Switch to: References

Add citations

You must login to add citations.
  1. Ethics of sleep tracking: techno-ethical particularities of consumer-led sleep-tracking with a focus on medicalization, vulnerability, and relationality.Nadia Primc, Jonathan Hunger, Robert Ranisch, Eva Kuhn & Regina Müller - 2023 - Ethics and Information Technology 25 (1):1-12.
    Consumer-targeted sleep tracking applications (STA) that run on mobile devices (e.g., smartphones) promise to be useful tools for the individual user. Assisted by built-in and/or external sensors, these apps can analyze sleep data and generate assessment reports for the user on their sleep duration and quality. However, STA also raise ethical questions, for example, on the autonomy of the sleeping person, or potential effects on third parties. Nevertheless, a specific ethical analysis of the use of these technologies is still missing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Commercial mHealth Apps and Unjust Value Trade-offs: A Public Health Perspective.Leon W. S. Rossmaier - 2022 - Public Health Ethics 15 (3):277-288.
    Mobile health (mHealth) apps for self-monitoring increasingly gain relevance for public health. As a mobile technology, they promote individual participation in health monitoring with the aim of disease prevention and the mitigation of health risks. In this paper, I argue that users of mHealth apps must engage in value trade-offs concerning their fundamental dimensions of well-being when using mobile health apps for the self-monitoring of health parameters. I particularly focus on trade-offs regarding the user’s self-determination as well as their capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • (1 other version)Beneficent Intelligence: A Capability Approach to Modeling Benefit, Assistance, and Associated Moral Failures Through AI Systems.Alex John London & Hoda Heidari - 2024 - Minds and Machines 34 (4):1-37.
    The prevailing discourse around AI ethics lacks the language and formalism necessary to capture the diverse ethical concerns that emerge when AI systems interact with individuals. Drawing on Sen and Nussbaum’s capability approach, we present a framework formalizing a network of ethical concepts and entitlements necessary for AI systems to confer meaningful benefit or assistance to stakeholders. Such systems enhance stakeholders’ ability to advance their life plans and well-being while upholding their fundamental rights. We characterize two necessary conditions for morally (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Conceptualizations of user autonomy within the normative evaluation of dark patterns.Jyoti Kumar & Sanju Ahuja - 2022 - Ethics and Information Technology 24 (4):1-18.
    Dark patterns have received significant attention in literature as interface design practices which undermine users’ autonomy by coercing, misleading or manipulating their decision making and behavior. Individual autonomy has been argued to be one of the normative lenses for the evaluation of dark patterns. However, theoretical perspectives on autonomy have not been sufficiently adapted in literature to identify the ethical concerns raised by dark patterns. The aim of this paper is to conceptualize user autonomy within the context of dark patterns. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Capability Sensitive Design for Health and Wellbeing Technologies.Naomi Jacobs - 2020 - Science and Engineering Ethics 26 (6):3363-3391.
    This article presents the framework Capability Sensitive Design (CSD), which consists of merging the design methodology Value Sensitive Design (VSD) with Martha Nussbaum's capability theory. CSD aims to normatively assess technology design in general, and technology design for health and wellbeing in particular. Unique to CSD is its ability to account for human diversity and to counter (structural) injustices that manifest in technology design. The basic framework of CSD is demonstrated by applying it to the hypothetical design case of a (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations