Results for 'Online Abuse'

1000+ found
Order:
  1. Who Do You Speak For? And How?: Online Abuse as Collective Subordinating Speech Acts.Michael Randall Barnes - 2023 - Journal of Ethics and Social Philosophy 25 (2):251—281.
    A lot of subordinating speech has moved online, which raises several questions for philosophers. Can current accounts of oppressive speech adequately capture digital hate? How does the anonymity of online harassers contribute to the force of their speech? This paper examines online abuse and argues that standard accounts of licensing and accommodation are not up to the task of explaining the authority of online hate speech, as speaker authority often depends on the community in more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Child abuse: A reality to be exposed.Subhasis Chattopadhyay - 2014 - Merinews.Com.
    I occasionally write on topics relating to psychology since I am a trained psychoanalyst. One of the evils which plagues us is child abuse which a psychologist had correctly called soul murder in the 1990s. This article was written to sensitize parents. And also is philosophy (of evil) in praxes.
    Download  
     
    Export citation  
     
    Bookmark  
  3. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  4. abuse to human greed and its impulse else-the two legends ...Rituparna Ray Chaudhuri - 2015
    "My boat was moored beside an old bathing 'ghat' of the river, almost in ruins. The sun had set,"...https://youtu.be/VAhd2GNf1js. (http://philpapers.org/profile/112741).
    Download  
     
    Export citation  
     
    Bookmark  
  5. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Exploring New Zealand children’s technology access, use, skills and opportunities. Evidence from Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    While children’s interaction with digital technologies is a matter of interest around the world, evidence based on nationally representative data about how integrated these tools are in children’s everyday life is still limited in New Zealand. This research report presents findings from a study that explores children’s internet access, online skills, practices, and opportunities. This report is part of Netsafe’s research project Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online, and our first publication as a member (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Child Abuse and Health Promotion.Hang K. Nguyen, Trang T. Le, My Nguyen & Kien Le - 2013 - Working Paper.
    Lạm dụng và bỏ bê trẻ еm đаng diễn rа phổ biến trên tоàn сầu. Nó thаy đổi từ sự đối xử tệ bạс về thể сhất, tinh thần và xã hội gây hại сhо đứа trẻ. Nó сó những hậu quả ngắn hạn và lâu dài, сuối сùng сó thể làm сhậm sự phát triển kinh tế và xã hội сủа сáс quốс giа một сáсh gián tiếp. Người tа ướс tính rằng сứ 5 phụ nữ và 1 trоng (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The State of Child Abuse in Poor Countries.Hang K. Nguyen, Trang T. Le, My Nguyen & Kien Le - 2009 - Working Paper.
    Lạm dụng và bỏ bê trẻ еm đаng diễn rа phổ biến trên tоàn сầu. Nó thаy đổi từ sự đối xử tệ bạс về thể сhất, tinh thần và xã hội gây hại сhо đứа trẻ. Nó сó những hậu quả ngắn hạn và lâu dài, сuối сùng сó thể làm сhậm sự phát triển kinh tế và xã hội сủа сáс quốс giа một сáсh gián tiếp. Người tа ướс tính rằng сứ 5 phụ nữ và 1 trоng (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  51
    Public Secondary Education in Rural Areas in Haiti - Dominance and Abuse of Power Through The Lens of Polarities of Democracy Theory.Calixte-Hallworth Marjorie - 2024 - Agpe the Royal Gondwana Research Journal.
    Public secondary schools are scarcely available to children in rural Haiti who want to continue their education beyond primary school. While some remote communities may offer private schools, poor families simply cannot afford to send their children to private schools or even move to a city where they have options to attend public secondary schools. The research examined the perspectives of well-informed Haitian educators and other educators who were familiar with the issue of limited access to public secondary education in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Cognitive Biases for the Design of Persuasive Technologies: Uses, Abuses and Ethical Concerns.Antonio Lieto - 2021 - ACM Distinguished Speakers - Lecture Series.
    In the last decades Human-Computer Interaction (HCI) has started to focus attention on “persuasive technologies” having the goal of changing users’ behavior and attitudes according to a predefined direction. In this talk we show how some of the techniques employed in such technologies trigger some well known cognitive biases by adopting a strategy relying on logical fallacies (i.e. forms of reasoning which are logically invalid but psychologically persuasive). In particular, we will show how the mechanisms reducible to logical fallacies are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  93
    Văn minh làm giàu từ góc nhìn của một người Việt.Dân-Trí Online - 2007 - Dân Trí Online.
    (Dân trí) - Bạn hãy thử hình dung một bức tranh thể hiện hình ảnh một thương gia cưỡi một chú lạc đà. Dưới chân họ chỉ có cát nóng bỏng của sa mạc khô cằn, phía sau lưng họ là ánh mặt trời chói lòa, bỏng rát. Hai bên đường chỉ có sương rồng gai góc, như biểu trưng cho hành trình vất vả đầy chông gai. Một điều gây bất ngờ: chú lạc đà lại kéo theo một chiếc (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Factsheet: Who is sending and sharing potentially harmful digital communications?Neil Melhuish & Edgar Pacheco - 2021 - In Neil Melhuish & Edgar Pacheco (eds.), Netsafe. Netsafe.
    This factsheet presents findings from a quantitative study looking at adults’ experiences of sending and sharing potentially harmful digital communications in New Zealand. Typically research into harmful digital communications focuses on the experiences of those on the receiving end – the victims. However, to better address the distress and harm caused, information is needed about the people sending and sharing potentially harmful messages and posts. In this study we asked adult New Zealanders whether they had sent potentially harmful digital communications (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. The socio-economic argument for the human right to internet access.Merten Reglitz - 2023 - Politics, Philosophy and Economics 22 (4): 441-469.
    This paper argues that Internet access should be recognised as a human right because it has become practically indispensable for having adequate opportunities to realise our socio-economic human rights. This argument is significant for a philosophically informed public understanding of the Internet and because it provides the basis for creating new duties. For instance, accepting a human right to Internet access minimally requires guaranteeing access for everyone and protecting Internet access and use from certain objectionable interferences (e.g. surveillance, censorship, (...) abuse). Realising this right thus requires creating an Internet that is crucially different from the one we currently have. The argument thus has wide-ranging implications. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  79
    The Face of Technology-Facilitated Aggression in New Zealand: Exploring Adult Aggressors’ Behaviors.Edgar Pacheco & Neil Melhuish - 2021 - In Jane Bailey, Asher Flynn & Nicola Henry (eds.), The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald Publishing Limited. pp. 103-123.
    The nature and extent of adults’ engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Subordinating Speech and the Construction of Social Hierarchies.Michael Randall Barnes - 2019 - Dissertation, Georgetown University
    This dissertation fits within the literature on subordinating speech and aims to demonstrate that how language subordinates is more complex than has been described by most philosophers. I argue that the harms that subordinating speech inflicts on its targets (chapter one), the type of authority that is exercised by subordinating speakers (chapters two and three), and the expansive variety of subordinating speech acts themselves (chapter three) are all under-developed subjects in need of further refinement—and, in some cases, large paradigm shifts. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Children's Health in the Digital Age.Birgitta Dresp-Langley - 2020 - International Journal of Environmental Research and Public Health 9 (17):299..
    Can we identify potential long-term consequences of digitalisation on public health? Environmental studies, metabolic research, and state of the art research in neurobiology point towards the reduced amount of natural day and sunlight exposure of the developing child, as a consequence of increasingly long hours spent indoors online, as the single unifying source of a whole set of health risks identified worldwide, as is made clear in this review of currently available literature. Over exposure to digital environments, from (...) to addiction, now concerns even the youngest (ages 0 to 2) and triggers, as argued on the basis of clear examples herein, a chain of interdependent negative and potentially long-term metabolic changes. This leads to a deregulation of the serotonin and dopamine neurotransmitter pathways in the developing brain, currently associated with online activity abuse and/or internet addiction, and akin to that found in severe substance abuse syndromes. A general functional working model is proposed under the light of evidence brought to the forefront in this review. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Technology to Prevent Criminal Behavior.Gabriel De Marco & Thomas Douglas - 2021 - In David Edmonds (ed.), Future Morality. Oxford: Oxford University Press.
