View topic on PhilPapers for more information
Related categories

75 found
Order:
More results on PhilPapers
1 — 50 / 75
  1. Ethical Pitfalls for Natural Language Processing in Psychology.Mark Alfano, Emily Sullivan & Amir Ebrahimi Fard - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    Knowledge is power. Knowledge about human psychology is increasingly being produced using natural language processing (NLP) and related techniques. The power that accompanies and harnesses this knowledge should be subject to ethical controls and oversight. In this chapter, we address the ethical pitfalls that are likely to be encountered in the context of such research. These pitfalls occur at various stages of the NLP pipeline, including data acquisition, enrichment, analysis, storage, and sharing. We also address secondary uses of the results (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  2. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  3. Corporatised Identities ≠ Digital Identities: Algorithmic Filtering on Social Media and the Commercialisation of Presentations of Self.Charlie Harry Smith - forthcoming - In Christopher Burr & Luciano Floridi (eds.), Ethics of Digital Well-being: A Multidisciplinary Approach. Springer.
    Goffman’s (1959) dramaturgical identity theory requires modification when theorising about presentations of self on social media. This chapter contributes to these efforts, refining a conception of digital identities by differentiating them from ‘corporatised identities’. Armed with this new distinction, I ultimately argue that social media platforms’ production of corporatised identities undermines their users’ autonomy and digital well-being. This follows from the disentanglement of several commonly conflated concepts. Firstly, I distinguish two kinds of presentation of self that I collectively refer to (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  4. Disoriented and Alone in the “Experience Machine” - On Netflix, Shared World Deceptions and the Consequences of Deepening Algorithmic Personalization.Maria Brincker - 2021 - SATS 22 (1):75-96.
    Most online platforms are becoming increasingly algorithmically personalized. The question is if these practices are simply satisfying users preferences or if something is lost in this process. This article focuses on how to reconcile the personalization with the importance of being able to share cultural objects - including fiction – with others. In analyzing two concrete personalization examples from the streaming giant Netflix, several tendencies are observed. One is to isolate users and sometimes entirely eliminate shared world aspects. Another tendency (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. A Digital Picture to Hold Us Captive? A Flusserian Interpretation of Misinformation Sharing on Social Media.Lavinia Marin - 2021 - Philosophy Today 65 (3):485–504.
    In this article I investigate online misinformation from a media philosophy perspective. I, thus move away from the debate focused on the semantic content, concerned with what is true or not about misinformation. I argue rather that online misinformation is the effect of an informational climate promoted by user micro-behaviours such as liking, sharing, and posting. Misinformation online is explained as the effect of an informational environment saturated with and shaped by techno-images in which most users act automatically under the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  6. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Algorithms & Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press: Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  7. Surveillance Capitalism: A Marx-Inspired Account.Nikhil Venkatesh - 2021 - Philosophy:1-27.
    Some of the world's most powerful corporations practise what Shoshana Zuboff (2015; 2019) calls ‘surveillance capitalism’. The core of their business is harvesting, analysing and selling data about the people who use their products. In Zuboff's view, the first corporation to engage in surveillance capitalism was Google, followed by Facebook; recently, firms such as Microsoft and Amazon have pivoted towards such a model. In this paper, I suggest that Karl Marx's analysis of the relations between industrial capitalists and workers is (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  8. Technologically scaffolded atypical cognition: The case of YouTube’s recommender system.Mark Alfano, Amir Ebrahimi Fard, J. Adam Carter, Peter Clutton & Colin Klein - 2020 - Synthese:1-24.
    YouTube has been implicated in the transformation of users into extremists and conspiracy theorists. The alleged mechanism for this radicalizing process is YouTube’s recommender system, which is optimized to amplify and promote clips that users are likely to watch through to the end. YouTube optimizes for watch-through for economic reasons: people who watch a video through to the end are likely to then watch the next recommended video as well, which means that more advertisements can be served to them. This (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark   2 citations  
  9. A Ghost Workers' Bill of Rights: How to Establish a Fair and Safe Gig Work Platform.Julian Friedland, David Balkin & Ramiro Montealegre - 2020 - California Management Review 62 (2).
