View topic on PhilPapers for more information
Related categories

63 found
Order:
More results on PhilPapers
1 — 50 / 63
  1. added 2020-06-21
    Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  2. added 2020-06-12
    The Future of Value Sensitive Design.Batya Friedman, David Hendry, Steven Umbrello, Jeroen Van Den Hoven & Daisy Yoo - 2020 - Paradigm Shifts in ICT Ethics: Proceedings of the 18th International Conference ETHICOMP 2020.
    In this panel, we explore the future of value sensitive design (VSD). The stakes are high. Many in public and private sectors and in civil society are gradually realizing that taking our values seriously implies that we have to ensure that values effectively inform the design of technology which, in turn, shapes people’s lives. Value sensitive design offers a highly developed set of theory, tools, and methods to systematically do so.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. added 2020-05-17
    Online Shaming.Kathryn J. Norlock - 2017 - Social Philosophy Today 33:187-197.
    Online shaming is a subject of import for social philosophy in the Internet age, and not simply because shaming seems generally bad. I argue that social philosophers are well-placed to address the imaginal relationships we entertain when we engage in social media; activity in cyberspace results in more relationships than one previously had, entailing new and more responsibilities, and our relational behaviors admit of ethical assessment. I consider the stresses of social media, including the indefinite expansion of our relationships and (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. added 2020-05-16
    Retweeting: Its Linguistic and Epistemic Value.Neri Marsili - forthcoming - Synthese:1-27.
    This paper analyses the communicative and epistemic value of retweeting (and more generally of reposting content on social media). Against a naïve view, it argues that retweets are not acts of endorsement, motivating this diagnosis with linguistic data. Retweeting is instead modelled as a peculiar form of quotation, in which the reported content is indicated rather than reproduced. A relevance-theoretic account of the communicative import of retweeting is then developed, to spell out the complex mechanisms by which retweets achieve their (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. added 2020-05-06
    Ethics of Identity in the Time of Big Data.James Brusseau - 2019 - First Monday 24 (5-6):00-11.
    Compartmentalizing our distinct personal identities is increasingly difficult in big data reality. Pictures of the person we were on past vacations resurface in employers’ Google searches; LinkedIn which exhibits our income level is increasingly used as a dating web site. Whether on vacation, at work, or seeking romance, our digital selves stream together. One result is that a perennial ethical question about personal identity has spilled out of philosophy departments and into the real world. Ought we possess one, unified identity (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. added 2020-04-30
    L’Éthique des Mégadonnées (Big Data) En Recherche.Nicolae Sfetcu - 2020 - Drobeta Turnu Severin: MultiMedia Publishing.
    Les principaux problèmes rencontrés par les scientifiques qui travaillent avec des ensembles de données massives (mégadonnées, Big Data), en soulignant les principaux problèmes éthiques, tout en tenant compte de la législation de l'Union européenne. Après une brève Introduction au Big Data, la section Technologie présente les applications spécifiques de la recherche. Il suit une approche des principales questions philosophiques spécifiques dans Aspects philosophiques, et Aspects juridiques en soulignant les problèmes éthiques spécifiques du règlement de l'UE sur la protection des données (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  7. added 2020-04-16
    Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. added 2020-04-14
    The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - forthcoming - Science and Engineering Ethics:1-18.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its use. We will (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  9. added 2020-03-20
    Search Engines, Free Speech Coverage, and the Limits of Analogical Reasoning.Heather Whitney & Robert Mark Simpson - 2019 - In Susan Brison & Katharine Gelber (eds.), Free Speech in the Digital Age. pp. 33-41.
    This paper investigates whether search engines and other new modes of online communication should be covered by free speech principles. It criticizes the analogical reason-ing that contemporary American courts and scholars have used to liken search engines to newspapers, and to extend free speech coverage to them based on that likeness. There are dissimilarities between search engines and newspapers that undermine the key analogy, and also rival analogies that can be drawn which don’t recommend free speech protection for search engines. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. added 2020-03-06
    Technologically scaffolded atypical cognition: The case of YouTube’s recommender system.Mark Alfano, Amir Ebrahimi Fard, J. Adam Carter, Peter Clutton & Colin Klein - 2020 - Synthese:1-24.
