Results for 'Internet'

331 found
Order:
  1. A Virtue Epistemology of the Internet: Search Engines, Intellectual Virtues and Education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  2. The Cognitive Ecology of the Internet.Paul Smart, Richard Heersmink & Robert Clowes - 2017 - In Stephen Cowley & Frederic Vallée-Tourangeau (eds.), Cognition Beyond the Brain: Computation, Interactivity and Human Artifice (2nd ed.). Cham, Switzerland: Springer. pp. 251-282.
    In this chapter, we analyze the relationships between the Internet and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory and its species of embedded, embodied, extended, distributed and collective cognition. Having thus set the stage, we begin by taking (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  3. Komputer, Kecerdasan Buatan dan Internet: Filsafat Hubert L. Dreyfus tentang Produk Industri 3.0 dan Industri 4.0 (Computer, Artificial Intelligence and Internet: Dreyfus’s Philosophy on the Product of 3.0 and 4.0 Industries).Zainul Maarif - 2019 - Prosiding Paramadina Research Day.
    The content of this paper is an elaboration of Hubert L. Dreyfus’s philosophical critique of Artificial Intelligence (AI), computers and the internet. Hubert L. Dreyfus (1929-2017) is Ua SA philosopher and alumni of Harvard University who teach at the Massachusetts Institute of Technology (MIT) and University of California, Berkeley. He is a phenomenological philosopher who criticize computer researchers and the artificial intelligence community. In 1965, Dreyfus wrote an article for Rand Corporation titled “Alchemy and Artificial Intelligence” which criticizes the (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  4. Trustworthiness and Truth: The Epistemic Pitfalls of Internet Accountability.Karen Frost-Arnold - 2014 - Episteme 11 (1):63-81.
    Since anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. This paper provides a veritistic argument that accountability mechanisms can cause significant epistemic problems for internet encyclopedias and social media communities. I show that accountability mechanisms can undermine both the dissemination of true beliefs and the detection of error. Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  63
    Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - forthcoming - In Algorithms & Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press:
    NOTE: This material is forthcoming in revised form in Algorithms & Autonomy: The Ethics of Automated Decision Systems by Alan Rubel, Clinton Castro, and Adam Pham (Cambridge University Press). This version is free to view and download for private research and study only. It is not for re-distribution or re-use. Please cite to the final version when available. © Alan Rubel, Clinton Castro, and Adam Pham. ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Towards a Just and Fair Internet: Applying Rawls’ Principles of Justice to Internet Regulation.David M. Douglas - 2015 - Ethics and Information Technology 17 (1):57-64.
    I suggest that the social justice issues raised by Internet regulation can be exposed and examined by using a methodology adapted from that described by John Rawls in 'A Theory of Justice'. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the 'original position' as a method of removing bias in decision-making about justice. The original position imposes a 'veil of ignorance' that hides the particular circumstances of individuals from them so that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  8. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2019 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech and high (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  88
    The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Ethics of the Health-Related Internet of Things: A Narrative Review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  11. Knowledge, Democracy, and the Internet.Nicola Mößner & Philip Kitcher - 2017 - Minerva 55 (1):1-24.
    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a democratization of knowledge. In the following text, we will analyze this statement. In particular, we will focus on a potential change in epistemic structure. Does the internet change our common epistemic practice to rely on expert (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Designing the Health-Related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Towards the Epistemology of the Internet of Things Techno-Epistemology and Ethical Considerations Through the Prism of Trust.Ori Freiman - 2014 - International Review of Information Ethics 22:6-22.
    This paper discusses the epistemology of the Internet of Things [IoT] by focusing on the topic of trust. It presents various frameworks of trust, and argues that the ethical framework of trust is what constitutes our responsibility to reveal desired norms and standards and embed them in other frameworks of trust. The first section briefly presents the IoT and scrutinizes the scarce philosophical work that has been done on this subject so far. The second section suggests that the field (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. What Can a Medieval Friar Teach Us About the Internet? Deriving Criteria of Justice for Cyberlaw From Thomist Natural Law Theory.Brandt Dainow - 2013 - Philosophy and Technology 26 (4):459-476.
    This paper applies a very traditional position within Natural Law Theory to Cyberspace. I shall first justify a Natural Law approach to Cyberspace by exploring the difficulties raised by the Internet to traditional principles of jurisprudence and the difficulties this presents for a Positive Law Theory account of legislation of Cyberspace. This will focus on issues relating to geography. I shall then explicate the paradigm of Natural Law accounts, the Treatise on Law, by Thomas Aquinas. From this account will (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Internet and Advertisement.Khaled Moustafa - 2016 - Science and Engineering Ethics 22 (1):293-296.
    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Ontological Revolution: On the Phenomenology of the Internet.Alexandros Schismenos - 2016 - SOCRATES 4 (2):56-67.
    Cogitation described as calculation, the living being described as a machine, cognitive functions considered as algorithmic sequences and the ‘mechanization’ of the subjective were the theoretical elements that late heideggerian anti–humanism, especially in France was able to utilize[1], even more so, after the second cybernetics or post-cybernetics movement of the late ‘60s introduced the concepts of the autopoietic and the allopoietic automata[2]. Recently, neurologists pose claims on the traditional epistemological field of philosophy, proceeding from this ontological decision, the equation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Deception: From Ancient Empires to Internet Dating. [REVIEW]James Edwin Mahon - 2012 - Philosophy in Review 32 (4):275-278.
    In this review of Brooke Harrington's edited collection of essays on deception, written by people from different disciplines and giving us a good "status report" on what various disciplines have to say about deception and lying, I reject social psychologist Mark Frank's taxonomy of passive deception, active consensual deception, and active non-consensual deception (active consensual deception is not deception), as well as his definition of deception as "anything that misleads another for some gain" ("for gain" is a reason for engaging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  48
    Homo Virtualis: Existence in Internet Space.Daria Bylieva, Victoria Lobatyuk & Anna Rubtsova - 2018 - SHS Web of Conference 44:00021.
    The study of a person existence in Internet space is certainly an actual task, since the Internet is not only a source of innovation, but also the cause of society's transformations and the social and cultural problems that arise in connection with this. Computer network is global. It is used by people of different professions, age, level and nature of education, living around the world and belonging to different cultures. It complicates the problem of developing common standards of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  10
    Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. The Internet, Cognitive Enhancement, and the Values of Cognition.Richard Heersmink - 2016 - Minds and Machines 26 (4):389-407.
    This paper has two distinct but related goals: (1) to identify some of the potential consequences of the Internet for our cognitive abilities and (2) to suggest an approach to evaluate these consequences. I begin by outlining the Google effect, which (allegedly) shows that when we know information is available online, we put less effort into storing that information in the brain. Some argue that this strategy is adaptive because it frees up internal resources which can then be used (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   16 citations  
  21. Justified Belief in a Digital Age: On the Epistemic Implications of Secret Internet Technologies.Boaz Miller & Isaac Record - 2013 - Episteme 10 (2):117 - 134.
    People increasingly form beliefs based on information gained from automatically filtered Internet ‎sources such as search engines. However, the workings of such sources are often opaque, preventing ‎subjects from knowing whether the information provided is biased or incomplete. Users’ reliance on ‎Internet technologies whose modes of operation are concealed from them raises serious concerns about ‎the justificatory status of the beliefs they end up forming. Yet it is unclear how to address these concerns ‎within standard theories of knowledge (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  22. Internet-Based Commons of Intellectual Resources: An Exploration of Their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Some Information is Too Dangerous to Be on the Internet.Vincent C. Müller - 2006 - Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category includes information the use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  54
    #Palladium of the People: A Kantian Right to Internet Access.Christopher Buckman - 2017 - Sociologia: Rivista Quadrimestrale di Scienze Storiche E Sociali 51 (3).
    Lack of high-speed internet access remains a problem in the United States, particularly in rural areas, Tribal lands, and the U.S. territories. High-speed internet should be considered a basic right because it connects people to social media, the new public sphere. Critics worry about the politically polarizing effects of online social media, but its ability to unify, connect, and shape policy decisions should also be taken into account. Engaging with Jürgen Habermas’s early work on the public sphere, I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. La democrazia nell’era di Internet. Per una politica dell’intelligenza collettiva.Luca Corchia - 2011 - le Lettere.
    Le discussioni sulle tecnologie digitali e Internet e sulle loro applicazioni nel campo della politica sono l’inevitabile portato di un mutamento di più ampia rilevanza che coinvolge ogni aspetto economico, sociale e culturale della contemporaneità. È in corso una “rivoluzione tecnologica” di cui ancora non siamo pienamente consapevoli, che scombina assetti ritenuti stabili e sposta l’orizzonte del possibile. Il ceto politico in parte la condiziona e in parte la subisce. Nell’uno e nell’altro caso, possiamo rilevare che non è in (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  26. The Internet and Privacy.Carissa Véliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. Abingdon, UK: pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark  
  27.  51
    Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  29
    Cross-National Associations Among Cyberbullying Victimization, Self-Esteem, and Internet Addiction: Direct and Indirect Effects of Alexithymia.Sebastian Wachs, Alexander T. Vazsonyi, Michelle F. Wright & Gabriela Ksinan Jiskrova - 2020 - Frontiers in Psychology 11.
