Switch to: Citations

References in:

Technology as Terrorism: Police Control Technologies and Drone Warfare

In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke, Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21 (2021)

Add references

You must login to add references.
  1. Reassembling the Social: An Introduction to the Actor-Network Theory.Bruno Latour - 2005 - Oxford, England and New York, NY, USA: Oxford University Press.
    Latour is a world famous and widely published French sociologist who has written with great eloquence and perception about the relationship between people, science, and technology. He is also closely associated with the school of thought known as Actor Network Theory. In this book he sets out for the first time in one place his own ideas about Actor Network Theory and its relevance to management and organization theory.
    Download  
     
    Export citation  
     
    Bookmark   705 citations  
  • Oppressive Things.Shen-yi Liao & Bryce Huebner - 2021 - Philosophy and Phenomenological Research 103 (1):92-113.
    In analyzing oppressive systems like racism, social theorists have articulated accounts of the dynamic interaction and mutual dependence between psychological components, such as individuals’ patterns of thought and action, and social components, such as formal institutions and informal interactions. We argue for the further inclusion of physical components, such as material artifacts and spatial environments. Drawing on socially situated and ecologically embedded approaches in the cognitive sciences, we argue that physical components of racism are not only shaped by, but also (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  • Risk Society: Towards a New Modernity.Ulrich Beck, Mark Ritter & Jennifer Brown - 1993 - Environmental Values 2 (4):367-368.
    Download  
     
    Export citation  
     
    Bookmark   684 citations  
  • Lying: moral choice in public and private life.Sissela Bok - 1978 - New York: Vintage Books.
    A thoughtful addition to the growing debate over public and private morality. Looks at lying and deception in law, family, medicine, government.
    Download  
     
    Export citation  
     
    Bookmark   246 citations  
  • Moralizing Technology: Understanding and Designing the Morality of Things.Peter-Paul Verbeek - 2011 - University of Chicago Press.
    Technology permeates nearly every aspect of our daily lives. Cars enable us to travel long distances, mobile phones help us to communicate, and medical devices make it possible to detect and cure diseases. But these aids to existence are not simply neutral instruments: they give shape to what we do and how we experience the world. And because technology plays such an active role in shaping our daily actions and decisions, it is crucial, Peter-Paul Verbeek argues, that we consider the (...)
    Download  
     
    Export citation  
     
    Bookmark   112 citations  
  • Killer robots.Robert Sparrow - 2007 - Journal of Applied Philosophy 24 (1):62–77.
    The United States Army’s Future Combat Systems Project, which aims to manufacture a “robot army” to be ready for deployment by 2012, is only the latest and most dramatic example of military interest in the use of artificially intelligent systems in modern warfare. This paper considers the ethics of a decision to send artificially intelligent robots into war, by asking who we should hold responsible when an autonomous weapon system is involved in an atrocity of the sort that would normally (...)
    Download  
     
    Export citation  
     
    Bookmark   260 citations  
  • Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed.James C. Scott - 1999 - Utopian Studies 10 (2):310-312.
    Download  
     
    Export citation  
     
    Bookmark   326 citations  
  • Violence: Six Sideways Reflections.Slavoj Zizek - 2008 - Picador.
    Book synopsis: Philosopher, cultural critic, and agent provocateur Slavoj Žižek constructs a fascinating new framework to look at the forces of violence in our world. Using history, philosophy, books, movies, Lacanian psychiatry, and jokes, Slavoj Žižek examines the ways we perceive and misperceive violence. Drawing from his unique cultural vision, Žižek brings new light to the Paris riots of 2005; he questions the permissiveness of violence in philanthropy; in daring terms, he reflects on the powerful image and determination of contemporary (...)
    Download  
     
    Export citation  
     
    Bookmark   92 citations  
  • Proportionality in the Morality of War.Thomas Hurka - 2004 - Philosophy and Public Affairs 33 (1):34-66.
    Download  
     
    Export citation  
     
    Bookmark   115 citations  
  • Secrets: on the ethics of concealment and revelation.Sissela Bok - 1982 - New York: Oxford University Press.
    Shows how the ethical issues raised by secrets and secrecy in our careers or private lives take us to the heart of the critical questions of private and public morality.
    Download  
     
    Export citation  
     
    Bookmark   97 citations  
  • Actions, Intentions, and Consequences: The Doctrine of Double Effect.Warren S. Quinn - 1989 - Philosophy and Public Affairs 18 (4):334-351.
    Download  
     
    Export citation  
     
    Bookmark   179 citations  
  • Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
    Download  
     
    Export citation  
     
    Bookmark   167 citations  
  • 33. Lying: Moral Choice in Public and Private Life.Sissela Bok - 2014 - In Bernard Williams, Essays and Reviews: 1959-2002. Princeton: Princeton University Press. pp. 161-165.
    Download  
     
    Export citation  
     
    Bookmark   131 citations  
  • Moral responsibility and ignorance.Michael J. Zimmerman - 1997 - Ethics 107 (3):410-426.
    Download  
     
    Export citation  
     
    Bookmark   162 citations  
  • What Stakeholder Theory is Not.Andrew C. Wicks - 2003 - Business Ethics Quarterly 13 (4):479-502.
    Abstract:The term stakeholder is a powerful one. This is due, to a significant degree, to its conceptual breadth. The term means different things to different people and hence evokes praise or scorn from a wide variety of scholars and practitioners. Such breadth of interpretation, though one of stakeholder theory’s greatest strengths, is also one of its most prominent theoretical liabilities. The goal of the current paper is like that of a controlled burn that clears away some of the underbrush of (...)
    Download  
     
    Export citation  
     
    Bookmark   173 citations  
  • A Misdirected Principle with a Catch: Explicability for AI.Scott Robbins - 2019 - Minds and Machines 29 (4):495-514.
    There is widespread agreement that there should be a principle requiring that artificial intelligence be ‘explicable’. Microsoft, Google, the World Economic Forum, the draft AI ethics guidelines for the EU commission, etc. all include a principle for AI that falls under the umbrella of ‘explicability’. Roughly, the principle states that “for AI to promote and not constrain human autonomy, our ‘decision about who should decide’ must be informed by knowledge of how AI would act instead of us” :689–707, 2018). There (...)
    Download  
     
    Export citation  
     
    Bookmark   44 citations  
  • Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account is correct then (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  • Uneasy Access: Privacy for Women in a Free Society.Anita L. Allen - 1988 - Rowman & Littlefield Publishers.
    'Anita L. Allen breaks new ground...A stunning indictment of women's status in contemporary society, her book provides vital original scholarly research and insight.' |s-NEW DIRECTIONS FOR WOMEN.
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  • Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of our lives or shrinking it to (...)
    Download  
     
    Export citation  
     
    Bookmark   50 citations  
  • The Moral Foundations of Social Institutions: A Philosophical Study.Seumas Miller - 2009 - Cambridge University Press.
    In this book, Seumas Miller examines the moral foundations of contemporary social institutions. Offering an original general theory of social institutions, he posits that all social institutions exist to realize various collective ends, indeed, to produce collective goods. He analyses key concepts such as collective responsibility and institutional corruption. Miller also provides distinctive special theories of particular institutions, including governments, welfare agencies, universities, police organizations, business corporations, and communications and information technology entities. These theories are philosophical and, thus, foundational and (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  • Surveillance, Snowden, and Big Data: Capacities, consequences, critique.David Lyon - 2014 - Big Data and Society 1 (2).
    The Snowden revelations about National Security Agency surveillance, starting in 2013, along with the ambiguous complicity of internet companies and the international controversies that followed provide a perfect segue into contemporary conundrums of surveillance and Big Data. Attention has shifted from late C20th information technologies and networks to a C21st focus on data, currently crystallized in “Big Data.” Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid configurations. This is (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  • Autonomous weapons systems, killer robots and human dignity.Amanda Sharkey - 2019 - Ethics and Information Technology 21 (2):75-87.
    One of the several reasons given in calls for the prohibition of autonomous weapons systems (AWS) is that they are against human dignity (Asaro, 2012; Docherty, 2014; Heyns, 2017; Ulgen, 2016). However there have been criticisms of the reliance on human dignity in arguments against AWS (Birnbacher, 2016; Pop, 2018; Saxton, 2016). This paper critically examines the relationship between human dignity and autonomous weapons systems. Three main types of objection to AWS are identified; (i) arguments based on technology and the (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Secrets: On the Ethics of Concealment and Revelation.Sissela Bok - 1985 - Philosophy 60 (231):143-145.
    Download  
     