    YouTube has been implicated in the transformation of users into extremists and conspiracy theorists. The alleged mechanism for this radicalizing process is YouTube’s recommender system, which is optimized to amplify and promote clips that users are likely to watch through to the end. YouTube optimizes for watch-through for economic reasons: people who watch a video through to the end are likely to then watch the next recommended video as well, which means that more advertisements can be served to them. This (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  11. added 2020-03-04
    Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. added 2020-01-22
    A Ghost Workers' Bill of Rights: How to Establish a Fair and Safe Gig Work Platform.Julian Friedland, David Balkin & Ramiro Montealegre - 2020 - California Management Review 62 (2).
    Many of us assume that all the free editing and sorting of online content we ordinarily rely on is carried out by AI algorithms — not human persons. Yet in fact, that is often not the case. This is because human workers remain cheaper, quicker, and more reliable than AI for performing myriad tasks where the right answer turns on ineffable contextual criteria too subtle for algorithms to yet decode. The output of this work is then used for machine learning (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. added 2020-01-13
    Big Data.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Odată cu creșterea volumului de date pe Internet, în media socială, cloud computing, dispozitive mobile și date guvernamentale, Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate. În fiecare zi, folosim și generăm tone de date, alimentând bazele de date ale agențiilor guvernamentale, companiilor private și chiar cetățenilor privați. Beneficiem în multe feluri de existența și utilizarea Big Data, dar trebuie să ne (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  14. added 2020-01-11
    Privacy, Autonomy, and Personalised Targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2019 - In Carissa Véliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific individuals or (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  15. added 2020-01-11
    Defending the Morality of Violent Video Games.Marcus Schulzke - 2010 - Ethics and Information Technology 12 (2):127-138.
    The effect of violent video games is among the most widely discussed topics in media studies, and for good reason. These games are immensely popular, but many seem morally objectionable. Critics attack them for a number of reasons ranging from their capacity to teach players weapons skills to their ability to directly cause violent actions. This essay shows that many of these criticisms are misguided. Theoretical and empirical arguments against violent video games often suffer from a number of significant shortcomings (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   10 citations  
  16. added 2020-01-11
    What Should We Share?: Understanding the Aim of Intercultural Information Ethics.Pak-Hang Wong - 2009 - Acm Sigcas Computers and Society 39 (3):50-58.
    The aim of Intercultural Information Ethics (IIE), as Ess aptly puts, is to “(a) address both local and global issues evoked by ICTs / CMC, etc., (b) in a ways that both sustain local traditions / values / preference, etc. and (c) provide shared, (quasi-) universal responses to central ethical problems” (Ess 2007a, 102). This formulation of the aim of IIE, however, is not unambiguous. In this paper, I will discuss two different understandings of the aim of IIE, one of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. added 2020-01-01
    Emotions and Digital Well-Being. The Rationalistic Bias of Social Media Design in Online Deliberations.Lavinia Marin & Sabine Roeser - forthcoming - In Christopher Burr & Luciano Floridi (eds.), Ethics of Digital Well-being: A Multidisciplinary Approach. Springer.
    In this chapter we argue that emotions are mediated in an incomplete way in online social media because of the heavy reliance on textual messages which fosters a rationalistic bias and a bias towards less nuanced emotional expressions. This incompleteness can happen either by obscuring emotions, showing less than the original intensity, misinterpreting emotions, or eliciting emotions without feedback and context. Online interactions and deliberations tend to contribute rather than overcome stalemates and informational bubbles, partially due to prevalence of anti-social (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  18. added 2019-12-21
    Ethical Pitfalls for Natural Language Processing in Psychology.Mark Alfano, Emily Sullivan & Amir Ebrahimi Fard - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    Knowledge is power. Knowledge about human psychology is increasingly being produced using natural language processing (NLP) and related techniques. The power that accompanies and harnesses this knowledge should be subject to ethical controls and oversight. In this chapter, we address the ethical pitfalls that are likely to be encountered in the context of such research. These pitfalls occur at various stages of the NLP pipeline, including data acquisition, enrichment, analysis, storage, and sharing. We also address secondary uses of the results (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  19. added 2019-12-01
    Corporatised Identities ≠ Digital Identities: Algorithmic Filtering on Social Media and the Commercialisation of Presentations of Self.Charlie Harry Smith - forthcoming - In Christopher Burr & Luciano Floridi (eds.), Ethics of Digital Well-being: A Multidisciplinary Approach. Springer.
    Goffman’s (1959) dramaturgical identity theory requires modification when theorising about presentations of self on social media. This chapter contributes to these efforts, refining a conception of digital identities by differentiating them from ‘corporatised identities’. Armed with this new distinction, I ultimately argue that social media platforms’ production of corporatised identities undermines their users’ autonomy and digital well-being. This follows from the disentanglement of several commonly conflated concepts. Firstly, I distinguish two kinds of presentation of self that I collectively refer to (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  20. added 2019-11-11
    Derecho al olvido en Internet: Google y la doctrina europea.David Villena Saldaña - 2015 - Contratexto 23 (23):259-269.
    This essay accounts for part of the moral, social and legal problems behind the attempts for justifying and implementing the so-called right to be forgotten in the Internet. Such right implies that –under certain circumstances–individuals are entitled to demand that search engines remove links containing their personal information. Our inquiry reflects on a ruling issued by the Court of Justice of the European Union and made public on May 13th 2014, as well as on the recommendations conveyed in Article 29 (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  21. added 2019-11-11
    Julian Assange: Periodismo científico, conspiración y ética hacker.David Villena Saldaña - 2011 - Quehacer 181 (181):58-69.
    This essay attempts to explain the ethics behind WikiLeaks. It also assesses the concepts of conspiration and scientific journalism introduced by Julian Assange in one his manifestos.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  22. added 2019-09-26
    Profiling Vandalism in Wikipedia: A Schauerian Approach to Justification.Paul B. de Laat - 2016 - Ethics and Information Technology 18 (2):131-148.
    In order to fight massive vandalism the English- language Wikipedia has developed a system of surveillance which is carried out by humans and bots, supported by various tools. Central to the selection of edits for inspection is the process of using filters or profiles. Can this profiling be justified? On the basis of a careful reading of Frederick Schauer’s books about rules in general (1991) and profiling in particular (2003) I arrive at several conclusions. The effectiveness, efficiency, and risk-aversion of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  23. added 2019-09-26
    Indiscriminate Mass Surveillance and the Public Sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   9 citations  
  24. added 2019-09-26
    From Open-Source Software to Wikipedia: ‘Backgrounding’ Trust by Collective Monitoring and Reputation Tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered instead. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. added 2019-08-13
    The Use of Software Tools and Autonomous Bots Against Vandalism: Eroding Wikipedia’s Moral Order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new hierarchical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. added 2019-08-10
    Ethics of the Health-Related Internet of Things: A Narrative Review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. H-IoT promises many (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   5 citations  
  27. added 2019-06-14
    Бітард як персонаж фольклору анонімних форумів.Kostiantyn Zadyraka - 2017 - NaUKMA Research Papers. History and Theory of Culture 191:26-28.
    Статтю присвячено феномену Інтернет-фольклору, який розглядається на прикладі візуального образу персонажа «бітард». Наведено деякі аргументи для обґрунтування доцільності вживання поняття «Інтернет-фольклор», описано особливості комунікації через специфічний тип анонімних форумів – іміджборд, а також процес формування фольклору іміджборд. Проаналізовано один із елементів цього фольклору – персонаж «бітард», як відображення досвіду користувачів форумів. Описано його визначальні риси та головні характеристики.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  28. added 2019-06-14
    Віртуальне тіло: приклади соціальних мереж та анонімних форумів.Kostiantyn Zadyraka - 2016 - NaUKMA Research Papers. History and Theory of Culture 179:18-22.
    У статті досліджено феномен віртуальної тілесності, яка не тільки посідає важливе місце у сфері зацікавлення гуманітарних наук, а й увійшла як елемент повсякденності в життя значної частини сучасного людства завдяки мережі Інтернет. Розглянуто концепції поєднання віртуальності та тілесності, ключові підходи до аналізу цього поєднання. Предметом аналізу стали анонімні форуми як яскравий приклад конфігурації віртуального тіла, радикально відмінний від інших через анонімний спосіб репрезентації. Інформація, яку індивід викладає в публічний доступ, сприймається як його втілення в буквальному сенсі слова, а цифровий формат (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  29. added 2019-06-13
    Зародження теорії і практики нових медіа: проекти Алана Кея і Теда Нельсона.Oleksandr Mandelina - 2018 - NaUKMA Research Papers. History and Theory of Culture 1:11-16.
    Мета статті – з’ясувати концептуальний контекст виникнення нових медіа. Задля цього здійснено огляд ключових для нових медіа ідей Алана Кея та Теда Нельсона, а саме: перетворення комп’ютера на персональний метамедіум за допомогою користувацького інферфейсу та ідеї гіпертексту. Підкреслено, що створення медіа на базі комп’ютерних технологій супроводжувалось впливом медіа-теорії Маклюена та поєднанням технічного і гуманітарного дискурсів. Від початку створення нових медіа осмислювалась їхня метапозиція щодо традиційних медіа через здатність перших до симуляції наявних медіа-форм та створення нових. Теоретичні підвалини нових медіа як (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  30. added 2019-06-05
    Vortex of the Web. Potentials of the Online Environment.Martin A. M. Gansinger & Ayman Kole (eds.) - 2018 - Hamburg: Anchor.
    This volume compiles international contributions that explore the potential risks and chances coming along with the wide-scale migration of society into digital space. Suggesting a shift of paradigm from Spiral of Silence to Nexus of Noise, the opening chapter provides an overview on systematic approaches and mechanisms of manipulation – ranging from populist political players to Cambridge Analytica. After a discussion of the the juxtaposition effects of social media use on social environments, the efficient instrumentalization of Twitter by Turkish politicans (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  31. added 2019-03-17
    Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’T.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  32. added 2019-02-25
    Net Recommendation: Prudential Appraisals of Digital Media and the Good Life.Pak-Hang Wong - 2012 - Dissertation, University of Twente
    Digital media has become an integral part of people’s lives, and its ubiquity and pervasiveness in our everyday lives raise new ethical, social, cultural, political, economic and legal issues. Many of these issues have primarily been dealt with in terms of what is ‘right’ or ‘just’ with digital media and digitally-mediated practices, and questions about the relations between digital media and the good life are often left in the background. In short, what is often missing is an explicit discussion of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  33. added 2019-02-21
    Ecosophy, Philosophy of Security, New Technologies and the Digital Philosophy.Sarbu Ion - 2017 - In Proceedings of the 13th International Scientific Committee "Strategies XXI". Technologies, Military Applications, Simulations and Resources. Bucharest: "Carol I" National Defence University. pp. 437-443.
    Defining Ecosophy (ecological wisdom) like a contemporary philosophy of survival, security and a sustainable Human Development, terrestrial nature and society, the author of this article approaches the correlation between it and the digital version of security in the context of new technologies. Human survival is in connection with the protection, optimal functioning of the natural environment and the development of human society. Human evolution, physical and psychological (the issues of Anthropoecology, a medical-biological science, deals with them), depends on the natural (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  34. added 2019-02-19
    Information Technology, the Good and Modernity.Pak-Hang Wong - 2010 - In Thinking Machines and the Philosophy of Computer Science: Concepts and Principles. pp. 223-236.