    Many of us assume that all the free editing and sorting of online content we ordinarily rely on is carried out by AI algorithms — not human persons. Yet in fact, that is often not the case. This is because human workers remain cheaper, quicker, and more reliable than AI for performing myriad tasks where the right answer turns on ineffable contextual criteria too subtle for algorithms to yet decode. The output of this work is then used for machine learning (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  10. The Future of Value Sensitive Design.Batya Friedman, David Hendry, Steven Umbrello, Jeroen Van Den Hoven & Daisy Yoo - 2020 - Paradigm Shifts in ICT Ethics: Proceedings of the 18th International Conference ETHICOMP 2020.
    In this panel, we explore the future of value sensitive design (VSD). The stakes are high. Many in public and private sectors and in civil society are gradually realizing that taking our values seriously implies that we have to ensure that values effectively inform the design of technology which, in turn, shapes people’s lives. Value sensitive design offers a highly developed set of theory, tools, and methods to systematically do so.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  11. Excavating “Excavating AI”: The Elephant in the Gallery.Michael J. Lyons - 2020 - arXiv 2009:1-15.
    Two art exhibitions, “Training Humans” and “Making Faces,” and the accompanying essay “Excavating AI: The politics of images in machine learning training sets” by Kate Crawford and Trevor Paglen, are making substantial impact on discourse taking place in the social and mass media networks, and some scholarly circles. Critical scrutiny reveals, however, a self-contradictory stance regarding informed consent for the use of facial images, as well as serious flaws in their critique of ML training sets. Our analysis underlines the non-negotiability (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Three Contextual Dimensions of Information on Social Media: Lessons Learned From the COVID-19 Infodemic.Lavinia Marin - 2020 - Ethics and Information Technology.
    The COVID-19 pandemic has been accompanied on social media by an explosion of information disorders such as inaccurate, misleading and irrelevant information. Countermeasures adopted thus far to curb these informational disorders have had limited success because these did not account for the diversity of informational contexts on social media, focusing instead almost exclusively on curating the factual content of user’s posts. However, content-focused measures do not address the primary causes of the infodemic itself, namely the user’s need to post content (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. Emotions and Digital Well-Being. The Rationalistic Bias of Social Media Design in Online Deliberations.Lavinia Marin & Sabine Roeser - 2020 - In Christopher Burr & Luciano Floridi (eds.), Ethics of Digital Well-being: A Multidisciplinary Approach. Cham: Springer. pp. 139-150.
    In this chapter we argue that emotions are mediated in an incomplete way in online social media because of the heavy reliance on textual messages which fosters a rationalistic bias and an inclination towards less nuanced emotional expressions. This incompleteness can happen either by obscuring emotions, showing less than the original intensity, misinterpreting emotions, or eliciting emotions without feedback and context. Online interactions and deliberations tend to contribute rather than overcome stalemates and informational bubbles, partially due to prevalence of anti-social (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  14. Retweeting: Its Linguistic and Epistemic Value.Neri Marsili - 2020 - Synthese:1-27.
    This paper analyses the communicative and epistemic value of retweeting (and more generally of reposting content on social media). Against a naïve view, it argues that retweets are not acts of endorsement, motivating this diagnosis with linguistic data. Retweeting is instead modelled as a peculiar form of quotation, in which the reported content is indicated rather than reproduced. A relevance-theoretic account of the communicative import of retweeting is then developed, to spell out the complex mechanisms by which retweets achieve their (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Echo Chambers and Epistemic Bubbles.C. Thi Nguyen - 2020 - Episteme 17 (2):141-161.
    Recent conversation has blurred two very different social epistemic phenomena: echo chambers and epistemic bubbles. Members of epistemic bubbles merely lack exposure to relevant information and arguments. Members of echo chambers, on the other hand, have been brought to systematically distrust all outside sources. In epistemic bubbles, other voices are not heard; in echo chambers, other voices are actively undermined. It is crucial to keep these phenomena distinct. First, echo chambers can explain the post-truth phenomena in a way that epistemic (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   46 citations  
  16. L’Éthique des Mégadonnées (Big Data) En Recherche.Nicolae Sfetcu - 2020 - Drobeta Turnu Severin: MultiMedia Publishing.
    Les principaux problèmes rencontrés par les scientifiques qui travaillent avec des ensembles de données massives (mégadonnées, Big Data), en soulignant les principaux problèmes éthiques, tout en tenant compte de la législation de l'Union européenne. Après une brève Introduction au Big Data, la section Technologie présente les applications spécifiques de la recherche. Il suit une approche des principales questions philosophiques spécifiques dans Aspects philosophiques, et Aspects juridiques en soulignant les problèmes éthiques spécifiques du règlement de l'UE sur la protection des données (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  17. The world is a big network. Pandemic, the Internet and institutions.Constantin Vica - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):136-161.
    2020 is the year of the first pandemic lived through the Internet. More than half of the world population is now online and because of self-isolation, our moral and social lives unfold almost exclusively online. Two pressing questions arise in this context: how much can we rely on the Internet, as a set of technologies, and how much should we trust online platforms and applications? In order to answer these two questions, I develop an argument based on two fundamental assumptions: (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  18. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its use. We will (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  19. Political Correctness Gone Viral.Waleed Aly & Robert Mark Simpson - 2019 - In Carl Fox & Joe Saunders (eds.), Media Ethics, Free Speech, and the Requirements of Democracy. London: pp. 125-143.
    Communicative practices in online and social media sometimes seem to amplify political conflict, and result in significant harms to people who become the targets of collective outrage. Many complaints that have been made about political correctness in the past, we argue, amount to little more than a veiled expression of resentment over the increasing influence enjoyed by progressive activists. But some complaints about political correctness take on a different complexion, in light of the technologically-driven changes to our communicative practices and (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  20. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Ethics of Identity in the Time of Big Data.James Brusseau - 2019 - First Monday 24 (5-6):00-11.
    Compartmentalizing our distinct personal identities is increasingly difficult in big data reality. Pictures of the person we were on past vacations resurface in employers’ Google searches; LinkedIn which exhibits our income level is increasingly used as a dating web site. Whether on vacation, at work, or seeking romance, our digital selves stream together. One result is that a perennial ethical question about personal identity has spilled out of philosophy departments and into the real world. Ought we possess one, unified identity (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  22. Planning for Ethical Agent-Agent Interaction.Jesse David Dinneen - 2019 - Good Systems: Ethical AI for CSCW, Workshop at CSCW '19: ACM SIGCHI Conference on Computer-Supported Cooperative Work.
    In this position paper for the 2019 CSCW workshop Good Systems: Ethical AI for CSCW I propose one tool and one idea for navigating the complex ethical problem space that results from the interaction of human and/or AI agents in shared, hopefully cooperative, computing environments.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  23. Big Data.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Odată cu creșterea volumului de date pe Internet, în media socială, cloud computing, dispozitive mobile și date guvernamentale, Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate. În fiecare zi, folosim și generăm tone de date, alimentând bazele de date ale agențiilor guvernamentale, companiilor private și chiar cetățenilor privați. Beneficiem în multe feluri de existența și utilizarea Big Data, dar trebuie să ne (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  24. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’T.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  25. Privacy, Autonomy, and Personalised Targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2019 - In Carissa Véliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific individuals or (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  26. Search Engines, Free Speech Coverage, and the Limits of Analogical Reasoning.Heather Whitney & Robert Mark Simpson - 2019 - In Susan Brison & Katharine Gelber (eds.), Free Speech in the Digital Age. pp. 33-41.
    This paper investigates whether search engines and other new modes of online communication should be covered by free speech principles. It criticizes the analogical reason-ing that contemporary American courts and scholars have used to liken search engines to newspapers, and to extend free speech coverage to them based on that likeness. There are dissimilarities between search engines and newspapers that undermine the key analogy, and also rival analogies that can be drawn which don’t recommend free speech protection for search engines. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  27. The Normative Significance of Identifiability.Tomasz Żuradzki - 2019 - Ethics and Information Technology 21 (4):295-305.
    According to psychological research, people are more eager to help identified individuals than unidentified ones. This phenomenon significantly influences many important decisions, both individual and public, regarding, for example, vaccinations or the distribution of healthcare resources. This paper aims at presenting definitions of various levels of identifiability as well as a critical analysis of the main philosophical arguments regarding the normative significance of the identifiability effect, which refer to: (1) ex ante contractualism; (2) fair distribution of chances and risks; (3) (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Sharing as Speech Act.Emanuele Arielli - 2018 - Versus 127:243-258.
    Social media platforms allow users to perform different speech acts: status updates could be assertives, a like is an expressive, a friendship request is a directive, and so on. But sharing (or "retweeting") seems to lack a fixed illocutive status: this explains why present controversies concerning the sharing of misinformation have been debated in legal procedure and discussed from the point of view of personal responsibility without reaching a general consensus. The premise of this paper is that the diffusion of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Vortex of the Web. Potentials of the Online Environment.Martin A. M. Gansinger & Ayman Kole (eds.) - 2018 - Hamburg: Anchor.
    This volume compiles international contributions that explore the potential risks and chances coming along with the wide-scale migration of society into digital space. Suggesting a shift of paradigm from Spiral of Silence to Nexus of Noise, the opening chapter provides an overview on systematic approaches and mechanisms of manipulation – ranging from populist political players to Cambridge Analytica. After a discussion of the the juxtaposition effects of social media use on social environments, the efficient instrumentalization of Twitter by Turkish politicans (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  30. A Virtue Epistemology of the Internet: Search Engines, Intellectual Virtues and Education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to use the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   19 citations  
  31. Зародження теорії і практики нових медіа: проекти Алана Кея і Теда Нельсона.Oleksandr Mandelina - 2018 - NaUKMA Research Papers. History and Theory of Culture 1:11-16.
    Мета статті – з’ясувати концептуальний контекст виникнення нових медіа. Задля цього здійснено огляд ключових для нових медіа ідей Алана Кея та Теда Нельсона, а саме: перетворення комп’ютера на персональний метамедіум за допомогою користувацького інферфейсу та ідеї гіпертексту. Підкреслено, що створення медіа на базі комп’ютерних технологій супроводжувалось впливом медіа-теорії Маклюена та поєднанням технічного і гуманітарного дискурсів. Від початку створення нових медіа осмислювалась їхня метапозиція щодо традиційних медіа через здатність перших до симуляції наявних медіа-форм та створення нових. Теоретичні підвалини нових медіа як (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  32. Infotality: On Living, Loving, and Dying Through Information.Joel Michael Reynolds - 2018 - American Journal of Bioethics 18 (2):33-35.
    Responding to Danaher et al. on self-tracking technologies, I argue that human lived experience is becoming increasingly mediated by generalized, statistical information, which I term our "infotality." Drawing on the work of Foucault, I argue that infotality is historically novel and best understood as the product of biopolitics, healthism, and informatics. I then critique the authors' "stance of cautious openness,” which misunderstands the aims of the technology in question and the fundamental ambiguity of the role information plays in the achievement (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The home (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  34. Sharing is Caring Vs. Stealing is Wrong: A Moral Argument for Limiting Copyright Protection.Julian Hauser - 2017 - International Journal of Technology Policy and Law 3 (1):68-85.
    Copyright is at the centre of both popular and academic debate. That emotions are running high is hardly surprising – copyright influences who contributes what to culture, how culture is used, and even the kind of persons we are and come to be. Consequentialist, Lockean, and personality interest accounts are generally advanced in the literature to morally justify copyright law. I argue that these approaches fail to ground extensive authorial rights in intellectual creations and that only a small subset of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  35. The Social in the Platform Trap: Why a Microscopic System Focus Limits the Prospect of Social Machines.Markus Luczak-Roesch & Ramine Tinati - 2017 - Discover Society 40.
    “Filter bubble”, “echo chambers”, “information diet” – the metaphors to describe today’s information dynamics on social media platforms are fairly diverse. People use them to describe the impact of the viral spread of fake, biased or purposeless content online, as witnessed during the recent race for the US presidency or the latest outbreak of the Ebola virus (in the latter case a tasteless racist meme was drowning out any meaningful content). This unravels the potential envisioned to arise from emergent activities (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  36. Ethics of the Health-Related Internet of Things: A Narrative Review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. H-IoT promises many (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   9 citations  
  37. Online Shaming.Kathryn J. Norlock - 2017 - Social Philosophy Today 33:187-197.
    Online shaming is a subject of import for social philosophy in the Internet age, and not simply because shaming seems generally bad. I argue that social philosophers are well-placed to address the imaginal relationships we entertain when we engage in social media; activity in cyberspace results in more relationships than one previously had, entailing new and more responsibilities, and our relational behaviors admit of ethical assessment. I consider the stresses of social media, including the indefinite expansion of our relationships and (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. The Cognitive Ecology of the Internet.Paul Smart, Richard Heersmink & Robert Clowes - 2017 - In Stephen Cowley & Frederic Vallée-Tourangeau (eds.), Cognition Beyond the Brain: Computation, Interactivity and Human Artifice (2nd ed.). Cham, Switzerland: Springer. pp. 251-282.
    In this chapter, we analyze the relationships between the Internet and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory and its species of embedded, embodied, extended, distributed and collective cognition. Having thus set the stage, we begin by taking an embedded (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   19 citations  
  39. Бітард як персонаж фольклору анонімних форумів.Kostiantyn Zadyraka - 2017 - NaUKMA Research Papers. History and Theory of Culture 191:26-28.
    Статтю присвячено феномену Інтернет-фольклору, який розглядається на прикладі візуального образу персонажа «бітард». Наведено деякі аргументи для обґрунтування доцільності вживання поняття «Інтернет-фольклор», описано особливості комунікації через специфічний тип анонімних форумів – іміджборд, а також процес формування фольклору іміджборд. Проаналізовано один із елементів цього фольклору – персонаж «бітард», як відображення досвіду користувачів форумів. Описано його визначальні риси та головні характеристики.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  40. Review of Interdisciplining Digital Humanities: Boundary Work in an Emerging Field. [REVIEW]Subhasis Chattopadhyay - 2016 - Prabuddha Bharata or Awakened India 121 (7 (July)):577-8.
    This review makes a case for scholars putting up their works online and for removing pay-walls of any kind. Therefore, this review is in sync with the stated aims of philpapers.org.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  41. Profiling Vandalism in Wikipedia: A Schauerian Approach to Justification.Paul B. de Laat - 2016 - Ethics and Information Technology 18 (2):131-148.
    In order to fight massive vandalism the English- language Wikipedia has developed a system of surveillance which is carried out by humans and bots, supported by various tools. Central to the selection of edits for inspection is the process of using filters or profiles. Can this profiling be justified? On the basis of a careful reading of Frederick Schauer’s books about rules in general (1991) and profiling in particular (2003) I arrive at several conclusions. The effectiveness, efficiency, and risk-aversion of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  42. Reseña de 'El nuevo leviatán. Una historia política de la Red' de Enrique Alonso. [REVIEW]María G. Navarro - 2016 - Dilemata (22):363-367.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  43. Indiscriminate Mass Surveillance and the Public Sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   10 citations  
  44. Віртуальне тіло: приклади соціальних мереж та анонімних форумів.Kostiantyn Zadyraka - 2016 - NaUKMA Research Papers. History and Theory of Culture 179:18-22.
    У статті досліджено феномен віртуальної тілесності, яка не тільки посідає важливе місце у сфері зацікавлення гуманітарних наук, а й увійшла як елемент повсякденності в життя значної частини сучасного людства завдяки мережі Інтернет. Розглянуто концепції поєднання віртуальності та тілесності, ключові підходи до аналізу цього поєднання. Предметом аналізу стали анонімні форуми як яскравий приклад конфігурації віртуального тіла, радикально відмінний від інших через анонімний спосіб репрезентації. Інформація, яку індивід викладає в публічний доступ, сприймається як його втілення в буквальному сенсі слова, а цифровий формат (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  45. Digital Alienation as the Foundation of Online Privacy Concerns.Brandt Dainow - 2015 - Acm Sigcas Computers and Society 45 (3):109-117.
    The term ‘digital alienation’ is used in critical IS research to refer to manifestations of alienation online. This paper explores the difficulties of using a traditional Marxist analysis to account for digital alienation. The problem is that the activity people undertake online does not look coerced or estranged from the creator’s individuality, both of which are typically seen as necessary for the production of alienation. As a result of this apparent difficulty, much of the research has focused on the relationship (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  46. Key Dialectics in Cloud Services.Brandt Dainow - 2015 - Acm Sigcas Computers and Society 45 (3):52-59.
    This paper will identify three central dialectics within cloud services. These constitute defining positions regarding the nature of cloud services in terms of privacy, ethical responsibility, technical architecture and economics. These constitute the main frameworks within which ethical discussions of cloud services occur. The first dialectic concerns the question of whether it is it essential that personal privacy be reduced in order to deliver personalised cloud services. I shall evaluate the main arguments in favour of the view that it is. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  47. The Use of Software Tools and Autonomous Bots Against Vandalism: Eroding Wikipedia’s Moral Order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new hierarchical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Towards a Just and Fair Internet: Applying Rawls’ Principles of Justice to Internet Regulation.David M. Douglas - 2015 - Ethics and Information Technology 17 (1):57-64.
    I suggest that the social justice issues raised by Internet regulation can be exposed and examined by using a methodology adapted from that described by John Rawls in 'A Theory of Justice'. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the 'original position' as a method of removing bias in decision-making about justice. The original position imposes a 'veil of ignorance' that hides the particular circumstances of individuals from them so that they (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Derecho al olvido en Internet: Google y la doctrina europea.David Villena Saldaña - 2015 - Contratexto 23 (23):259-269.
    This essay accounts for part of the moral, social and legal problems behind the attempts for justifying and implementing the so-called right to be forgotten in the Internet. Such right implies that –under certain circumstances–individuals are entitled to demand that search engines remove links containing their personal information. Our inquiry reflects on a ruling issued by the Court of Justice of the European Union and made public on May 13th 2014, as well as on the recommendations conveyed in Article 29 (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  50. Measuring Openness and Evaluating Digital Academic Publishing Models: Not Quite the Same Business.Giovanni De Grandis & Yrsa Neuman - 2014 - The Journal of Electronic Publishing 17 (3).
    In this article we raise a problem, and we offer two practical contributions to its solution. The problem is that academic communities interested in digital publishing do not have adequate tools to help them in choosing a publishing model that suits their needs. We believe that excessive focus on Open Access (OA) has obscured some important issues; moreover exclusive emphasis on increasing openness has contributed to an agenda and to policies that show clear practical shortcomings. We believe that academic communities (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 75