Switch to: References

Add citations

You must login to add citations.
  1. Mind and artifact: A multidimensional matrix for exploring cognition-artifact relations.Richard Heersmink - 2012 - In R. Heersmink (ed.), Proceedings of AISB/IACAP World Congres 2012.
    What are the possible varieties of cognition-artifact relations, and which dimensions are relevant for exploring these varieties? This question is answered in two steps. First, three levels of functional and informational integration between human agent and cognitive artifact are distinguished. These levels are based on the degree of interactivity and direction of information flow, and range from monocausal and bicausal relations to continuous reciprocal causation. In these levels there is a hierarchy of integrative processes in which there is an increasing (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The Changing Meaning of Privacy, Identity and Contemporary Feminist Philosophy.Janice Richardson - 2011 - Minds and Machines 21 (4):517-532.
    This paper draws upon contemporary feminist philosophy in order to consider the changing meaning of privacy and its relationship to identity, both online and offline. For example, privacy is now viewed by European Court of Human Rights (ECtHR) as a right, which when breached can harm us by undermining our ability to maintain social relations. I briefly outline the meaning of privacy in common law and under the European Convention on Human Rights (ECHR) in order to show the relevance of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The informational nature of personal identity.Luciano Floridi - 2011 - Minds and Machines 21 (4):549-566.
    In this paper, I present an informational approach to the nature of personal identity. In “Plato and the problem of the chariot”, I use Plato’s famous metaphor of the chariot to introduce a specific problem regarding the nature of the self as an informational multiagent system: what keeps the self together as a whole and coherent unity? In “Egology and its two branches” and “Egology as synchronic individualisation”, I outline two branches of the theory of the self: one concerning the (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  • Discourses on information ethics: The claim to universality. [REVIEW]Bernd Carsten Stahl - 2008 - Ethics and Information Technology 10 (2-3):97-108.
    An important question one can ask of ethical theories is whether and how they aim to raise claims to universality. This refers to the subject area that they intend to describe or govern and also to the question whether they claim to be binding for all (moral) agents. This paper discusses the question of universality of Luciano Floridi’s information ethics (IE). This is done by introducing the theory and discussing its conceptual foundations and applications. The emphasis will be placed on (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Information ethics and the law of data representations.Dan L. Burk - 2008 - Ethics and Information Technology 10 (2-3):135-147.
    The theories of information ethics articulated by Luciano Floridi and his collaborators have clear implications for law. Information law, including the law of privacy and of intellectual property, is especially likely to benefit from a coherent and comprehensive theory of information ethics. This article illustrates how information ethics might apply to legal doctrine, by examining legal questions related to the ownership and control of the personal data representations, including photographs, game avatars, and consumer profiles, that have become ubiquitous with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Alienation in a World of Data. Toward a Materialist Interpretation of Digital Information Technologies.Michael Steinmann - 2022 - Philosophy and Technology 35 (4):1-24.
    The essay proposes to use alienation as a heuristic and conceptual tool for the analysis of the impact of digital information and communication technologies (ICTs) on users. It follows a historical materialist understanding, according to which data can be considered as things produced in an industrial fashion. A representational interpretation, according to which data would merely reflect a given reality, is untenable. It will be argued instead to understand data as an additional layer which has a transformative impact on reality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Inferences and the Right to Privacy.Jakob Mainz - 2024 - Journal of Value Inquiry 58 (4):563-581.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts what (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
    Due to the technology of machine learning, new breakthroughs are currently being achieved with constant regularity. By using machine learning techniques, computer applications can be developed and used to solve tasks that have hitherto been assumed not to be solvable by computers. If these achievements consider applications that collect and process personal data, this is typically perceived as a threat to information privacy. This paper aims to discuss applications from both fields of personality and image analysis. These applications are often (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Digital’s cleaving power and its consequences.Luciano Floridi - 2017 - Philosophy and Technology 30 (2):123-129.
    The digital is deeply transforming reality. Through discussion of concepts such as identity, location, presence, law and territoriality, this article explores why and how these transformations are occurring, and highlights the importance of having a design and a plan for our new digital world.
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • From Individual to Group Privacy in Big Data Analytics.Brent Mittelstadt - 2017 - Philosophy and Technology 30 (4):475-494.
    Mature information societies are characterised by mass production of data that provide insight into human behaviour. Analytics has arisen as a practice to make sense of the data trails generated through interactions with networked devices, platforms and organisations. Persistent knowledge describing the behaviours and characteristics of people can be constructed over time, linking individuals into groups or classes of interest to the platform. Analytics allows for a new type of algorithmically assembled group to be formed that does not necessarily align (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • The philosophy of information as a conceptual framework.Luciano Floridi - 2010 - Knowledge, Technology & Policy 23 (1-2):1-31.
    The article contains the replies to the collection of contributions discussing my research on the philosophy of information.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Distributed morality in an information society.Luciano Floridi - 2013 - Science and Engineering Ethics 19 (3):727-743.
    The phenomenon of distributed knowledge is well-known in epistemic logic. In this paper, a similar phenomenon in ethics, somewhat neglected so far, is investigated, namely distributed morality. The article explains the nature of distributed morality, as a feature of moral agency, and explores the implications of its occurrence in advanced information societies. In the course of the analysis, the concept of infraethics is introduced, in order to refer to the ensemble of moral enablers, which, although morally neutral per se, can (...)
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  • Luciano Floridi’s philosophy of information and information ethics: Critical reflections and the state of the art. [REVIEW]Charles Ess - 2008 - Ethics and Information Technology 10 (2-3):89-96.
    I describe the emergence of Floridi’s philosophy of information (PI) and information ethics (IE) against the larger backdrop of Information and Computer Ethics (ICE). Among their many strengths, PI and IE offer promising metaphysical and ethical frameworks for a global ICE that holds together globally shared norms with the irreducible differences that define local cultural and ethical traditions. I then review the major defenses and critiques of PI and IE offered by contributors to this special issue, and highlight Floridi’s responses (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data.Georgy Ishmaev - 2020 - Philosophy and Technology 33 (3):411-432.
    This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest present solutions aimed at reorganizing data flows in the Internet of Things architectures, enabling the secure and decentralized exchange of data between network participants. However, as this paper argues, the promised benefits are counterbalanced by a significant shift towards the propertization of private data, underlying these proposals. Considering the unique capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • On human dignity as a foundation for the right to privacy.Luciano Floridi - 2016 - Philosophy and Technology 29 (4):307-312.
    In 2016, the European Parliament approved the General Data Protection Regulation (GDPR) whose core aim is the safeguarding of information privacy, and, by corollary, human dignity. Drawing on the field of philosophical anthropology, this paper analyses various interpretations of human dignity and human exceptionalism. It concludes that privacy is essential for humans to flourish and enable individuals to build a sense of self and the world.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Is There a Philosophy of Information?Fred Adams & João Antonio de Moraes - 2016 - Topoi 35 (1):161-171.
    In 2002, Luciano Floridi published a paper called What is the Philosophy of Information?, where he argues for a new paradigm in philosophical research. To what extent should his proposal be accepted? Is the Philosophy of Information actually a new paradigm, in the Kuhninan sense, in Philosophy? Or is it only a new branch of Epistemology? In our discussion we will argue in defense of Floridi’s proposal. We believe that Philosophy of Information has the types of features had by other (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
    PurposeThe purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.Design/methodology/approachFirst, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described followed by the analysis of the Japanese socio‐cultural circumstances (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)Information ethics and infosphere.Ariel Antonio Morán Reyes - 2013 - Escritos 21 (46):21-37.
    Download  
     
    Export citation  
     
    Bookmark  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical pluralism and global information ethics.Charles Ess - 2006 - Ethics and Information Technology 8 (4):215-226.
    A global information ethics that seeks to avoid imperialistic homogenization must conjoin shared norms while simultaneously preserving the irreducible differences between cultures and peoples. I argue that a global information ethics may fulfill these requirements by taking up an ethical pluralism – specifically Aristotle’s pros hen [“towards one”] or “focal” equivocals. These ethical pluralisms figure centrally in both classical and contemporary Western ethics: they further offer important connections with the major Eastern ethical tradition of Confucian thought. Both traditions understand ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  • From public data to private information: The case of the supermarket.Vincent C. Müller - 2009 - In Bottis Maria (ed.), Proceedings of the 8th International Conference Computer Ethics: Philosophical Enquiry. Nomiki Bibliothiki. pp. 500-507.
    The background to this paper is that in our world of massively increasing personal digital data any control over the data about me seems illusionary – informational privacy seems a lost cause. On the other hand, the production of this digital data seems a necessary component of our present life in the industrialized world. A framework for a resolution of this apparent dilemma is provided if by the distinction between (meaningless) data and (meaningful) information. I argue that computational data processing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Informational privacy and its ontological interpretation.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (3):1.
    The article provides an outline of the ontological interpretation of informational privacy based on information ethics. It is part of a larger project of research, in which I have developed the foundations of ideas presented here and their consequences. As an outline, it is meant to be self-sufficient and to provide enough information to enable the reader to assess how the approach fares with respect to other alternatives. However, those interested in a more detailed analysis, and especially in the reasons (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Information technology and privacy: conceptual muddles or privacy vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Forbidden knowledge in machine learning reflections on the limits of research and publication.Thilo Hagendorff - 2021 - AI and Society 36 (3):767-781.
    Certain research strands can yield “forbidden knowledge”. This term refers to knowledge that is considered too sensitive, dangerous or taboo to be produced or shared. Discourses about such publication restrictions are already entrenched in scientific fields like IT security, synthetic biology or nuclear physics research. This paper makes the case for transferring this discourse to machine learning research. Some machine learning applications can very easily be misused and unfold harmful consequences, for instance, with regard to generative video or text synthesis, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Is There a Philosophy of Information?João Moraes & Fred Adams - 2016 - Topoi 35 (1):161-171.
    In 2002, Luciano Floridi published a paper called What is the Philosophy of Information?, where he argues for a new paradigm in philosophical research. To what extent should his proposal be accepted? Is the Philosophy of Information actually a new paradigm, in the Kuhninan sense, in Philosophy? Or is it only a new branch of Epistemology? In our discussion we will argue in defense of Floridi’s proposal. We believe that Philosophy of Information has the types of features had by other (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Is there a philosophy of information?Filip Buekens, Alessandro Salice, Luciano Floridi, Bert Baumgaertner & Filippo Domaneschi - 2016 - Topoi 35 (1):161-171.
    In 2002, Luciano Floridi published a paper called What is the Philosophy of Information?, where he argues for a new paradigm in philosophical research. To what extent should his proposal be accepted? Is the Philosophy of Information actually a new paradigm, in the Kuhninan sense, in Philosophy? Or is it only a new branch of Epistemology? In our discussion we will argue in defense of Floridi’s proposal. We believe that Philosophy of Information has the types of features had by other (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Commodification and privacy: A Lockean perspective.Richard Volkman - 2010 - HEC Forum 22 (3):179-195.
    This paper defends the thesis that privacy as a right is derived from fundamental rights to life, liberty, and property and does not permit restricting the commodification of bodily material; however, privacy as life, liberty, property does require conventions that ensure a robust and just market in bodily material. The analysis proceeds by defending a general commitment to liberty and markets, but not in the manner one might expect from a ‘doctrinaire’ libertarian. Ethical concerns about commodification are legitimate in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Sovereignty, privacy, and ethics in blockchain-based identity management systems.Georgy Ishmaev - 2020 - Ethics and Information Technology 23 (3):239-252.
    Self-sovereign identity solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The concept of Datenherrschaft of patient information from a Heideggerian perspective.Jani Simo Sakari Koskinen - 2019 - Journal of Information, Communication and Ethics in Society 17 (3):336-353.
    PurposeIn this paper, patient information is approached from a Heideggerian perspective with the intention to gather an understanding about the personal nature of the information. The purpose of this paper is to analyse the ownership of patient information and then present Datenherrschaft as a suitable model for patient ownership of patient information.Design/methodology/approachThis paper is theoretical in approach. It is based on arguments derived from Heidegger’s work in the Being and Time.FindingsBased on this Heideggerian approcah, a proposal for using the special (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Correspondents theory 1800/2000: philosophical reflections upon epistolary technics and praxis in the analogue and digital. [REVIEW]Anthony John Charles Ross - unknown
    When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean? What do we lose and what do we gain as we move towards digital ways of being in the world? Critically engaging with many of the canonical writers in the philosophy of technology , and following what has been termed the 'empirical turn' in that discipline, this thesis answers such questions by means of a philosophical, comparative study of epistolary technics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics among peers: file sharing on the internet between openness and precaution.U. Pagallo - 2010 - Journal of Information, Communication and Ethics in Society 8 (2):136-149.
    PurposeThe paper suggests overcoming the polarization of today's debate on peer‐to‐peer systems by defining a fair balance between the principle of precaution and the principle of openness. Threats arising from these file sharing applications‐systems should not be a pretext to limit freedom of research, speech or the right “freely to participate in the cultural life of the community”, as granted by the Universal Declaration of Human Rights from 1948. The paper aims to take sides in today's debate.Design/methodology/approachThe paper adopts an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)La ética de la información y la infoesfera.Ariel Antonio Morán Reyes - 2013 - Escritos 21 (46):21-37.
    Este artículo examina las cuestiones culturales y los supuestos relacionados con la adopción de las tecnologías, al igual que los principios éticos aplicados a ellas. Se analizan cuestiones prácticas y problemas éticos que han surgido por el uso de la tecnología. Además, se desarrolla el concepto de infoesfera como un mundo inmaterial, en el marco de una ética informacional donde coexisten e interactúan las entidades informacionales. Para la Filosofía de la información, el elemento fundamental de la infoesfera es la información. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A new “Ring of Gyges” and the meaning of invisibility in the information revolution.Ugo Pagallo - 2010 - Journal of Information, Communication and Ethics in Society 8 (4):364-376.
    PurposeThe paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human affairs. It seeks to explore the meaning of invisibility via an interdisciplinary approach, including computer science, law, and ethics.Design/methodology/approachThe method draws on both theoretical and empirical material so as to scrutinise the ways in which today's information revolution is recasting the boundaries between visibility and invisibility.FindingsThe degrees of exposure to public notice can be (...)
    Download  
     
    Export citation  
     
    Bookmark