    In Information and Computer Ethics (ICE), and, in fact, in normative and evaluative research of Information Technology (IT) in general, researchers have paid few attentions to the prudential values of IT. Hence, analyses of the prudential values of IT are mostly found in popular discourse. Yet, the analyses of the prudential values of IT are important for answering normative questions about people’s well-being. In this chapter, the author urges researchers in ICE to take the analyses of the prudential values of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. added 2019-01-15
    Infotality: On Living, Loving, and Dying Through Information.Joel Michael Reynolds - 2018 - American Journal of Bioethics 18 (2):33-35.
    Responding to Danaher et al. on self-tracking technologies, I argue that human lived experience is becoming increasingly mediated by generalized, statistical information, which I term our "infotality." Drawing on the work of Foucault, I argue that infotality is historically novel and best understood as the product of biopolitics, healthism, and informatics. I then critique the authors' "stance of cautious openness,” which misunderstands the aims of the technology in question and the fundamental ambiguity of the role information plays in the achievement (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. added 2018-12-31
    The Normative Significance of Identifiability.Tomasz Żuradzki - 2019 - Ethics and Information Technology 21 (4):295-305.
    According to psychological research, people are more eager to help identified individuals than unidentified ones. This phenomenon significantly influences many important decisions, both individual and public, regarding, for example, vaccinations or the distribution of healthcare resources. This paper aims at presenting definitions of various levels of identifiability as well as a critical analysis of the main philosophical arguments regarding the normative significance of the identifiability effect, which refer to: (1) ex ante contractualism; (2) fair distribution of chances and risks; (3) (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. added 2018-12-31
    In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The home (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  38. added 2018-09-20
    Echo Chambers and Epistemic Bubbles.C. Thi Nguyen - 2020 - Episteme 17 (2):141-161.
    Recent conversation has blurred two very different social epistemic phenomena: echo chambers and epistemic bubbles. Members of epistemic bubbles merely lack exposure to relevant information and arguments. Members of echo chambers, on the other hand, have been brought to systematically distrust all outside sources. In epistemic bubbles, other voices are not heard; in echo chambers, other voices are actively undermined. It is crucial to keep these phenomena distinct. First, echo chambers can explain the post-truth phenomena in a way that epistemic (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   11 citations  
  39. added 2018-07-31
    The Social in the Platform Trap: Why a Microscopic System Focus Limits the Prospect of Social Machines.Markus Luczak-Roesch & Ramine Tinati - 2017 - Discover Society 40.
    “Filter bubble”, “echo chambers”, “information diet” – the metaphors to describe today’s information dynamics on social media platforms are fairly diverse. People use them to describe the impact of the viral spread of fake, biased or purposeless content online, as witnessed during the recent race for the US presidency or the latest outbreak of the Ebola virus (in the latter case a tasteless racist meme was drowning out any meaningful content). This unravels the potential envisioned to arise from emergent activities (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  40. added 2017-08-27
    Technology and Privacy.Edmund Byrne - 1991 - In The Technology of Discovery and the Discovery of Technology. Blacksburg, VA: Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential treatment of multiple competitors.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  41. added 2017-08-25
    The Two-Tiered Ethics of EDP.Edmund F. Byrne - 1995 - Journal of Business Ethics 14 (1):53-61.
    Ethical questions regarding access to and use of electronically generated data are (if asked) commonly resolved by distinguishing in Lockean fashion between raw (unworked) and refined (worked) data. The former is thought to belong to no one, the latter to the collector and those to whom the collector grants access. Comparative power separates free riders from rightful owners. The resulting two-tiered ethics of access is here challenged on the grounds that it inequitably establishes a rule of law for the strong (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  42. added 2017-08-16
    A Virtue Epistemology of the Internet: Search Engines, Intellectual Virtues and Education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to use the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   11 citations  
  43. added 2017-06-27
    Sharing is Caring Vs. Stealing is Wrong: A Moral Argument for Limiting Copyright Protection.Julian Hauser - 2017 - International Journal of Technology Policy and Law 3 (1):68-85.
    Copyright is at the centre of both popular and academic debate. That emotions are running high is hardly surprising – copyright influences who contributes what to culture, how culture is used, and even the kind of persons we are and come to be. Consequentialist, Lockean, and personality interest accounts are generally advanced in the literature to morally justify copyright law. I argue that these approaches fail to ground extensive authorial rights in intellectual creations and that only a small subset of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  44. added 2017-02-01
    Innovación y conocimiento libre: cuestiones morales y políticas.Javier De La Cueva González-Cotera - 2013 - Isegoría 48:51-74.
    En el presente trabajo se parte de que la innovación requiere transmisión de información. En la actualidad, el contenido de la transmisión de información se halla sometido a una regulación legal, habitualmente la propiedad intelectual, donde los agentes intervinientes y su requisito de sistema de permisos dificultan la transmisión libre. Para solucionar esta problemática, se están promoviendo dos tipos de soluciones: el primero mediante código legal y el segundo mediante código informático. Estas soluciones, que se fundamentan en razones morales, tienen (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  45. added 2016-10-23
    How to Assess the Emergence of the European Pirate Parties. Towards a Research Agenda.Radu Uszkai & Constantin Vică - 2012 - Sfera Politicii (169):46-55.
    The purpose of this paper is to assess the emergence of the pirate movements in the European Union. Our goal is to sketch the steps towards a research agenda for this grassroots political movement which gained momentum since 2009. To attain our goal we showed the re-signification of the concept of piracy in the debate around intellectual property and its institutional settlement. Afterwards we analysed the big political themes of several European Pirate Parties and their struggle to follow the preferences (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. added 2016-09-30
    Reseña de 'El nuevo leviatán. Una historia política de la Red' de Enrique Alonso. [REVIEW]María G. Navarro - 2016 - Dilemata (22):363-367.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  47. added 2016-07-17
    Review of Interdisciplining Digital Humanities: Boundary Work in an Emerging Field. [REVIEW]Subhasis Chattopadhyay - 2016 - Prabuddha Bharata or Awakened India 121 (7 (July)):577-8.
    This review makes a case for scholars putting up their works online and for removing pay-walls of any kind. Therefore, this review is in sync with the stated aims of philpapers.org.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  48. added 2016-07-14
    The Cognitive Ecology of the Internet.Paul Smart, Richard Heersmink & Robert Clowes - 2017 - In Stephen Cowley & Frederic Vallée-Tourangeau (eds.), Cognition Beyond the Brain: Computation, Interactivity and Human Artifice (2nd ed.). Cham, Switzerland: Springer. pp. 251-282.
    In this chapter, we analyze the relationships between the Internet and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory and its species of embedded, embodied, extended, distributed and collective cognition. Having thus set the stage, we begin by taking an embedded (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   8 citations  
  49. added 2016-03-18
    From Culture 2.0 to a Network State of Mind: A Selective History of Web 2.0’s Axiologies and a Lesson From It.Pak-Hang Wong - 2013 - tripleC 11 (1):191-206.
    There is never a shortage of celebratory and condemnatory popular discourse on digital media even in its early days. This, of course, is also true of the advent of Web 2.0. In this article, I shall argue that normative analyses of digital media should not take lightly the popular discourse, as it can deepen our understanding of the normative and axiological foundation(s) of our judgements towards digital media. Looking at some of the most representative examples available, I examine the latest (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  50. added 2016-03-15
    Digital Alienation as the Foundation of Online Privacy Concerns.Brandt Dainow - 2015 - Acm Sigcas Computers and Society 45 (3):109-117.
    The term ‘digital alienation’ is used in critical IS research to refer to manifestations of alienation online. This paper explores the difficulties of using a traditional Marxist analysis to account for digital alienation. The problem is that the activity people undertake online does not look coerced or estranged from the creator’s individuality, both of which are typically seen as necessary for the production of alienation. As a result of this apparent difficulty, much of the research has focused on the relationship (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 63