Switch to: References

Add citations

You must login to add citations.
  1. Interpretative Pros Hen Pluralism: from Computer-Mediated Colonization to a Pluralistic Intercultural Digital Ethics.Charles Melvin Ess - 2020 - Philosophy and Technology 33 (4):551-569.
    Intercultural Digital Ethics faces the central challenge of how to develop a global IDE that can endorse and defend some set of universal ethical norms, principles, frameworks, etc. alongside sustaining local, culturally variable identities, traditions, practices, norms, and so on. I explicate interpretive pros hen ethical pluralism ) emerging in the late 1990s and into the twenty-first century in response to this general problem and its correlates, including conflicts generated by “computer-mediated colonization” that imposed homogenous values, communication styles, and so (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Introduction.Charles Ess - 2002 - Ethics and Information Technology 4 (3):177-188.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Miranda Rights and Cyberspace Realities: Risks to "the Right to Remain Silent".William E. Berry - 2003 - Journal of Mass Media Ethics 18 (3-4):230-249.
    This article is a critical and interpretive examination of moral and ethical issues that have emerged as the Internet and other digital information forms have evolved. It considers individual expectations of privacy for one's cyberspace communications against the greater public good for unencumbered access, by government and other organizations, to information that may be harmful to others. I argue for the need to find a reasonable balance between the individual's "right" not to disclose information that might be self-incriminating, as codified (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Information ethics in the context of smart devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
    Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion of data protection and are central in the discussion. The telecommunications environment is profoundly changing. The traditionally closed markets with closed networks change into an open market with open networks. Within these open networks more privacy sensitive data are generated and have to be exchanged (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations