Switch to: References

Citations of:

Does Information Have a Moral Worth in Itself?

In CEPE 1998, Computer Ethics: Philosophical Enquiry. London: (1998)

Add citations

You must login to add citations.
  1. The relevance of software rights: An anthology of the divergence of sociopolitical doctrines. [REVIEW]Mikko Siponen - 2001 - AI and Society 15 (1-2):128-148.
    The relevance of different concepts of computer software (henceforth SW) rights is analysed from the viewpoint of divergent sociopolitical doctrines. The question of software rights is considered from the ontological assumptions, on one extreme, to the relevance of current practical applications of SW rights (such as copyright and patent), on the other extreme. It will be argued (from a non-descriptive/non-cognitive account) that the current expression of SW rights in Western societies (namely copyright, excluding patent) can be seen to be fair (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Luciano Floridi, Philosophy and Computing: An introduction, London and New York: Routledge, 1999, xiv+242 pp., ISBN 0-415-18025-2. [REVIEW]J. W. Sanders - 2001 - Minds and Machines 11 (1):151-154.
    Download  
     
    Export citation  
     
    Bookmark  
  • Artificial evil and the foundation of computer ethics.J. W. Sanders & Luciano Floridi - 2001 - Ethics and Information Technology 3 (1):55-66.
    Moral reasoning traditionally distinguishes two types of evil:moral and natural. The standard view is that ME is the product of human agency and so includes phenomena such as war, torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomousagents in cyberspace, a new (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Mapping the foundationalist debate in computer ethics.Luciano Floridi & J. W. Sanders - 2002 - Ethics and Information Technology 4 (1):1–9.
    The paper provides a critical review of thedebate on the foundations of Computer Ethics(CE). Starting from a discussion of Moor'sclassic interpretation of the need for CEcaused by a policy and conceptual vacuum, fivepositions in the literature are identified anddiscussed: the ``no resolution approach'',according to which CE can have no foundation;the professional approach, according to whichCE is solely a professional ethics; the radicalapproach, according to which CE deals withabsolutely unique issues, in need of a uniqueapproach; the conservative approach, accordingto which CE (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  • Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Springer Netherlands. Edited by Luciano Floridi & J. W. Sanders.
    Moral reasoning traditionally distinguishes two types of evil:moral (ME) and natural (NE). The standard view is that ME is the product of human agency and so includes phenomena such as war,torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in cyberspace, (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  • Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations