Results for 'online abuse'

951 found
Order:
  1. Who Do You Speak For? And How?: Online Abuse as Collective Subordinating Speech Acts.Michael Randall Barnes - 2023 - Journal of Ethics and Social Philosophy 25 (2):251—281.
    A lot of subordinating speech has moved online, which raises several questions for philosophers. Can current accounts of oppressive speech adequately capture digital hate? How does the anonymity of online harassers contribute to the force of their speech? This paper examines online abuse and argues that standard accounts of licensing and accommodation are not up to the task of explaining the authority of online hate speech, as speaker authority often depends on the community in more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Child abuse: A reality to be exposed.Subhasis Chattopadhyay - 2014 - Merinews.Com.
    I occasionally write on topics relating to psychology since I am a trained psychoanalyst. One of the evils which plagues us is child abuse which a psychologist had correctly called soul murder in the 1990s. This article was written to sensitize parents. And also is philosophy (of evil) in praxes.
    Download  
     
    Export citation  
     
    Bookmark  
  3. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  4. Exploring New Zealand children’s technology access, use, skills and opportunities. Evidence from Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    While children’s interaction with digital technologies is a matter of interest around the world, evidence based on nationally representative data about how integrated these tools are in children’s everyday life is still limited in New Zealand. This research report presents findings from a study that explores children’s internet access, online skills, practices, and opportunities. This report is part of Netsafe’s research project Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online, and our first publication as a member (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. abuse to human greed and its impulse else-the two legends ...Rituparna Ray Chaudhuri - 2015
    "My boat was moored beside an old bathing 'ghat' of the river, almost in ruins. The sun had set,"...https://youtu.be/VAhd2GNf1js. (http://philpapers.org/profile/112741).
    Download  
     
    Export citation  
     
    Bookmark  
  6. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  7. Child Abuse and Health Promotion.Hang K. Nguyen, Trang T. Le, My Nguyen & Kien Le - 2013 - Working Paper.
    Lạm dụng và bỏ bê trẻ еm đаng diễn rа phổ biến trên tоàn сầu. Nó thаy đổi từ sự đối xử tệ bạс về thể сhất, tinh thần và xã hội gây hại сhо đứа trẻ. Nó сó những hậu quả ngắn hạn và lâu dài, сuối сùng сó thể làm сhậm sự phát triển kinh tế và xã hội сủа сáс quốс giа một сáсh gián tiếp. Người tа ướс tính rằng сứ 5 phụ nữ và 1 trоng (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The State of Child Abuse in Poor Countries.Hang K. Nguyen, Trang T. Le, My Nguyen & Kien Le - 2009 - Working Paper.
    Lạm dụng và bỏ bê trẻ еm đаng diễn rа phổ biến trên tоàn сầu. Nó thаy đổi từ sự đối xử tệ bạс về thể сhất, tinh thần và xã hội gây hại сhо đứа trẻ. Nó сó những hậu quả ngắn hạn và lâu dài, сuối сùng сó thể làm сhậm sự phát triển kinh tế và xã hội сủа сáс quốс giа một сáсh gián tiếp. Người tа ướс tính rằng сứ 5 phụ nữ và 1 trоng (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Cognitive Biases for the Design of Persuasive Technologies: Uses, Abuses and Ethical Concerns.Antonio Lieto - 2021 - ACM Distinguished Speakers - Lecture Series.
    In the last decades Human-Computer Interaction (HCI) has started to focus attention on “persuasive technologies” having the goal of changing users’ behavior and attitudes according to a predefined direction. In this talk we show how some of the techniques employed in such technologies trigger some well known cognitive biases by adopting a strategy relying on logical fallacies (i.e. forms of reasoning which are logically invalid but psychologically persuasive). In particular, we will show how the mechanisms reducible to logical fallacies are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. (1 other version)Factsheet: Who is sending and sharing potentially harmful digital communications?Neil Melhuish & Edgar Pacheco - 2021 - In Neil Melhuish & Edgar Pacheco (eds.), Netsafe. Netsafe.
    This factsheet presents findings from a quantitative study looking at adults’ experiences of sending and sharing potentially harmful digital communications in New Zealand. Typically research into harmful digital communications focuses on the experiences of those on the receiving end – the victims. However, to better address the distress and harm caused, information is needed about the people sending and sharing potentially harmful messages and posts. In this study we asked adult New Zealanders whether they had sent potentially harmful digital communications (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. The socio-economic argument for the human right to internet access.Merten Reglitz - 2023 - Politics, Philosophy and Economics 22 (4): 441-469.
    This paper argues that Internet access should be recognised as a human right because it has become practically indispensable for having adequate opportunities to realise our socio-economic human rights. This argument is significant for a philosophically informed public understanding of the Internet and because it provides the basis for creating new duties. For instance, accepting a human right to Internet access minimally requires guaranteeing access for everyone and protecting Internet access and use from certain objectionable interferences (e.g. surveillance, censorship, (...) abuse). Realising this right thus requires creating an Internet that is crucially different from the one we currently have. The argument thus has wide-ranging implications. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  12. The Face of Technology-Facilitated Aggression in New Zealand: Exploring Adult Aggressors’ Behaviors.Edgar Pacheco & Neil Melhuish - 2021 - In Jane Bailey, Asher Flynn & Nicola Henry (eds.), The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald Publishing Limited. pp. 103-123.
    The nature and extent of adults’ engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Rethinking the right to know and the case for restorative epistemic reparation.Melanie Altanian - forthcoming - Wiley: Journal of Social Philosophy.
    This article was developed as part of the forthcoming special issue on "Reparations" for the Journal of Social Philosophy and was accepted (with minor revisions) by the guest editors Christina Nick and Susan Stark in November 2021. The special issue article is available online open access for early view. -/- Abstract: The United Nations Commission on Human Rights acknowledges the Right to Know as part of state obligations to combat impunity and thereby protect and promote human rights in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Children's Health in the Digital Age.Birgitta Dresp-Langley - 2020 - International Journal of Environmental Research and Public Health 9 (17):299..
    Can we identify potential long-term consequences of digitalisation on public health? Environmental studies, metabolic research, and state of the art research in neurobiology point towards the reduced amount of natural day and sunlight exposure of the developing child, as a consequence of increasingly long hours spent indoors online, as the single unifying source of a whole set of health risks identified worldwide, as is made clear in this review of currently available literature. Over exposure to digital environments, from (...) to addiction, now concerns even the youngest (ages 0 to 2) and triggers, as argued on the basis of clear examples herein, a chain of interdependent negative and potentially long-term metabolic changes. This leads to a deregulation of the serotonin and dopamine neurotransmitter pathways in the developing brain, currently associated with online activity abuse and/or internet addiction, and akin to that found in severe substance abuse syndromes. A general functional working model is proposed under the light of evidence brought to the forefront in this review. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. The Rising Tide of Artificial Intelligence in Scientific Journals: A Profound Shift in Research Landscape.Ricardo Grillo - 2023 - European Journal of Therapeutics 29 (3):686-688.
    Dear Editors, -/- I found the content of your editorials to be highly intriguing [1,2]. Scientific journals are witnessing a growing prevalence of publications related to artificial intelligence (AI). Three letters to the editor were recently published in your journal [3-5]. The renowned journal Nature has dedicated approximately 25 publications solely to the subject of ChatGPT. Moreover, a quick search on Pubmed using the term "ChatGPT" yields around 900 articles, with the vast majority originating in 2023. These statistics underscore the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Subordinating Speech and the Construction of Social Hierarchies.Michael Randall Barnes - 2019 - Dissertation, Georgetown University
    This dissertation fits within the literature on subordinating speech and aims to demonstrate that how language subordinates is more complex than has been described by most philosophers. I argue that the harms that subordinating speech inflicts on its targets (chapter one), the type of authority that is exercised by subordinating speakers (chapters two and three), and the expansive variety of subordinating speech acts themselves (chapter three) are all under-developed subjects in need of further refinement—and, in some cases, large paradigm shifts. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Technology to Prevent Criminal Behavior.Gabriel De Marco & Thomas Douglas - 2021 - In David Edmonds (ed.), Future Morality. Oxford: Oxford University Press, Usa.
    The Case of Jim: Jim was arrested arriving at the house of an unattended minor, having brought with him some alcoholic drinks, condoms, and an overnight bag. Records of online conversations Jim was having with the minor give the court strong evidence that the purpose of this meet-up was to engage in sexual relations with the minor. In the course of searching his home computer, investigators also found child pornography. Jim was charged with intent to sexually abuse a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Effects of Porn: A Critical Analysis.Rory Collins - 2019 - 1890: A Journal of Undergraduate Research 3:28-40.
    The impacts of pornography are varied and complex. Performers are often thought to be victims of abuse and exploitation, while viewers are regularly accused of becoming desensitized to sexual violence. Further, porn is held by some to perpetuate damaging racial and gender stereotypes. I contend that these accusations, though not entirely baseless, are undermined for two reasons: they rest on questionable empirical evidence and ignore many of the positive consequences porn may have. In this article, I organize my analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Etica della ragione. La filosofia dell'uomo tra nichilismo e confronto interculturale.Angelo Campodonico - 1999 - Milano: Jaca book.
    Preface -/- This volume was published in 2000 by Jaca Book under the title Ethics of Reason. La filosofia dell'uomo nell'epoca del nichilismo e del confronto interculturale (The Philosophy of Man in the Age of Nihilism and Intercultural Confrontation) and is now long out of print. I gladly republish it online because, for the most part, I still recognize myself in what was written. The book had required considerable work and had been prepared by many years of study at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. The opportunities and challenges of blockchain in the fight against government corruption.Nikita Aggarwal & Luciano Floridi - 2018 - 19th General Activity Report (2018) of the Council of Europe Group of States Against Corruption (GRECO).
    Broadly defined, government corruption is the abuse of public power for private gain. It can assume various forms, including bribery, embezzlement, cronyism, and electoral fraud. At root, however, government corruption is a problem of trust. Corrupt politicians abuse the powers entrusted to them by the electorate (the principal-agent problem). Politicians often resort to corruption out of a lack of trust that other politicians will abstain from it (the collective action problem). Corruption breeds greater mistrust in elected officials amongst (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. What is a service?Barry Smith & Peter Koch - 2022 - The Eighth Joint Ontology Workshops (JOWO’22), August 15-19, 2022, Jönköping University, Sweden.
    When governments collect data relating to economic activity they commonly employ a distinction between goods and services. Both goods and services have economic value. Goods (cars, houses, bottles of milk) are, very roughly, independent continuants which can be alienated (sold, gifted, rented, and so forth). Services (hairdressing, gardening, teaching) are, again very roughly, occurrents. They are occurrents which are further often said to be marked by the fact that production and consumption coincide. Social services under both headings typically involve combinations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Victims of Trafficking, Reproductive Rights, and Asylum.Diana Tietjens Meyers - 2016 - Oxford Handbook of Reproductive Ethics.
    My aim is to extend and complement the arguments that others have already made for the claim that women who are citizens of economically disadvantaged states and who have been trafficked into sex work in economically advantaged states should be considered candidates for asylum. Familiar arguments cite the sexual violence and forced labor that trafficked women are subjected to along with their well-founded fear of persecution if they’re repatriated. What hasn’t been considered is that reproductive rights are also at stake. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. BMF CP67: Anthropocentrism, virtual world behaviors, and game-playing immersiveness.A. I. S. D. L. Team - 2024 - Sm3D Portal.
    “Are humans in a toxic, abusive relationship with nature? Love is strange.” -/- —In “Glands of Love”; Meandering Sobriety.
    Download  
     
    Export citation  
     
    Bookmark  
  24. (2 other versions)The Transient Suppression of the Worst Devils of our Nature—a review of Steven Pinker’s ‘The Better Angels of Our Nature: Why Violence Has Declined’(2012).Michael Starks - 2017 - Philosophy, Human Nature and the Collapse of Civilization -- Articles and Reviews 2006-2017 3rd Ed 686p(2017).
    This is not a perfect book, but it is unique, and if you skim the first 400 or so pages, the last 300 (of some 700) are a pretty good attempt to apply what's known about behavior to social changes in violence and manners over time. The basic topic is: how does our genetics control and limit social change? Surprisingly he fails to describe the nature of kin selection (inclusive fitness) which explains much of animal and human social life. He (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Review of Adapting Minds Evolutionary Psychology and the Persistent Quest for Human Nature by Buller (2006).Michael Starks - 2017 - Philosophy, Human Nature and the Collapse of Civilization Michael Starks 3rd Ed. (2017).
    I bought this thinking anything from Bradford books and MIT must be good. Instead it's a boring, stupid, incompetent, antiscientific and antirational piece of closet creationist trash. Heads should roll at Bradford for this atrocity! If you must then start by reading the last chapter first as he conceals a frank statement of his anti-rationality til the end. I made detailed notes on it as I thought it was a serious work of science and was going to do a long (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Văn minh làm giàu từ góc nhìn của một người Việt.Dân-Trí Online - 2007 - Dân Trí Online.
    (Dân trí) - Bạn hãy thử hình dung một bức tranh thể hiện hình ảnh một thương gia cưỡi một chú lạc đà. Dưới chân họ chỉ có cát nóng bỏng của sa mạc khô cằn, phía sau lưng họ là ánh mặt trời chói lòa, bỏng rát. Hai bên đường chỉ có sương rồng gai góc, như biểu trưng cho hành trình vất vả đầy chông gai. Một điều gây bất ngờ: chú lạc đà lại kéo theo một chiếc (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Encountering Evil: The Evil-god Challenge from Religious Experience.Asha Lancaster-Thomas - 11th July Online - European Journal for Philosophy of Religion 12 (3):0-0.
    It is often thought that religious experiences provide support for the cumulative case for the existence of the God of classical monotheism. In this paper, I formulate an Evil-god challenge that invites classical monotheists to explain why, based on evidence from religious experience, the belief in an omnipotent, omniscient, omnibenevolent god is significantly more reasonable than the belief in an omnipotent, omniscient, evil god. I demonstrate that religious experiences substantiate the existence of Evil-god more so than they do the existence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Belonging Online: Rituals, Sacred Objects, and Mediated Interations.Lucy Osler - forthcoming - In Luna Dolezal & Danielle Petherbridge (eds.), Phenomenology of Belonging.
    In this chapter, I explore how experiences of social belonging might emerge and be sustained in online communities, drawing from the work on rituals by Randall Collins. I argue that rather than viewing mediated interactions in terms of whether they are suitable substitutes for face-to-face interactions, we should consider mediated encounters in their own right. This allows us to recognize the creative ways that people can create rituals in a mediated setting and thus support and create a sense of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Online Misinformation and “Phantom Patterns”: Epistemic Exploitation in the Era of Big Data.Megan Fritts & Frank Cabrera - 2021 - Southern Journal of Philosophy 60 (1):57-87.
    In this paper, we examine how the availability of massive quantities of data i.e., the “Big Data” phenomenon, contributes to the creation, spread, and harms of online misinformation. Specifically, we argue that a factor in the problem of online misinformation is the evolved human instinct to recognize patterns. While the pattern-recognition instinct is a crucial evolutionary adaptation, we argue that in the age of Big Data, these capacities have, unfortunately, rendered us vulnerable. Given the ways in which (...) media outlets profit from the spread of misinformation by preying on this pattern-finding instinct, we conceptualize the problem that we identify as a morally objectionable form of “epistemic exploitation.” As we argue, the consumer of digital misinformation is often exploited by having her pattern-recognition instinct used against her. This exploitation is morally objectionable because it deprives her of an epistemic good to which she has a right. This epistemic good is the integrity of the pattern-recognition instinct itself which, we argue, is a capacity that allows us to participate in uniquely human goods. While our primary goal is to bring attention to this form of epistemic exploitation, we conclude by briefly evaluating some general solutions to the growing problem of online misinformation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  31. The Abuse of Expertise and the Problem with Public Economics.Gordon Barnes - forthcoming - Social Theory and Practice.
    In recent decades, economists have played an active role in shaping public policy by publicly recommending the adoption of certain policies. These recommendations are often based on normative assumptions that are not the product of economic analysis; nor are they shared by the laypeople to whom these recommendations are made. Inducing people to adopt public policies for reasons that are neither the product of expertise, nor shared by the people, is a form of manipulation that violates the ideals of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Child abuse remains mundane even under symbolic disguise: highlights from an Albanian post WWII movie.Gentian Vyshka - 2020 - Asian Journal of Language, Literature and Culture Studies 3 (4):28-37.
    Artistic work during communist regime in Albania has been a strictly controlled area, due to censorship and ideological limitations. However, the creative genius of some individuals was able to transmit religious images in a disguised form, particularly when themes were permissive to ambiguous messages. Depicting child abuse was a taboo for the everyday life, but not when focusing on certain historical periods that were purposefully stigmatized from the state propaganda. Some snapshots and images from the movie ‘Red poppies on (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Online Intellectual Virtues and the Extended Mind.Lukas Schwengerer - 2021 - Social Epistemology 35 (3):312-322.
    The internet has become an ubiquitous epistemic source. However, it comes with several drawbacks. For instance, the world wide web seems to foster filter bubbles and echo chambers and includes search results that promote bias and spread misinformation. Richard Heersmink suggests online intellectual virtues to combat these epistemically detrimental effects . These are general epistemic virtues applied to the online environment based on our background knowledge of this online environment. I argue that these online intellectual virtues (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  34. Online consent: how much do we need to know?Bartek Chomanski & Lode Lauwaert - forthcoming - AI and Society.
    This paper argues, against the prevailing view, that consent to privacy policies that regular internet users usually give is largely unproblematic from the moral point of view. To substantiate this claim, we rely on the idea of the right not to know (RNTK), as developed by bioethicists. Defenders of the RNTK in bioethical literature on informed consent claim that patients generally have the right to refuse medically relevant information. In this article we extend the application of the RNTK to (...) privacy. We then argue that if internet users can be thought of as exercising their RNTK before consenting to privacy policies, their consent ought to be considered free of the standard charges leveled against it by critics. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Online Shaming.Kathryn J. Norlock - 2017 - Social Philosophy Today 33:187-197.
    Online shaming is a subject of import for social philosophy in the Internet age, and not simply because shaming seems generally bad. I argue that social philosophers are well-placed to address the imaginal relationships we entertain when we engage in social media; activity in cyberspace results in more relationships than one previously had, entailing new and more responsibilities, and our relational behaviors admit of ethical assessment. I consider the stresses of social media, including the indefinite expansion of our relationships (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  36.  46
    Online Food Service Awareness and Perspective of Tertiary Institution Students: The Case of Federal University Oye-Ekiti, Nigeria.Fatimah Oyesomi & Ifeanyi Osuoha - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):306-324.
    This study assessed tertiary students’ awareness of the emergence of the online food delivery (OFD) services could be attributed to the changing nature of urban consumers. These consumers use food delivery services for a variety of reasons but, unsurprisingly, the most common reason seems to be the need for quick and convenient meals during or after a busy day. The study used the cross-sectional survey conducted in Federal University Oye-Ekiti, Ekiti State, Nigeria, using random sampling technique. A total of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Taking Watsuji online: Betweenness and expression in online spaces.Lucy Osler & Joel Krueger - 2021 - Continental Philosophy Review (1):1-23.
