Results for 'online harm'

1000+ found
Order:
  1. The Telegram Chronicles of Online Harm.Mihaela Popa-Wyatt - manuscript
    Harmful and dangerous language is frequent in social media, in particular in spaces which are considered anonymous and/or allow free participation. In this paper, we analyse the language in a Telegram channel populated by followers of Donald Trump, in order to identify the ways in which harmful language is used to create a specific narrative in a group of mostly like-minded discussants. Our research has several aims. First, we create an extended taxonomy of potentially harmful language that includes not only (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. A Telegram corpus for hate speech, offensive language, and online harm.Mihaela Popa-Wyatt - manuscript
    We provide a new text corpus from the social medium Telegram, which is rich in indirect forms of divisive speech. We scraped all messages from one channel of supporters of Donald Trump, covering a large part of his presidency from late 2016 until January 2021. The discussion among the group members over this long time period includes the spread of disinformation, disparaging of out-group members, and other forms of offensive speech. To encourage research into such practices of poisoning public political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  4. Factsheet: Parental awareness of children’s experiences of online risks and harm. Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    Research suggests that parents tend to largely underestimate their child’s engagement in risky and/or hurtful behaviours as well as their experiences of harm online. While helpful, the available international evidence is not only limited but also does not reflect the New Zealand context. In addition, understanding parental knowledge of the online experiences of children is important as parents play a critical role in helping their child to prevent or deal with bothering experiences and risky behaviours as well (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  6. Online Misinformation and “Phantom Patterns”: Epistemic Exploitation in the Era of Big Data.Megan Fritts & Frank Cabrera - 2021 - Southern Journal of Philosophy 60 (1):57-87.
    In this paper, we examine how the availability of massive quantities of data i.e., the “Big Data” phenomenon, contributes to the creation, spread, and harms of online misinformation. Specifically, we argue that a factor in the problem of online misinformation is the evolved human instinct to recognize patterns. While the pattern-recognition instinct is a crucial evolutionary adaptation, we argue that in the age of Big Data, these capacities have, unfortunately, rendered us vulnerable. Given the ways in which (...) media outlets profit from the spread of misinformation by preying on this pattern-finding instinct, we conceptualize the problem that we identify as a morally objectionable form of “epistemic exploitation.” As we argue, the consumer of digital misinformation is often exploited by having her pattern-recognition instinct used against her. This exploitation is morally objectionable because it deprives her of an epistemic good to which she has a right. This epistemic good is the integrity of the pattern-recognition instinct itself which, we argue, is a capacity that allows us to participate in uniquely human goods. While our primary goal is to bring attention to this form of epistemic exploitation, we conclude by briefly evaluating some general solutions to the growing problem of online misinformation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Digital self-harm: Prevalence, motivations and outcomes for teens who cyberbully themselves.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    This research report presents findings about the extent and nature of digital self-harm among New Zealand teens. Digital self-harm is broadly defined here as the anonymous online posting or sharing of mean or negative online content about oneself. The report centres on the prevalence of digital self-harm (or self-cyberbullying) among New Zealand teens (aged 13-17), the motivations, and outcomes related to engaging in this behaviour. The findings described in this report are representative of the teenage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The Philosophy of Online Manipulation.Michael Klenk & Fleur Jongepier (eds.) - 2022 - Routledge.
    Are we being manipulated online? If so, is being manipulated by online technologies and algorithmic systems notably different from human forms of manipulation? And what is under threat exactly when people are manipulated online? This volume provides philosophical and conceptual depth to debates in digital ethics about online manipulation. The contributions explore the ramifications of our increasingly consequential interactions with online technologies such as online recommender systems, social media, user-friendly design, micro-targeting, default-settings, gamification, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Autonomy and Online Manipulation.Michael Klenk & Jeff Hancock - 2019 - Internet Policy Review 1:1-11.
    More and more researchers argue that online technologies manipulate human users and, therefore, undermine their autonomy. We call this the MAL view on online technology because it argues from Manipulation to Autonomy-Loss. MAL enjoys public visibility and will shape the academic discussion to come. This view of online technology, however, fails conceptually. MAL presupposes that manipulation equals autonomy loss, and that autonomy is the absence of manipulation. That is mistaken. In short, an individual can be manipulated while (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  10. In Defense of (Some) Online Echo Chambers.Douglas R. Campbell - 2023 - Ethics and Information Technology 25 (3):1-11.
    In this article, I argue that online echo chambers are in some cases and in some respects good. I do not attempt to refute arguments that they are harmful, but I argue that they are sometimes beneficial. In the first section, I argue that it is sometimes good to be insulated from views with which one disagrees. In the second section, I argue that the software-design principles that give rise to online echo chambers have a lot to recommend (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  12. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. My avatar, my self: Virtual harm and attachment.Jessica Wolfendale - 2007 - Ethics and Information Technology 9 (2):111-119.
    Multi-user online environments involve millions of participants world-wide. In these online communities participants can use their online personas – avatars – to chat, fight, make friends, have sex, kill monsters and even get married. Unfortunately participants can also use their avatars to stalk, kill, sexually assault, steal from and torture each other. Despite attempts to minimise the likelihood of interpersonal virtual harm, programmers cannot remove all possibility of online deviant behaviour. Participants are often greatly distressed (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  14. Taking Account of Psychological Harm.Deepa Kansra - 2022 - Psychology Today.
    Justice for human rights violations involves taking into account psychological harm caused to individuals and communities. Justice for psychological harm is specifically grounded in four considerations: (1) that harm to human persons can be both physical and psychological (2) that even in the absence of physical injuries, psychological harm can constitute a human rights violation (3) that those causing psychological harm ought to be accountable, and (4) that claims for justice for harm are supported (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Compensation for Geoengineering Harms and No-Fault Climate Change Compensation.Pak-Hang Wong, Tom Douglas & Julian Savulescu - 2014 - The Climate Geoengineering Governance Working Papers.
    While geoengineering may counteract negative effects of anthropogenic climate change, it is clear that most geoengineering options could also have some harmful effects. Moreover, it is predicted that the benefits and harms of geoengineering will be distributed unevenly in different parts of the world and to future generations, which raises serious questions of justice. It has been suggested that a compensation scheme to redress geoengineering harms is needed for geoengineering to be ethically and politically acceptable. Discussions of compensation for geoengineering (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Who Do You Speak For? And How?: Online Abuse as Collective Subordinating Speech Acts.Michael Randall Barnes - 2023 - Journal of Ethics and Social Philosophy 25 (2):251—281.
    A lot of subordinating speech has moved online, which raises several questions for philosophers. Can current accounts of oppressive speech adequately capture digital hate? How does the anonymity of online harassers contribute to the force of their speech? This paper examines online abuse and argues that standard accounts of licensing and accommodation are not up to the task of explaining the authority of online hate speech, as speaker authority often depends on the community in more ways (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Duplicity of Online Behavior.Joseph Ulatowski - 2015 - In Berrin Beasley & Mitchell Haney (eds.), Social Media and Living Well. Lanham, MD: Lexington Books. pp. 31-43.
    People commonly believe that any form of deception, no matter how innocuous it is and no matter whether the deceiving person intended it otherwise, is always morally wrong. In this paper, I will argue that deceiving in real-time is morally distinguishable from deceiving on-line because online actions aren’t as fine-grained as actions occurring in real-time. Our failure to detect the fine-grained characteristics of another avatar leads us to believe that that avatar intended to do a moral harm. Openly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. "Did the Bills Harm Tom Brady?" - Overview of Temporal Comparative Account of Harm.Ryan Holt - 2015 - Http://Www.Freshphilosophy.Com/Journal.
    Harm is a concept in philosophy that has been able to elude definition. Many attempts have been made to formulate a definition of harm, however they have all been futile. This has led many to question if it is even possible to define harm, or if we really even need a definition of harm? My answer to both of these questions is yes, harm is something that is worth caring about and has many practical implications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Exploring New Zealand children’s technology access, use, skills and opportunities. Evidence from Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    While children’s interaction with digital technologies is a matter of interest around the world, evidence based on nationally representative data about how integrated these tools are in children’s everyday life is still limited in New Zealand. This research report presents findings from a study that explores children’s internet access, online skills, practices, and opportunities. This report is part of Netsafe’s research project Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online, and our first publication as a member (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. The digital parenting strategies and behaviours of New Zealand parents. Evidence from Nga taiohi matihiko o Aotearoa – New Zealand Kids Online.Neil Melhuish & Edgar Pacheco - 2021 - Netsafe.
    Parents play a critical role in their child’s personal development and day-to-day experiences. However, as digital technologies are increasingly embedded in most New Zealand children’s everyday life activities parents face the task of ensuring their child’s online safety. To do so, they need to understand the way their child engages with and through these tools and make sense of the rapidly changing, and more technically complex, nature of digital devices. This presents a digital parenting dilemma: maximising children’s online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. On the forms of harm stemming from the instrumentalization of large-scale ecosystems.Sarah Isabel Espinosa Flor - 2022 - Transforming Food Systems: Ethics, Innovation and Responsibility.
    One could argue that the use, extraction, and development of natural resources for human purposes, i.e. resource exploitation, constitutes a form of instrumentalization of the ecosystems from which these resources are derived. Moreover, that such instrumentalization may be carried out in a way that has adverse social and environmental impacts. Given that a number of ecosystems are indispensable for the satisfaction of human interests and needs, their instrumentalization may nevertheless be justified. In this context, if the amount and rate of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Factsheet: Who is sending and sharing potentially harmful digital communications?Neil Melhuish & Edgar Pacheco - 2021 - In Netsafe. Netsafe.
    This factsheet presents findings from a quantitative study looking at adults’ experiences of sending and sharing potentially harmful digital communications in New Zealand. Typically research into harmful digital communications focuses on the experiences of those on the receiving end – the victims. However, to better address the distress and harm caused, information is needed about the people sending and sharing potentially harmful messages and posts. In this study we asked adult New Zealanders whether they had sent potentially harmful digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  39
    The Complex relationship between fraud and technology - Should we ignore or regulate online platforms? (12th edition).Jack Mark Whittaker - 2024 - Public Sector Counter Fraud Journal 1 (12):21-22.
    This short article introduces the notion that there is a historical relationship between technology and fraud, that two opposing viewpoints argue whether technology is or is not capable of harm, and lastly that platforms can in fact benefit from fraudsters operating on them parasitically.
    Download  
     
    Export citation  
     
    Bookmark  
  24.  88
    Văn minh làm giàu từ góc nhìn của một người Việt.Dân-Trí Online - 2007 - Dân Trí Online.
    (Dân trí) - Bạn hãy thử hình dung một bức tranh thể hiện hình ảnh một thương gia cưỡi một chú lạc đà. Dưới chân họ chỉ có cát nóng bỏng của sa mạc khô cằn, phía sau lưng họ là ánh mặt trời chói lòa, bỏng rát. Hai bên đường chỉ có sương rồng gai góc, như biểu trưng cho hành trình vất vả đầy chông gai. Một điều gây bất ngờ: chú lạc đà lại kéo theo một chiếc (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  26. Enactive Principles for the Ethics of User Interactions on Social Media: How to Overcome Systematic Misunderstandings Through Shared Meaning-Making.Lavinia Marin - 2022 - Topoi 41 (2):425-437.
    This paper proposes three principles for the ethical design of online social environments aiming to minimise the unintended harms caused by users while interacting online, specifically by enhancing the users’ awareness of the moral load of their interactions. Such principles would need to account for the strong mediation of the digital environment and the particular nature of user interactions: disembodied, asynchronous, and ambiguous intent about the target audience. I argue that, by contrast to face to face interactions, additional (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  65
    The Face of Technology-Facilitated Aggression in New Zealand: Exploring Adult Aggressors’ Behaviors.Edgar Pacheco & Neil Melhuish - 2021 - In Jane Bailey, Asher Flynn & Nicola Henry (eds.), The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald Publishing Limited. pp. 103-123.
    The nature and extent of adults’ engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Factsheet: Trends in unwanted digital communications regarding sexual orientation in New Zealand.Edgar Pacheco & Neil Melhuish - 2021 - Netsafe.