    Download  
     
    Export citation  
     
    Bookmark  
  29.  92
    Ownership of Personal Data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  35
    Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  14
    A Review Paper on Internet of Things and It’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  17
    Internet Topology:Forces Behind A Shift From Hierarchical To Flattened Peering.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Engineering Research (IJAER) 2 (3):16-21.
    Abstract: Internet is a network of networks which share information to each other through Internet Protocol. Internet taxonomy was designed to not depend on a single point of access to propagate information from host source to host destination, this had led to dependability among Autonomous Systems for reachability and connectivity information. Internet, a highly engineered, large scale complex system, viewed as a hierarchy of connected tiers of Autonomous Systems from which lower tier depend on higher tier (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Internet Characteristics and Online Alternative Dispute Resolution.Bashar H. Malkawi - 2008 - Harvard Negotiation Law Review 13:327-348.
    Electronic commerce is important, and perhaps, inevitable. Thus, to consider the legal implications of the growth and development of electronic commerce is essential. However, the lack of suitable dispute resolution mechanisms in cyberspace will constitute a serious obstacle to the further development of electronic commerce. Bearing this in mind, this thesis argues that when Alternative Dispute Resolution (ADR) moves to cyberspace, particularly arbitration and mediation as the main types of ADR, the form of Online Alternative Dispute Resolution (OADR) can maximize (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Dwelling In the House That Porn Built: A Phenomenological Critique of Pornography In the Age of Internet Technology.Justin L. Harmon - 2012 - Social Philosophy Today 28:115-130.
    This paper is a critique of pornography from within the framework of Heideggerian phenomenology. I contend that pornography is a pernicious form of technological discourse in which women are reduced to spectral and anonymous figures fulfilling a universal role, namely that of sexual subordination. Further, the danger of pornography is covered over in the public sphere as a result of the pervasive appeal to its status as mere fantasy. I argue that relegating the problem to the domain of fantasy is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Commentary On: Marcin Lewiński’s “‘You’Re Moving From Irrelevant to Irrational’—Critical Reactions in Internet Discussion Forums”.Gilbert Plumer - 2009 - In Juho Ritola (ed.), Argument Cultures. Proceedings of the 8th OSSA Conference [CD-ROM]. Ontario Society for the Study of Argumentation. pp. 1-3.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  9
    Internet of Things Future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  32
    Derecho al olvido en Internet: Google y la doctrina europea.David Villena Saldaña - 2015 - Contratexto 23 (23):259-269.
    This essay accounts for part of the moral, social and legal problems behind the attempts for justifying and implementing the so-called right to be forgotten in the Internet. Such right implies that –under certain circumstances–individuals are entitled to demand that search engines remove links containing their personal information. Our inquiry reflects on a ruling issued by the Court of Justice of the European Union and made public on May 13th 2014, as well as on the recommendations conveyed in Article (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  38. Preconception Sex Selection: A Survey of Visitors to an Internet-Based Health Forum.Edgar Dahl - 2008 - Reproductive Biomedicine Online 16 (1):18-26.
    The aim of this survey was to explore the attitudes towards gender selection, focusing on people who were affected by infertility and also familiar with advanced technologies such as the internet. Although this survey is based almost exclusively on answers from women, it seems reasonable to conclude that a widely available service for preconception sex selection for non-medical reasons would not cause a severe gender imbalance in Germany.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  39.  28
    Transparency in Internet Regulation and Governance: Arguments and Counter-Arguments with Some Methodological Reflections.Gianluca Andresani & Natalina Stamile - 2018 - Revista Brasileira de Estudos Políticos 117:443-476.
    The debate on the argumentative turn in Public Policy and Administration (PPA), as reflective of the influence of politico-legal theory on the discipline, is reviewed with a thorough and indepth engagement with the Argumentation Theory (AT) literature. The focus in this article is in fact of a methodological nature since we argue that critical scholars - who have contributed to the general and specialized (i.e. political discourse analysis and critical contextualism) literature of AT as well as politico-legal theory - pave (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Applied Political Philosophy on the Internet: The New Pacific Order.Patrick Gellar - forthcoming - In New Crop Prize Submissions. Berkeley?.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  41.  54
    Online Intellectual Virtues and the Extended Mind.Lukas Schwengerer - forthcoming - Social Epistemology:1-11.