    Export citation  
     
    Bookmark   91 citations  
  • Double-effect reasoning: doing good and avoiding evil.T. A. Cavanaugh - 2006 - New York: Oxford University Press.
    T. A. Cavanaugh defends double-effect reasoning (DER), also known as the principle of double effect. DER plays a role in anti-consequentialist ethics (such as deontology), in hard cases in which one cannot realize a good without also causing a foreseen, but not intended, bad effect (for example, killing non-combatants when bombing a military target). This study is the first book-length account of the history and issues surrounding this controversial approach to hard cases. It will be indispensable in theoretical ethics, applied (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  • Trump, Parler, and regulating the infosphere as our commons.Luciano Floridi - 2021 - Philosophy and Technology 34 (1):1–⁠5.
    Following the storming of the US Capitol building, Donald Trump became digitally toxic, and was deplatformed from Facebook, Instagram, Twitter and YouTube—as well as a host of other social media networks. Subsequent debate has centred on the questions of whether these companies did the right thing and the possible ramifications of their actions for the future of digital societies along with their democratic organisation. This article seeks to answer this question through examining complex, and seemingly contradictory notions (legality and the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Can we program or train robots to be good?Amanda Sharkey - 2020 - Ethics and Information Technology 22 (4):283-295.
    As robots are deployed in a widening range of situations, it is necessary to develop a clearer position about whether or not they can be trusted to make good moral decisions. In this paper, we take a realistic look at recent attempts to program and to train robots to develop some form of moral competence. Examples of implemented robot behaviours that have been described as 'ethical', or 'minimally ethical' are considered, although they are found to only operate in quite constrained (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Free speech: a philosophical enquiry.Frederick F. Schauer - 1982 - New York: Cambridge University Press.
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  • We need to talk about deception in social robotics!Amanda Sharkey & Noel Sharkey - 2020 - Ethics and Information Technology 23 (3):309-316.
    Although some authors claim that deception requires intention, we argue that there can be deception in social robotics, whether or not it is intended. By focusing on the deceived rather than the deceiver, we propose that false beliefs can be created in the absence of intention. Supporting evidence is found in both human and animal examples. Instead of assuming that deception is wrong only when carried out to benefit the deceiver, we propose that deception in social robotics is wrong when (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • The ethical application of biometric facial recognition technology.Marcus Smith & Seumas Miller - 2022 - AI and Society 37 (1):167-175.
    Biometric facial recognition is an artificial intelligence technology involving the automated comparison of facial features, used by law enforcement to identify unknown suspects from photographs and closed circuit television. Its capability is expanding rapidly in association with artificial intelligence and has great potential to solve crime. However, it also carries significant privacy and other ethical implications that require law and regulation. This article examines the rise of biometric facial recognition, current applications and legal developments, and conducts an ethical analysis of (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Saying 'No!' to Lethal Autonomous Targeting.Noel Sharkey - 2010 - Journal of Military Ethics 9 (4):369-383.
    Plans to automate killing by using robots armed with lethal weapons have been a prominent feature of most US military forces? roadmaps since 2004. The idea is to have a staged move from ?man-in-the-loop? to ?man-on-the-loop? to full autonomy. While this may result in considerable military advantages, the policy raises ethical concerns with regard to potential breaches of International Humanitarian Law, including the Principle of Distinction and the Principle of Proportionality. Current applications of remote piloted robot planes or drones offer (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • The transparent self.Marjolein Lanzing - 2016 - Ethics and Information Technology 18 (1):9-16.
    This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • Ethics in an Age of Surveillance: Personal Information and Virtual Identities.Adam Henschke - 2017 - Cambridge University Press.
    People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Which Slopes are Slippery?Bernard Williams - 1995 - In Making Sense of Humanity: And Other Philosophical Papers 1982–1993. New York: Cambridge University Press.
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  • The Social Dimensions of Privacy.Beate Roessler & Dorota Mokrosinska (eds.) - 2015 - Cambridge University Press.
    Written by a select international group of leading privacy scholars, Social Dimensions of Privacy endorses and develops an innovative approach to privacy. By debating topical privacy cases in their specific research areas, the contributors explore the new privacy-sensitive areas: legal scholars and political theorists discuss the European and American approaches to privacy regulation; sociologists explore new forms of surveillance and privacy on social network sites; and philosophers revisit feminist critiques of privacy, discuss markets in personal data, issues of privacy in (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Autonomous weapons systems and the moral equality of combatants.Michael Skerker, Duncan Purves & Ryan Jenkins - 2020 - Ethics and Information Technology 22 (3):197-209.
    To many, the idea of autonomous weapons systems (AWS) killing human beings is grotesque. Yet critics have had difficulty explaining why it should make a significant moral difference if a human combatant is killed by an AWS as opposed to being killed by a human combatant. The purpose of this paper is to explore the roots of various deontological concerns with AWS and to consider whether these concerns are distinct from any concerns that also apply to long-distance, human-guided weaponry. We (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Killing by Remote Control: The Ethics of an Unmanned Military.Bradley Jay Strawser (ed.) - 2013 - New York, US: Oup Usa.
    A new powerful military weapon has appeared in the skies of world and with it a new form of warfare has quickly emerged bringing with it a host of pressing ethical questions and issues. Killing By Remote Control: The Ethics of an Unmanned Military brings together some of the best scholars currently working on these questions.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • An Eye for an Eye: Proportionality and Surveillance.Kevin Macnish - 2015 - Ethical Theory and Moral Practice 18 (3):529-548.
    It is often claimed that surveillance should be proportionate, but it is rarely made clear exactly what proportionate surveillance would look like beyond an intuitive sense of an act being excessive. I argue that surveillance should indeed be proportionate and draw on Thomas Hurka’s work on proportionality in war to inform the debate on surveillance. After distinguishing between the proportionality of surveillance per se, and surveillance as a particular act, I deal with objections to using proportionality as a legitimate ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Ethics, Security, and the War Machine: The True Cost of the Military.Ned Dobos - 2020 - New York, NY: Oxford University Press.
    This book addresses the question of when and why it is justifiable for a polity to prepare for war by militarizing. In doing so it highlights the ways in which a civilian population compromises its own security in maintaining a permanent military establishment, and explores the moral and social costs of militarization.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Unblinking eyes: the ethics of automating surveillance.Kevin Macnish - 2012 - Ethics and Information Technology 14 (2):151-167.
    In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual, fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the case. In (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • The Social License to Operate.Geert Demuijnck & Björn Fasterling - 2016 - Journal of Business Ethics 136 (4):675-685.
    This article proposes a way to zoom in on the concept of the social license to operate from the broader normative perspective of contractarianism. An SLO can be defined as a contractarian basis for the legitimacy of a company’s specific activity or project. “SLO”, as a fashionable expression, has its origins in business practice. From a normative viewpoint, the concept is closely related to social contract theory, and, as such, it has a political dimension. After outlining the contractarian normative background (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • (1 other version)Free Speech: A Philosophical Enquiry.Frederick Schauer - 1984 - Philosophy and Rhetoric 17 (3):176-178.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • Out of Proportion? On Surveillance and the Proportionality Requirement.Kira Vrist Rønn & Kasper Lippert-Rasmussen - 2020 - Ethical Theory and Moral Practice 23 (1):181-199.
    In this article, we critically scrutinize the principle of proportionality when used in the context of security and government surveillance. We argue that McMahan’s distinction from just warfare between narrow proportionality and wide proportionality can generally apply to the context of surveillance. We argue that narrow proportionality applies more or less directly to cases in which the surveilled is liable and that the wide proportionality principle applies to cases characterized by ‘collateral intrusion’. We argue, however, that a more demanding criterion (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Terrorism without intention.David Rodin - 2004 - Ethics 114 (4):752-771.
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  • The disciplinary power of predictive algorithms: a Foucauldian perspective.Paul B. de Laat - 2019 - Ethics and Information Technology 21 (4):319-329.
    Big Data are increasingly used in machine learning in order to create predictive models. How are predictive practices that use such models to be situated? In the field of surveillance studies many of its practitioners assert that “governance by discipline” has given way to “governance by risk”. The individual is dissolved into his/her constituent data and no longer addressed. I argue that, on the contrary, in most of the contexts where predictive modelling is used, it constitutes Foucauldian discipline. Compliance to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Proportionality and Self-Defense.Suzanne Uniacke - 2011 - Law and Philosophy 30 (3):253-272.
    Proportionality is widely accepted as a necessary condition of justified self-defense. What gives rise to this particular condition and what role it plays in the justification of self-defense seldom receive focused critical attention. In this paper I address the standard of proportionality applicable to personal self-defense and the role that proportionality plays in justifying the use of harmful force in self-defense. I argue against an equivalent harm view of proportionality in self-defense, and in favor of a standard of proportionality in (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Whither the University? Universities of Technology and the Problem of Institutional Purpose.Seumas Miller - 2019 - Science and Engineering Ethics 25 (6):1679-1698.
    There is a need to provide an appropriate normative conception of the modern university: a conception which identifies its unifying purposes and values and, thereby, gives direction to institutional role occupants, governments, public policymakers and other would-be institutional designers. Such a conception could admit differences between modern universities; differences, for example, between so-called universities of technology and other universities. Indeed, it is preferable to frame the issue at the level of higher education or university systems rather than at the level (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Contemporary Approaches to the Social Contract.Fred D'Agostino, John Thrasher & Gerald Gaus - 2011 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Privacy, the Internet of Things and State Surveillance: Handling Personal Information within an Inhuman System.Adam Henschke - 2020 - Moral Philosophy and Politics 7 (1):123-149.
    The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people’s lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, that we ought also to take (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations