Switch to: Citations

Add references

You must login to add references.
  1. E-care as craftsmanship: virtuous work, skilled engagement, and information technology in health care.Mark Coeckelbergh - 2013 - Medicine, Health Care and Philosophy 16 (4):807-816.
    Contemporary health care relies on electronic devices. These technologies are not ethically neutral but change the practice of care. In light of Sennett's work and that of other thinkers one worry is that "e-care"aEuro"care by means of new information and communication technologies-does not promote skilful and careful engagement with patients and hence is neither conducive to the quality of care nor to the virtues of the care worker. Attending to the kinds of knowledge involved in care work and their moral (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • After virtue: a study in moral theory.Alasdair C. MacIntyre - 1981 - Notre Dame, Ind.: University of Notre Dame Press.
    This classic and controversial book examines the roots of the idea of virtue, diagnoses the reasons for its absence in modern life, and proposes a path for its recovery.
    Download  
     
    Export citation  
     
    Bookmark   1239 citations  
  • Robots: ethical by design.Gordana Dodig Crnkovic & Baran Çürüklü - 2012 - Ethics and Information Technology 14 (1):61-71.
    Among ethicists and engineers within robotics there is an ongoing discussion as to whether ethical robots are possible or even desirable. We answer both of these questions in the positive, based on an extensive literature study of existing arguments. Our contribution consists in bringing together and reinterpreting pieces of information from a variety of sources. One of the conclusions drawn is that artifactual morality must come in degrees and depend on the level of agency, autonomy and intelligence of the machine. (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • The human use of human beings.Norbert Wiener - 1950 - Boston,: Houghton Mifflin.
    As this book reveals, his vision was much more complex and interesting. He hoped that machines would release people from relentless and repetitive drudgery in order to achieve more creative pursuits.
    Download  
     
    Export citation  
     
    Bookmark   108 citations  
  • Group privacy.Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.) - 2016 - Springer Verlag.
    The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the different approaches and methods that can be used to address them. In doing so, it will help the reader to gain a better grasp of the ethical and legal conundrums posed by group profiling. The volume first maps the (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • A Prospective Framework for the Design of Ideal Artificial Moral Agents: Insights from the Science of Heroism in Humans.Travis J. Wiltshire - 2015 - Minds and Machines 25 (1):57-71.
    The growing field of machine morality has becoming increasingly concerned with how to develop artificial moral agents. However, there is little consensus on what constitutes an ideal moral agent let alone an artificial one. Leveraging a recent account of heroism in humans, the aim of this paper is to provide a prospective framework for conceptualizing, and in turn designing ideal artificial moral agents, namely those that would be considered heroic robots. First, an overview of what it means to be an (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Ethical issues in web data mining.Lita van Wel & Lambèr Royakkers - 2004 - Ethics and Information Technology 6 (2):129-140.
    Web mining refers to the whole of data miningand related techniques that are used toautomatically discover and extract informationfrom web documents and services. When used in abusiness context and applied to some type ofpersonal data, it helps companies to builddetailed customer profiles, and gain marketingintelligence. Web mining does, however, pose athreat to some important ethical values likeprivacy and individuality. Web mining makes itdifficult for an individual to autonomouslycontrol the unveiling and dissemination of dataabout his/her private life. To study thesethreats, we (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • The Philosophy of Computer Science.Raymond Turner & Amnon H. Eden - 2008 - Journal of Applied Logic 6 (4):459.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • The ethics of information transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
    The paper investigates the ethics of information transparency (henceforth transparency). It argues that transparency is not an ethical principle in itself but a pro-ethical condition for enabling or impairing other ethical practices or principles. A new definition of transparency is offered in order to take into account the dynamics of information production and the differences between data and information. It is then argued that the proposed definition provides a better understanding of what sort of information should be disclosed and what (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  • Ethical protocols design.Matteo Turilli - 2007 - Ethics and Information Technology 9 (1):49-62.
    The paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Out of character: on the creation of virtuous machines. [REVIEW]Ryan Tonkens - 2012 - Ethics and Information Technology 14 (2):137-149.
    The emerging discipline of Machine Ethics is concerned with creating autonomous artificial moral agents that perform ethically significant actions out in the world. Recently, Wallach and Allen (Moral machines: teaching robots right from wrong, Oxford University Press, Oxford, 2009) and others have argued that a virtue-based moral framework is a promising tool for meeting this end. However, even if we could program autonomous machines to follow a virtue-based moral framework, there are certain pressing ethical issues that need to be taken (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral responsibilities (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Modelling Trust in Artificial Agents, A First Step Toward the Analysis of e-Trust.Mariarosaria Taddeo - 2010 - Minds and Machines 20 (2):243-257.
    This paper provides a new analysis of e - trust , trust occurring in digital contexts, among the artificial agents of a distributed artificial system. The analysis endorses a non-psychological approach and rests on a Kantian regulative ideal of a rational agent, able to choose the best option for itself, given a specific scenario and a goal to achieve. The paper first introduces e-trust describing its relevance for the contemporary society and then presents a new theoretical analysis of this phenomenon. (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Intending to err: the ethical challenge of lethal, autonomous systems. [REVIEW]Mark S. Swiatek - 2012 - Ethics and Information Technology 14 (4):241-254.
    Current precursors in the development of lethal, autonomous systems (LAS) point to the use of biometric devices for assessing, identifying, and verifying targets. The inclusion of biometric devices entails the use of a probabilistic matching program that requires the deliberate targeting of noncombatants as a statistically necessary function of the system. While the tactical employment of the LAS may be justified on the grounds that the deliberate killing of a smaller number of noncombatants is better than the accidental killing of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Asimov’s “three laws of robotics” and machine metaethics.Susan Leigh Anderson - 2008 - AI and Society 22 (4):477-493.
    Using Asimov’s “Bicentennial Man” as a springboard, a number of metaethical issues concerning the emerging field of machine ethics are discussed. Although the ultimate goal of machine ethics is to create autonomous ethical machines, this presents a number of challenges. A good way to begin the task of making ethics computable is to create a program that enables a machine to act an ethical advisor to human beings. This project, unlike creating an autonomous ethical machine, will not require that we (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Engineering Medical Decisions.Meredith Stark & Joseph J. Fins - 2013 - Cambridge Quarterly of Healthcare Ethics 22 (4):373-381.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The entanglement of trust and knowledge on the web.Judith Simon - 2010 - Ethics and Information Technology 12 (4):343-355.
    In this paper I use philosophical accounts on the relationship between trust and knowledge in science to apprehend this relationship on the Web. I argue that trust and knowledge are fundamentally entangled in our epistemic practices. Yet despite this fundamental entanglement, we do not trust blindly. Instead we make use of knowledge to rationally place or withdraw trust. We use knowledge about the sources of epistemic content as well as general background knowledge to assess epistemic claims. Hence, although we may (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  • On malfunctioning software.Giuseppe Primiero, Nir Fresco & Luciano Floridi - 2015 - Synthese 192 (4):1199-1220.
    Artefacts do not always do what they are supposed to, due to a variety of reasons, including manufacturing problems, poor maintenance, and normal wear-and-tear. Since software is an artefact, it should be subject to malfunctioning in the same sense in which other artefacts can malfunction. Yet, whether software is on a par with other artefacts when it comes to malfunctioning crucially depends on the abstraction used in the analysis. We distinguish between “negative” and “positive” notions of malfunction. A negative malfunction, (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • Data barns, ambient intelligence and cloud computing: the tacit epistemology and linguistic representation of Big Data.Lisa Portmess & Sara Tower - 2015 - Ethics and Information Technology 17 (1):1-9.
    The explosion of data grows at a rate of roughly five trillion bits a second, giving rise to greater urgency in conceptualizing the infosphere and understanding its implications for knowledge and public policy. Philosophers of technology and information technologists alike who wrestle with ontological and epistemological questions of digital information tend to emphasize, as Floridi does, information as our new ecosystem and human beings as interconnected informational organisms, inforgs at home in ambient intelligence. But the linguistic and conceptual representations of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Is there an ethics of algorithms?Martin Peterson - 2011 - Ethics and Information Technology 13 (3):251-260.
    We argue that some algorithms are value-laden, and that two or more persons who accept different value-judgments may have a rational reason to design such algorithms differently. We exemplify our claim by discussing a set of algorithms used in medical image analysis: In these algorithms it is often necessary to set certain thresholds for whether e.g. a cell should count as diseased or not, and the chosen threshold will partly depend on the software designer’s preference between avoiding false positives and (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  • Bearing Account-able Witness to the Ethical Algorithmic System.Daniel Neyland - 2016 - Science, Technology, and Human Values 41 (1):50-76.
    This paper explores how accountability might make otherwise obscure and inaccessible algorithms available for governance. The potential import and difficulty of accountability is made clear in the compelling narrative reproduced across recent popular and academic reports. Through this narrative we are told that algorithms trap us and control our lives, undermine our privacy, have power and an independent agential impact, at the same time as being inaccessible, reducing our opportunities for critical engagement. The paper suggests that STS sensibilities can provide (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • The ethics of big data: current and foreseeable issues in biomedical contexts.Brent Daniel Mittelstadt & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (2):303–341.
    The capacity to collect and analyse data is growing exponentially. Referred to as ‘Big Data’, this scientific, social and technological trend has helped create destabilising amounts of information, which can challenge accepted social and ethical norms. Big Data remains a fuzzy idea, emerging across social, scientific, and business contexts sometimes seemingly related only by the gigantic size of the datasets being considered. As is often the case with the cutting edge of scientific and technological progress, understanding of the ethical implications (...)
    Download  
     
    Export citation  
     
    Bookmark   85 citations  
  • Justified Belief in a Digital Age: On the Epistemic Implications of Secret Internet Technologies.Boaz Miller & Isaac Record - 2013 - Episteme 10 (2):117 - 134.
    People increasingly form beliefs based on information gained from automatically filtered Internet ‎sources such as search engines. However, the workings of such sources are often opaque, preventing ‎subjects from knowing whether the information provided is biased or incomplete. Users’ reliance on ‎Internet technologies whose modes of operation are concealed from them raises serious concerns about ‎the justificatory status of the beliefs they end up forming. Yet it is unclear how to address these concerns ‎within standard theories of knowledge and justification. (...)
    Download  
     
    Export citation  
     
    Bookmark   41 citations  
  • Diagnosis without doctors.James G. Mazoué - 1990 - Journal of Medicine and Philosophy 15 (6):559-579.
    Computer-based diagnostic systems are widely regarded as having only a supportive role in assisting physicians make diagnostic decisions. Continuing progress in the design of diagnostic software, however, may not only produce systems which have heuristic and consultative value, but which may render the traditional role of the physician as a ‘polyfunctional practitioner’ obsolete should it become feasible to replace practitioner-dependent diagnostic skill with more accurate, reliable and cost-effective computer-based programs. Should the implementation of such programs prove to be both a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The responsibility gap: Ascribing responsibility for the actions of learning automata. [REVIEW]Andreas Matthias - 2004 - Ethics and Information Technology 6 (3):175-183.
    Traditionally, the manufacturer/operator of a machine is held (morally and legally) responsible for the consequences of its operation. Autonomous, learning machines, based on neural networks, genetic algorithms and agent architectures, create a new situation, where the manufacturer/operator of the machine is in principle not capable of predicting the future machine behaviour any more, and thus cannot be held morally responsible or liable for it. The society must decide between not using this kind of machine any more (which is not a (...)
    Download  
     
    Export citation  
     
    Bookmark   167 citations  
  • The responsibility gap: Ascribing responsibility for the actions of learning automata.Andreas Matthias - 2004 - Ethics and Information Technology 6 (3):175-183.
    Traditionally, the manufacturer/operator of a machine is held (morally and legally) responsible for the consequences of its operation. Autonomous, learning machines, based on neural networks, genetic algorithms and agent architectures, create a new situation, where the manufacturer/operator of the machine is in principle not capable of predicting the future machine behaviour any more, and thus cannot be held morally responsible or liable for it. The society must decide between not using this kind of machine any more (which is not a (...)
    Download  
     
    Export citation  
     
    Bookmark   169 citations  
  • Unblinking eyes: the ethics of automating surveillance.Kevin Macnish - 2012 - Ethics and Information Technology 14 (2):151-167.
    In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual, fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the case. In (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Why Most Published Research Findings Are False.John P. A. Ioannidis - 2005 - PLoS Med 2 (8):e124.
    Published research findings are sometimes refuted by subsequent evidence, says Ioannidis, with ensuing confusion and disappointment.
    Download  
     
    Export citation  
     
    Bookmark   357 citations  
  • Who Needs Stories if You Can Get the Data? ISPs in the Era of Big Number Crunching.Mireille Hildebrandt - 2011 - Philosophy and Technology 24 (4):371-390.
    Who Needs Stories if You Can Get the Data? ISPs in the Era of Big Number Crunching Content Type Journal Article Category Special Issue Pages 371-390 DOI 10.1007/s13347-011-0041-8 Authors Mireille Hildebrandt, Institute of Computer and Information Sciences (ICIS), Radboud University Nijmegen, Nijmegen, the Netherlands Journal Philosophy & Technology Online ISSN 2210-5441 Print ISSN 2210-5433 Journal Volume Volume 24 Journal Issue Volume 24, Number 4.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • What an Algorithm Is.Robin K. Hill - 2016 - Philosophy and Technology 29 (1):35-59.
    The algorithm, a building block of computer science, is defined from an intuitive and pragmatic point of view, through a methodological lens of philosophy rather than that of formal computation. The treatment extracts properties of abstraction, control, structure, finiteness, effective mechanism, and imperativity, and intentional aspects of goal and preconditions. The focus on the algorithm as a robust conceptual object obviates issues of correctness and minimality. Neither the articulation of an algorithm nor the dynamic process constitute the algorithm itself. Analysis (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  • Developing artificial agents worthy of trust: “Would you buy a used car from this artificial agent?”. [REVIEW]F. S. Grodzinsky, K. W. Miller & M. J. Wolf - 2011 - Ethics and Information Technology 13 (1):17-27.
    There is a growing literature on the concept of e-trust and on the feasibility and advisability of “trusting” artificial agents. In this paper we present an object-oriented model for thinking about trust in both face-to-face and digitally mediated environments. We review important recent contributions to this literature regarding e-trust in conjunction with presenting our model. We identify three important types of trust interactions and examine trust from the perspective of a software developer. Too often, the primary focus of research in (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Truth and Method.H. G. Gadamer - 1975 - Journal of Aesthetics and Art Criticism 36 (4):487-490.
    Download  
     
    Export citation  
     
    Bookmark   1216 citations  
  • The informational nature of personal identity.Luciano Floridi - 2011 - Minds and Machines 21 (4):549-566.
    In this paper, I present an informational approach to the nature of personal identity. In “Plato and the problem of the chariot”, I use Plato’s famous metaphor of the chariot to introduce a specific problem regarding the nature of the self as an informational multiagent system: what keeps the self together as a whole and coherent unity? In “Egology and its two branches” and “Egology as synchronic individualisation”, I outline two branches of the theory of the self: one concerning the (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  • The method of levels of abstraction.Luciano Floridi - 2008 - Minds and Machines 18 (3):303–329.
    The use of “levels of abstraction” in philosophical analysis (levelism) has recently come under attack. In this paper, I argue that a refined version of epistemological levelism should be retained as a fundamental method, called the method of levels of abstraction. After a brief introduction, in section “Some Definitions and Preliminary Examples” the nature and applicability of the epistemological method of levels of abstraction is clarified. In section “A Classic Application of the Method ofion”, the philosophical fruitfulness of the new (...)
    Download  
     
    Export citation  
     
    Bookmark   118 citations  
  • On the morality of artificial agents.Luciano Floridi & J. W. Sanders - 2004 - Minds and Machines 14 (3):349-379.
    Artificial agents (AAs), particularly but not only those in Cyberspace, extend the class of entities that can be involved in moral situations. For they can be conceived of as moral patients (as entities that can be acted upon for good or evil) and also as moral agents (as entities that can perform actions, again for good or evil). In this paper, we clarify the concept of agent and go on to separate the concerns of morality and responsibility of agents (most (...)
    Download  
     
    Export citation  
     
    Bookmark   287 citations  
  • Big data and their epistemological challenge.Luciano Floridi - 2012 - Philosophy and Technology 25 (4):435-437.
    Between 2006 and 2011, humanity accumulated 1,600 EB of data. As a result of this growth, there is now more data produced than available storage. This article explores the problem of “Big Data,” arguing for an epistemological approach as a possible solution to this ever-increasing challenge.
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  • Identity, profiling algorithms and a world of ambient intelligence.Katja de Vries - 2010 - Ethics and Information Technology 12 (1):71-85.
    The tendency towards an increasing integration of the informational web into our daily physical world (in particular in so-called Ambient Intelligent technologies which combine ideas derived from the field of Ubiquitous Computing, Intelligent User Interfaces and Ubiquitous Communication) is likely to make the development of successful profiling and personalization algorithms, like the ones currently used by internet companies such as Amazon , even more important than it is today. I argue that the way in which we experience ourselves necessarily goes (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Ethics, Finance, and Automation: A Preliminary Survey of Problems in High Frequency Trading. [REVIEW]Michael Davis, Andrew Kumiega & Ben Vliet - 2013 - Science and Engineering Ethics 19 (3):851-874.
    All of finance is now automated, most notably high frequency trading. This paper examines the ethical implications of this fact. As automation is an interdisciplinary endeavor, we argue that the interfaces between the respective disciplines can lead to conflicting ethical perspectives; we also argue that existing disciplinary standards do not pay enough attention to the ethical problems automation generates. Conflicting perspectives undermine the protection those who rely on trading should have. Ethics in finance can be expanded to include organizational and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Ethics, Finance, and Automation: A Preliminary Survey of Problems in High Frequency Trading. [REVIEW]Michael Davis, Andrew Kumiega & Ben Van Vliet - 2013 - Science and Engineering Ethics 19 (3):851-874.
    All of finance is now automated, most notably high frequency trading. This paper examines the ethical implications of this fact. As automation is an interdisciplinary endeavor, we argue that the interfaces between the respective disciplines can lead to conflicting ethical perspectives; we also argue that existing disciplinary standards do not pay enough attention to the ethical problems automation generates. Conflicting perspectives undermine the protection those who rely on trading should have. Ethics in finance can be expanded to include organizational and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • All that glitters is not gold: Digging beneath the surface of data mining. [REVIEW]Anthony Danna & Oscar H. Gandy - 2002 - Journal of Business Ethics 40 (4):373 - 386.
    This article develops a more comprehensive understanding of data mining by examining the application of this technology in the marketplace. In addition to exploring the technological issues that arise from the use of these applications, we address some of the social concerns that are too often ignored.As more firms shift more of their business activities to the Web, increasingly more information about consumers and potential customers is being captured in Web server logs. Sophisticated analytic and data mining software tools enable (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • Can an Algorithm be Agonistic? Ten Scenes from Life in Calculated Publics.Kate Crawford - 2016 - Science, Technology, and Human Values 41 (1):77-92.
    This paper explores how political theory may help us map algorithmic logics against different visions of the political. Drawing on Chantal Mouffe’s theories of agonistic pluralism, this paper depicts algorithms in public life in ten distinct scenes, in order to ask the question, what kinds of politics do they instantiate? Algorithms are working within highly contested online spaces of public discourse, such as YouTube and Facebook, where incompatible perspectives coexist. Yet algorithms are designed to produce clear “winners” from information contests, (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • ‘Healthy Ageing’ policies and anti-ageing ideologies and practices: on the exercise of responsibility. [REVIEW]Beatriz Cardona - 2008 - Medicine, Health Care and Philosophy 11 (4):475-483.
    This paper explores how the exercise of the ethics of ‘responsibility’ for health care advanced through ‘healthy ageing’ and ‘successful ageing’ narratives in Western countries animates an array of ‘authorities’, including the ‘anti-ageing medicine’ movement as a strategy to address the anxieties of growing old in Western societies and as a tool to exercise the ethos of ‘responsibility’. The choice of this type of authority as a source of guidance for self-constitution and the exercise of the ‘responsible self’, this paper (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • How the machine ‘thinks’: Understanding opacity in machine learning algorithms.Jenna Burrell - 2016 - Big Data and Society 3 (1):205395171562251.
    This article considers the issue of opacity as a problem for socially consequential mechanisms of classification and ranking, such as spam filters, credit card fraud detection, search engines, news trends, market segmentation and advertising, insurance or loan qualification, and credit scoring. These mechanisms of classification all frequently rely on computational algorithms, and in many cases on machine learning algorithms to do this work. In this article, I draw a distinction between three forms of opacity: opacity as intentional corporate or state (...)
    Download  
     
    Export citation  
     
    Bookmark   181 citations  
  • Bias in algorithmic filtering and personalization.Engin Bozdag - 2013 - Ethics and Information Technology 15 (3):209-227.
    Online information intermediaries such as Facebook and Google are slowly replacing traditional media channels thereby partly becoming the gatekeepers of our society. To deal with the growing amount of information on the social web and the burden it brings on the average user, these gatekeepers recently started to introduce personalization features, algorithms that filter information per individual. In this paper we show that these online services that filter information are not merely algorithms. Humans not only affect the design of the (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  • Data mining to combat terrorism and the roots of privacy concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • On How to Build a Moral Machine.Paul Bello & Selmer Bringsjord - 2013 - Topoi 32 (2):251-266.
    Herein we make a plea to machine ethicists for the inclusion of constraints on their theories consistent with empirical data on human moral cognition. As philosophers, we clearly lack widely accepted solutions to issues regarding the existence of free will, the nature of persons and firm conditions on moral agency/patienthood; all of which are indispensable concepts to be deployed by any machine able to make moral judgments. No agreement seems forthcoming on these matters, and we don’t hold out hope for (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Toward an Ethics of Algorithms: Convening, Observation, Probability, and Timeliness.Mike Ananny - 2016 - Science, Technology, and Human Values 41 (1):93-117.
    Part of understanding the meaning and power of algorithms means asking what new demands they might make of ethical frameworks, and how they might be held accountable to ethical standards. I develop a definition of networked information algorithms as assemblages of institutionally situated code, practices, and norms with the power to create, sustain, and signify relationships among people and data through minimally observable, semiautonomous action. Starting from Merrill’s prompt to see ethics as the study of “what we ought to do,” (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  • The Mathematical Theory of Communication.Claude E. Shannon & Warren Weaver - 1949 - University of Illinois Press.
    Scientific knowledge grows at a phenomenal pace--but few books have had as lasting an impact or played as important a role in our modern world as The Mathematical Theory of Communication, published originally as a paper on communication theory more than fifty years ago. Republished in book form shortly thereafter, it has since gone through four hardcover and sixteen paperback printings. It is a revolutionary work, astounding in its foresight and contemporaneity. The University of Illinois Press is pleased and honored (...)
    Download  
     
    Export citation  
     
    Bookmark   640 citations  
  • Causality: Philosophical theory meets scientific practice.Phyllis McKay Illari & Federica Russo - 2014 - Oxford, UK: Oxford University Press. Edited by Federica Russo.
    Scientific and philosophical literature on causality has become highly specialised. It is hard to find suitable access points for students, young researchers, or professionals outside this domain. This book provides a guide to the complex literature, explains the scientific problems of causality and the philosophical tools needed to address them.
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  • The fourth revolution: how the infosphere is reshaping human reality.Luciano Floridi - 2014 - Oxford University Press UK.
    Who are we, and how do we relate to each other? Luciano Floridi, one of the leading figures in contemporary philosophy, argues that the explosive developments in Information and Communication Technologies is changing the answer to these fundamental human questions. As the boundaries between life online and offline break down, and we become seamlessly connected to each other and surrounded by smart, responsive objects, we are all becoming integrated into an "infosphere". Personas we adopt in social media, for example, feed (...)
    Download  
     
    Export citation  
     
    Bookmark   100 citations