Computer Ethics

Edited by Lavinia Marin (Delft University of Technology)
View topic on PhilPapers for more information
Related categories

146 found
Order:
More results on PhilPapers
1 — 50 / 146
Material to categorize
  1. AI Recruitment Algorithms and the Dehumanization Problem.Megan Fritts & Frank Cabrera - forthcoming - Ethics and Information Technology:1-19.
    According to a recent survey by the HR Research Institute, as the presence of artificial intelligence (AI) becomes increasingly common in the workplace, HR professionals are worried that the use of recruitment algorithms will lead to a “dehumanization” of the hiring process. Our main goals in this paper are threefold: i) to bring attention to this neglected issue, ii) to clarify what exactly this concern about dehumanization might amount to, and iii) to sketch an argument for why dehumanizing the hiring (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. Web-Based School Information and Publication System: A Developmental Study.Kevin Caratiquit - 2021 - Global Education and Social Sciences Journal 1 (3):45-55.
    The study aimed to promote the school online, provide timely, engaging, and current information of the school to employees, learners, parents, and community, share updates of school activities online, supply downloadable instructional materials and resources for both employees and students. Also, it evaluated the assessment of teaching and non-teaching staff, learners, parents and IT specialists to the ISO 25010:2011 software quality standards of the developed Web-based School Information and Publication System along functional and suitability, maintainability, usability, security, reliability, performance efficiency, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. Information Ethics: On the Philosophical Foundation of Computer Ethics.Luciano Floridi - 2007 - In John Weckert (ed.), Computer Ethics. pp. 63–82.
    The essential difficulty about Computer Ethics’ (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of ‘environmental’ ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is the ethical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Technikvertrauen. Beiträge zur Technikfolgenabschätzung jenseits von Akzeptanz und Akzeptabilität?Sebastian Weydner-Volkmann - 2021 - Technikfolgenabschätzung – Theorie Und Praxis 30 (2):53-59.
    This article explores the potential for “trust in technology” to make a productive conceptual contribution to the ethical evaluation of technology, complementing the concepts of “acceptance” and “acceptability” already established in technology assessment. It shows that for digital technologies in particular, “trust” can better address aspects of security against attacks as it allows to integrate concepts of IT security. Furthermore, “trustworthy technology” allows for a better inclusion of lay perspectives, since rationally justified trust in the sense of risk expectations can (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  5. Does Kindness Towards Robots Lead to Virtue? A Reply to Sparrow’s Asymmetry Argument.Mark Coeckelbergh - 2021 - Ethics and Information Technology 1 (Online first).
    Does cruel behavior towards robots lead to vice, whereas kind behavior does not lead to virtue? This paper presents a critical response to Sparrow’s argument that there is an asymmetry in the way we (should) think about virtue and robots. It discusses how much we should praise virtue as opposed to vice, how virtue relates to practical knowledge and wisdom, how much illusion is needed for it to be a barrier to virtue, the relation between virtue and consequences, the moral (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. The Sherry Turkle Miracle.Kristof Nyiri - 2021 - Budapest: Hungarian Academy of Sciences.
    Papers presented at a Hungarian Academy of Sciences online workshop held on May 27, 2021.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  7. Online Deliberation and #CivicTech: A Symposium.Weiyu Zhang, Todd Davies & Anna Przybylska - 2021 - Journal of Deliberative Democracy 17 (1):76-77.
    Online deliberation is one important instance of civic tech that is both for and by the citizens, through engaging citizens in Internet-supported deliberative discussions on public issues. This article explains the origins of a set of symposium articles in this journal issue based on the 2017 'International Conference on Deliberation and Decision Making: Interdisciplinary Perspectives on Civic Tech' held in Singapore. Symposium articles are presented in a sequence that flows from designing decision making systems to platforms to specific technological nudges.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. What It’s Like to Be a ___: Why It’s (Often) Unethical to Use VR as an Empathy Nudging Tool.Erick Jose Ramirez, Miles Elliott & Per-Erik Milam - 2021 - Ethics and Information Technology 1.
