Switch to: Citations

Add references

You must login to add references.
  1. (1 other version)The ethics of designing artificial agents.Frances S. Grodzinsky, Keith W. Miller & Marty J. Wolf - 2008 - Ethics and Information Technology 10 (2-3):115-121.
    In their important paper “Autonomous Agents”, Floridi and Sanders use “levels of abstraction” to argue that computers are or may soon be moral agents. In this paper we use the same levels of abstraction to illuminate differences between human moral agents and computers. In their paper, Floridi and Sanders contributed definitions of autonomy, moral accountability and responsibility, but they have not explored deeply some essential questions that need to be answered by computer scientists who design artificial agents. One such question (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • The Theory and Practice of Autonomy.Gerald Dworkin - 1988 - New York: Cambridge University Press.
    This important new book develops a new concept of autonomy. The notion of autonomy has emerged as central to contemporary moral and political philosophy, particularly in the area of applied ethics. professor Dworkin examines the nature and value of autonomy and uses the concept to analyse various practical moral issues such as proxy consent in the medical context, paternalism, and entrapment by law enforcement officials.
    Download  
     
    Export citation  
     
    Bookmark   316 citations  
  • Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. [REVIEW]Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):247-251.
    In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support of technologies that could (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • (1 other version)Giving an account of oneself.Judith Butler - 2005 - New York: Fordham University Press.
    Offers an outline for a new ethical practice - one responsive to the need for critical autonomy and grounded in a new sense of the human subject. The author demonstrates how difficult it is to give an account of oneself, and how this lack of self-transparency and narratibility is crucial to an ethical understanding of the human.
    Download  
     
    Export citation  
     
    Bookmark   154 citations  
  • Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? [REVIEW]Kenneth Einar Himma - 2009 - Ethics and Information Technology 11 (1):19-29.
    In this essay, I describe and explain the standard accounts of agency, natural agency, artificial agency, and moral agency, as well as articulate what are widely taken to be the criteria for moral agency, supporting the contention that this is the standard account with citations from such widely used and respected professional resources as the Stanford Encyclopedia of Philosophy, Routledge Encyclopedia of Philosophy, and the Internet Encyclopedia of Philosophy. I then flesh out the implications of some of these well-settled theories (...)
    Download  
     
    Export citation  
     
    Bookmark   71 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • On the intrinsic value of information objects and the infosphere.Luciano Floridi - 2002 - Ethics and Information Technology 4 (4):287–304.
    What is the most general common set of attributes that characterises something as intrinsically valuable and hence as subject to some moral respect, and without which something would rightly be considered intrinsically worthless or even positively unworthy and therefore rightly to be disrespected in itself? This paper develops and supports the thesis that the minimal condition of possibility of an entity's least intrinsic value is to be identified with its ontological status as an information object. All entities, even when interpreted (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  • On the morality of artificial agents.Luciano Floridi & J. W. Sanders - 2004 - Minds and Machines 14 (3):349-379.
    Artificial agents (AAs), particularly but not only those in Cyberspace, extend the class of entities that can be involved in moral situations. For they can be conceived of as moral patients (as entities that can be acted upon for good or evil) and also as moral agents (as entities that can perform actions, again for good or evil). In this paper, we clarify the concept of agent and go on to separate the concerns of morality and responsibility of agents (most (...)
    Download  
     
    Export citation  
     
    Bookmark   294 citations  
  • Giving an Account of Oneself.Judith Butler - 2001 - Diacritics 31 (4):22-40.
    In lieu of an abstract, here is a brief excerpt of the content:Diacritics 31.4 (2001) 22-40 [Access article in PDF] Giving an Account of Oneself Judith Butler In recent years, the critique of poststructuralism, itself loquacious, has held that the postulation of a subject who is not self-grounding undermines the possibility of responsibility and, in particular, of giving an account of oneself. Critics have argued that the various critical reconsiderations of the subject, including those that do away with the theory (...)
    Download  
     
    Export citation  
     
    Bookmark   120 citations  
  • ISPs & Rowdy Web Sites Before the Law: Should We Change Today’s Safe Harbour Clauses?Ugo Pagallo - 2011 - Philosophy and Technology 24 (4):419-436.
    The paper examines today’s debate on the new responsibilities of Internet service providers in connection with legal problems concerning jurisdiction, data processing, people’s privacy and education. The focus is foremost on the default rules and safe harbour clauses for ISPs liability, set up by the US and European legal systems. This framework is deepened in light of the different functions of the services provided on the Internet so as to highlight multiple levels of control over information and, correspondingly, different types (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Layering privacy on operating systems, social networks, and other platforms by design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
    Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational privacy services, and (4) use (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • S.Immanuel Kant - 1969 - In Allgemeiner Kantindex Zu Kants Gesammelten Schriften. Band. 20. Abt. 3: Personenindex Zu Kants Gesammelten Schriften. De Gruyter. pp. 112-126.
    Download  
     
    Export citation  
     
    Bookmark   517 citations  
  • Embodying values in technology: Theory and practice.Mary Flanagan, Daniel Howe & Helen Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  • Embodying Values in Design: Theory and Practice.M. Flanagan, D. Howe & H. Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • (1 other version)Giving an Account of Oneself.Judith Butler - 2005 - New York: Fordham University Press.
    Offers an outline for a new ethical practice - one responsive to the need for critical autonomy and grounded in a new sense of the human subject. The author demonstrates how difficult it is to give an account of oneself, and how this lack of self-transparency and narratibility is crucial to an ethical understanding of the human.
    Download  
     
    Export citation  
     
    Bookmark   121 citations  
  • The Theory and Practice of Autonomy.Gerald Dworkin - 1988 - Philosophy 64 (250):571-572.
    Download  
     
    Export citation  
     
    Bookmark   404 citations  
  • Review of Ruth R. Faden and Tom L. Beauchamp: A History and Theory of Informed Consent[REVIEW]William G. Bartholome - 1988 - Ethics 98 (3):605-606.
    Download  
     
    Export citation  
     
    Bookmark   419 citations  
  • Autonomic and autonomous "thinking": preconditions for criminal accountability.Mireille Hildebrandt - 2011 - In Mireille Hildebrandt & Antoinette Rouvroy (eds.), Law, human agency, and autonomic computing: the philosophy of law meets the philosophy of technology. New York, NY: Routledge.
    Download  
     
    Export citation  
     
    Bookmark   1 citation