    The internet has become an ubiquitous epistemic source. However, it comes with several drawbacks. For instance, the world wide web seems to foster filter bubbles and echo chambers and includes search results that promote bias and spread misinformation. Richard Heersmink suggests online intellectual virtues to combat these epistemically detrimental effects . These are general epistemic virtues applied to the online environment based on our background knowledge of this online environment. I argue that these online intellectual virtues also demand a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  48
    Exploring New Zealand Children’s Technology Access, Use, Skills and Opportunities. Evidence From Ngā Taiohi Matihiko o Aotearoa - New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    While children’s interaction with digital technologies is a matter of interest around the world, evidence based on nationally representative data about how integrated these tools are in children’s everyday life is still limited in New Zealand. This research report presents findings from a study that explores children’s internet access, online skills, practices, and opportunities. This report is part of Netsafe’s research project Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online, and our first publication as a member of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Extended Cognition and the Explosion of Knowledge.David Ludwig - 2014 - Philosophical Psychology (3):1-14.
    The aim of this article is to show that externalist accounts of cognition such as Clark and Chalmers' (1998) “active externalism” lead to an explosion of knowledge that is caused by online resources such as Wikipedia and Google. I argue that externalist accounts of cognition imply that subjects who integrate mobile Internet access in their cognitive routines have millions of standing beliefs on unexpected issues such as the birth dates of Moroccan politicians or the geographical coordinates of villages in (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  44. Corpus Analysis in Philosophy.Roland Bluhm - 2016 - In Martin Hinton (ed.), Evidence, Experiment and Argument in Linguistics and the Philosophy of Language. Peter Lang. pp. 91-109.
    The experimental philosophy movement advocates the use of empirical methods in philosophy. The methods most often discussed and in fact employed in experimental philosophy are appropriated from the experimental paradigm in psychology. But there is a variety of other (at least partly) empirical methods from various disciplines that are and others that could be used in philosophy. The paper explores the application of corpus analysis to philosophical issues. Although the method is well established in linguistics, there are only a few (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  45.  36
    On the Net: Baran, Dreyfus, Merleau-Ponty, and Austin.Yusuke Kaneko - 2020 - The Basis : The Annual Bulletin of Research Center for Liberal Education, Musashino University 10:183-201.
    The Internet was born in 1960’s, then Internet ethics appeared as a branch of information ethics. It seems, however, our status on the Net is not yet scrutinized. We investigate this problem with the help of philosophers like Dreyfus, Merleau-Ponty, and Austin.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Trusting Virtual Trust.Paul B. de Laat - 2005 - Ethics and Information Technology 7 (3):167-180.
    Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  47. AI Can Help Us Live More Deliberately.Julian Friedland - 2019 - MIT Sloan Management Review 60 (4).
    Our rapidly increasing reliance on frictionless AI interactions may increase cognitive and emotional distance, thereby letting our adaptive resilience slacken and our ethical virtues atrophy from disuse. Many trends already well underway involve the offloading of cognitive, emotional, and ethical labor to AI software in myriad social, civil, personal, and professional contexts. Gradually, we may lose the inclination and capacity to engage in critically reflective thought, making us more cognitively and emotionally vulnerable and thus more anxious and prone to manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Re-Examining the Gene in Personalized Genomics.Jordan Bartol - 2013 - Science & Education 22 (10):2529-2546.
    Personalized genomics companies (PG; also called ‘direct-to-consumer genetics’) are businesses marketing genetic testing to consumers over the Internet. While much has been written about these new businesses, little attention has been given to their roles in science communication. This paper provides an analysis of the gene concept presented to customers and the relation between the information given and the science behind PG. Two quite different gene concepts are present in company rhetoric, but only one features in the science. To (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  35
    Percepciones y sentidos de los sagrado en las generaciones digitales.Jorge Balladares & Mauro AViles - 2020 - Perseitas 8 (1):142-159.
    The purpose of this article is to inquire into the perception and sense of what is considered sacred by youth mediated by the use of technology, the internet and social media. Based on an approximation to digital young generations and theirperception of what is considered sacred, there is an approach to investigatereligion and digital culture. What is sacred is built and showed in alternativespaces out of traditional institutions, such as the internet and social media. Thecyberspace allows what is (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  50.  77
    Electronic Banking Services From the Point of View of Bank Customers in Palestine.Suliman A. El Talla, Mazen J. Al Shobaki & Samy S. Abu-Naser - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (10):45-60.
    This study aims to identify the electronic banking services in Palestine from the point of view of the customers of the banks, where researchers used the descriptive analytical method, through a questionnaire distributed electronically to the sample of beneficiaries of the electronic banking services provided by banks operating in Palestine. The study reached a number of results, the most important of which are: There is a moderate degree of efficiency of electronic banking services provided in banks operating in Palestine from (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 331