Switch to: References

Citations of:

What is computer ethics?

Metaphilosophy 16 (4):266-275 (1985)

Add citations

You must login to add citations.
  1. Ethics vs. IT Ethics: Do Undergraduate Students Perceive a Difference?Kathleen K. Molnar, Marilyn G. Kletke & Jongsawas Chongwatpol - 2008 - Journal of Business Ethics 83 (4):657-671.
    Do undergraduate students perceive that it is more acceptable to ‹cheat’ using information technology (IT) than it is to cheat without the use of IT? Do business discipline-related majors cheat more than non-business discipline-related majors? Do undergraduate students perceive it to be more acceptable for them personally to cheat than for others to cheat? Questionnaires were administered to undergraduate students at five geographical academic locations in the spring, 2006 and fall 2006 and spring, 2007. A total of 708 usable questionnaires (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • What is data ethics?Luciano Floridi & Mariarosaria Taddeo - 2016 - Philosophical Transactions of the Royal Society A 374 (2083):20160360.
    This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including AI, artificial agents, machine learning, and robots), and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data Ethics builds on the foundation provided by Computer and Information (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  • When Morals Ain’t Enough: Robots, Ethics, and the Rules of the Law.Ugo Pagallo - 2017 - Minds and Machines 27 (4):625-638.
    No single moral theory can instruct us as to whether and to what extent we are confronted with legal loopholes, e.g. whether or not new legal rules should be added to the system in the criminal law field. This question on the primary rules of the law appears crucial for today’s debate on roboethics and still, goes beyond the expertise of robo-ethicists. On the other hand, attention should be drawn to the secondary rules of the law: The unpredictability of robotic (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Robot ethics: Mapping the issues for a mechanized world.Patrick Lin, Keith Abney & George Bekey - 2011 - Artificial Intelligence 175 (5-6):942-949.
    As with other emerging technologies, advanced robotics brings with it new ethical and policy challenges. This paper will describe the flourishing role of robots in society—from security to sex—and survey the numerous ethical and social issues, which we locate in three broad categories: safety & errors, law & ethics, and social impact. We discuss many of these issues in greater detail in our forthcoming edited volume on robot ethics from MIT Press.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Anticipatory Ethics and Governance : Towards a Future Care Orientation Around Nanotechnology.Syed A. M. Tofail, Finbarr Murphy, Martin Mullins & Karena Hester - 2015 - NanoEthics 9 (2):123-136.
    Nanotechnology presents significant challenges in terms of developing a regulatory framework. This is due to a lack of scientific knowledge about the behaviour of the technology in its interactions with biological and ecological processes, the environment and other technologies. Crucially, there is a great deal of uncertainty surrounding the potential environmental and human health and safety impacts of NT. Consequently, the development of NT is a potential test case for framing new models of ‘soft law’ voluntary governance as a substitute (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Informed consent and the Facebook emotional manipulation study.Catherine Flick - 2016 - Research Ethics 12 (1):14-28.
    This article argues that the study conducted by Facebook in conjunction with Cornell University did not have sufficient ethical oversight, and neglected in particular to obtain necessary informed consent from the participants in the study. It establishes the importance of informed consent in Internet research ethics and suggests that in Facebook’s case (and other, similar cases), a reasonable shift could be made from traditional medical ethics ‘effective consent’ to a ‘waiver of normative expectations’, although this would require much-needed change to (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Does computing need to go beyond good and evil impacts?Randy Connolly & Alan Fedoruk - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):190-204.
    Purpose– This paper aims to demonstrate that computing social issues courses are often being taught by articulating the social impacts of different computer technologies and then applying moral theories to those impacts. It then argues that that approach has a number of serious drawbacks.Design/methodology/approach– A bibliometric analysis of ETHICOMP papers is carried out. Papers from early in the history of ETHICOMP are compared to recent years, so as to determine if papers are more or less focused on social scientific examinations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Slow Tech: a roadmap for a good, clean and fair ICT.Norberto Patrignani & Diane Whitehouse - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):268-282.
    Purpose– The purpose of this paper is to examine how Slow Tech can support the celebration of the 20-year series of ETHICOMP conferences, with its ethical and societal focus, building on earlier descriptions of Slow Tech. The paper takes Slow Tech’s ideas a step further to explore how a roadmap and concrete checklist of activities can be developed.Design/methodology/approach– The paper is a thought leadership or conceptual piece. Its approach is based on a normative, qualitative discourse. It, nevertheless, indicates a shift (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Computer ethics beyond mere compliance.Richard Volkman - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):176-189.
    If computer ethics is to constitute a real engagement with industry and society that cultivates a genuine sensitivity to ethical concerns in the creation, development, and implementation of technologies, a genuine sensitivity that stands in marked contrast to ethics as “mere compliance,” then computer ethics will have to consist in issuing an open invitation to inquiry, since going beyond mere compliance requires a sensitivity to the importance of what we care about, and inquiry has the potential to leverage what our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Slow Tech: a quest for good, clean and fair ICT.Norberto Patrignani & Diane Whitehouse - 2014 - Journal of Information, Communication and Ethics in Society 12 (2):78-92.
    Purpose– The purpose of this paper is to introduce the term Slow Tech as a way of describing information and communication technology that is good, clean and fair. These are technologies that are human centred, environmentally sustainable and socially desirable.Design/methodology/approach– The paper's approach is based on a qualitative discourse that justifies the introduction of Slow Tech as a new design paradigm.Findings– The limits of the human body, and the need to take into account human wellbeing, the limits of the planet (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • The ethics of big data: current and foreseeable issues in biomedical contexts.Brent Daniel Mittelstadt & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (2):303–341.
    The capacity to collect and analyse data is growing exponentially. Referred to as ‘Big Data’, this scientific, social and technological trend has helped create destabilising amounts of information, which can challenge accepted social and ethical norms. Big Data remains a fuzzy idea, emerging across social, scientific, and business contexts sometimes seemingly related only by the gigantic size of the datasets being considered. As is often the case with the cutting edge of scientific and technological progress, understanding of the ethical implications (...)
    Download  
     
    Export citation  
     
    Bookmark   88 citations  
  • Understanding the relevance of ethics reviews of ICT research in UK computing departments using dialectical hermeneutics.Damian Okaibedi Eke, Bernd Carsten Stahl & Christine Fidler - 2015 - Journal of Information, Communication and Ethics in Society 13 (1):28-38.
    Purpose– The purpose of this paper is to attempt to investigate how Information and Communications Technology researchers in UK computing departments address ethics in their research. Whilst research and innovation in ICT has blossomed in the last two decades, the ethical, social and legal challenges they present have also increased. However, the increasing attention the technical development receives has not been replicated in the area of developing effective guidelines that can address the moral issues inherent in ICT research.Design/methodology/approach– This research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  • Proceedings of the WWW2012 conference workshop PhiloWeb 2012: "Web and Philosophy, Why and What For?".Alexandre Monnin, Harry Halpin & Carr Leslie - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  • Levels of Trust in the Context of Machine Ethics.Herman T. Tavani - 2015 - Philosophy and Technology 28 (1):75-90.
    Are trust relationships involving humans and artificial agents possible? This controversial question has become a hotly debated topic in the emerging field of machine ethics. Employing a model of trust advanced by Buechner and Tavani :39–51, 2011), I argue that the “short answer” to this question is yes. However, I also argue that a more complete and nuanced answer will require us to articulate the various levels of trust that are also possible in environments comprising both human agents and AAs. (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The future of computer ethics 12 years after: in memory of Alessandro D'Atri.Antonio Marturano - 2012 - Journal of Information, Communication and Ethics in Society 10 (3):124-130.
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical assessment of new technologies: a meta‐methodology.Ian Harris, Richard C. Jennings, David Pullinger, Simon Rogerson & Penny Duquenoy - 2011 - Journal of Information, Communication and Ethics in Society 9 (1):49-64.
    The purpose of this paper is to set out a structured meta‐methodology, named DIODE, for the ethical assessment of new and emerging technologies. DIODE has been designed by a mixture of academics, governmental people and commercial practitioners. It is designed to help diverse organisations and individuals conduct ethical assessments of new and emerging technologies. A framework discussion paper was developed for consultation to ensure that DIODE addresses fundamental ethical concerns, has appropriate and manageable scope and is comprehensive in its ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The counter‐control revolution: “silent control” of individuals through dataveillance systems.Yohko Orito - 2011 - Journal of Information, Communication and Ethics in Society 9 (1):5-19.
    PurposeThe purpose of this paper is to examine the social impacts of “silent control” of individuals by means of the architecture of dataveillance systems. It addresses the question whether individuals, in reality, can actually determine autonomously the kinds of information that they can acquire and convey in today's dataveillance environments. The paper argues that there is a risk of a “counter‐control revolution” that may threaten to reverse the “control revolution” described by Shapiro.Design/methodology/approachUsing relevant business cases, this paper describes the nature (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The portable panopticon: morality and mobile technologies.Martin De Saulles & David S. Horner - 2011 - Journal of Information, Communication and Ethics in Society 9 (3):206-216.
    PurposeThe purpose of this paper is to explore ethical issues arising from the mass deployment and take‐up of mobile technologies.Design/methodology/approachThe ethical dimensions of mobile technologies and their use among the general population are considered within a conceptual framework drawing on James Moor's belief in a need for “better ethics” for emerging technologies and Michel Foucault's development of Jeremy Bentham's panopticon as a tool of surveillance.FindingsIt is found that the mass deployment and use of mobile technologies amongst the general population raise (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Ethical challenges to citizens of ‘The automatic Age’: Norbert Wiener on the information society.Terrell Ward Bynum - 2004 - Journal of Information, Communication and Ethics in Society 2 (2):65-74.
    This article discusses the foresight of philosopher/mathematician Norbert Wiener who, in the 1940s, founded Information Ethics as a research discipline. Wiener envisioned the coming of an “automatic age” in which information technology would have profound social and ethical impacts upon the world. He predicted, for example, machines that will learn, reason and play games; “automatic factories” that will replace assembly‐line workers and middle managers with computerized devices; workers who will perform their jobs over great distances with the aid of new (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Bringing oversight review in line with online research.Stephen Lilley - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):235-246.
    The purpose of an oversight structure or institution is to protect human subjects from research that would pose unacceptable dangers or deny human rights. Review boards provide an independent assessment of research proposals. This additional level of scrutiny is meant to provide an additional level of protection for human subjects. However, oversight of human subject research, as currently carried out in the bureaucratic, rule‐based, clinically‐biased American system, is too cumbersome with regard to online research. In addition, it is not conducive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Societral perspective on e‐business adoption.Athanasia Pouloudi, Xenia Ziouvelou & Konstantina Vassilopoulou - 2003 - Journal of Information, Communication and Ethics in Society 1 (3):149-166.
    A large amount of research work in e‐business concerns the experiences and lessons learned from developing and implementing innovative e‐business models. The findings of this research usually concentrate on financial aspects or on the use of information and communication technologies in a specific company or industrial sector. While this is critical for understanding and replicating positive business results, we argue that it is as important to understand the societal context in which business models are developed; it is social issues that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Customer relationship management information systems (CRM‐IS) and the realisation of moral agency.Christopher Bull & Alison Adam - 2010 - Journal of Information, Communication and Ethics in Society 8 (2):164-177.
    PurposeThe purpose of this paper is to examine how the design of characteristics and use of practices incorporated in customer relationship management information systems (CRM‐IS) impact on the expression and realisation of moral agency within organisations.Design/methodology/approachThe paper draws on the findings from an in‐depth UK case study of a CRM‐IS implementation.FindingsThe paper finds that some characteristics and practices within CRM‐IS can restrict the expression and realisation of moral agency in organisational life, resulting in a number of problems. For a greater (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Computer ethics for the computer professional from an Islamic point of view.Mansoor Al-A'ali - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):28-45.
    PurposeThe purpose of this paper is to study the ethical behaviour of Muslim IT professionals in an attempt to stop many unethical practices such as software piracy, software intellectual property violations and general software development.Design/methodology/approachThis study examines the computer ethical principles presented in the Association for Computing Machinery code of conduct from an Islamic point of view through studying some relevant verses of The Holy Quran and Hadiths of Prophet Mohammed. An evaluation of the benefits of this newly proposed Islamic (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • ICT and the tension between old and new: the human factor.Krystyna Górniak-Kocikowska - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):4-27.
    PurposeThe purpose of this paper is to deepen the understanding of tensions between old and new in the emerging global society driven by information and communication technology ; and to argue that creation of a theory of this society would contribute in the easing of these tensions.Design/methodology/approachThe methods used in this paper are mostly analytical, descriptive, and qualitative. An analysis of the creation and development of ICT from a mathematical discipline of computer science to a universal tool and a driving (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics, technology development and uncertainty: an outline for any future ethics of technology.Paul Sollie - 2007 - Journal of Information, Communication and Ethics in Society 5 (4):293-306.
    PurposeThis conceptual paper aims to examine theoretical issues in the proactive ethical assessment of technology development, with a focus on uncertainty. Although uncertainty is a fundamental feature of complex technologies, its importance has not yet been fully recognized within the field of ethics. Hence, the purpose of this paper is to study uncertainty in technology development and its consequences for ethics.Design/methodology/approachGoing on the insight of various scientific disciplines, the concept of uncertainty will be scrutinised and a typology of uncertainty is (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Computer Ethics and Neoplatonic Virtue.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (1):1-11.
    In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves deontological and utilitarian ethics as appropriate to computer ethics, while classical theories of ethics, such as virtue ethics, are usually neglected as anachronistic and unsuitable to the information era and ICT industry. During past decades, an Aristotelian form of virtue ethics has been revived (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Significance of Network Ethics Education in Japanese Universities.Tetsu Ueno & Yasushi Maruyama - 2011 - International Journal of Cyber Ethics in Education 1 (3):50-58.
    Cell phone abuse amongst Japanese school students, including sex crimes and bullying, are commonly managed with filters and phone bans. Many believe these measures are more effective than moral education. Japanese teenagers therefore enter college without moral education in the Internet society, which can cause problems on campus: students plagiarizing from the Internet, or posting anonymous defamatory messages on bulletin boards. Japanese universities address these problems ineffectively. Problems are caused by both student ignorance of network ethics and moral immatureness. Therefore, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The joy of sharing knowledge: But what if there is no knowledge to share? A critical reflection on human capacity building in Africa.Johannes J. Britz - 2007 - International Review of Information Ethics 7:18-28.
    This article focuses on the current trends and initiatives in human capacity building in Africa. It takes as it starting point that human capacity development is essential for Africa to become an information and know-ledge society and therefore an equal partner in the global sharing of knowledge. Four knowledge areas are identified and discussed. These are education, research and development, brain drain and information and documentation drain. The paper concludes that there is a clear understanding in Africa that its future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Cybernetic Pluralism in an Emerging Global Information and Computing Ethics.Charles Ess - 2007 - International Review of Information Ethics 7:09.
    I trace the development of an emerging global Information and Computing Ethics , arguing that ethical pluralism – as found in both Western and Asian traditions – is crucial to such an ICE. In particular, ethical pluralism – as affiliated with notions of judgment , reson-ance, and harmony – holds together shared ethical norms alongside the irreducible differences that define individual and cultural identities. I demonstrate how such pluralism is already at work in both contemporary theory and praxis, including in (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Robots: ethical by design.Gordana Dodig Crnkovic & Baran Çürüklü - 2012 - Ethics and Information Technology 14 (1):61-71.
    Among ethicists and engineers within robotics there is an ongoing discussion as to whether ethical robots are possible or even desirable. We answer both of these questions in the positive, based on an extensive literature study of existing arguments. Our contribution consists in bringing together and reinterpreting pieces of information from a variety of sources. One of the conclusions drawn is that artifactual morality must come in degrees and depend on the level of agency, autonomy and intelligence of the machine. (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Unique ethical problems in information technology.Professor Walter Maner - 1996 - Science and Engineering Ethics 2 (2):137-154.
    A distinction is made between moral indoctrination and instruction in ethics. It is argued that the legitimate and important field of computer ethics should not be permitted to become mere moral indoctrination. Computer ethics is an academic field in its own right with unique ethical issues that would not have existed if computer technology had not been invented. Several example issues are presented to illustrate this point. The failure to find satisfactory non-computer analogies testifies to the uniqueness of computer ethics. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design. [REVIEW]Francien Dechesne, Martijn Warnier & Jeroen van den Hoven - 2013 - Ethics and Information Technology 15 (3):173-181.
    Information technology is widely used to fulfill societal goals such as safety and security. These application areas put ever changing demands on the functionality of the technology. Designing technological appliances to be reconfigurable, thereby keeping them open to functionalities yet to be determined, will possibly allow the technology to fulfill these changing demands in an efficient way. In this paper we present a first exploration of potential societal and moral issues of reconfigurable sensors developed for application in the safety and (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Unauthorized copying of software: an empirical study of reasons for and against.Mikko T. Siponen & Tero Vartiainen - 2007 - Acm Sigcas Computers and Society 37 (1):30-43.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Togetherness and respect: ethical concerns of privacy in Global Web Societies.Gordana Dodig-Crnkovic & Virginia Horniak - 2006 - AI and Society 20 (3):372-383.
    Today’s computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated internet-based attacks are almost impossible to prevent. At the same time, information and communication technology, ICT offers the technical possibility of embedded privacy protection. Making technology legitimate by design is a part of the intentional design for democracy. This means incorporating options for socially acceptable behaviour in technical systems, and making the basic principles of privacy protection, rights and responsibilities, transparent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Investigations into Information Semantics and Ethics of Computing.Gordana Dodig-Crnkovic - 2005 - Dissertation, Mälardalen
    The recent development of the research field of Computing and Philosophy has triggered investigations into the theoretical foundations of computing and information. This thesis consists of two parts which are the result of studies in two areas of Philosophy of Computing and Philosophy of Information regarding the production of meaning and the value system with applications. The first part develops a unified dual-aspect theory of information and computation, in which information is characterized as structure, and computation is the information dynamics. (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Ethical Blowback from Emerging Technologies.Patrick Lin - 2010 - Journal of Military Ethics 9 (4):313-331.
    The military is a major driver of technological, world-changing innovations which, like the Internet, often have unpredictable dual uses and widespread civilian impact (?blowback?). Ethical and policy concerns arising from such technologies, therefore, are not limited to military affairs, but can have great implications for society at large as well. This paper will focus on two technology areas making headlines at present: human enhancement technologies and robotics, representing both biological and technological upgrades to the military. The concerns we will raise (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Virtual decisions: video game ethics, Just Consequentialism, and ethics on the fly.Don Gotterbarn & James Moor - 2009 - Acm Sigcas Computers and Society 39 (3):27-42.
    Video games are ethically controversial. Some video games are effective training tools for learning various skills and approaches to problem-solving, but some video games are notorious for promoting discriminatory and barbaric behavior. We consider such ethical pros and cons of video games, but we also present a more fundamental ethical issue about video games. Most video games have a bias toward self-centered decision-making. Often the decision-making driver is not the impact of the decision on society but rather the quantity of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A justification for software rights.Mikko Siponen - 2006 - Acm Sigcas Computers and Society 36 (3):11-20.
    It has been debated whether unauthorized copying of computer software is morally justified and whether developers or software companies can own software and require users to pay for its use. Four views in favour of unauthorized copying of software can be distinguished: 'free software', the landlord analogy, the 'non-exclusiveness argument' and 'it is justified to copy a program that we would never buy'. Considerations regarding these issues can be retraced to the three foundations of rights: inherited rights that are already (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Internet, ethical values, and conceptual frameworks: an introduction to Cyberethics.Richard A. Spinello & Herman T. Tavani - 2001 - Acm Sigcas Computers and Society 31 (2):5-7.
    What exactly is Cyberethics? How did the field develop? What are some of the central issues and themes in this field, and what methodologies are used by those working in this area of applied ethics? These and related questions are considered in the readings included in Chapter 1. It is perhaps important to note at the outset that the field that many are now beginning to refer to as "cyberethics" has until quite recently been referred to by the more general (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Disclosive computer ethics.Philip Brey - 2000 - Acm Sigcas Computers and Society 30 (4):10-16.
    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a (...)
    Download  
     
    Export citation  
     
    Bookmark   44 citations  
  • Computer ethics textbooks: a thirty-year retrospective.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (3):26-31.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Information and Computer Ethics.Richard A. Spinello - 2012 - Journal of Information Ethics 21 (2):17-32.
    This paper reviews the intriguing history of information and computer ethics. Information ethics began as a branch of applied ethics concerned with the responsible management of information resources, while computer ethics was originally concerned with the training of computer professionals. Thanks to the Internet and the Web, these two fields merged together as access and communications issues became more prominent. In more recent years, responding to the ongoing debate about this discipline's structural foundations, philosophers like Floridi have given information ethics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Computer Ethics as a Field of Applied Ethics.Herman T. Tavani - 2012 - Journal of Information Ethics 21 (2):52-70.
    The present essay includes an overview of key milestones in the development of computer ethics as a field of applied ethics. It also describes the ongoing debate about the proper scope of CE, as a subfield both in applied ethics and computer science. Following a brief description of the cluster of ethical issues that CE scholars and practitioners have generally considered to be the standard or "mainstream" issues comprising the field thus far, the essay speculates about the future direction of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Gandhigiri in cyberspace: a novel approach to information ethics.Vaibhav Garg & L. Jean Camp - 2012 - Acm Sigcas Computers and Society 42 (1):9-20.
    The interpretation of the terms 'information' and 'ethics' is often culturally situated. A common understanding is contingent to facilitating dialogue concerning the novel ethical issues we face during computer-mediated interactions. Developing a nuanced understanding of information ethics is critical at a point when the number of information and communication technology -enabled interactions may soon exceed traditional human interactions. Utilitarianism and deontology, the two major schools of ethics are based in a western perspective. We contribute to the existing discourse on information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Skepticism and Information.Eric T. Kerr & Duncan Pritchard - 2012 - In Hilmi Demir (ed.), Philosophy of Engineering and Technology Volume 8. Springer.
    Philosophers of information, according to Luciano Floridi (The philosophy of information. Oxford University Press, Oxford, 2010, p 32), study how information should be “adequately created, processed, managed, and used.” A small number of epistemologists have employed the concept of information as a cornerstone of their theoretical framework. How this concept can be used to make sense of seemingly intractable epistemological problems, however, has not been widely explored. This paper examines Fred Dretske’s information-based epistemology, in particular his response to radical epistemological (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Network ethics: information and business ethics in a networked society.Luciano Floridi - 2009 - Journal of Business Ethics 90 (S4):649 - 659.
    This article brings together two research fields in applied ethics - namely, information ethics and business ethics- which deal with the ethical impact of information and communication technologies but that, so far, have remained largely independent. Its goal is to articulate and defend an informational approach to the conceptual foundation of business ethics, by using ideas and methods developed in information ethics, in view of the convergence of the two fields in an increasingly networked society.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • What Is the Model of Trust for Multi-agent Systems? Whether or Not E-Trust Applies to Autonomous Agents.Massimo Durante - 2010 - Knowledge, Technology & Policy 23 (3):347-366.
    A socio-cognitive approach to trust can help us envisage a notion of networked trust for multi-agent systems (MAS) based on different interacting agents. In this framework, the issue is to evaluate whether or not a socio-cognitive analysis of trust can apply to the interactions between human and autonomous agents. Two main arguments support two alternative hypothesis; one suggests that only reliance applies to artificial agents, because predictability of agents’ digital interaction is viewed as an absolute value and human relation is (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • (1 other version)Virtual Worlds and Their Challenge to Philosophy: Understanding the “Intravirtual” and the “Extravirtual”.Johnny Hartz Søraker - 2012 - Metaphilosophy 43 (4):499-512.
    The Web, in particular real-time interactions in three-dimensional virtual environments (virtual worlds), comes with a set of unique characteristics that leave our traditional frameworks inapplicable. The present article illustrates this by arguing that the notion of “technology relations,” as put forward by Ihde and Verbeek, becomes inapplicable when it comes to the Internet, and this inapplicability shows why these phenomena require new philosophical frameworks. Against this background, and more constructively, the article proposes a fundamental distinction between “intravirtual” and “extravirtual” consequences—a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Information technology and moral values.John Sullins - forthcoming - Stanford Encyclopedia of Philosophy.
    A encyclopedia entry on the moral impacts that happen when information technologies are used to record, communicate and organize information. including the moral challenges of information technology, specific moral and cultural challenges such as online games, virtual worlds, malware, the technology transparency paradox, ethical issues in AI and robotics, and the acceleration of change in technologies. It concludes with a look at information technology as a model for moral change, moral systems and moral agents.
    Download  
     
    Export citation  
     
    Bookmark   7 citations