Switch to: Citations

Add references

You must login to add references.
  1. Disclosive computer ethics.Philip Brey - 2000 - Acm Sigcas Computers and Society 30 (4):10-16.
    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  • Trust and antitrust.Annette Baier - 1986 - Ethics 96 (2):231-260.
    Download  
     
    Export citation  
     
    Bookmark   575 citations  
  • Common morality: deciding what to do.Bernard Gert - 2004 - New York: Oxford University Press.
    Moral problems do not always come in the form of great social controversies. More often, the moral decisions we make are made quietly, constantly, and within the context of everyday activities and quotidian dilemmas. Indeed, these smaller decisions are based on a moral foundation that few of us ever stop to think about but which guides our every action. Here distinguished philosopher Bernard Gert presents a clear and concise introduction to what he calls "common morality" -- the moral system that (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  • Trust.Carolyn McLeod - 2020 - Stanford Encyclopedia of Philosophy.
    A summary of the philosophical literature on trust.
    Download  
     
    Export citation  
     
    Bookmark   76 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Cyberstalking, personal privacy, and moral responsibility.Herman T. Tavani & Frances S. Grodzinsky - 2002 - Ethics and Information Technology 4 (2):123-132.
    This essay examines some ethical aspects of stalkingincidents in cyberspace. Particular attention is focused on the Amy Boyer/Liam Youens case of cyberstalking, which has raised a number of controversial ethical questions. We limit our analysis to three issues involving this particular case. First, we suggest that the privacy of stalking victims is threatened because of the unrestricted access to on-linepersonal information, including on-line public records, currently available to stalkers. Second, we consider issues involving moral responsibility and legal liability for Internet (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral responsibilities (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Cyberethics: Morality and Law in Cyberspace.Richard Spinello - 2005 - Journal of Information Ethics 14 (1):70-90.
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  • Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5-6):559-596.
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   71 citations  
  • Search engines and the public use of reason.Dag Elgesem - 2008 - Ethics and Information Technology 10 (4):233-242.
    How should the policies of search engines and other information intermediaries be ethically evaluated? It is argued that Kant’s principles for the public use of reason are useful starting points for the formulation of criteria for such an evaluation. The suggestion is, furthermore, that a search engine can be seen to provide a testimony to the user concerning what information that is most relevant to her query. This suggestion is used as the basis for the development of a broadly Kantian (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Moral Repair: Reconstructing Moral Relations After Wrongdoing.Margaret Urban Walker - 2006 - Cambridge University Press.
    Moral Repair examines the ethics and moral psychology of responses to wrongdoing. Explaining the emotional bonds and normative expectations that keep human beings responsive to moral standards and responsible to each other, Margaret Urban Walker uses realistic examples of both personal betrayal and political violence to analyze how moral bonds are damaged by serious wrongs and what must be done to repair the damage. Focusing on victims of wrong, their right to validation, and their sense of justice, Walker presents a (...)
    Download  
     
    Export citation  
     
    Bookmark   152 citations  
  • A Theory of Justice.J. Rawls - 1971
    Download  
     
    Export citation  
     
    Bookmark   41 citations  
  • Search engines, personal information and the problem of privacy in public.Herman T. Tavani - 2005 - International Review of Information Ethics 3:39-45.
    The purpose of this paper is to show how certain uses of search-engine technology raise concerns for personal privacy. In particular, we examine some privacy implications involving the use of search engines to acquire information about persons. We consider both a hypothetical scenario and an actual case in which one or more search engines are used to find information about an individual. In analyzing these two cases, we note that both illustrate an existing problem that has been exacerbated by the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Imperative of Responsibility: In Search of an Ethics for the Technological Age.Hans Jonas - 1984 - Human Studies 11 (4):419-429.
    Download  
     
    Export citation  
     
    Bookmark   326 citations  
  • Social Trust and Human Communities.Trudy Govier - 1997
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  • Ethical subjectification and search engines: ethics reconsidered.Tobias Blanke - 2005 - International Review of Information Ethics 3:34-38.
    This article will explore the relation of search engines to the freedom they invoke in human subjects. Away from questions about the social impact of search engines and their ethical use, it shall investigate the influence of search engines on ethical subjectifications. The article will criticise the common critique that search engines should only deliver neutral and objective results to their users, where ‘neutral’ and ‘objective’ are defined as anti-subjective. On the contrary, it will argue that search engines are designed (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Esse est indicato in Google: Ethical and political issues in search engines.Lawrence M. Hinman - 2005 - International Review of Information Ethics 3 (6):19-25.
    Search engines play an increasingly pivotal role in the distribution and eventual construction of knowledge, yet they are largely unnoticed, their procedures are opaque, and they are almost completely devoid of independent oversight. In this paper the author examines three areas in which we encounter difficult and persistent ethical issues in search engine technology: The problem of algorithm and the lack of transparency of the search process, the problem of privacy with regards of the possibility to monitor search histories, and (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy vs. security: Why privacy is not an absolute value or right.Kenneth Einar Himma - manuscript
    In this essay, I consider the relationship between the rights to privacy and security and argue that, in a sense to be made somewhat more precise below, that threats to the right to security outweighs comparable threats to privacy. My argument begins with an assessment of ordinary case judgments and an explanation of the important moral distinction between intrinsic value (i.e., value as an end) and instrumental value (i.e., value as a means), arguing that each approach assigns more moral value, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The ethics of search engines (special issue).M. Nagenborg - 2005 - International Review of Information Ethics 3.
    Download  
     
    Export citation  
     
    Bookmark   2 citations