    In this article, we apply the literature on the ethics of choice-architecture (nudges) to the realm of virtual reality (VR) to point out ethical problems with using VR for empathy-based nudging. Specifically, we argue that VR simulations aiming to enhance empathic understanding of others via perspective-taking will almost always be unethical to develop or deploy. We argue that VR-based empathy enhancement not only faces traditional ethical concerns about nudge (autonomy, welfare, transparency), but also a variant of the semantic variance problem (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. Ethical Analysis on the Application of Neurotechnology for Human Augmentation in Physicians and Surgeons.Soaad Hossain & Syed Ishtiaque Ahmed - 2021 - In Kohei Arai, Supriya Kapoor & Rahul Bhatia (eds.), Proceedings of the Future Technologies Conference (FTC) 2020. Switzerland: pp. 78-99.
    With the shortage of physicians and surgeons and increase in demand worldwide due to situations such as the COVID-19 pandemic, there is a growing interest in finding solutions to help address the problem. A solution to this problem would be to use neurotechnology to provide them augmented cognition, senses and action for optimal diagnosis and treatment. Consequently, doing so can negatively impact them and others. We argue that applying neurotechnology for human enhancement in physicians and surgeons can cause injustices, and (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. Perceptual Breakdown During a Global Pandemic: Introducing Phenomenological Insights for Digital Mental Health Purposes.Janna van Grunsven - forthcoming - Ethics and Information Technology.
    Online therapy sessions and other forms of digital mental health services (DMH) have seen a sharp spike in new users since the start of the COVID-19 pandemic. Having little access to their social networks and support systems, people have had to turn to digital tools and spaces to cope with their experiences of anxiety and loss. With no clear end to the pandemic in sight, many of us are likely to remain reliant upon DMH for the foreseeable future. As such, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  11. Ethics of Digital Contact Tracing and COVID-19: Who is (Not) Free to Go?Michael Klenk & Hein Duijf - forthcoming - Ethics and Information Technology.
    Digital tracing technologies are heralded as an effective way of containing SARS-CoV-2 faster than it is spreading, thereby allowing the possibility of easing draconic measures of population-wide quarantine. But existing technological proposals risk addressing the wrong problem. The proper objective is not solely to maximise the ratio of people freed from quarantine but to also ensure that the composition of the freed group is fair. We identify several factors that pose a risk for fair group composition along with an analysis (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Social Norms in Virtual Worlds of Computer Games.Daria Bylieva & Tatiana Nam - 2018 - In Advances in Social Science, Education and Humanities Research. Proceedings of the International Conference Communicative Strategies of Information Society (CSIS 2018). pp. 369-373.
    Immersing in the virtual world of the Internet, information and communication technologies are changing the human being. In spite of the apparent similarity of on-line and off-line, social laws of their existence are different. According to the analysis of games, based on the violation of the accepted laws of the world off-line, their censoring, as well as the cheating, features of formation and violations of social norms in virtual worlds were formulated. Although the creators of the games have priority in (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. Bibliometric Mapping of Computer and Information Ethics.Richard Heersmink, Jeroen van den Hoven, Nees Jan van Eck & Jan van den Berg - 2011 - Ethics and Information Technology 13 (3):241-249.
    This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology concepts on the one hand and ethical concepts on the other hand. To produce the term map, a data set of over thousand articles (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  14. Technologies of Artificial Sensations.Alexey S. Bakhirev - manuscript
    Technologies based on emergence will allow to reproduce sensations on non-biological carriers by making devices feel. These technologies will change fundamentally not only the approach to the creation of artificial intelligence, but also create artificial worlds of a totally different level. Which, unlike virtual models, will really exist for themselves. This approach differs completely from the methods currently used in digital technologies. Possibly the principles described herein will give a rise to many new trends.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  15. The Ethics of Information Transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
    The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be disclosed and what (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   42 citations  
  16. Editorial Introduction – Ethics of New Information Technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Trusting Virtual Trust.Paul B. de Laat - 2005 - Ethics and Information Technology 7 (3):167-180.
    Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   9 citations  
  18. Four Challenges for a Theory of Informational Privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   34 citations  
  19. Information Ethics: A Reappraisal.Luciano Floridi - 2008 - Ethics and Information Technology 10 (2–3):189–204.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   16 citations  
  20. Information Ethics: On the Philosophical Foundation of Computer Ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is the ethical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   97 citations  
  21. Mapping the Foundationalist Debate in Computer Ethics.Luciano Floridi & J. W. Sanders - 2002 - Ethics and Information Technology 4 (1):1-9.
    The paper provides a critical review of the debate on the foundations of Computer Ethics (CE). Starting from a discussion of Moor’s classic interpretation of the need for CE caused by a policy and conceptual vacuum, five positions in the literature are identified and discussed: the “no resolution approach”, according to which CE can have no foundation; the professional approach, according to which CE is solely a professional ethics; the radical approach, according to which CE deals with absolutely unique issues, (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   24 citations  
  22. On the Intrinsic Value of Information Objects and the Infosphere.Luciano Floridi - 2002 - Ethics and Information Technology 4 (4):287–304.
    What is the most general common set of attributes that characterises something as intrinsically valuable and hence as subject to some moral respect, and without which something would rightly be considered intrinsically worthless or even positively unworthy and therefore rightly to be disrespected in itself? This paper develops and supports the thesis that the minimal condition of possibility of an entity's least intrinsic value is to be identified with its ontological status as an information object. All entities, even when interpreted (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   60 citations  
  23. The Ontological Interpretation of Informational Privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   51 citations  
  24. The Tragedy of the Digital Commons.Gian Maria Greco & Luciano Floridi - 2004 - Ethics and Information Technology 6 (2):73-81.
    In the paper it is argued that bridging the digital divide may cause a new ethical and social dilemma. Using Hardin's Tragedy of the Commons, we show that an improper opening and enlargement of the digital environment (Infosphere) is likely to produce a Tragedy of the Digital Commons (TDC). In the course of the analysis, we explain why Adar and Huberman's previous use of Hardin's Tragedy to interpret certain recent phenomena in the Infosphere (especially peer-to-peer communication) may not be entirely (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   11 citations  
  25. Loss of the World: A Philosophical Dialogue.Raymond Kolcaba - 2000 - Ethics and Information Technology 2 (1):3-9.
    Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, conservation of humanist ideals, andprudent (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  26. Just Consequentialism and Computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   14 citations  
  27. Student Attitudes on Software Piracy and Related Issues of Computer Ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   17 citations  
  28. My Avatar, My Self: Virtual Harm and Attachment.Jessica Wolfendale - 2007 - Ethics and Information Technology 9 (2):111-119.
    Multi-user online environments involve millions of participants world-wide. In these online communities participants can use their online personas – avatars – to chat, fight, make friends, have sex, kill monsters and even get married. Unfortunately participants can also use their avatars to stalk, kill, sexually assault, steal from and torture each other. Despite attempts to minimise the likelihood of interpersonal virtual harm, programmers cannot remove all possibility of online deviant behaviour. Participants are often greatly distressed when their avatars are harmed (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   11 citations  
Internet Ethics
  1. The Ethics of Matching: Mobile and Web-Based Dating and Hook Up Platforms.Michal Klincewicz, Lily E. Frank & Emma Jane - forthcoming - In Brian D. Earp, Clare Chambers & Lori Watson (eds.), Routledge Handbook of Philosophy of Sex and Sexuality. Routledge.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. Disoriented and Alone in the “Experience Machine” - On Netflix, Shared World Deceptions and the Consequences of Deepening Algorithmic Personalization.Maria Brincker - 2021 - SATS 22 (1):75-96.
    Most online platforms are becoming increasingly algorithmically personalized. The question is if these practices are simply satisfying users preferences or if something is lost in this process. This article focuses on how to reconcile the personalization with the importance of being able to share cultural objects - including fiction – with others. In analyzing two concrete personalization examples from the streaming giant Netflix, several tendencies are observed. One is to isolate users and sometimes entirely eliminate shared world aspects. Another tendency (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. Internet Ethics: The Constructionist Values of Homo Poieticus.Luciano Floridi & J. W. Sanders - 2005 - In Robert Cavalier (ed.), The Impact of the Internet on our moral lives. New York, NY, USA: pp. 195-214.
    In this chapter, we argue that the web is a poietically- enabling environment, which both enhances and requires the development of a “constructionist ethics”. We begin by explaining the appropriate concept of “constructionist ethics”, and analysing virtue ethics as the primary example. We then show why CyberEthics (or Computer Ethics, as it is also called) cannot be based on virtue ethics, yet needs to retain a constructionist approach. After providing evidence for significant poietic uses of the web, we argue that (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   12 citations  
  4. A Digital Picture to Hold Us Captive? A Flusserian Interpretation of Misinformation Sharing on Social Media.Lavinia Marin - 2021 - Philosophy Today 65 (3):485–504.
    In this article I investigate online misinformation from a media philosophy perspective. I, thus move away from the debate focused on the semantic content, concerned with what is true or not about misinformation. I argue rather that online misinformation is the effect of an informational climate promoted by user micro-behaviours such as liking, sharing, and posting. Misinformation online is explained as the effect of an informational environment saturated with and shaped by techno-images in which most users act automatically under the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. Surveillance Capitalism: A Marx-Inspired Account.Nikhil Venkatesh - 2021 - Philosophy 96 (3):359-385..
    Some of the world's most powerful corporations practise what Shoshana Zuboff (2015; 2019) calls ‘surveillance capitalism’. The core of their business is harvesting, analysing and selling data about the people who use their products. In Zuboff's view, the first corporation to engage in surveillance capitalism was Google, followed by Facebook; recently, firms such as Microsoft and Amazon have pivoted towards such a model. In this paper, I suggest that Karl Marx's analysis of the relations between industrial capitalists and workers is (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. The world is a big network. Pandemic, the Internet and institutions.Constantin Vica - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):136-161.
    2020 is the year of the first pandemic lived through the Internet. More than half of the world population is now online and because of self-isolation, our moral and social lives unfold almost exclusively online. Two pressing questions arise in this context: how much can we rely on the Internet, as a set of technologies, and how much should we trust online platforms and applications? In order to answer these two questions, I develop an argument based on two fundamental assumptions: (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  7. Planning for Ethical Agent-Agent Interaction.Jesse David Dinneen - 2019 - Good Systems: Ethical AI for CSCW, Workshop at CSCW '19: ACM SIGCHI Conference on Computer-Supported Cooperative Work.
    In this position paper for the 2019 CSCW workshop Good Systems: Ethical AI for CSCW I propose one tool and one idea for navigating the complex ethical problem space that results from the interaction of human and/or AI agents in shared, hopefully cooperative, computing environments.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. Political Correctness Gone Viral.Waleed Aly & Robert Mark Simpson - 2019 - In Carl Fox & Joe Saunders (eds.), Media Ethics, Free Speech, and the Requirements of Democracy. London: pp. 125-143.
    Communicative practices in online and social media sometimes seem to amplify political conflict, and result in significant harms to people who become the targets of collective outrage. Many complaints that have been made about political correctness in the past, we argue, amount to little more than a veiled expression of resentment over the increasing influence enjoyed by progressive activists. But some complaints about political correctness take on a different complexion, in light of the technologically-driven changes to our communicative practices and (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. Excavating “Excavating AI”: The Elephant in the Gallery.Michael J. Lyons - 2020 - arXiv 2009:1-15.
    Two art exhibitions, “Training Humans” and “Making Faces,” and the accompanying essay “Excavating AI: The politics of images in machine learning training sets” by Kate Crawford and Trevor Paglen, are making substantial impact on discourse taking place in the social and mass media networks, and some scholarly circles. Critical scrutiny reveals, however, a self-contradictory stance regarding informed consent for the use of facial images, as well as serious flaws in their critique of ML training sets. Our analysis underlines the non-negotiability (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Three Contextual Dimensions of Information on Social Media: Lessons Learned From the COVID-19 Infodemic.Lavinia Marin - 2020 - Ethics and Information Technology.
    The COVID-19 pandemic has been accompanied on social media by an explosion of information disorders such as inaccurate, misleading and irrelevant information. Countermeasures adopted thus far to curb these informational disorders have had limited success because these did not account for the diversity of informational contexts on social media, focusing instead almost exclusively on curating the factual content of user’s posts. However, content-focused measures do not address the primary causes of the infodemic itself, namely the user’s need to post content (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  11. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its use. We will (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Algorithms & Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press: Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. The Future of Value Sensitive Design.Batya Friedman, David Hendry, Steven Umbrello, Jeroen Van Den Hoven & Daisy Yoo - 2020 - Paradigm Shifts in ICT Ethics: Proceedings of the 18th International Conference ETHICOMP 2020.
    In this panel, we explore the future of value sensitive design (VSD). The stakes are high. Many in public and private sectors and in civil society are gradually realizing that taking our values seriously implies that we have to ensure that values effectively inform the design of technology which, in turn, shapes people’s lives. Value sensitive design offers a highly developed set of theory, tools, and methods to systematically do so.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  15. Echo Chambers and Epistemic Bubbles.C. Thi Nguyen - 2020 - Episteme 17 (2):141-161.
    Recent conversation has blurred two very different social epistemic phenomena: echo chambers and epistemic bubbles. Members of epistemic bubbles merely lack exposure to relevant information and arguments. Members of echo chambers, on the other hand, have been brought to systematically distrust all outside sources. In epistemic bubbles, other voices are not heard; in echo chambers, other voices are actively undermined. It is crucial to keep these phenomena distinct. First, echo chambers can explain the post-truth phenomena in a way that epistemic (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   46 citations  
  16. Retweeting: Its Linguistic and Epistemic Value.Neri Marsili - 2021 - Synthese 198:10457–10483.
    This paper analyses the communicative and epistemic value of retweeting (and more generally of reposting content on social media). Against a naïve view, it argues that retweets are not acts of endorsement, motivating this diagnosis with linguistic data. Retweeting is instead modelled as a peculiar form of quotation, in which the reported content is indicated rather than reproduced. A relevance-theoretic account of the communicative import of retweeting is then developed, to spell out the complex mechanisms by which retweets achieve their (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. L’éthique des mégadonnées (Big Data) en recherche.Nicolae Sfetcu - 2020 - Drobeta Turnu Severin: MultiMedia Publishing.
    Les principaux problèmes rencontrés par les scientifiques qui travaillent avec des ensembles de données massives (mégadonnées, Big Data), en soulignant les principaux problèmes éthiques, tout en tenant compte de la législation de l'Union européenne. Après une brève Introduction au Big Data, la section Technologie présente les applications spécifiques de la recherche. Il suit une approche des principales questions philosophiques spécifiques dans Aspects philosophiques, et Aspects juridiques en soulignant les problèmes éthiques spécifiques du règlement de l'UE sur la protection des données (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  18. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  19. Search Engines, Free Speech Coverage, and the Limits of Analogical Reasoning.Heather Whitney & Robert Mark Simpson - 2019 - In Susan Brison & Katharine Gelber (eds.), Free Speech in the Digital Age. pp. 33-41.
    This paper investigates whether search engines and other new modes of online communication should be covered by free speech principles. It criticizes the analogical reason-ing that contemporary American courts and scholars have used to liken search engines to newspapers, and to extend free speech coverage to them based on that likeness. There are dissimilarities between search engines and newspapers that undermine the key analogy, and also rival analogies that can be drawn which don’t recommend free speech protection for search engines. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  20. Technologically scaffolded atypical cognition: The case of YouTube’s recommender system.Mark Alfano, Amir Ebrahimi Fard, J. Adam Carter, Peter Clutton & Colin Klein - 2020 - Synthese:1-24.
    YouTube has been implicated in the transformation of users into extremists and conspiracy theorists. The alleged mechanism for this radicalizing process is YouTube’s recommender system, which is optimized to amplify and promote clips that users are likely to watch through to the end. YouTube optimizes for watch-through for economic reasons: people who watch a video through to the end are likely to then watch the next recommended video as well, which means that more advertisements can be served to them. This (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark   3 citations  
  21. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  22. A Ghost Workers' Bill of Rights: How to Establish a Fair and Safe Gig Work Platform.Julian Friedland, David Balkin & Ramiro Montealegre - 2020 - California Management Review 62 (2).
    Many of us assume that all the free editing and sorting of online content we ordinarily rely on is carried out by AI algorithms — not human persons. Yet in fact, that is often not the case. This is because human workers remain cheaper, quicker, and more reliable than AI for performing myriad tasks where the right answer turns on ineffable contextual criteria too subtle for algorithms to yet decode. The output of this work is then used for machine learning (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 146