    The Case of Jim: Jim was arrested arriving at the house of an unattended minor, having brought with him some alcoholic drinks, condoms, and an overnight bag. Records of online conversations Jim was having with the minor give the court strong evidence that the purpose of this meet-up was to engage in sexual relations with the minor. In the course of searching his home computer, investigators also found child pornography. Jim was charged with intent to sexually abuse a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Effects of Porn: A Critical Analysis.Rory Collins - 2019 - 1890: A Journal of Undergraduate Research 3:28-40.
    The impacts of pornography are varied and complex. Performers are often thought to be victims of abuse and exploitation, while viewers are regularly accused of becoming desensitized to sexual violence. Further, porn is held by some to perpetuate damaging racial and gender stereotypes. I contend that these accusations, though not entirely baseless, are undermined for two reasons: they rest on questionable empirical evidence and ignore many of the positive consequences porn may have. In this article, I organize my analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. The Rising Tide of Artificial Intelligence in Scientific Journals: A Profound Shift in Research Landscape.Ricardo Grillo - 2023 - European Journal of Therapeutics 29 (3):686-688.
    Dear Editors, -/- I found the content of your editorials to be highly intriguing [1,2]. Scientific journals are witnessing a growing prevalence of publications related to artificial intelligence (AI). Three letters to the editor were recently published in your journal [3-5]. The renowned journal Nature has dedicated approximately 25 publications solely to the subject of ChatGPT. Moreover, a quick search on Pubmed using the term "ChatGPT" yields around 900 articles, with the vast majority originating in 2023. These statistics underscore the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Etica della ragione. La filosofia dell'uomo tra nichilismo e confronto interculturale.Angelo Campodonico - 1999 - Milano: Jaca book.
    Preface -/- This volume was published in 2000 by Jaca Book under the title Ethics of Reason. La filosofia dell'uomo nell'epoca del nichilismo e del confronto interculturale (The Philosophy of Man in the Age of Nihilism and Intercultural Confrontation) and is now long out of print. I gladly republish it online because, for the most part, I still recognize myself in what was written. The book had required considerable work and had been prepared by many years of study at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Encountering Evil: The Evil-god Challenge from Religious Experience.Asha Lancaster-Thomas - 11th July Online - European Journal for Philosophy of Religion 12 (3):0-0.
    It is often thought that religious experiences provide support for the cumulative case for the existence of the God of classical monotheism. In this paper, I formulate an Evil-god challenge that invites classical monotheists to explain why, based on evidence from religious experience, the belief in an omnipotent, omniscient, omnibenevolent god is significantly more reasonable than the belief in an omnipotent, omniscient, evil god. I demonstrate that religious experiences substantiate the existence of Evil-god more so than they do the existence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Online Public Shaming: Virtues and Vices.Paul Billingham & Tom Parr - 2020 - Journal of Social Philosophy 51 (3):371-390.
    We are witnessing increasing use of the Internet, particular social media, to criticize (perceived or actual) moral failings and misdemeanors. This phenomenon of so-called ‘online public shaming’ could provide a powerful tool for reinforcing valuable social norms. But it also threatens unwarranted and severe punishments meted out by online mobs. This paper analyses the dangers associated with the informal enforcement of norms, drawing on Locke, but also highlights its promise, drawing on recent discussions of social norms. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  23.  89
    The Abuse of Expertise and the Problem with Public Economics.Gordon Barnes - forthcoming - Social Theory and Practice.
    In recent decades, economists have played an active role in shaping public policy by publicly recommending the adoption of certain policies. These recommendations are often based on normative assumptions that are not the product of economic analysis; nor are they shared by the laypeople to whom these recommendations are made. Inducing people to adopt public policies for reasons that are neither the product of expertise, nor shared by the people, is a form of manipulation that violates the ideals of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Online Intellectual Virtues and the Extended Mind.Lukas Schwengerer - 2021 - Social Epistemology 35 (3):312-322.
    The internet has become an ubiquitous epistemic source. However, it comes with several drawbacks. For instance, the world wide web seems to foster filter bubbles and echo chambers and includes search results that promote bias and spread misinformation. Richard Heersmink suggests online intellectual virtues to combat these epistemically detrimental effects . These are general epistemic virtues applied to the online environment based on our background knowledge of this online environment. I argue that these online intellectual virtues (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  25. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  26. The opportunities and challenges of blockchain in the fight against government corruption.Nikita Aggarwal & Luciano Floridi - 2018 - 19th General Activity Report (2018) of the Council of Europe Group of States Against Corruption (GRECO).
    Broadly defined, government corruption is the abuse of public power for private gain. It can assume various forms, including bribery, embezzlement, cronyism, and electoral fraud. At root, however, government corruption is a problem of trust. Corrupt politicians abuse the powers entrusted to them by the electorate (the principal-agent problem). Politicians often resort to corruption out of a lack of trust that other politicians will abstain from it (the collective action problem). Corruption breeds greater mistrust in elected officials amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  77
    Belonging Online: Rituals, Sacred Objects, and Mediated Interations.Lucy Osler - forthcoming - In Luna Dolezal & Danielle Petherbridge (eds.), Phenomenology of Belonging.
    In this chapter, I explore how experiences of social belonging might emerge and be sustained in online communities, drawing from the work on rituals by Randall Collins. I argue that rather than viewing mediated interactions in terms of whether they are suitable substitutes for face-to-face interactions, we should consider mediated encounters in their own right. This allows us to recognize the creative ways that people can create rituals in a mediated setting and thus support and create a sense of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Metaphor Abuse in the Time of Coronavirus: A Reply to Lynne Tirrell.Shane J. Ralston - 2021 - Southwest Philosophy Review 37 (1):89-99.
    In the time of Coronavirus, it is perhaps as good a time as any to comment on the use and abuse of metaphors. One of the worst instances of metaphor abuse-especially given the recent epidemiological crisis-is Lynne Tirrell's notion of toxic speech. In the foregoing reply piece, I analyze Tirrell's metaphor and reveal how it blinds us to the liberating power of public speech. Lynne Tirrell argues that some speech is, borrowing from field of Epidemiology, toxic in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Online Misinformation and “Phantom Patterns”: Epistemic Exploitation in the Era of Big Data.Megan Fritts & Frank Cabrera - 2021 - Southern Journal of Philosophy 60 (1):57-87.
    In this paper, we examine how the availability of massive quantities of data i.e., the “Big Data” phenomenon, contributes to the creation, spread, and harms of online misinformation. Specifically, we argue that a factor in the problem of online misinformation is the evolved human instinct to recognize patterns. While the pattern-recognition instinct is a crucial evolutionary adaptation, we argue that in the age of Big Data, these capacities have, unfortunately, rendered us vulnerable. Given the ways in which (...) media outlets profit from the spread of misinformation by preying on this pattern-finding instinct, we conceptualize the problem that we identify as a morally objectionable form of “epistemic exploitation.” As we argue, the consumer of digital misinformation is often exploited by having her pattern-recognition instinct used against her. This exploitation is morally objectionable because it deprives her of an epistemic good to which she has a right. This epistemic good is the integrity of the pattern-recognition instinct itself which, we argue, is a capacity that allows us to participate in uniquely human goods. While our primary goal is to bring attention to this form of epistemic exploitation, we conclude by briefly evaluating some general solutions to the growing problem of online misinformation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Amidst the Online Learning Modality: The Social Support and Its Relationship to the Anxiety of Senior High School Students.Jastine Joy Basilio, Twinkle Pangilinan, Jeremiah Joy Kalong & Jhoselle Tus - 2022 - Psychology Abd Education: A Multidisciplinary Journal 1 (1):1-6.
    Senior high school is known to be part of the newly implemented K-12 program in the Philippines' educational system. Hence, this program added two years to the academic learning program of students, which mainly focuses on different theoretical and vocational strands that aim to prepare and fully furnish the students for education and employment in the future. Due to adjustments to new online learning amidst the pandemic, students begin to experience various challenges, primarily social support and mental well-being. Hence, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  31. Online Sellers' Lived Experiences and Challenges: A Qualitative Study Amidst COVID-19 Pandemic.Rhoyet Cruz, Eden Joy Frontuna, Lauren Grace Tabieros, Janz Glenn Lanozo, Ernest John Deato & Jhoselle Tus - 2022 - Psychology and Education: A Multidisciplinary Journal 12 (1):59-105.
    With the surge of the COVID-19 pandemic, online sellers faced challenges in managing their online business daily. Aside from it, their work-life balance has been negatively affected as well, considering that they work from home and are responsible for household responsibilities. Thus, this study is conducted during the pandemic and gathered data using a semi-structured interview through Messenger call. It is conducted to explore the lived experiences of online sellers and how they managed their online business (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Women Abuse Screening Tool: A Validation Study on Nigerian Pregnant Women.Ibukunoluwa B. Bello, Ebernezer O. Akinnawo & Bede C. Akpunn - 2020 - International Journal of Scientific Research and Management (IJSRM) 8 (6).
    Domestic violence is identified across the globe as a menace as it poses a threat to the mental health of its victims, the significant others of the victim and the security of a nation at large. In some cases, the victim of domestic violence is a pregnant woman and harm is caused not only to a woman but her fetus also and this calls for urgent psychological assessment and intervention. Although there is no doubt that psychological tests are effective in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Online hate speech: A survey on personal experiences and exposure among adult New Zealanders.Pacheco Edgar & Neil Melhuish - 2018 - Netsafe.
    Online hate speech has been a topic of public concern and research interest for some time. Initially the focus of this centred on the proliferation of online groups and websites promoting and distributing discriminatory content. Since the introduction of more interactive tools and platforms in the mid-2000s that enabled new and faster ways of disseminating content in a relatively anonymous fashion, concerns about online hate speech becoming a pervasive behavior have increased. Current research and analysis acknowledge the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Online update: Temporal, modal, and de se anaphora in polysynthetic discourse.Maria Bittner - 2007 - In Chris Barker & Pauline Jacobson (eds.), Direct Compositionality. Oxford University Press. pp. 11--363.
    This paper introduces a framework for direct surface composition by online update. The surface string is interpreted as is, with each morpheme in turn updating the input state of information and attention. A formal representation language, Logic of Centering, is defined and some crosslinguistic constraints on lexical meanings and compositional operations are formulated.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  35. Child abuse remains mundane even under symbolic disguise: highlights from an Albanian post WWII movie.Gentian Vyshka - 2020 - Asian Journal of Language, Literature and Culture Studies 3 (4):28-37.
    Artistic work during communist regime in Albania has been a strictly controlled area, due to censorship and ideological limitations. However, the creative genius of some individuals was able to transmit religious images in a disguised form, particularly when themes were permissive to ambiguous messages. Depicting child abuse was a taboo for the everyday life, but not when focusing on certain historical periods that were purposefully stigmatized from the state propaganda. Some snapshots and images from the movie ‘Red poppies on (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Victims of Trafficking, Reproductive Rights, and Asylum.Diana Tietjens Meyers - 2016 - Oxford Handbook of Reproductive Ethics.
    My aim is to extend and complement the arguments that others have already made for the claim that women who are citizens of economically disadvantaged states and who have been trafficked into sex work in economically advantaged states should be considered candidates for asylum. Familiar arguments cite the sexual violence and forced labor that trafficked women are subjected to along with their well-founded fear of persecution if they’re repatriated. What hasn’t been considered is that reproductive rights are also at stake. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Online Deliberation: Design, Research, and Practice.Todd Davies & Seeta Peña Gangadharan (eds.) - 2009 - CSLI Publications/University of Chicago Press.
    Can new technology enhance purpose-driven, democratic dialogue in groups, governments, and societies? Online Deliberation: Design, Research, and Practice is the first book that attempts to sample the full range of work on online deliberation, forging new connections between academic research, technology designers, and practitioners. Since some of the most exciting innovations have occurred outside of traditional institutions, and those involved have often worked in relative isolation from each other, work in this growing field has often failed to reflect (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. (Online) Manipulation: Sometimes Hidden, Always Careless.Michael Klenk - forthcoming - Review of Social Economy.
    Ever-increasing numbers of human interactions with intelligent software agents, online and offline, and their increasing ability to influence humans have prompted a surge in attention toward the concept of (online) manipulation. Several scholars have argued that manipulative influence is always hidden. But manipulation is sometimes overt, and when this is acknowledged the distinction between manipulation and other forms of social influence becomes problematic. Therefore, we need a better conceptualisation of manipulation that allows it to be overt and yet (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  39. Online Deliberation Design: Choices, Criteria, and Evidence.Todd Davies & Reid Chandler - 2012 - In Tina Nabatchi, John Gastil, G. Michael Weiksner & Matt Leihninger (eds.), Democracy in Motion: Evaluating the Practice and Impact of Deliberative Civic Engagement. New York, USA: Oxford University Press. pp. 103-131.
    This chapter reviews empirical evidence bearing on the design of online forums for deliberative civic engagement. Dimensions of design are defined for different aspects of the deliberation: its purpose, the target population, the spatiotemporal distance separating participants, the communication medium, and the deliberative process to be followed. After a brief overview of criteria for evaluating different design options, empirical findings are organized around design choices. Research has evolved away from treating technology for online deliberation dichotomously (either present or (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Online Shaming.Kathryn J. Norlock - 2017 - Social Philosophy Today 33:187-197.
    Online shaming is a subject of import for social philosophy in the Internet age, and not simply because shaming seems generally bad. I argue that social philosophers are well-placed to address the imaginal relationships we entertain when we engage in social media; activity in cyberspace results in more relationships than one previously had, entailing new and more responsibilities, and our relational behaviors admit of ethical assessment. I consider the stresses of social media, including the indefinite expansion of our relationships (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  41. Feeling togetherness online: a phenomenological sketch of online communal experiences.Lucy Osler - 2020 - Phenomenology and the Cognitive Sciences 19 (3):569-588.
    The internet provides us with a multitude of ways of interacting with one another. In discussions about how technological innovations impact and shape our interpersonal interactions, there is a tendency to assume that encountering people online is essentially different to encountering people offline. Yet, individuals report feeling a sense of togetherness with one another online that echoes offline descriptions. I consider how we can understand people’s experiences of being together with others online, at least in certain instances, (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  42. Minds Online: The Interface between Web Science, Cognitive Science, and the Philosophy of Mind.Paul Smart, Robert William Clowes & Richard Heersmink - 2017 - Foundations and Trends in Web Science 6 (1-2):1-234.
    Alongside existing research into the social, political and economic impacts of the Web, there is a need to study the Web from a cognitive and epistemic perspective. This is particularly so as new and emerging technologies alter the nature of our interactive engagements with the Web, transforming the extent to which our thoughts and actions are shaped by the online environment. Situated and ecological approaches to cognition are relevant to understanding the cognitive significance of the Web because of the (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  43. Online consent: how much do we need to know?Bartek Chomanski & Lode Lauwaert - forthcoming - AI and Society.
    This paper argues, against the prevailing view, that consent to privacy policies that regular internet users usually give is largely unproblematic from the moral point of view. To substantiate this claim, we rely on the idea of the right not to know (RNTK), as developed by bioethicists. Defenders of the RNTK in bioethical literature on informed consent claim that patients generally have the right to refuse medically relevant information. In this article we extend the application of the RNTK to (...) privacy. We then argue that if internet users can be thought of as exercising their RNTK before consenting to privacy policies, their consent ought to be considered free of the standard charges leveled against it by critics. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  44. What is a service?Barry Smith & Peter Koch - 2022 - The Eighth Joint Ontology Workshops (JOWO’22), August 15-19, 2022, Jönköping University, Sweden.
    When governments collect data relating to economic activity they commonly employ a distinction between goods and services. Both goods and services have economic value. Goods (cars, houses, bottles of milk) are, very roughly, independent continuants which can be alienated (sold, gifted, rented, and so forth). Services (hairdressing, gardening, teaching) are, again very roughly, occurrents. They are occurrents which are further often said to be marked by the fact that production and consumption coincide. Social services under both headings typically involve combinations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. When Human Rights and Psychology Meet.Deepa Kansra - 2021 - The Human Rights Blog.
    A psychology-informed view of human rights has been taken into account by many scholars while examining the short-term and long-term effects of human rights violations on individuals and communities. In Trauma and Human Rights: Integrating Approaches to Address Human Suffering, for instance, the authors discuss the trauma-informed approach in the context of human rights violations, namely domestic violence, racial and other forms of discrimination, etc. In the paper on Trauma among children and legal implications, the authors advance a trauma-informed approach (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Online Echo Chambers, Online Epistemic Bubbles, and Open-Mindedness.Cody Turner - 2023 - Episteme 21:1-26.
    This article is an exercise in the virtue epistemology of the internet, an area of applied virtue epistemology that investigates how online environments impact the development of intellectual virtues, and how intellectual virtues manifest within online environments. I examine online echo chambers and epistemic bubbles (Nguyen 2020, Episteme 17(2), 141–61), exploring the conceptual relationship between these online environments and the virtue of open-mindedness (Battaly 2018b, Episteme 15(3), 261–82). The article answers two key individual-level, virtue epistemic questions: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Free online services: enabling, disenfranchising, disempowering.Luciano Floridi - 2015 - Philosophy and Technology 28 (2):163-166.
    Free online services have become an essential part of onlife experience in the digital society. And yet, such digital gifts can be argued to represent a modern-day Trojan horse. This paper advances the theory that, far from being “free”, the digital gift economy disempowers and disenfranchises users, eroding privacy and promoting inequality. It concludes that what is needed to improve the situation is better taxation and stricter regulation of the advertising industry.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Existential Abuse of Readers in Samuel Beckett’s Malone Dies.Syed Ismyl Mahmood Rizvi - 2015 - LANGUAGE FORUM 41 (1-2):157-172.
    Malone Dies marks the point where Samuel Beckett foremost turns to “metaphysical destruction” of “untrue self,” and Derrida’s critique of the notion of “self-presence” of the subject. In this article, I examine Beckett’s literary absurdities to his readers’ concerns of “abuse” through them. For this investigation Malone Dies posits a stream of conflicting “linguistic nihilism” to the concerns of deconstructing “untrue self,” arguably, which will reflect how abuse of Beckettian readers is stimulated. In this context, abuse is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Substance Abuse.Landon Frim & Harrison Fluss - 2018 - Epoché: A Journal for the History of Philosophy 23 (1):191-217.
    This paper will set out in plain language the basic ontology of “Deleuze’s Spinoza”; it will then critically examine whether such a Spinoza has, or indeed could have, ever truly existed. In this, it will be shown that Deleuze’s reading of Spinoza involves the imposition of three interlocking, formal principles. These are (1) Necessitarianism, (2) Immanence, and (3) Univocity. The uncovering of Deleuze’s use of these three principles, how they relate to one another, and what they jointly imply in terms (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  54
    BMF CP67: Anthropocentrism, virtual world behaviors, and game-playing immersiveness.A. I. S. D. L. Team - 2024 - Sm3D Portal.
    “Are humans in a toxic, abusive relationship with nature? Love is strange.” -/- —In “Glands of Love”; Meandering Sobriety.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000