Switch to: References

Add citations

You must login to add citations.
  1. Corporatised Identities ≠ Digital Identities: Algorithmic Filtering on Social Media and the Commercialisation of Presentations of Self.Charlie Harry Smith - 2020 - In Christopher Burr & Luciano Floridi (eds.), Ethics of digital well-being: a multidisciplinary approach. Springer.
    Goffman’s (1959) dramaturgical identity theory requires modification when theorising about presentations of self on social media. This chapter contributes to these efforts, refining a conception of digital identities by differentiating them from ‘corporatised identities’. Armed with this new distinction, I ultimately argue that social media platforms’ production of corporatised identities undermines their users’ autonomy and digital well-being. This follows from the disentanglement of several commonly conflated concepts. Firstly, I distinguish two kinds of presentation of self that I collectively refer to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Challenges of ethical and legal responsibilities when technologies' uses and users change: social networking sites, decision-making capacity and dementia. [REVIEW]Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne - 2012 - Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Alienation in a World of Data. Toward a Materialist Interpretation of Digital Information Technologies.Michael Steinmann - 2022 - Philosophy and Technology 35 (4):1-24.
    The essay proposes to use alienation as a heuristic and conceptual tool for the analysis of the impact of digital information and communication technologies (ICTs) on users. It follows a historical materialist understanding, according to which data can be considered as things produced in an industrial fashion. A representational interpretation, according to which data would merely reflect a given reality, is untenable. It will be argued instead to understand data as an additional layer which has a transformative impact on reality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Making Data Valuable: Political, Economic, and Conceptual Bases of Big Data.Anna Lauren Hoffmann - 2018 - Philosophy and Technology 31 (2):209-212.
    Download  
     
    Export citation  
     
    Bookmark  
  • From Ethical to Equitable Social Media Technologies: Amplifying Underrepresented Youth Voices in Digital Technology Design.Ioana Literat & Melissa Brough - 2019 - Journal of Media Ethics 34 (3):132-145.
    ABSTRACTAlthough youth of color, youth from lower socioeconomic brackets, and young women are among the heaviest users of social media technologies, their voices are almost entirely absent from cur...
    Download  
     
    Export citation  
     
    Bookmark  
  • Sovereignty, privacy, and ethics in blockchain-based identity management systems.Georgy Ishmaev - 2020 - Ethics and Information Technology 23 (3):239-252.
    Self-sovereign identity solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations