Internet Ethics

Edited by Lavinia Marin (KU Leuven, Delft University of Technology)
View topic on PhilPapers for more information
Related categories

45 found
Order:
More results on PhilPapers
  1. added 2019-11-11
    Derecho al olvido en Internet: Google y la doctrina europea.David Villena Saldaña - 2015 - Contratexto 23 (23):259-269.
    This essay accounts for part of the moral, social and legal problems behind the attempts for justifying and implementing the so-called right to be forgotten in the Internet. Such right implies that –under certain circumstances–individuals are entitled to demand that search engines remove links containing their personal information. Our inquiry reflects on a ruling issued by the Court of Justice of the European Union and made public on May 13th 2014, as well as on the recommendations conveyed in Article 29 (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  2. added 2019-11-11
    Julian Assange: Periodismo científico, conspiración y ética hacker.David Villena Saldaña - 2011 - Quehacer 181 (181):58-69.
    This essay attempts to explain the ethics behind WikiLeaks. It also assesses the concepts of conspiration and scientific journalism introduced by Julian Assange in one his manifestos.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  3. added 2019-09-26
    Indiscriminate Mass Surveillance and the Public Sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  4. added 2019-09-26
    Profiling Vandalism in Wikipedia: A Schauerian Approach to Justification.Paul B. de Laat - 2016 - Ethics and Information Technology 18 (2):131-148.
    In order to fight massive vandalism the English- language Wikipedia has developed a system of surveillance which is carried out by humans and bots, supported by various tools. Central to the selection of edits for inspection is the process of using filters or profiles. Can this profiling be justified? On the basis of a careful reading of Frederick Schauer’s books about rules in general (1991) and profiling in particular (2003) I arrive at several conclusions. The effectiveness, efficiency, and risk-aversion of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  5. added 2019-09-26
    From Open-Source Software to Wikipedia: ‘Backgrounding’ Trust by Collective Monitoring and Reputation Tracking.Paul B. de Laat - 2014 - Ethics and Information Technology 16 (2):157-169.
    Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered instead. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. added 2019-08-13
    The Use of Software Tools and Autonomous Bots Against Vandalism: Eroding Wikipedia’s Moral Order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new hierarchical (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. added 2019-08-10
    Ethics of the Health-Related Internet of Things: A Narrative Review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. H-IoT promises many (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   5 citations  
  8. added 2019-06-14
    Бітард як персонаж фольклору анонімних форумів.Kostiantyn Zadyraka - 2017 - NaUKMA Research Papers. History and Theory of Culture 191:26-28.
    Статтю присвячено феномену Інтернет-фольклору, який розглядається на прикладі візуального образу персонажа «бітард». Наведено деякі аргументи для обґрунтування доцільності вживання поняття «Інтернет-фольклор», описано особливості комунікації через специфічний тип анонімних форумів – іміджборд, а також процес формування фольклору іміджборд. Проаналізовано один із елементів цього фольклору – персонаж «бітард», як відображення досвіду користувачів форумів. Описано його визначальні риси та головні характеристики.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  9. added 2019-06-14
    Віртуальне тіло: приклади соціальних мереж та анонімних форумів.Kostiantyn Zadyraka - 2016 - NaUKMA Research Papers. History and Theory of Culture 179:18-22.
    У статті досліджено феномен віртуальної тілесності, яка не тільки посідає важливе місце у сфері зацікавлення гуманітарних наук, а й увійшла як елемент повсякденності в життя значної частини сучасного людства завдяки мережі Інтернет. Розглянуто концепції поєднання віртуальності та тілесності, ключові підходи до аналізу цього поєднання. Предметом аналізу стали анонімні форуми як яскравий приклад конфігурації віртуального тіла, радикально відмінний від інших через анонімний спосіб репрезентації. Інформація, яку індивід викладає в публічний доступ, сприймається як його втілення в буквальному сенсі слова, а цифровий формат (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  10. added 2019-06-13
    Зародження теорії і практики нових медіа: проекти Алана Кея і Теда Нельсона.Oleksandr Mandelina - 2018 - NaUKMA Research Papers. History and Theory of Culture 1:11-16.
    Мета статті – з’ясувати концептуальний контекст виникнення нових медіа. Задля цього здійснено огляд ключових для нових медіа ідей Алана Кея та Теда Нельсона, а саме: перетворення комп’ютера на персональний метамедіум за допомогою користувацького інферфейсу та ідеї гіпертексту. Підкреслено, що створення медіа на базі комп’ютерних технологій супроводжувалось впливом медіа-теорії Маклюена та поєднанням технічного і гуманітарного дискурсів. Від початку створення нових медіа осмислювалась їхня метапозиція щодо традиційних медіа через здатність перших до симуляції наявних медіа-форм та створення нових. Теоретичні підвалини нових медіа як (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  11. added 2019-06-05
    Vortex of the Web. Potentials of the Online Environment.Martin A. M. Gansinger & Ayman Kole (eds.) - 2018 - Hamburg: Anchor.
    This volume compiles international contributions that explore the potential risks and chances coming along with the wide-scale migration of society into digital space. Suggesting a shift of paradigm from Spiral of Silence to Nexus of Noise, the opening chapter provides an overview on systematic approaches and mechanisms of manipulation – ranging from populist political players to Cambridge Analytica. After a discussion of the the juxtaposition effects of social media use on social environments, the efficient instrumentalization of Twitter by Turkish politicans (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  12. added 2019-04-10
    Propaganda, Misinformation, and the Epistemic Value of Democracy.Étienne Brown - 2018 - Critical Review 30 (3-4):194-218.
    If citizens are to make enlightened collective decisions, they need to rely on true factual beliefs, but misinformation impairs their ability to do so. Although some cases of misinformation are deliberate and amount to propaganda, cases of inadvertent misinformation are just as problematic in affecting the beliefs and behavior of democratic citizens. A review of empirical evidence suggests that this is a serious problem that cannot entirely be corrected by means of deliberation.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  13. added 2019-03-17
    Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’T.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  14. added 2019-02-25
    Net Recommendation: Prudential Appraisals of Digital Media and the Good Life.Pak-Hang Wong - 2012 - Dissertation, University of Twente
    Digital media has become an integral part of people’s lives, and its ubiquity and pervasiveness in our everyday lives raise new ethical, social, cultural, political, economic and legal issues. Many of these issues have primarily been dealt with in terms of what is ‘right’ or ‘just’ with digital media and digitally-mediated practices, and questions about the relations between digital media and the good life are often left in the background. In short, what is often missing is an explicit discussion of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  15. added 2019-02-21
    Ecosophy, Philosophy of Security, New Technologies and the Digital Philosophy.Sarbu Ion - 2017 - In Proceedings of the 13th International Scientific Committee "Strategies XXI". Technologies, Military Applications, Simulations and Resources. Bucharest: "Carol I" National Defence University. pp. 437-443.
    Defining Ecosophy (ecological wisdom) like a contemporary philosophy of survival, security and a sustainable Human Development, terrestrial nature and society, the author of this article approaches the correlation between it and the digital version of security in the context of new technologies. Human survival is in connection with the protection, optimal functioning of the natural environment and the development of human society. Human evolution, physical and psychological (the issues of Anthropoecology, a medical-biological science, deals with them), depends on the natural (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  16. added 2019-02-19
    Information Technology, the Good and Modernity.Pak-Hang Wong - 2010 - In Thinking Machines and the Philosophy of Computer Science: Concepts and Principles. pp. 223-236.
    In Information and Computer Ethics (ICE), and, in fact, in normative and evaluative research of Information Technology (IT) in general, researchers have paid few attentions to the prudential values of IT. Hence, analyses of the prudential values of IT are mostly found in popular discourse. Yet, the analyses of the prudential values of IT are important for answering normative questions about people’s well-being. In this chapter, the author urges researchers in ICE to take the analyses of the prudential values of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. added 2019-01-15
    Infotality: On Living, Loving, and Dying Through Information.Joel Michael Reynolds - 2018 - American Journal of Bioethics 18 (2):33-35.
    Responding to Danaher et al. on self-tracking technologies, I argue that human lived experience is becoming increasingly mediated by generalized, statistical information, which I term our "infotality." Drawing on the work of Foucault, I argue that infotality is historically novel and best understood as the product of biopolitics, healthism, and informatics. I then critique the authors' "stance of cautious openness,” which misunderstands the aims of the technology in question and the fundamental ambiguity of the role information plays in the achievement (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. added 2018-12-31
    The Normative Significance of Identifiability.Tomasz Żuradzki - 2019 - Ethics and Information Technology 21 (4):295-305.
    According to psychological research, people are more eager to help identified individuals than unidentified ones. This phenomenon significantly influences many important decisions, both individual and public, regarding, for example, vaccinations or the distribution of healthcare resources. This paper aims at presenting definitions of various levels of identifiability as well as a critical analysis of the main philosophical arguments regarding the normative significance of the identifiability effect, which refer to: (1) ex ante contractualism; (2) fair distribution of chances and risks; (3) (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  19. added 2018-12-31
    In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The home (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  20. added 2018-09-20
    Echo Chambers and Epistemic Bubbles.C. Thi Nguyen - forthcoming - Episteme:1-21.
    Recent conversation has blurred two very different social epistemic phenomena: echo chambers and epistemic bubbles. Members of epistemic bubbles merely lack exposure to relevant information and arguments. Members of echo chambers, on the other hand, have been brought to systematically distrust all outside sources. In epistemic bubbles, other voices are not heard; in echo chambers, other voices are actively undermined. It is crucial to keep these phenomena distinct. First, echo chambers can explain the post-truth phenomena in a way that epistemic (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. added 2018-07-31
    The Social in the Platform Trap: Why a Microscopic System Focus Limits the Prospect of Social Machines.Markus Luczak-Roesch & Ramine Tinati - 2017 - Discover Society 40.
    “Filter bubble”, “echo chambers”, “information diet” – the metaphors to describe today’s information dynamics on social media platforms are fairly diverse. People use them to describe the impact of the viral spread of fake, biased or purposeless content online, as witnessed during the recent race for the US presidency or the latest outbreak of the Ebola virus (in the latter case a tasteless racist meme was drowning out any meaningful content). This unravels the potential envisioned to arise from emergent activities (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  22. added 2017-08-27
    Technology and Privacy.Edmund Byrne - 1991 - In The Technology of Discovery and the Discovery of Technology. Blacksburg, VA: Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential treatment of multiple competitors.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  23. added 2017-08-25
    The Two-Tiered Ethics of EDP.Edmund F. Byrne - 1995 - Journal of Business Ethics 14 (1):53-61.
    Ethical questions regarding access to and use of electronically generated data are (if asked) commonly resolved by distinguishing in Lockean fashion between raw (unworked) and refined (worked) data. The former is thought to belong to no one, the latter to the collector and those to whom the collector grants access. Comparative power separates free riders from rightful owners. The resulting two-tiered ethics of access is here challenged on the grounds that it inequitably establishes a rule of law for the strong (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  24. added 2017-08-16
    A Virtue Epistemology of the Internet: Search Engines, Intellectual Virtues and Education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to use the (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   7 citations  
  25. added 2017-06-27
    Sharing is Caring Vs. Stealing is Wrong: A Moral Argument for Limiting Copyright Protection.Julian Hauser - 2017 - International Journal of Technology Policy and Law 3 (1):68-85.
    Copyright is at the centre of both popular and academic debate. That emotions are running high is hardly surprising – copyright influences who contributes what to culture, how culture is used, and even the kind of persons we are and come to be. Consequentialist, Lockean, and personality interest accounts are generally advanced in the literature to morally justify copyright law. I argue that these approaches fail to ground extensive authorial rights in intellectual creations and that only a small subset of (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  26. added 2017-02-01
    Innovación y conocimiento libre: cuestiones morales y políticas.Javier De La Cueva González-Cotera - 2013 - Isegoría 48:51-74.
    En el presente trabajo se parte de que la innovación requiere transmisión de información. En la actualidad, el contenido de la transmisión de información se halla sometido a una regulación legal, habitualmente la propiedad intelectual, donde los agentes intervinientes y su requisito de sistema de permisos dificultan la transmisión libre. Para solucionar esta problemática, se están promoviendo dos tipos de soluciones: el primero mediante código legal y el segundo mediante código informático. Estas soluciones, que se fundamentan en razones morales, tienen (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  27. added 2016-10-23
    How to Assess the Emergence of the European Pirate Parties. Towards a Research Agenda.Radu Uszkai & Constantin Vică - 2012 - Sfera Politicii (169):46-55.
    The purpose of this paper is to assess the emergence of the pirate movements in the European Union. Our goal is to sketch the steps towards a research agenda for this grassroots political movement which gained momentum since 2009. To attain our goal we showed the re-signification of the concept of piracy in the debate around intellectual property and its institutional settlement. Afterwards we analysed the big political themes of several European Pirate Parties and their struggle to follow the preferences (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. added 2016-09-30
    Reseña de 'El nuevo leviatán. Una historia política de la Red' de Enrique Alonso. [REVIEW]María G. Navarro - 2016 - Dilemata (22):363-367.
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  29. added 2016-07-17
    Review of Interdisciplining Digital Humanities: Boundary Work in an Emerging Field. [REVIEW]Subhasis Chattopadhyay - 2016 - Prabuddha Bharata or Awakened India 121 (7 (July)):577-8.
    This review makes a case for scholars putting up their works online and for removing pay-walls of any kind. Therefore, this review is in sync with the stated aims of philpapers.org.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  30. added 2016-07-14
    The Cognitive Ecology of the Internet.Paul Smart, Richard Heersmink & Robert Clowes - 2017 - In Stephen Cowley & Frederic Vallée-Tourangeau (eds.), Cognition Beyond the Brain: Computation, Interactivity and Human Artifice (2nd ed.). Springer. pp. 251-282.
    In this chapter, we analyze the relationships between the Internet and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory and its species of embedded, embodied, extended, distributed and collective cognition. Having thus set the stage, we begin by taking an embedded (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark   8 citations  
  31. added 2016-03-18
    From Culture 2.0 to a Network State of Mind: A Selective History of Web 2.0’s Axiologies and a Lesson From It.Pak-Hang Wong - 2013 - tripleC 11 (1):191-206.
    There is never a shortage of celebratory and condemnatory popular discourse on digital media even in its early days. This, of course, is also true of the advent of Web 2.0. In this article, I shall argue that normative analyses of digital media should not take lightly the popular discourse, as it can deepen our understanding of the normative and axiological foundation(s) of our judgements towards digital media. Looking at some of the most representative examples available, I examine the latest (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  32. added 2016-03-15
    Key Dialectics in Cloud Services.Brandt Dainow - 2015 - Acm Sigcas Computers and Society 45 (3):52-59.
    This paper will identify three central dialectics within cloud services. These constitute defining positions regarding the nature of cloud services in terms of privacy, ethical responsibility, technical architecture and economics. These constitute the main frameworks within which ethical discussions of cloud services occur. The first dialectic concerns the question of whether it is it essential that personal privacy be reduced in order to deliver personalised cloud services. I shall evaluate the main arguments in favour of the view that it is. (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  33. added 2016-03-15
    Digital Alienation as the Foundation of Online Privacy Concerns.Brandt Dainow - 2015 - Acm Sigcas Computers and Society 45 (3):109-117.
    The term ‘digital alienation’ is used in critical IS research to refer to manifestations of alienation online. This paper explores the difficulties of using a traditional Marxist analysis to account for digital alienation. The problem is that the activity people undertake online does not look coerced or estranged from the creator’s individuality, both of which are typically seen as necessary for the production of alienation. As a result of this apparent difficulty, much of the research has focused on the relationship (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  34. added 2016-03-15
    What Can a Medieval Friar Teach Us About the Internet? Deriving Criteria of Justice for Cyberlaw From Thomist Natural Law Theory.Brandt Dainow - 2013 - Philosophy and Technology 26 (4):459-476.
    This paper applies a very traditional position within Natural Law Theory to Cyberspace. I shall first justify a Natural Law approach to Cyberspace by exploring the difficulties raised by the Internet to traditional principles of jurisprudence and the difficulties this presents for a Positive Law Theory account of legislation of Cyberspace. This will focus on issues relating to geography. I shall then explicate the paradigm of Natural Law accounts, the Treatise on Law, by Thomas Aquinas. From this account will emerge (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  35. added 2016-02-07
    Ethical Issues of 'Morality Mining': When the Moral Identity of Individuals Becomes a Focus of Data-Mining.Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley - 2013 - In Hakikur Rahman & I. Ramos (eds.), Ethical Data Mining Applications for Socio-Economic Development. IGI Global. pp. 1-21.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   4 citations  
  36. added 2015-11-30
    The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  37. added 2015-10-21
    Some Information is Too Dangerous to Be on the Internet.Vincent C. Müller - 2006 - Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category includes information the use of which (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  38. added 2015-09-04
    Horrorporn/Pornhorror: The Problematic Communities and Contexts of Extreme Online Imagery.Steve Jones - 2010 - In Feona Attwood (ed.), Porn.com: Making Sense of Online Pornography. Peter Lang. pp. 123-137.
    This chapter explores the tentative line between erotic spectacle and horror; a judgement that is problematic given that is based on an axis of moral or ideological normality. The contexts of viewing impact on the status of ‘obscene’ images, both in terms of the communities that view them and their motivation for viewing; for sexual arousal, out of morbid curiosity or malevolence, or perhaps all three simultaneously. The reception of an obscene image is largely based upon the issue of viewer (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. added 2015-09-03
    Towards a Just and Fair Internet: Applying Rawls’ Principles of Justice to Internet Regulation.David M. Douglas - 2015 - Ethics and Information Technology 17 (1):57-64.
    I suggest that the social justice issues raised by Internet regulation can be exposed and examined by using a methodology adapted from that described by John Rawls in 'A Theory of Justice'. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the 'original position' as a method of removing bias in decision-making about justice. The original position imposes a 'veil of ignorance' that hides the particular circumstances of individuals from them so that they (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  40. added 2014-11-16
    Measuring Openness and Evaluating Digital Academic Publishing Models: Not Quite the Same Business.Giovanni De Grandis & Yrsa Neuman - 2014 - The Journal of Electronic Publishing 17 (3).
    In this article we raise a problem, and we offer two practical contributions to its solution. The problem is that academic communities interested in digital publishing do not have adequate tools to help them in choosing a publishing model that suits their needs. We believe that excessive focus on Open Access (OA) has obscured some important issues; moreover exclusive emphasis on increasing openness has contributed to an agenda and to policies that show clear practical shortcomings. We believe that academic communities (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  41. added 2014-09-22
    The Ethical Work That Regulations Will Not Do.Carusi Annamaria & De Grandis Giovanni - 2012 - Information, Communication and Society 15 (1):124-141.
    Ethical concerns in e-social science are often raised with respect to privacy, confidentiality, anonymity and the ethical and legal requirements that govern research. In this article, the authors focus on ethical aspects of e-research that are not directly related to ethical regulatory framework or requirements. These frameworks are often couched in terms of benefits or harms that can be incurred by participants in the research. The authors shift the focus to the sources of value in terms of which benefits or (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  42. added 2014-03-14
    Hacking: The Performance of Technology? [REVIEW]Cathy Legg - 2005 - Techne 9 (2):151-154.
    The word “hacker” has an interesting double meaning: one vastly more widespread connotation of technological mischief, even criminality, and an original meaning amongst the tech savvy as a term of highest approbation. Both meanings, however, share the idea that hackers possess a superior ability to manipulate technology according to their will (and, as with God, this superior ability to exercise will is a source of both mystifying admiration and fear). This book mainly concerns itself with the former meaning. To Thomas (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  43. added 2014-03-07
    Dwelling In the House That Porn Built: A Phenomenological Critique of Pornography In the Age of Internet Technology.Justin L. Harmon - 2012 - Social Philosophy Today 28:115-130.
    This paper is a critique of pornography from within the framework of Heideggerian phenomenology. I contend that pornography is a pernicious form of technological discourse in which women are reduced to spectral and anonymous figures fulfilling a universal role, namely that of sexual subordination. Further, the danger of pornography is covered over in the public sphere as a result of the pervasive appeal to its status as mere fantasy. I argue that relegating the problem to the domain of fantasy is (...)
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark  
  44. added 2013-09-16
    Trustworthiness and Truth: The Epistemic Pitfalls of Internet Accountability.Karen Frost-Arnold - 2014 - Episteme 11 (1):63-81.
    Since anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. This paper provides a veritistic argument that accountability mechanisms can cause significant epistemic problems for internet encyclopedias and social media communities. I show that accountability mechanisms can undermine both the dissemination of true beliefs and the detection of error. Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.
    Remove from this list   Download  
     
    Export citation  
     
    Bookmark   5 citations  
  45. added 2012-01-25
    Ethical Aspects of Research in Ultrafast Communication.Alfred Driessen - 2009 - In Paul Sollie & Marcus Düwell (eds.), Evaluating New Technologies: Methodological Problems for the Ethical Assessment of Technology Developments. Springer.
    This chapter summarizes the reflections of a scientist active in optical communication about the need of ethical considerations in technological research. An optimistic definition of ethics, being the art to make good use of technology, is proposed that emphasizes the necessarily involvement of not only technologists but also experts in humanity. The paper then reviews briefly the research activities of a Dutch national consortium where the author had been involved. This mainly academic research dealt with advanced approaches for ultrafast communication. (...)
    Remove from this list   Download  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation