Switch to: References

Citations of:

In the age of the smart machine

In Craig Hanks (ed.), Technology and values: essential readings. Malden, MA: Wiley-Blackwell (2010)

Add citations

You must login to add citations.
  1. The Ethical Implications of Artificial Intelligence (AI) For Meaningful Work.Sarah Bankins & Paul Formosa - 2023 - Journal of Business Ethics (4):1-16.
    The increasing workplace use of artificially intelligent (AI) technologies has implications for the experience of meaningful human work. Meaningful work refers to the perception that one’s work has worth, significance, or a higher purpose. The development and organisational deployment of AI is accelerating, but the ways in which this will support or diminish opportunities for meaningful work and the ethical implications of these changes remain under-explored. This conceptual paper is positioned at the intersection of the meaningful work and ethical AI (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Thought, Sign and Machine - the Idea of the Computer Reconsidered.Niels Ole Finnemann - 1999 - Copenhagen: Danish Original: Akademisk Forlag 1994. Tanke, Sprog og Maskine..
    Throughout what is now the more than 50-year history of the computer many theories have been advanced regarding the contribution this machine would make to changes both in the structure of society and in ways of thinking. Like other theories regarding the future, these should also be taken with a pinch of salt. The history of the development of computer technology contains many predictions which have failed to come true and many applications that have not been foreseen. While we must (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The hierarchical abuse of power in work organizations.Donald Vredenburgh & Yael Brender - 1998 - Journal of Business Ethics 17 (12):1337-1347.
    Although much theoretical and empirical research has examined organizational power, virtually none has addressed the hierarchical abuse of power in organizations. Managers' incentives and discretion and subordinates' dependencies define the abuse of power as an important organizational issue. This paper offers a conceptualization and process model to help further theoretical and applied understanding, and it considers the ethical nature of power abuse. Two dimensions, disrespect for individual dignity and interference with job performance or deserved rewards, conceptualize the interpersonal abuse of (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation.Simeon de Brouwer - 2020 - Internet Policy Review 9 (4).
    This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service includes not just the provision of the user’s own personal data, but also that of others. This term, related to similar concepts from the literature on privacy such as ‘networked privacy’ or ‘data pollution’, is used here to bring to light the incentives and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Technological Dramas.Bryan Pfaffenberger - 1992 - Science, Technology and Human Values 17 (3):282-312.
    This article examines the technological construction of political power, as well as resistance to political power, by means of an "ideal-typical" model called a technolog ical drama. In technological regularization, a design constituency creates artifacts whose features reveal an intention to shape the distribution of wealth, power, or status in society. The design constituency also creates myths, social contexts, and rituals to legitimate its intention and constitute the artifact's political impact. In reply, the people adversely affected by regularization engage in (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • The Computer and Education: Choosing the Least Powerful Means of Instruction.Richard Stivers - 1999 - Bulletin of Science, Technology and Society 19 (2):99-104.
    The computer is a threat to the intellectual and moral education of students. It reduces words to their most abstract meaning, thereby objectifying meaning. Moreover, the computer promotes logical thought at the expense of dialectical thinking. The computer is behind the proliferation of random information, all of which is at the disposal of the individual user. This fosters a cynical worldview that information is random and exists to be exploited. Finally, the computer turns us into consumers of information that fragments (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Engineering perspectives and technology design in the United States.Harold Salzman - 1991 - AI and Society 5 (4):339-356.
    Technology design has social as well as technical determinants. These social factors, such as the political context and social philosophy, vary historically and cross-nationally. The work upon which this paper is based addresses the nature of process technology design in the United States and focuses on the underlying assumptions that guide technology design, based on both historical analysis and survey and case studies of current design practices. Central to this work is an analysis of how the US approaches compare to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Expertise, Automation and Trust in X-Ray Screening of Cabin Baggage.Alain Chavaillaz, Adrian Schwaninger, Stefan Michel & Juergen Sauer - 2019 - Frontiers in Psychology 10.
    Download  
     
    Export citation  
     
    Bookmark  
  • Some Problems with Employee Monitoring.Kirsten Martin & R. Edward Freeman - 2003 - Journal of Business Ethics 43 (4):353-361.
    Employee monitoring has raised concerns from all areas of society – business organizations, employee interest groups, privacy advocates, civil libertarians, lawyers, professional ethicists, and every combination possible. Each advocate has its own rationale for or against employee monitoring whether it be economic, legal, or ethical. However, no matter what the form of reasoning, seven key arguments emerge from the pool of analysis. These arguments have been used equally from all sides of the debate. The purpose of this paper is to (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
    The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Worker autonomy and the drama of digital networks in organizations.Philip Brey - 1999 - Journal of Business Ethics 22 (1):15 - 25.
    This essay considers the impact of digital networks in organizations on worker autonomy. Worker autonomy, the control that workers have over their own work situation, is claimed in this essay to be a key determinant for the quality of work, as well as an important moral goal. Digital networks pose significant threats to worker autonomy as well as opportunities for its enhancement. In this essay, the notion of worker autonomy is analyzed and evaluated for its importance and moral relevance. It (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Information Inflation.Jasper Doomen - 2009 - Journal of Information Ethics 18 (2):27-37.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • (1 other version)‘Flexible Control’: Towards a conception of personal autonomy for postmodern education.Roni Aviram & Yossi Yonah - 2004 - Educational Philosophy and Theory 36 (1):3–17.
    (2004). ‘Flexible Control’: Towards a conception of personal autonomy for postmodern education. Educational Philosophy and Theory: Vol. 36, No. 1, pp. 3-17.
    Download  
     
    Export citation  
     
    Bookmark  
  • Personalizing One's Technological Environment by Communicating with Machines.Daniel Levi - 1998 - Bulletin of Science, Technology and Society 18 (5):345-351.
    How do people adapt to technology? This study examines one mechanism people may be using to personalize technology—talking to machines. Communicating to machines is similar to other forms of personalization and can be explained using attribution theory. Characteristics of machines (such as relationship to emotions, predictability, and familiarity) may affect people's willingness to communicate. A survey study that examined people's communication to machines showed that people do communicate to some machines, and hypotheses about the characteristics of machines were supported. A (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • An Ethical Perspective on Emerging Forms of Ubiquitous IT-Based Control.Aurélie Leclercq-Vandelannoitte - 2017 - Journal of Business Ethics 142 (1):139-154.
    The goal of this paper is to investigate the ethical implications of emerging forms of control that have developed along with the use of ubiquitous information technology. Because it can be exerted at a distance, almost anytime and anywhere, IT-based control has become more subtle, indirect, and almost invisible, with many negative side effects. Yet the issues raised by this new form of control have rarely been interpreted, treated, and framed as ethical issues in business ethics literature. Thus, a more (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Ontological security, existential anxiety and workplace privacy.William S. Brown - 2000 - Journal of Business Ethics 23 (1):61 - 65.
    The relationship of workers to management has traditionally been one of control. However, the introduction of increasingly sophisticated technology as a means of supervision in the modern workplace has dramatically altered the contours of this relationship, giving workers much less privacy and making workers much more visible than previously possible. The purpose of this paper is to examine the current state of technological control of workers and how it has altered the relationship of worker to organization, through the impact upon (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Cyberstalking and internet pornography: Gender and the gaze. [REVIEW]Alison Adam - 2002 - Ethics and Information Technology 4 (2):133-142.
    This paper is based on the premise that the analysis of some cyberethics problems would benefit from a feminist treatment. It is argued that both cyberstalking and Internet child pornography are two such areas which have a `gendered' aspect which has rarely been explored in the literature. Against a wide ranging feminist literature of potential relevance, the paper explores a number of cases through a focused approach which weaves together feminist concepts of privacy and the gaze.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Labor process theory vs. reform in the workplace.Roy B. Helfgott - 1992 - Critical Review: A Journal of Politics and Society 6 (1):11-27.
    Critics of the organization of industrial work under capitalism have ranged from the “human relations” school to socio‐technical systems theorists and, most vociferously, to advocates of labor process theory (LPT). Their practical influence on management was small as long as production was rolling on and profits rolling in. When competition intensified, however, employers started to question old ideas and, abetted by the needs of new computerized technology, began to broaden jobs, allow workers greater discretion in their performance and involve them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Mobility as involvement: on the role of involvement in the design of mobile support systems for industrial application. [REVIEW]Daniel Fallman - 2010 - AI and Society 25 (1):43-52.
    In this article, the concept of mobility is examined theoretically, from a phenomenological perspective, as well as empirically, through two design case studies. First, a background to how the notion of mobility is generally conceptualized and used in academia as well as within industry is provided. From a phenomenological analysis, it becomes necessary to question the currently dominating understanding of mobility as first and foremost a provider of freedom from a number of constraints. Rather, it is argued, mobility needs to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Validating Teacher Performativity through Lifelong School-University Collaboration.Theodore Lewis - 2013 - Educational Philosophy and Theory 45 (10):1028-1039.
    The main point of this article is that more credence should be given in teacher education to performative dimensions of teaching. I agree with David Carr that the requisite capabilities are probably best learned in actual schools. I employ Turnbull’s conception of performativity, which speaks of tacit cultural learning. Following Wilfred Carr I go back to Aristotle, and to debate between Gadamer and Habermas, before arriving at the view that expert teaching practice should be in the spirit of phronesis. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Collaborative information environments to support knowledge construction by communities.Gerry Stahl - 2000 - AI and Society 14 (1):71-97.
    Computer-based design environments for skilled domain workers have recently graduated from research prototypes to commercial products, supporting the learning of individual designers. Such systems do not, however, adequately support the collaborative nature of work or the evolution of knowledge within communities of practice. If innovation is to be supported within collaborative efforts, thesedomain-oriented design environments (DODEs) must be extended to becomecollaborative information environments (CIEs), capable of providing effective community memories for managing information and learning within constantly evolving collaborative contexts. In (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Cockpit cognition: Education, the military and cognitive engineering. [REVIEW]Douglas D. Noble - 1989 - AI and Society 3 (4):271-296.
    The goals of public education, as well as conceptions of human intelligence and learning, are undergoing a transformation through the application of military-sponsored information technologies and information processing models of human thought. Recent emphases in education on thinking skills, learning strategies, and computer-based technologies are the latest episodes in the postwar military agenda to engineer intelligent components, human and artificial, for the optimal performance of complex technological systems. Public education serves increasingly as a “human factors” laboratory and production site for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Technology, workplace privacy and personhood.William S. Brown - 1996 - Journal of Business Ethics 15 (11):1237 - 1248.
    This paper traces the intellectual development of the workplace privacy construct in the course of American thinking. The role of technological development in this process is examined, particularly in regard to the information gathering/dissemination dilemmas faced by employers and employees alike. The paper concludes with some preliminary considerations toward a theory of workplace privacy.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • What are knowledge engineers for?Richard Ennals - 1991 - AI and Society 5 (2):171-173.
    Download  
     
    Export citation  
     
    Bookmark  
  • Technology and Masculinity: The Case of the Computer.Merete Lie - 1995 - European Journal of Women's Studies 2 (3):379-394.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Cultural visions of technology.Lauge Baungaard Rasmussen - 2013 - AI and Society 28 (2):177-188.
    The essential premise of the human-centered technology paradigm was clearly formulated by Howard Rosenbrock in the 1970s: technology should enrich rather than impoverish people’s work and life conditions. The increasing influence of technology in modern societies has been seen by some as offering great promise for the future, but by others as creating the electronic surveillance and/or manipulation of human genes, minds and beliefs. This paper approaches technological worlds as cultural visions in order to discuss and reflect the paradoxical process (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)Modernity and the Upgrading of Psychological Reflectivity.Arne Poulsen - 1995 - Journal of Phenomenological Psychology 26 (2):1-20.
    The societal dynamism of modernity results in the theoretical upgrading and the actual development of personal reflective capacities, for example abstract reasoning, Kantian morality, and the development of the idiocentered perspective. These capacities are created in the disembedding of prereflective capacities, for example context-sensitive intelligence, care-morality, and mundocenteredness. The reflective capacities become the prerequisite of further modernization. The development-potential offered by the demands of modernity is accompanied by a risk of assimilative stress, for example pseudological reasoning, varieties of postmodernism, making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Hybrid Agency in Co-Configuration Work.Jaakko Virkkunen - 2006 - Outlines. Critical Practice Studies 8 (1):61-75.
    This article maintains that a new wave in the development of the productive forces of society triggered by the revolution in information and communication technologies is taking place. Production carried out by single organizations is increasingly replaced by forms of production that are based on close long-term collaboration between specialized firms. This transition reflects the increasing importance of research and development as well as collective learning in business competition. New information and communication technologies enable new forms of distributed and collaborative (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Women's voice: The case of nursing information systems. [REVIEW]Ina Wagner - 1993 - AI and Society 7 (4):295-310.
    This paper looks at the cultural transformation of nursing. It argues that introducing computers in a female occupation is not simply a case of imposing ‘male’ technology on ‘female’ care-oriented practices and values. In order to understand current changes of nursing practice, three points of view have to be simultaneously kept in focus: 1) the differences between women's interests and ambitions; 2) the readings of a technology that have already been established through previous examples of design and use (in hospitals (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • What are experts for?Marianne LaFrance - 1991 - AI and Society 5 (2):161-171.
    Knowledge engineering is the term given to the process of developing expert systems and knowledge engineers are the people who acquire the requisite knowledge from experts and structure that knowledge into a useable computer program. As knowledge engineering becomes a more accepted technology, there is increasing concern about attendant social costs, such as job displacement or possible exploitation of experts. This paper reports on our efforts to explore this latter issue by scrutinizing how knowledge engineers think about the domain expert (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Children, Guns and Technological Determinism.Leon E. Trachtman - 1994 - Bulletin of Science, Technology and Society 14 (4):187-191.
    Download  
     
    Export citation  
     
    Bookmark  
  • Social Context in HCl: A New Framework for Mental Models, Cooperation, and Communication.Giuseppe Mantovani - 1996 - Cognitive Science 20 (2):237-269.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Power, Technology and Social Studies of Health Care: An Infrastructural Inversion. [REVIEW]Casper Bruun Jensen - 2008 - Health Care Analysis 16 (4):355-374.
    Power, dominance, and hierarchy are prevalent analytical terms in social studies of health care. Power is often seen as residing in medical structures, institutions, discourses, or ideologies. While studies of medical power often draw on Michel Foucault, this understanding is quite different from his proposal to study in detail the “strategies, the networks, the mechanisms, all those techniques by which a decision is accepted” [Foucault, M. (1988). In Politics, philosophy, culture: Interviews and other writings 1977–84 (pp. 96–109). New York: Routledge]. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • CSCW design reconceptualised through science studies.Casper Bruun Jensen - 2001 - AI and Society 15 (3):200-215.
    This paper points out the need for an analytical and ontological reorientation of the field of computer-supported cooperative work (CSCW). It is argued that even though this field is heterogeneous it is marred by general problems of conceptualising the co-constitutive relations between humans and technologies. This is demonstrated through readings of several recent CSCW analyses. It is then suggested that a conceptual improvement can be facilitated by paying attention to newer scientific studies, here exemplified by Pickering, Haraway and Latour.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Automate or innervate? The role of knowledge in advanced manufacturing systems.J. Martin Corbett - 1989 - AI and Society 3 (3):198-208.
    This chapter examines the role of shopfloor knowledge in the operation of advanced manufacturing systems. Design trends towards full automation are contrasted with those toward hybrid, human-centred systems with particular emphasis on job design and the development and reproduction of knowledge. The chapter concludes with a short discussion of the problems inherent in hybrid design.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Virtual Reality and the Modern Ideology of Order and Control.Craig I. Murrihy - unknown
    In this thesis I will examine the construction of the concept of Virtual Reality. I argue that rather than a technology of liberation as it is often perceived, virtual realities' conception has been influenced significantly by a discourse of control and order. I examine books, articles and films concerning Virtual Reality to support this claim. Furthermore this discourse of control and order is born out of a larger ideology of Western culture that values order and control. Throughout modernity this ideology (...)
    Download  
     
    Export citation  
     
    Bookmark