due to a normative gap between reality and virtuality that classical approaches to moral philosophy cannot bridge. I am investigating to what extent an accurate action analysis can help us to justify our intuitions that, in some cases, something is ethically wrong with video games. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  17. Resisting the Gamer’s Dilemma.Thomas Montefiore & Paul Formosa - 2022 - Ethics and Information Technology 24 (3):1-13.
    Intuitively, many people seem to hold that engaging in acts of virtual murder in videogames is morally permissible, whereas engaging in acts of virtual child molestation is morally impermissible. The Gamer’s Dilemma (Luck in Ethics Inf Technol 11:31–36, 2009) challenges these intuitions by arguing that it is unclear whether there is a morally relevant difference between these two types of virtual actions. There are two main responses in the literature to this dilemma. First, attempts to resolve the dilemma by defending (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   7 citations  
  18. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  19. May Kantians commit virtual killings that affect no other persons?Tobias Flattery - 2021 - Ethics and Information Technology 23 (4):751-762.
    Are acts of violence performed in virtual environments ever morally wrong, even when no other persons are affected? While some such acts surely reflect deficient moral character, I focus on the moral rightness or wrongness of acts. Typically it’s thought that, on Kant’s moral theory, an act of virtual violence is morally wrong (i.e., violate the Categorical Imperative) only if the act mistreats another person. But I argue that, on Kant’s moral theory, some acts of virtual violence can be morally (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  20. A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: beneficence, non-maleficence, autonomy, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  21. Bigger Isn’t Better: The Ethical and Scientific Vices of Extra-Large Datasets in Language Models.Trystan S. Goetze & Darren Abramson - 2021 - WebSci '21: Proceedings of the 13th Annual ACM Web Science Conference (Companion Volume).
    The use of language models in Web applications and other areas of computing and business have grown significantly over the last five years. One reason for this growth is the improvement in performance of language models on a number of benchmarks — but a side effect of these advances has been the adoption of a “bigger is always better” paradigm when it comes to the size of training, testing, and challenge datasets. Drawing on previous criticisms of this paradigm as applied (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  22. Ethical Analysis on the Application of Neurotechnology for Human Augmentation in Physicians and Surgeons.Soaad Hossain & Syed Ishtiaque Ahmed - 2021 - In Kohei Arai, Supriya Kapoor & Rahul Bhatia (eds.), Proceedings of the Future Technologies Conference (FTC) 2020. Switzerland: pp. 78-99.
    With the shortage of physicians and surgeons and increase in demand worldwide due to situations such as the COVID-19 pandemic, there is a growing interest in finding solutions to help address the problem. A solution to this problem would be to use neurotechnology to provide them augmented cognition, senses and action for optimal diagnosis and treatment. Consequently, doing so can negatively impact them and others. We argue that applying neurotechnology for human enhancement in physicians and surgeons can cause injustices, and (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  23. What it’s like to be a ___: Why it’s (often) unethical to use VR as an empathy nudging tool.Erick Jose Ramirez, Miles Elliott & Per-Erik Milam - 2021 - Ethics and Information Technology 1 (3):527-542.
    In this article, we apply the literature on the ethics of choice-architecture (nudges) to the realm of virtual reality (VR) to point out ethical problems with using VR for empathy-based nudging. Specifically, we argue that VR simulations aiming to enhance empathic understanding of others via perspective-taking will almost always be unethical to develop or deploy. We argue that VR-based empathy enhancement not only faces traditional ethical concerns about nudge (autonomy, welfare, transparency), but also a variant of the semantic variance problem (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Hey, Google, leave those kids alone: Against hypernudging children in the age of big data.James Smith & Tanya de Villiers-Botha - 2021 - AI and Society.
    Children continue to be overlooked as a topic of concern in discussions around the ethical use of people’s data and information. Where children are the subject of such discussions, the focus is often primarily on privacy concerns and consent relating to the use of their data. This paper highlights the unique challenges children face when it comes to online interferences with their decision-making, primarily due to their vulnerability, impressionability, the increased likelihood of disclosing personal information online, and their developmental capacities. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  25. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer ethics content (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  26. Presumptuous aim attribution, conformity, and the ethics of artificial social cognition.Owen C. King - 2020 - Ethics and Information Technology 22 (1):25-37.
    Imagine you are casually browsing an online bookstore, looking for an interesting novel. Suppose the store predicts you will want to buy a particular novel: the one most chosen by people of your same age, gender, location, and occupational status. The store recommends the book, it appeals to you, and so you choose it. Central to this scenario is an automated prediction of what you desire. This article raises moral concerns about such predictions. More generally, this article examines the ethics (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. Ethics of digital contact tracing and COVID-19: who is (not) free to go?Michael Klenk & Hein Duijf - 2020 - Ethics and Information Technology 23 (1):69-77.
    Digital tracing technologies are heralded as an effective way of containing SARS-CoV-2 faster than it is spreading, thereby allowing the possibility of easing draconic measures of population-wide quarantine. But existing technological proposals risk addressing the wrong problem. The proper objective is not solely to maximise the ratio of people freed from quarantine but to also ensure that the composition of the freed group is fair. We identify several factors that pose a risk for fair group composition along with an analysis (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   6 citations  
  28. Excavating “Excavating AI”: The Elephant in the Gallery.Michael J. Lyons - 2020 - arXiv 2009:1-15.
    Two art exhibitions, “Training Humans” and “Making Faces,” and the accompanying essay “Excavating AI: The politics of images in machine learning training sets” by Kate Crawford and Trevor Paglen, are making substantial impact on discourse taking place in the social and mass media networks, and some scholarly circles. Critical scrutiny reveals, however, a self-contradictory stance regarding informed consent for the use of facial images, as well as serious flaws in their critique of ML training sets. Our analysis underlines the non-negotiability (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Algorithms, Agency, and Respect for Persons.Alan Rubel, Clinton Castro & Adam Pham - 2020 - Social Theory and Practice 46 (3):547-572.
    Algorithmic systems and predictive analytics play an increasingly important role in various aspects of modern life. Scholarship on the moral ramifications of such systems is in its early stages, and much of it focuses on bias and harm. This paper argues that in understanding the moral salience of algorithmic systems it is essential to understand the relation between algorithms, autonomy, and agency. We draw on several recent cases in criminal sentencing and K–12 teacher evaluation to outline four key ways in (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  30. Measuring morality in videogames research.Malcolm Ryan, Paul Formosa, Stephanie Howarth & Dan Staines - 2020 - Ethics and Information Technology 22 (1):55-68.
    There has been a recent surge of research interest in videogames of moral engagement for entertainment, advocacy and education. We have seen a wealth of analysis and several theoretical models proposed, but experimental evaluation has been scarce. One of the difficulties lies in the measurement of moral engagement. How do we meaningfully measure whether players are engaging with and affected by the moral choices in the games they play? In this paper, we survey the various standard psychometric instruments from the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Corporatised Identities ≠ Digital Identities: Algorithmic Filtering on Social Media and the Commercialisation of Presentations of Self.Charlie Harry Smith - 2020 - In Christopher Burr & Luciano Floridi (eds.), Ethics of digital well-being: a multidisciplinary approach. Springer.
    Goffman’s (1959) dramaturgical identity theory requires modification when theorising about presentations of self on social media. This chapter contributes to these efforts, refining a conception of digital identities by differentiating them from ‘corporatised identities’. Armed with this new distinction, I ultimately argue that social media platforms’ production of corporatised identities undermines their users’ autonomy and digital well-being. This follows from the disentanglement of several commonly conflated concepts. Firstly, I distinguish two kinds of presentation of self that I collectively refer to (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Perceptual breakdown during a global pandemic: introducing phenomenological insights for digital mental health purposes.Janna van Grunsven - 2020 - Ethics and Information Technology 23 (S1):91-98.
    Online therapy sessions and other forms of digital mental health services (DMH) have seen a sharp spike in new users since the start of the COVID-19 pandemic. Having little access to their social networks and support systems, people have had to turn to digital tools and spaces to cope with their experiences of anxiety and loss. With no clear end to the pandemic in sight, many of us are likely to remain reliant upon DMH for the foreseeable future. As such, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Planning for Ethical Agent-Agent Interaction.Jesse David Dinneen - 2019 - Good Systems: Ethical AI for CSCW, Workshop at CSCW '19: ACM SIGCHI Conference on Computer-Supported Cooperative Work.
    In this position paper for the 2019 CSCW workshop Good Systems: Ethical AI for CSCW I propose one tool and one idea for navigating the complex ethical problem space that results from the interaction of human and/or AI agents in shared, hopefully cooperative, computing environments.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  34. The ethics of uncertainty for data subjects.Philip Nickel - 2019 - In Peter Dabrock, Matthias Braun & Patrik Hummel (eds.), The Ethics of Medical Data Donation. Springer Verlag. pp. 55-74.
    Modern health data practices come with many practical uncertainties. In this paper, I argue that data subjects’ trust in the institutions and organizations that control their data, and their ability to know their own moral obligations in relation to their data, are undermined by significant uncertainties regarding the what, how, and who of mass data collection and analysis. I conclude by considering how proposals for managing situations of high uncertainty might be applied to this problem. These emphasize increasing organizational flexibility, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Playing Around With Morality: Introducing the Special Issue on “Morality Play”.Malcolm Ryan, Paul Formosa & Rowan Tulloch - 2019 - Games and Culture 14 (4):299–305.
    This special issue of Games and Culture focuses on the intersection between video games and ethics. This introduction briefly sets out the key research questions in the research field and identifies trends in the articles included in this special issue.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  36. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. Computer Simulations in Science and Engineering. Concept, Practices, Perspectives.Juan Manuel Durán - 2018 - Springer.
    This book addresses key conceptual issues relating to the modern scientific and engineering use of computer simulations. It analyses a broad set of questions, from the nature of computer simulations to their epistemological power, including the many scientific, social and ethics implications of using computer simulations. The book is written in an easily accessible narrative, one that weaves together philosophical questions and scientific technicalities. It will thus appeal equally to all academic scientists, engineers, and researchers in industry interested in questions (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   22 citations  
  38. Зародження теорії і практики нових медіа: проекти Алана Кея і Теда Нельсона.Oleksandr Mandelina - 2018 - NaUKMA Research Papers. History and Theory of Culture 1:11-16.
    Мета статті – з’ясувати концептуальний контекст виникнення нових медіа. Задля цього здійснено огляд ключових для нових медіа ідей Алана Кея та Теда Нельсона, а саме: перетворення комп’ютера на персональний метамедіум за допомогою користувацького інферфейсу та ідеї гіпертексту. Підкреслено, що створення медіа на базі комп’ютерних технологій супроводжувалось впливом медіа-теорії Маклюена та поєднанням технічного і гуманітарного дискурсів. Від початку створення нових медіа осмислювалась їхня метапозиція щодо традиційних медіа через здатність перших до симуляції наявних медіа-форм та створення нових. Теоретичні підвалини нових медіа як (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  39. Philosophy of games.C. Thi Nguyen - 2017 - Philosophy Compass 12 (8):e12426.
    What is a game? What are we doing when we play a game? What is the value of playing games? Several different philosophical subdisciplines have attempted to answer these questions using very distinctive frameworks. Some have approached games as something like a text, deploying theoretical frameworks from the study of narrative, fiction, and rhetoric to interrogate games for their representational content. Others have approached games as artworks and asked questions about the authorship of games, about the ontology of the work (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   17 citations  
  40. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience for this symposium is (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Focus, Sensitivity, Judgement, Action: Four Lenses for Designing Morally Engaging Games.Malcolm Ryan, Dan Staines & Paul Formosa - 2017 - Transactions of the Digital Games Research Association 2 (3):143-173.
    Historically the focus of moral decision-making in games has been narrow, mostly confined to challenges of moral judgement (deciding right and wrong). In this paper, we look to moral psychology to get a broader view of the skills involved in ethical behaviour and how these skills can be employed in games. Following the Four Component Model of Rest and colleagues, we identify four “lenses” – perspectives for considering moral gameplay in terms of focus, sensitivity, judgement and action – and describe (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Papers, Please and the systemic approach to engaging ethical expertise in videogames.Formosa Paul, Ryan Malcolm & Staines Dan - 2016 - Ethics and Information Technology 18 (3):211-225.
    Papers, Please, by Lucas Pope (2013), explores the story of a customs inspector in the fictional political regime of Arstotzka. In this paper we explore the stories, systems and moral themes of Papers, Please in order to illustrate the systemic approach to designing videogames for moral engagement. Next, drawing on the Four Component model of ethical expertise from moral psychology, we contrast this systemic approach with the more common scripted approach. We conclude by demonstrating the different strengths and weaknesses that (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. Four Lenses for Designing Morally Engaging Games.Malcolm Ryan, Dan Staines & Paul Formosa - 2016 - Proceedings of 1st International Joint Conference of DiGRA and FDG.
    Historically the focus of moral decision-making in games has been narrow, mostly confined to challenges of moral judgement (deciding right and wrong). In this paper, we look to moral psychology to get a broader view of the skills involved in ethical behaviour and how they may be employed in games. Following the Four Component Model of Rest and colleagues, we identify four “lenses” – perspectives for considering moral gameplay in terms of focus, sensitivity, judgement and action – and describe the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  44. A new solution to the gamer’s dilemma.Rami Ali - 2015 - Ethics and Information Technology 17 (4):267-274.
    Luck (2009) argues that gamers face a dilemma when it comes to performing certain virtual acts. Most gamers regularly commit acts of virtual murder, and take these acts to be morally permissible. They are permissible because unlike real murder, no one is harmed in performing them; their only victims are computer-controlled characters, and such characters are not moral patients. What Luck points out is that this justification equally applies to virtual pedophelia, but gamers intuitively think that such acts are not (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   26 citations  
  45. The anti-counterfeiting trade agreement: the ethical analysis of a failure, and its lessons.Luciano Floridi - 2015 - Ethics and Information Technology 17 (2):165-173.
    The anti-counterfeiting trade agreement was originally meant to harmonise and enforce intellectual property rights provisions in existing trade agreements within a wider group of countries. This was commendable in itself, so ACTA’s failure was all the more disappointing. In this article, I wish to contribute to the post-ACTA debate by proposing a specific analysis of the ethical reasons why ACTA failed, and what we can learn from them. I argue that five kinds of objections—namely, secret negotiations, lack of consultation, vagueness (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  46. Computer ethics beyond mere compliance.Richard Volkman - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):176-189.
    If computer ethics is to constitute a real engagement with industry and society that cultivates a genuine sensitivity to ethical concerns in the creation, development, and implementation of technologies, a genuine sensitivity that stands in marked contrast to ethics as “mere compliance,” then computer ethics will have to consist in issuing an open invitation to inquiry, since going beyond mere compliance requires a sensitivity to the importance of what we care about, and inquiry has the potential to leverage what our (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  47. Ethical issues of 'morality mining': When the moral identity of individuals becomes a focus of data-mining.Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley - 2013 - In Hakikur Rahman & Isabel Ramos (eds.), Ethical Data Mining Applications for Socio-Economic Development. IGI Global. pp. 1-21.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. Unveiling the link between logical fallacies and web persuasion.Antonio Lieto & Fabiana Vernero - 2013 - In ACM Proceedings of the 5th Web Science Conference, Paris. ACM.
    In the last decade Human-Computer Interaction (HCI) has started to focus attention on forms of persuasive interaction where computer technologies have the goal of changing users behavior and attitudes according to a predefined direction. In this work, we hypothesize a strong connection between logical fallacies (forms of reasoning which are logically invalid but cognitively effective) and some common persuasion strategies adopted within web technologies. With the aim of empirically evaluating our hypothesis, we carried out a pilot study on a sample (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. From Culture 2.0 to a Network State of Mind: A Selective History of Web 2.0’s Axiologies and a Lesson from It.Pak-Hang Wong - 2013 - tripleC 11 (1):191-206.
    There is never a shortage of celebratory and condemnatory popular discourse on digital media even in its early days. This, of course, is also true of the advent of Web 2.0. In this article, I shall argue that normative analyses of digital media should not take lightly the popular discourse, as it can deepen our understanding of the normative and axiological foundation(s) of our judgements towards digital media. Looking at some of the most representative examples available, I examine the latest (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  50. A Walzerian approach to ICTs and the good life.Pak-Hang Wong - 2012 - Journal of Information, Communication and Ethics in Society 10 (1):19-35.
    PurposeThe purpose of this paper is to introduce an interpretive approach to examining the relation between information and communication technologies (ICTs) and the good life, based on Michael Walzer's view of (connected) social criticism.Design/methodology/approachThrough a discussion of Michael Walzer's view of social criticism, an interpretive approach to normative analysis of ICTs and the good life is introduced. The paper also offers an additional argument for the indispensability of prudential appraisals of ICTs in normative analysis of ICTs and the good life, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 63