    In this paper, we introduce the Japanese philosopher Tetsurō Watsuji’s phenomenology of aidagara (“betweenness”) and use his analysis in the contemporary context of online space. We argue that Watsuji develops a prescient analysis anticipating modern technologically-mediated forms of expression and engagement. More precisely, we show that instead of adopting a traditional phenomenological focus on face-to-face interaction, Watsuji argues that communication technologies — which now include Internet-enabled technologies and spaces — are expressive vehicles enabling new forms of emotional expression, shared (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  38. (Online) Manipulation: Sometimes Hidden, Always Careless.Michael Klenk - forthcoming - Review of Social Economy.
    Ever-increasing numbers of human interactions with intelligent software agents, online and offline, and their increasing ability to influence humans have prompted a surge in attention toward the concept of (online) manipulation. Several scholars have argued that manipulative influence is always hidden. But manipulation is sometimes overt, and when this is acknowledged the distinction between manipulation and other forms of social influence becomes problematic. Therefore, we need a better conceptualisation of manipulation that allows it to be overt and yet (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  39. Free online services: enabling, disenfranchising, disempowering.Luciano Floridi - 2015 - Philosophy and Technology 28 (2):163-166.
    Free online services have become an essential part of onlife experience in the digital society. And yet, such digital gifts can be argued to represent a modern-day Trojan horse. This paper advances the theory that, far from being “free”, the digital gift economy disempowers and disenfranchises users, eroding privacy and promoting inequality. It concludes that what is needed to improve the situation is better taxation and stricter regulation of the advertising industry.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  69
    Online reach adjustments induced by real-time movement sonification.Michael Barkasi, Ambika Bansal, Björn Jörges & Laurence R. Harris - 2024 - Human Movement Science 96:103250.
    Movement sonification can improve motor control in both healthy subjects (e.g., learning or refining a sport skill) and those with sensorimotor deficits (e.g., stroke patients and deafferented individuals). It is not known whether improved motor control and learning from movement sonification are driven by feedback-based real-time (“online”) trajectory adjustments, adjustments to internal models over multiple trials, or both. We searched for evidence of online trajectory adjustments (muscle twitches) in response to movement sonification feedback by comparing the kinematics and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. (1 other version)Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Tightlacing and Abusive Normative Address.Alexander Edlich & Alfred Archer - 2023 - Ergo: An Open Access Journal of Philosophy 10.
    In this paper, we introduce a distinctive kind of psychological abuse we call Tightlacing. We begin by presenting four examples and argue that there is a distinctive form of abuse in these examples that cannot be captured by our existing moral categories. We then outline our diagnosis of this distinctive form of abuse. Tightlacing consists in inducing a mistaken self-conception in others that licenses overburdening demands on them such that victims apply those demands to themselves. We discuss (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Metaphor Abuse in the Time of Coronavirus: A Reply to Lynne Tirrell.Shane J. Ralston - 2021 - Southwest Philosophy Review 37 (1):89-99.
    In the time of Coronavirus, it is perhaps as good a time as any to comment on the use and abuse of metaphors. One of the worst instances of metaphor abuse-especially given the recent epidemiological crisis-is Lynne Tirrell's notion of toxic speech. In the foregoing reply piece, I analyze Tirrell's metaphor and reveal how it blinds us to the liberating power of public speech. Lynne Tirrell argues that some speech is, borrowing from field of Epidemiology, toxic in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Minds Online: The Interface between Web Science, Cognitive Science, and the Philosophy of Mind.Paul Smart, Robert William Clowes & Richard Heersmink - 2017 - Foundations and Trends in Web Science 6 (1-2):1-234.
    Alongside existing research into the social, political and economic impacts of the Web, there is a need to study the Web from a cognitive and epistemic perspective. This is particularly so as new and emerging technologies alter the nature of our interactive engagements with the Web, transforming the extent to which our thoughts and actions are shaped by the online environment. Situated and ecological approaches to cognition are relevant to understanding the cognitive significance of the Web because of the (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  45. 5-MeO-DMT in the complete resolution of the consequences of chronic, severe sexual abuse in early childhood—a retrospective case study.Mika Turkia - manuscript
    5-MeO-DMT is a psychedelic substance with a short duration of action and intensive effects. Its therapeutic efficacy and practicality may significantly surpass those of classical psychedelics such as ayahuasca and LSD. -/- This retrospective ethnographic inquiry features a woman in her mid-thirties who witnessed her mother's violent suicide and its bloody aftermath at the age of three. Before and after that, her childhood was characterized by domestic violence and sexual abuse perpetrated by several members of her family and extended (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Online Communication Tools in Teaching Foreign Languages for Education Sustainability.Anna Shutaleva - 2021 - Sustainability 13:11127.
    Higher education curricula are developed based on creating conditions for implementing many professional and universal competencies. In Russia, one of the significant competencies for a modern specialist is business communication in oral and written forms in the Russian language and a foreign language. Therefore, teaching students to write in a foreign language is one of the modern requirements for young specialists’ professional training. This article aimed to study the tools of online communication that are used in teaching foreign languages. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Robotic Rape and Robotic Child Sexual Abuse: Should They be Criminalised?John Danaher - 2017 - Criminal Law and Philosophy 11 (1):71-95.
    Soon there will be sex robots. The creation of such devices raises a host of social, legal and ethical questions. In this article, I focus in on one of them. What if these sex robots are deliberately designed and used to replicate acts of rape and child sexual abuse? Should the creation and use of such robots be criminalised, even if no person is harmed by the acts performed? I offer an argument for thinking that they should be. The (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  48. Women Abuse Screening Tool: A Validation Study on Nigerian Pregnant Women.Ibukunoluwa B. Bello, Ebernezer O. Akinnawo & Bede C. Akpunn - 2020 - International Journal of Scientific Research and Management (IJSRM) 8 (6).
    Domestic violence is identified across the globe as a menace as it poses a threat to the mental health of its victims, the significant others of the victim and the security of a nation at large. In some cases, the victim of domestic violence is a pregnant woman and harm is caused not only to a woman but her fetus also and this calls for urgent psychological assessment and intervention. Although there is no doubt that psychological tests are effective in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Online Deliberation Design: Choices, Criteria, and Evidence.Todd Davies & Reid Chandler - 2012 - In Nabatchi Tina, Gastil John, Weiksner G. Michael & Leihninger Matt (eds.), Democracy in Motion: Evaluating the Practice and Impact of Deliberative Civic Engagement. Oxford University Press. pp. 103-131.
    This chapter reviews empirical evidence bearing on the design of online forums for deliberative civic engagement. Dimensions of design are defined for different aspects of the deliberation: its purpose, the target population, the spatiotemporal distance separating participants, the communication medium, and the deliberative process to be followed. After a brief overview of criteria for evaluating different design options, empirical findings are organized around design choices. Research has evolved away from treating technology for online deliberation dichotomously (either present or (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Online Public Shaming: Virtues and Vices.Paul Billingham & Tom Parr - 2020 - Journal of Social Philosophy 51 (3):371-390.
    We are witnessing increasing use of the Internet, particular social media, to criticize (perceived or actual) moral failings and misdemeanors. This phenomenon of so-called ‘online public shaming’ could provide a powerful tool for reinforcing valuable social norms. But it also threatens unwarranted and severe punishments meted out by online mobs. This paper analyses the dangers associated with the informal enforcement of norms, drawing on Locke, but also highlights its promise, drawing on recent discussions of social norms. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 951