    There is emerging empirical evidence showing that people who identify as gender diverse and/or non-heterosexual report higher rates of risks and harm online. To expand the available evidence, this factsheet presents new insights based on longitudinal data exploring and comparing the extent of four types of unwanted digital communications in the last two to three years. The factsheet looks at the prevalence of being the target and the sender of unwanted, potentially harmful digital communications that included physical threats, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Political Correctness Gone Viral.Waleed Aly & Robert Mark Simpson - 2019 - In Joe Saunders & Carl Fox (eds.), Media Ethics, Free Speech, and the Requirements of Democracy. Routledge. pp. 125-143.
    Communicative practices in online and social media sometimes seem to amplify political conflict, and result in significant harms to people who become the targets of collective outrage. Many complaints that have been made about political correctness in the past, we argue, amount to little more than a veiled expression of resentment over the increasing influence enjoyed by progressive activists. But some complaints about political correctness take on a different complexion, in light of the technologically-driven changes to our communicative practices (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Sharing (mis) information on social networking sites. An exploration of the norms for distributing content authored by others.Lavinia Marin - 2021 - Ethics and Information Technology 23 (3):363-372.
    This article explores the norms that govern regular users’ acts of sharing content on social networking sites. Many debates on how to counteract misinformation on Social Networking Sites focus on the epistemic norms of testimony, implicitly assuming that the users’ acts of sharing should fall under the same norms as those for posting original content. I challenge this assumption by proposing a non-epistemic interpretation of (mis) information sharing on social networking sites which I construe as infrastructures for forms of life (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  31. What is a subliminal technique? An ethical perspective on AI-driven influence.Juan Pablo Bermúdez, Rune Nyrup, Sebastian Deterding, Celine Mougenot, Laura Moradbakhti, Fangzhou You & Rafael A. Calvo - 2023 - Ieee Ethics-2023 Conference Proceedings.
    Concerns about threats to human autonomy feature prominently in the field of AI ethics. One aspect of this concern relates to the use of AI systems for problematically manipulative influence. In response to this, the European Union’s draft AI Act (AIA) includes a prohibition on AI systems deploying subliminal techniques that alter people’s behavior in ways that are reasonably likely to cause harm (Article 5(1)(a)). Critics have argued that the term ‘subliminal techniques’ is too narrow to capture the target (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Deepfakes, Intellectual Cynics, and the Cultivation of Digital Sensibility.Taylor Matthews - 2022 - Royal Institute of Philosophy Supplement 92:67-85.
    In recent years, a number of philosophers have turned their attention to developments in Artificial Intelligence, and in particular to deepfakes. A deepfake is a portmanteau of ‘deep learning' and ‘fake', and for the most part they are videos which depict people doing and saying things they never did. As a result, much of the emerging literature on deepfakes has turned on questions of trust, harms, and information-sharing. In this paper, I add to the emerging concerns around deepfakes by drawing (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. How are Moral Foundations Associated with Empathic Traits and Moral Identity?Kelsie J. Dawson, Hyemin Han & YeEun Rachel Choi - forthcoming - Current Psychology.
    We examined the relationship between moral foundations, empathic traits, and moral identity using an online survey via Mechanical Turk. In order to determine how moral foundations contribute to empathic traits and moral identity, we performed classical correlation analysis as well as Bayesian correlation analysis, Bayesian ANCOVA, and Bayesian regression analysis. Results showed that individualizing foundations (harm/care, fairness/reciprocity) and binding foundations (ingroup/loyalty, authority/respect, purity/sanctity) had various different relationships with empathic traits. In addition, the individualizing versus binding foundations showed somewhat (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Wrongful Observation.Helen Frowe & Jonathan Parry - 2019 - Philosophy and Public Affairs 47 (1):104-137.
    According to common-sense morality, agents can become morally connected to the wrongdoing of others, such that they incur special obligations to prevent or rectify the wrongs committed by the primary wrongdoer. We argue that, under certain conditions, voluntary and unjustified observation of another agent’s degrading wrongdoing, or of the ‘product’ of their wrongdoing, can render an agent morally liable to bear costs for the sake of the victim of the primary wrong. We develop our account with particular reference to widespread (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. The Internet and Privacy.Carissa Veliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. New York: Routledge. pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Addiction, Autonomy, and the Internet: Some ethical considerations.Anna Hartford & Dan J. Stein - 2021
    Despite growing understanding of the addictive qualities of the internet, and rising concerns about the effects of excessive internet use on personal wellbeing and mental health, the corresponding ethical debate is still in its infancy, and many of the relevant philosophical and conceptual frameworks are underdeveloped. Our goal in this chapter is to explore some of this evolving terrain. While there are unique ethical considerations that pertain to the formalisation of a disorder related to excessive internet use, our ethical concerns (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Digital Technology and the Problem of Dialogical Discourse in Social Media.Bradley Warfield - 2023 - Techné Research in Philosophy and Technology 27 (2):220-239.
