Switch to: Citations

Add references

You must login to add references.
  1. Responsibility of and Trust in ISPs.Raphael Cohen-Almagor - 2010 - Knowledge, Technology & Policy 23 (3):381-397.
    This discussion is about the neglected concepts of trust and social responsibility on the Internet. I will discuss and explain the concepts and their implications to people and society. I then address the issue of moral and social responsibilities of ISPs and web-hosting companies. I argue that ISPs and web-hosting companies should aspire to take responsibility for content and that they should respect and abide by their own terms of conduct.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. [REVIEW]Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):247-251.
    In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support of technologies that could (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • (15 other versions)Leviathan.Thomas Hobbes - 1904 - Harmondsworth,: Penguin Books. Edited by C. B. Macpherson.
    v. 1. Editorial introduction -- v. 2. The English and Latin texts (i) -- v. 3. The English and Latin texts (ii).
    Download  
     
    Export citation  
     
    Bookmark   989 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • On the intrinsic value of information objects and the infosphere.Luciano Floridi - 2002 - Ethics and Information Technology 4 (4):287–304.
    What is the most general common set of attributes that characterises something as intrinsically valuable and hence as subject to some moral respect, and without which something would rightly be considered intrinsically worthless or even positively unworthy and therefore rightly to be disrespected in itself? This paper develops and supports the thesis that the minimal condition of possibility of an entity's least intrinsic value is to be identified with its ontological status as an information object. All entities, even when interpreted (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  • Transnational Citizenship: Membership and Rights in International Migration.Rainer Bauböck - 1994 - Edward Elgar Publishing.
    Regional integration, mass migration and the development of transnational organizations are just some of the factors challenging the traditional definitions of citizenship. In this important new book, Rainer Bauböck argues that citizenship rights will have to extend beyond nationality and state territory if liberal democracies are to remain true to their own principles of inclusive membership and equal basic rights.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • (3 other versions)Leviathan.Thomas Hobbes - 2007 - In Aloysius Martinich, Fritz Allhoff & Anand Vaidya (eds.), Early Modern Philosophy: Essential Readings with Commentary. Oxford: Wiley-Blackwell.
    Thomas Hobbes took a new look at the ways in which society should function, and he ended up formulating the concept of political science. His crowning achievement, Leviathan, remains among the greatest works in the history of ideas. Written during a moment in English history when the political and social structures as well as methods of science were in flux and open to interpretation, Leviathan played an essential role in the development of the modern world. This edition of Hobbes' landmark (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  • Information technologies and the tragedy of the good will.Luciano Floridi - 2006 - Ethics and Information Technology 8 (4):253–262.
    Information plays a major role in any moral action. ICT have revolutionized the life of information, from its production and management to its consumption, thus deeply affecting our moral lives. Amid the many issues they have raised, a very serious one, discussed in this paper, is labelled the tragedy of the Good Will. This is represented by the increasing pressure that ICT and their deluge of information are putting on any agent who would like to act morally, when informed about (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Editorial introduction – ethics of new information technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Embodying values in technology: Theory and practice.Mary Flanagan, Daniel Howe & Helen Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  • (15 other versions)Leviathan.Thomas Hobbes - 1651 - Baltimore,: Clarendon Press. Edited by Aloysius Martinich, Fritz Allhoff & Anand Vaidya.
    Thomas Hobbes took a new look at the ways in which society should function, and he ended up formulating the concept of political science. His crowning achievement, Leviathan, remains among the greatest works in the history of ideas. Written during a moment in English history when the political and social structures as well as methods of science were in flux and open to interpretation, Leviathan played an essential role in the development of the modern world. This edition of Hobbes' landmark (...)
    Download  
     
    Export citation  
     
    Bookmark   246 citations  
  • Layering privacy on operating systems, social networks, and other platforms by design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
    Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational privacy services, and (4) use (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Three Roads to P2P Systems and Their Impact on Business Practices and Ethics.Ugo Pagallo & Massimo Durante - 2009 - Journal of Business Ethics 90 (S4):551 - 564.
    This article examines some of the most relevant issues concerning P2P systems so as to take sides in today's strongly polarized debate. The idea is to integrate a context-based perspective with an ontological representation of informational norms; thanks to a procedural outlook which is presented in terms of burden of proof More particularly, we examine three ''roads." First, the topological approach to complex social networks allows us to comprehend the laws according to which information is distributed through P2P systems and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Embodying Values in Design: Theory and Practice.M. Flanagan, D. Howe & H. Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • (1 other version)The ethics of designing artificial agents.Frances S. Grodzinsky, Keith W. Miller & Marty J. Wolf - 2008 - Ethics and Information Technology 10 (2-3):115-121.
    In their important paper “Autonomous Agents”, Floridi and Sanders use “levels of abstraction” to argue that computers are or may soon be moral agents. In this paper we use the same levels of abstraction to illuminate differences between human moral agents and computers. In their paper, Floridi and Sanders contributed definitions of autonomy, moral accountability and responsibility, but they have not explored deeply some essential questions that need to be answered by computer scientists who design artificial agents. One such question (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations