Switch to: Citations

Add references

You must login to add references.
  1. Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. This paper develops a phenomenological account of information security, in which a distinction is made between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, the paper provides a phenomenological explanation of the electronic voting controversy in the Netherlands.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • What Things Do: Philosophical Reflections on Technology, Agency, and Design.Peter-Paul Verbeek - 2005 - Pennsylvania State University Press.
    This paper praises and criticizes Peter-Paul Verbeek's What Things Do . The four things that Verbeek does well are: remind us of the importance of technological things; bring Karl Jaspers into the conversation on technology; explain how technology "co-shapes" experience by reading Bruno Latour's actor-network theory in light of Don Ihde's post-phenomenology; develop a material aesthetics of design. The three things that Verbeek does not do well are: analyze the material conditions in which things are produced; criticize the social-political design (...)
    Download  
     
    Export citation  
     
    Bookmark   197 citations  
  • Temptations of turnout and modernisation.Wolter Pieters & Robert van Haren - 2007 - Journal of Information, Communication and Ethics in Society 5 (4):276-292.
    PurposeThe aim of the research described was to identify reasons for differences between discourses on electronic voting in the UK and The Netherlands, from a qualitative point of view.Design/methodology/approachFrom both countries, eight e‐voting experts were interviewed on their expectations, risk estimations, cooperation and learning experiences. The design was based on the theory of strategic niche management. A qualitative analysis of the data was performed to refine the main variables and identify connections.FindingsThe results show that differences in these variables can partly (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Trust in technological systems.Philip J. Nickel - 2013 - In M. J. de Vries, S. O. Hansson & A. W. M. Meijers (eds.), Norms in technology: Philosophy of Engineering and Technology, Vol. 9. Springer.
    Technology is a practically indispensible means for satisfying one’s basic interests in all central areas of human life including nutrition, habitation, health care, entertainment, transportation, and social interaction. It is impossible for any one person, even a well-trained scientist or engineer, to know enough about how technology works in these different areas to make a calculated choice about whether to rely on the vast majority of the technologies she/he in fact relies upon. Yet, there are substantial risks, uncertainties, and unforeseen (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Reassembling the Social: An Introduction to the Actor-Network Theory.Bruno Latour - 2005 - Oxford, England and New York, NY, USA: Oxford University Press.
    Latour is a world famous and widely published French sociologist who has written with great eloquence and perception about the relationship between people, science, and technology. He is also closely associated with the school of thought known as Actor Network Theory. In this book he sets out for the first time in one place his own ideas about Actor Network Theory and its relevance to management and organization theory.
    Download  
     
    Export citation  
     
    Bookmark   661 citations  
  • Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. This paper develops a phenomenological account of information security, in which a distinction is made between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, the paper provides a phenomenological explanation of the electronic voting controversy in the Netherlands.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Defining Trust and E-trust: Old Theories and New Problems.Mariarosaria Taddeo - 2009 - International Journal of Technology and Human Interaction (IJTHI) Official Publication of the Information Resources Management Association 5 (2):23-35.
    The paper provides a selective analysis of the main theories of trust and e-trust (that is, trust in digital environments) provided in the last twenty years, with the goal of preparing the ground for a new philosophical approach to solve the problems facing them. It is divided into two parts. The first part is functional toward the analysis of e-trust: it focuses on trust and its definition and foundation and describes the general background on which the analysis of e-trust rests. (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Vico and Herder: two studies in the history of ideas.Isaiah Berlin - 1976 - New York: Vintage Books.
    About the philosophy of Giambattista Vico, 1668- 1774 and Johann Gottfried Herder, 1774-1803.
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  • Freedom and privacy in ambient intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
    This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Vico and Herden. Two Studies in the History of Ideas. [REVIEW]Eckhard Kessler - 1978 - Journal of Philosophy 75 (5):264-270.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Vico and Herder, two studies in the History of Ideas.Isaiah Berlin - 1977 - Revue Philosophique de la France Et de l'Etranger 167 (1):68-70.
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • What Things Do: Philosophical Reflections on Technology, Agency, and Design.Peter-Paul Verbeek - 2005 - Human Studies 32 (2):229-240.
    This paper praises and criticizes Peter-Paul Verbeek's What Things Do. The four things that Verbeek does well are: remind us of the importance of technological things; bring Karl Jaspers into the conversation on technology; explain how technology "co-shapes" experience by reading Bruno Latour's actor-network theory in light of Don Ihde's post-phenomenology; develop a material aesthetics of design. The three things that Verbeek does not do well are: analyze the material conditions in which things are produced; criticize the social-political design and (...)
    Download  
     
    Export citation  
     
    Bookmark   154 citations  
  • Review of Ruth R. Faden and Tom L. Beauchamp: A History and Theory of Informed Consent[REVIEW]William G. Bartholome - 1988 - Ethics 98 (3):605-606.
    Download  
     
    Export citation  
     
    Bookmark   419 citations  
  • Mobile-centric ambient intelligence in health- and homecare—anticipating ethical and legal challenges.Eleni Kosta, Olli Pitkänen, Marketta Niemelä & Eija Kaasinen - 2010 - Science and Engineering Ethics 16 (2):303-323.
    Ambient Intelligence provides the potential for vast and varied applications, bringing with it both promise and peril. The development of Ambient Intelligence applications poses a number of ethical and legal concerns. Mobile devices are increasingly evolving into tools to orientate in and interact with the environment, thus introducing a user-centric approach to Ambient Intelligence. The MINAmI (Micro-Nano integrated platform for transverse Ambient Intelligence applications) FP6 research project aims at creating core technologies for mobile device based Ambient Intelligence services. In this (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Vico and Herder: Two Studies in the History of Ideas.Isaiah Berlin - 1976 - Philosophy and Rhetoric 10 (4):276-280.
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Vico and Herder: Two Studies in the History of Ideas.Isaiah Berlin - 1978 - Mind 87 (346):284-286.
    Download  
     
    Export citation  
     
    Bookmark   17 citations