    In this paper, I discuss some prominent features of our use of social media and what I think are its harms. My paper has three main parts. In the first part, I use a dialogical framework to argue that much of the discursive activity online is manifested as an ethically impoverished other-directedness and interactivity. In the second part, I identify and discuss several reasons that help explain why so much of the discursive activity on social media is ethically lacking. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Subordinating Speech and the Construction of Social Hierarchies.Michael Randall Barnes - 2019 - Dissertation, Georgetown University
    This dissertation fits within the literature on subordinating speech and aims to demonstrate that how language subordinates is more complex than has been described by most philosophers. I argue that the harms that subordinating speech inflicts on its targets (chapter one), the type of authority that is exercised by subordinating speakers (chapters two and three), and the expansive variety of subordinating speech acts themselves (chapter three) are all under-developed subjects in need of further refinement—and, in some cases, large paradigm shifts. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. An Epistemic Lens on Algorithmic Fairness.Elizabeth Edenberg & Alexandra Wood - 2023 - Eaamo '23: Proceedings of the 3Rd Acm Conference on Equity and Access in Algorithms, Mechanisms, and Optimization.
    In this position paper, we introduce a new epistemic lens for analyzing algorithmic harm. We argue that the epistemic lens we propose herein has two key contributions to help reframe and address some of the assumptions underlying inquiries into algorithmic fairness. First, we argue that using the framework of epistemic injustice helps to identify the root causes of harms currently framed as instances of representational harm. We suggest that the epistemic lens offers a theoretical foundation for expanding approaches (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Ethical Dilemmas for @Celebrities: Promoting #Intimacy, Facing #Inauthenticity, and Defusing #Invectiveness.Marc Cheong - 2022 - Ethical Perspectives 29 (1):139-166.
    The rise of social-media-mediated celebrity culture raises several philosophical concerns. Therefore, it is not uncommon to see, for example, Hollywood actors being placed in the same bracket as YouTube artists and Instagram influencers. The increased perceived ‘connectivity’ afforded by social media allows online celebrities to reach more fans and increases the perceived engagement or intimacy in the fan-celebrity relationship. In this paper I argue that this online relationship, which is beneficial to celebrities (for brand development) and social media (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Free and Always Will Be? On Social Media Participation as it Undermines Individual Autonomy.Kathryn J. Norlock - 2021 - Canadian Journal of Practical Philosophy 5 (1):52-65.
    Open Access: Social media participation undermines individual autonomy in ways that ought to concern ethicists. Discussions in the philosophical literature are concerned primarily with egregious conduct online such as harassment and shaming, keeping the focus on obvious ills to which no one could consent; this prevents a wider understanding of the risks and harms of quotidian social media participation. Two particular concerns occupy me: social media participation carries the risks of (1) negatively formative experiences and (2) continuous partial attention (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Teens and “sexting” in New Zealand: Prevalence and attitudes.Edgar Pacheco & Neil Melhuish - 2017 - Netsafe.
    Over the last ten years the sharing of nude images or videos (sometimes known as “sexting”) by young people has emerged as a concern. Despite this, no research had been conducted on the prevalence of the sharing of nudes among young New Zealanders. This study addresses this and raises important questions for all those with a role in supporting young people’s healthy development. We believe this report makes an important contribution to the overall understanding of young people’s experience of these (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Exploring moral algorithm preferences in autonomous vehicle dilemmas: an empirical study.Tingting Sui - 2023 - Frontiers in Psychology 14:1-12.
    Introduction: This study delves into the ethical dimensions surrounding autonomous vehicles (AVs), with a specific focus on decision-making algorithms. Termed the “Trolley problem,” an ethical quandary arises, necessitating the formulation of moral algorithms grounded in ethical principles. To address this issue, an online survey was conducted with 460 participants in China, comprising 237 females and 223 males, spanning ages 18 to 70. -/- Methods: Adapted from Joshua Greene’s trolley dilemma survey, our study employed Yes/No options to probe participants’ choices (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Study of depression, anxiety, and social media addiction among undergraduate students.Tuan Hai Nguyen, Kuan-Han Lin, Ferry Fadzlul Rahman, Jenho-Peter Ou & Wing-Keung Wong - 2020 - Journal of Management Information and Decision Sciences 23 (4):257-276.
    This paper studies the connection between social media addiction and mental disorder from the existing investigation among undergraduate students. A comprehensive document search was conducted by using six electronic databases, including PubMed, Scopus, ScienceDirect, Web of Science, JSTOR, ProQuest Education to identify articles published before November 21st, 2019. All collected papers focused on studying social media addiction and psychosis. Two reviewers individualistically evaluated the quality of the study by using the Joanna Briggs Institute’s approach. Five articles were filtered out through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Cyberbullying: Effect on work place production.James Nambusi Makhulo - 2019 - Africa International Journal of Multidisciplinary Research 2 (1).
    Cyber bullying affects many adolescents and teens on a daily basis; it is a form of violence that can do lasting harm to people at different ages and social status in a society. Cyber bullying is real experience that has been in existence for a quite a long time; Bullying statistics show that cyber bullying is a serious problem among teens and gaining roots among adults. By being more aware of cyber bullying, teens and adults can help to fight (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Modalities of Healthcare Payment and their Consequences – A Qualitative Study on Kenyan Doctors.Elijah Yulu, B. Jason Brotherton & Geoffrey Gitau Kamau - unknown
    Introduction: The Kenyan government has put a spirited reform to ensure all Kenyans get universal healthcare. This has led to restructuring of several entities among them the health insurance industry. This is geared at alleviating the burden of catastrophic expenditure on health from the poor Kenyans. However, insurance uptake remains at less than a quarter of the population with many Kenyans still paying for healthcare out-of-pocket. These out-of-pocket payers often don’t afford the ever-increasing cost of healthcare in Kenya. This study (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Effects of Porn: A Critical Analysis.Rory Collins - 2019 - 1890: A Journal of Undergraduate Research 3:28-40.
    The impacts of pornography are varied and complex. Performers are often thought to be victims of abuse and exploitation, while viewers are regularly accused of becoming desensitized to sexual violence. Further, porn is held by some to perpetuate damaging racial and gender stereotypes. I contend that these accusations, though not entirely baseless, are undermined for two reasons: they rest on questionable empirical evidence and ignore many of the positive consequences porn may have. In this article, I organize my analysis from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Mushrooming Like Coronavirus? Tackling the menace of Fake news by way of an Epistemic, Legal and Regulatory Discourse.Aayush Shankar - manuscript
    Fake news is a topic that we all know well, and that continues to play a prominent role in the social harms besieging the globe today. From the recent storming of the Capitol Hill in the United States to the siege of Red fort over Farm-laws in India, online disinformation via social media platforms was the main driving force catapulting the protestors far and wide. In the backdrop of such social harms, this Research Article examines the epistemic, legal and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Harmful Salience Perspectives.Ella Whiteley - 2022 - In Sophie Archer (ed.), Salience: A Philosophical Inquiry. New York, NY: Routledge. pp. Chapter 11.
    Consider a terrible situation that too many women find themselves in: 85,000 women are raped in England and Wales alone every year. Many of these women do not bring their cases to trial. There are multiple reasons that they might not want to testify in the courts. The incredibly low conviction rate is one. Another reason, however, might be that these women do not want the fact that they were raped to become the most salient thing about them. More specifically, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  50. Encountering Evil: The Evil-god Challenge from Religious Experience.Asha Lancaster-Thomas - 11th July Online - European Journal for Philosophy of Religion 12 (3):0-0.
    It is often thought that religious experiences provide support for the cumulative case for the existence of the God of classical monotheism. In this paper, I formulate an Evil-god challenge that invites classical monotheists to explain why, based on evidence from religious experience, the belief in an omnipotent, omniscient, omnibenevolent god is significantly more reasonable than the belief in an omnipotent, omniscient, evil god. I demonstrate that religious experiences substantiate the existence of Evil-god more so than they do the existence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000