Switch to: References

Add citations

You must login to add citations.
  1. Informational privacy and its ontological interpretation.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (3):1.
    The article provides an outline of the ontological interpretation of informational privacy based on information ethics. It is part of a larger project of research, in which I have developed the foundations of ideas presented here and their consequences. As an outline, it is meant to be self-sufficient and to provide enough information to enable the reader to assess how the approach fares with respect to other alternatives. However, those interested in a more detailed analysis, and especially in the reasons (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Flourishing on facebook: virtue friendship & new social media.Shannon Vallor - 2012 - Ethics and Information Technology 14 (3):185-199.
    The widespread and growing use of new social media, especially social networking sites such as Facebook and Twitter, invites sustained ethical reflection on emerging forms of online friendship. Social scientists and psychologists are gathering a wealth of empirical data on these trends, yet philosophical analysis of their ethical implications remains comparatively impoverished. In particular, there have been few attempts to explore how traditional ethical theories might be brought to bear upon these developments, or what insights they might offer, if any. (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  • Can we trust robots?Mark Coeckelbergh - 2012 - Ethics and Information Technology 14 (1):53-60.
    Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is articulated, which provides a way of thinking about trust that puts less emphasis on individual choice and control than the contractarian-individualist approach. In addition, the argument is made that while robots are neither human (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Modelling Trust in Artificial Agents, A First Step Toward the Analysis of e-Trust.Mariarosaria Taddeo - 2010 - Minds and Machines 20 (2):243-257.
    This paper provides a new analysis of e - trust , trust occurring in digital contexts, among the artificial agents of a distributed artificial system. The analysis endorses a non-psychological approach and rests on a Kantian regulative ideal of a rational agent, able to choose the best option for itself, given a specific scenario and a goal to achieve. The paper first introduces e-trust describing its relevance for the contemporary society and then presents a new theoretical analysis of this phenomenon. (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Philosophy in the information age.Terrell Ward Bynum - 2010 - Metaphilosophy 41 (3):420-442.
    Abstract: In the past, major scientific and technological revolutions, like the Copernican Revolution and the Industrial Revolution, have had profound effects, not only upon society in general, but also upon Philosophy. Today's Information Revolution is no exception. Already it has had significant impacts upon our understanding of human nature, the nature of society, even the nature of the universe. Given these developments, this essay considers some of the philosophical contributions of two "philosophers of the Information Age"—Norbert Wiener and Luciano Floridi—with (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Why information ethics must begin with virtue ethics.Richard Volkman - 2010 - Metaphilosophy 41 (3):380-401.
    Abstract: The information ethics (IE) of Floridi and Sanders is evaluated here in the light of an alternative in virtue ethics that is antifoundationalist, particularist, and relativist in contrast to Floridi's foundationalist, impartialist, and universalist commitments. Drawing from disparate traditional sources like Aristotle, Nietzsche, and Emerson, as well as contemporary advocates of virtue ethics like Nussbaum, Foot, and Williams, the essay shows that the central contentions of IE, including especially the principle of ontological equality, must either express commitments grounded in (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The banality of simulated evil: Designing ethical gameplay. [REVIEW]Miguel Sicart - 2009 - Ethics and Information Technology 11 (3):191-202.
    This paper offers an analytical description of the ethics of game design and its influence in the ethical challenges computer games present. The paper proposes a set of game design suggestions based on the Information Ethics concept of Levels of Abstraction which can be applied to formalise ethical challenges into gameplay mechanics; thus allowing game designers to incorporate ethics as part of the experience of their games. The goal of this paper is twofold: to address some of the reasons why (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • The Syrian Electronic Army – a hacktivist group.Matthew Warren & Shona Leitch - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):200-212.
    Purpose The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations. Design/methodology/approach This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography research approach. Findings This paper determines that the Syrian Electronic Army is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A defence of informational structural realism.Luciano Floridi - 2008 - Synthese 161 (2):219-253.
    This is the revised version of an invited keynote lecture delivered at the "1st Australian Computing and Philosophy Conference". The paper is divided into two parts. The first part defends an informational approach to structural realism. It does so in three steps. First, it is shown that, within the debate about structural realism, epistemic and ontic structural realism are reconcilable. It follows that a version of OSR is defensible from a structuralist-friendly position. Second, it is argued that a version of (...)
    Download  
     
    Export citation  
     
    Bookmark   85 citations  
  • Trust and multi-agent systems: applying the diffuse, default model of trust to experiments involving artificial agents. [REVIEW]Jeff Buechner & Herman T. Tavani - 2011 - Ethics and Information Technology 13 (1):39-51.
    We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical model of trust based on Richard Holton’s interpretation of P. F. Strawson’s writings on freedom and resentment, and we show why this account of trust is difficult to extend to artificial agents (AAs) as well as to other non-human entities. (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Developing artificial agents worthy of trust: “Would you buy a used car from this artificial agent?”. [REVIEW]F. S. Grodzinsky, K. W. Miller & M. J. Wolf - 2011 - Ethics and Information Technology 13 (1):17-27.
    There is a growing literature on the concept of e-trust and on the feasibility and advisability of “trusting” artificial agents. In this paper we present an object-oriented model for thinking about trust in both face-to-face and digitally mediated environments. We review important recent contributions to this literature regarding e-trust in conjunction with presenting our model. We identify three important types of trust interactions and examine trust from the perspective of a software developer. Too often, the primary focus of research in (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Computer Ethics as a Field of Applied Ethics.Herman T. Tavani - 2012 - Journal of Information Ethics 21 (2):52-70.
    The present essay includes an overview of key milestones in the development of computer ethics as a field of applied ethics. It also describes the ongoing debate about the proper scope of CE, as a subfield both in applied ethics and computer science. Following a brief description of the cluster of ethical issues that CE scholars and practitioners have generally considered to be the standard or "mainstream" issues comprising the field thus far, the essay speculates about the future direction of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Network ethics: information and business ethics in a networked society.Luciano Floridi - 2009 - Journal of Business Ethics 90 (S4):649 - 659.
    This article brings together two research fields in applied ethics - namely, information ethics and business ethics- which deal with the ethical impact of information and communication technologies but that, so far, have remained largely independent. Its goal is to articulate and defend an informational approach to the conceptual foundation of business ethics, by using ideas and methods developed in information ethics, in view of the convergence of the two fields in an increasingly networked society.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Recent Developments in Computing and Philosophy.Anthony F. Beavers - 2011 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 42 (2):385-397.
    Because the label "computing and philosophy" can seem like an ad hoc attempt to tie computing to philosophy, it is important to explain why it is not, what it studies (or does) and how it differs from research in, say, "computing and history," or "computing and biology". The American Association for History and Computing is "dedicated to the reasonable and productive marriage of history and computer technology for teaching, researching and representing history through scholarship and public history" (http://theaahc.org). More pervasive, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Cyberethics and co-operation in the information society.Christian Fuchs, Robert M. Bichler & Celina Raffl - 2009 - Science and Engineering Ethics 15 (4):447-466.
    The task of this paper is to ground the notion of cyberethics of co-operation. The evolution of modern society has resulted in a shift from industrial society towards informational capitalism. This transformation is a multidimensional shift that affects all aspects of society. Hence also the ethical system of society is penetrated by the emergence of the knowledge society and ethical guidelines for the information age are needed. Ethical issues and conflicts in the knowledge society are connected to topics of ecological (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The categorical imperative and the ethics of trust.Bjørn K. Myskja - 2008 - Ethics and Information Technology 10 (4):213-220.
    Trust can be understood as a precondition for a well-functioning society or as a way to handle complexities of living in a risk society, but also as a fundamental aspect of human morality. Interactions on the Internet pose some new challenges to issues of trust, especially connected to disembodiedness. Mistrust may be an important obstacle to Internet use, which is problematic as the Internet becomes a significant arena for political, social and commercial activities necessary for full participation in a liberal (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • On the autonomy and justification of nanoethics.Fritz Allhoff - 2007 - NanoEthics 1 (3):185-210.
    In this paper, I take a critical stance on the emerging field of nanoethics. After an introductory section, “Conceptual Foundations of Nanotechnology” considers the conceptual foundations of nanotechnology, arguing that nanoethics can only be as coherent as nanotechnology itself and then discussing concerns with this latter concept; the conceptual foundations of nanoethics are then explicitly addressed in “Conceptual Foundations of Nanoethics”. “Issues in Nanoethics” considers ethical issues that will be raised through nanotechnology and, in “What’s New?”, it is argued that (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral responsibilities (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Semantic information and the correctness theory of truth.Luciano Floridi - 2011 - Erkenntnis 74 (2):147–175.
    Semantic information is usually supposed to satisfy the veridicality thesis: p qualifies as semantic information only if p is true. However, what it means for semantic information to be true is often left implicit, with correspondentist interpretations representing the most popular, default option. The article develops an alternative approach, namely a correctness theory of truth (CTT) for semantic information. This is meant as a contribution not only to the philosophy of information but also to the philosophical debate on the nature (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Information ethics: a reappraisal.Luciano Floridi - 2008 - Ethics and Information Technology 10 (2–3):189–204.
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Social networking technology and the virtues.Shannon Vallor - 2010 - Ethics and Information Technology 12 (2):157-170.
    This paper argues in favor of more widespread and systematic applications of a virtue-based normative framework to questions about the ethical impact of information technologies, and social networking technologies in particular. The first stage of the argument identifies several distinctive features of virtue ethics that make it uniquely suited to the domain of IT ethics, while remaining complementary to other normative approaches. I also note its potential to reconcile a number of significant methodological conflicts and debates in the existing literature, (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Trust and New Communication Technologies: Vicious Circles, Virtuous Circles, Possible Futures. [REVIEW]Charles M. Ess - 2010 - Knowledge, Technology & Policy 23 (3):287-305.
    I approach the philosophical analyses of the phenomenon of trust vis-à-vis online communication beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to the more directly philosophical analyses of trust online by first offering an introductory taxonomy of diverse accounts of trust that have emerged over the past decade or so. In the face of important objections to the possibility of establishing and (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Ethical issues in open source software.F. S. Grodzinsky, K. Miller & M. J. Wolf - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):193-205.
    In this essay we argue that the current social and ethical structure in the Open Source Software Community stem from its roots in academia. The individual developers experience a level of autonomy similar to that of a faculty member. Furthermore, we assert that the Open Source Software Community’s social structure demands benevolent leadership. We argue that it is difficult to pass off low quality open source software as high quality software and that the Open Source development model offers strong accountability. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • How shall i compare thee? Comparing the prudential value of actual virtual friendship.Johnny Hartz Søraker - 2012 - Ethics and Information Technology 14 (3):209-219.
    It has become commonplace to hold the view that virtual surrogates for the things that are good in life are inferior to their actual, authentic counterparts, including virtual education, virtual skill-demanding activities and virtual acts of creativity. Virtual friendship has also been argued to be inferior to traditional, embodied forms of friendship. Coupled with the view that virtual friendships threaten to replace actual ones, the conclusion is often made that we ought to concentrate our efforts on actual friendships rather than (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Casuistry and computer ethics.Kari Gwen Coleman - 2007 - Metaphilosophy 38 (4):471-488.
    At the heart of the uniqueness debate is the possibility that the computer revolution may demand more in the way of ethical analysis than our traditional (that is, modern) ethical edification has prepared us for. In short, it may present new and unique problems and therefore demand new and unique solutions. In this article I argue that the solution is in fact an old and not‐so‐unique one: casuistry. Appealing to Jonsen and Toulmin's analysis of casuistry (1988), I argue that a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • What does it mean to trust blockchain technology?Yan Teng - 2022 - Metaphilosophy 54 (1):145-160.
    This paper argues that the widespread belief that interactions between blockchains and their users are trust-free is inaccurate and misleading, since this belief not only overlooks the vital role played by trust in the lack of knowledge and control but also conceals the moral and normative relevance of relying on blockchain applications. The paper reaches this argument by providing a close philosophical examination of the concept referred to as trust in blockchain technology, clarifying the trustor group, the structure, and the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Trustworthy Nanotechnology: Risk, Engagement and Responsibility. [REVIEW]Bjørn K. Myskja - 2011 - NanoEthics 5 (1):49-56.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Naturaleza humana en perspectiva Biohermenéutica.Jesús Conill Sancho - 2015 - Pensamiento 71 (269):1249-1260.
    Me propongo mostrar que tanto la naturalización, ahora también en versión neurológica, como la tecnologización contemporáneas son fruto de interpretaciones que pretenden ofrecer una nueva imagen del hombre, por ejemplo, a través de fórmulas como la de «homo poieticus». Pero la cuestión decisiva es ver si a partir de estas nuevas imágenes se puede reconstruir la realidad personal, manteniendo las pretensiones expresadas mediante el valor de dignidad de la persona humana o quedan realmente sustituidas por otras que rebasan el sentido (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • What pluralism, why pluralism, and how? A response to Charles Ess.Kei Hiruta - 2006 - Ethics and Information Technology 8 (4):227-236.
    In this critical response to Charles Ess’ ‚Ethical Pluralism and Global Information Ethics’ presented in this Special Issue of Ethics and Information Technology, it is firstly argued that his account of pros hen pluralism can be more accurately reformulated as a three layered doctrine by separating one acceptance of diversity at a cultural level and another at an ethical theoretic level. Following this clarificatory section, the next section considers Ess’ political and sociological reasons for the necessity and desirability of pros (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Towards trustworthy blockchains: normative reflections on blockchain-enabled virtual institutions.Yan Teng - 2021 - Ethics and Information Technology 23 (3):385-397.
    This paper proposes a novel way to understand trust in blockchain technology by analogy with trust placed in institutions. In support of the analysis, a detailed investigation of institutional trust is provided, which is then used as the basis for understanding the nature and ethical limits of blockchain trust. Two interrelated arguments are presented. First, given blockchains’ capacity for being institution-like entities by inviting expectations similar to those invited by traditional institutions, blockchain trust is argued to be best conceptualized as (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Academic Integrity in the Information Age: Virtues of Respect and Responsibility.Tracy S. Manly, Lori N. K. Leonard & Cynthia K. Riemenschneider - 2015 - Journal of Business Ethics 127 (3):579-590.
    This study examines business students’ ethical awareness for two virtues needed to maintain academic integrity, respect, and responsibility. Using the multidimensional ethics survey, five dimensions were measured for six scenarios representing student behaviors using Information Technology . The results indicate that students are ethically aware in respect situations, but are more neutral in responsibility situations. Of the five ethical dimensions, moral equity and relativism appear to be the strongest influences in academic integrity scenarios utilizing IT. This study provides guidance for (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Information technologies and the tragedy of the good will.Luciano Floridi - 2006 - Ethics and Information Technology 8 (4):253–262.
    Information plays a major role in any moral action. ICT have revolutionized the life of information, from its production and management to its consumption, thus deeply affecting our moral lives. Amid the many issues they have raised, a very serious one, discussed in this paper, is labelled the tragedy of the Good Will. This is represented by the increasing pressure that ICT and their deluge of information are putting on any agent who would like to act morally, when informed about (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations