Switch to: Citations

Add references

You must login to add references.
  1. Internet and the flow of knowledge: Which ethical and political challenges will we face?Niels Gottschalk-Mazouz - 2008 - In Herbert Hrachovec & Alois Pichler (eds.), Philosophy of the Information Society: Proceedings of the 30th International Ludwig Wittgenstein-Symposium in Kirchberg, 2007. De Gruyter. pp. 215-232.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Anticipating ethical issues in emerging IT.Philip A. E. Brey - 2012 - Ethics and Information Technology 14 (4):305-317.
    In this essay, a new approach to the ethics of emerging information technology will be presented, called anticipatory technology ethics (ATE). The ethics of emerging technology is the study of ethical issues at the R&D and introduction stage of technology development through anticipation of possible future devices, applications, and social consequences. In the essay, I will first locate emerging technology in the technology development cycle, after which I will consider ethical approaches to emerging technologies, as well as obstacles in developing (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • The human condition [selections].Hannah Arendt - 2013 - In Timothy C. Campbell & Adam Sitze (eds.), Biopolitics: A Reader. Durham: Duke University Press.
    Download  
     
    Export citation  
     
    Bookmark   493 citations  
  • How Google Works.Eric Schmidt & Jonathan Rosenberg - 2017
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Anticipatory Ethics for a Future Internet: Analyzing Values During the Design of an Internet Infrastructure.Katie Shilton - 2015 - Science and Engineering Ethics 21 (1):1-18.
    The technical details of Internet architecture affect social debates about privacy and autonomy, intellectual property, cybersecurity, and the basic performance and reliability of Internet services. This paper explores one method for practicing anticipatory ethics in order to understand how a new infrastructure for the Internet might impact these social debates. This paper systematically examines values expressed by an Internet architecture engineering team—the Named Data Networking project—based on data gathered from publications and internal documents. Networking engineers making technical choices also weigh (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain why (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations