Results for 'online victimization'

968 found
Order:
  1. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the disparity between academic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Online hate speech: A survey on personal experiences and exposure among adult New Zealanders.Pacheco Edgar & Neil Melhuish - 2018 - Netsafe.
    Online hate speech has been a topic of public concern and research interest for some time. Initially the focus of this centred on the proliferation of online groups and websites promoting and distributing discriminatory content. Since the introduction of more interactive tools and platforms in the mid-2000s that enabled new and faster ways of disseminating content in a relatively anonymous fashion, concerns about online hate speech becoming a pervasive behavior have increased. Current research and analysis acknowledge the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Victims of Trafficking, Reproductive Rights, and Asylum.Diana Tietjens Meyers - 2016 - Oxford Handbook of Reproductive Ethics.
    My aim is to extend and complement the arguments that others have already made for the claim that women who are citizens of economically disadvantaged states and who have been trafficked into sex work in economically advantaged states should be considered candidates for asylum. Familiar arguments cite the sexual violence and forced labor that trafficked women are subjected to along with their well-founded fear of persecution if they’re repatriated. What hasn’t been considered is that reproductive rights are also at stake. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. The Myth of the Victim Public. Democracy contra Disinformation.Petr špecián - 2022 - Filozofia 77 (10):791-803.
    Do people fall for online disinformation, or do they actively utilize it as a tool to accomplish their goals? Currently, the notion of the members of the public as victims of deception and manipulation prevails in the debate. It emphasizes the need to limit people’s exposure to falsehoods and bolster their deficient reasoning faculties. However, the observed epistemic irrationality can also stem from politically motivated reasoning incentivized by digital platforms. In this context, the readily available disinformation facilitates an arms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Positive youth development attributes, mental disorder, and problematic online behaviors in adolescents: a longitudinal study amidst the COVID-19 pandemic.Xiong Gan, Guo-Xing Xiang, Min Li, Xin Jin & Ke-Nan Qin - 2023 - Frontiers in Public Health 11:1133696.
    Introduction: During the COVID-19 pandemic, adolescents have increasingly suffered from online problem behaviors and mental disorders. But little research has paid attention to the protective factors among adolescents. Therefore, the present study attempted to investigate the role of positive youth development (PYD) attributes in adolescents’ depression, internet gaming disorder (IGD) and cyberbullying/victimization (CBV). -/- Methods: A total of 995 Chinese adolescents (Mage = 15.97 years, SD = 0.77, 325 boys) from two public high schools in Hubei province were (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Accountability and Community on the Internet: A Plea for Restorative Justice.Laura Wildemann Kane - 2020 - Journal of Applied Philosophy 37 (4):594-611.
    In this article, I analyze norm enforcement on social media, specifically cases where an agent has committed a moral transgression online and is brought to account by an Internet mob with incongruously injurious results in their offline life. I argue that users problematically imagine that they are members of a particular kind of moral community where shaming behaviors are not only acceptable, but morally required to ‘take down’ those who appear to violate community norms. I then demonstrate the costs (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. #MeToo – Hungarian Style.Sára Magyari & Gizela Horvath - 2018 - In Rozália Klára Bakó & Gizela Horvath (eds.), Digital Agora. Proceedings of the Fifth International Conference on Argumentation and Rhetoric, held in Oradea / Nagyvárad, Romania, 21 September 2018. pp. 36-66.
    This study focuses on the Hungarian impact of the 2017 “Me Too” movement, offering an analysis of some relevant online texts and of their comments. The theoretical framework is provided by the anthropological linguistic approach (Balázs 2009), linguistic world view research (Kövecses 2017, Banczerowski 2008, 2012, Magyari 2015), and discourse analysis (Berger 1998, Nemesi 2016). The research method is based on participant observation and on text analysis, which also offers the possibility of content analysis, if the researcher applies a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Face of Technology-Facilitated Aggression in New Zealand: Exploring Adult Aggressors’ Behaviors.Edgar Pacheco & Neil Melhuish - 2021 - In Jane Bailey, Asher Flynn & Nicola Henry (eds.), The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald Publishing Limited. pp. 103-123.
    The nature and extent of adults’ engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Wrongful Observation.Helen Frowe & Jonathan Parry - 2019 - Philosophy and Public Affairs 47 (1):104-137.
    According to common-sense morality, agents can become morally connected to the wrongdoing of others, such that they incur special obligations to prevent or rectify the wrongs committed by the primary wrongdoer. We argue that, under certain conditions, voluntary and unjustified observation of another agent’s degrading wrongdoing, or of the ‘product’ of their wrongdoing, can render an agent morally liable to bear costs for the sake of the victim of the primary wrong. We develop our account with particular reference to widespread (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  11. (1 other version)Factsheet: Who is sending and sharing potentially harmful digital communications?Neil Melhuish & Edgar Pacheco - 2021 - In Neil Melhuish & Edgar Pacheco (eds.), Netsafe. Netsafe.
    This factsheet presents findings from a quantitative study looking at adults’ experiences of sending and sharing potentially harmful digital communications in New Zealand. Typically research into harmful digital communications focuses on the experiences of those on the receiving end – the victims. However, to better address the distress and harm caused, information is needed about the people sending and sharing potentially harmful messages and posts. In this study we asked adult New Zealanders whether they had sent potentially harmful digital communications (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. CRITIQUE OF IMPURE REASON: Horizons of Possibility and Meaning.Steven James Bartlett - 2021 - Salem, USA: Studies in Theory and Behavior.
    PLEASE NOTE: This is the corrected 2nd eBook edition, 2021. ●●●●● _Critique of Impure Reason_ has now also been published in a printed edition. To reduce the otherwise high price of this scholarly, technical book of nearly 900 pages and make it more widely available beyond university libraries to individual readers, the non-profit publisher and the author have agreed to issue the printed edition at cost. ●●●●● The printed edition was released on September 1, 2021 and is now available through (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Rethinking the right to know and the case for restorative epistemic reparation.Melanie Altanian - forthcoming - Wiley: Journal of Social Philosophy.
    This article was developed as part of the forthcoming special issue on "Reparations" for the Journal of Social Philosophy and was accepted (with minor revisions) by the guest editors Christina Nick and Susan Stark in November 2021. The special issue article is available online open access for early view. -/- Abstract: The United Nations Commission on Human Rights acknowledges the Right to Know as part of state obligations to combat impunity and thereby protect and promote human rights in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. La maladie mortelle de Descartes - pneumonie ou empoisonnement ?Theodor Ebert - 2015 - Http://Www.17esiecle.Fr.
    This is a reply to Vincent Carraud/René Verdon « Remarques circonspectes sur la mort de Descartes » (published in Revue du dix-septième siècle, n° 265, 2014/4, pp. 719-726, online: http://www.cairn.info/revue-dix-septieme-siecle-2014-4-page-719.htm, containing a critique of my "L'énigme de la mort de Descartes" Paris, 2011). I discuss the fatal illness and the death of Descartes, arguing that Descartes was very probably the victim of arsenical poisoning. The suspected murderer is a French priest, François Viogué, living with Descartes in 1650 at the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Reactionary attitudes: Strawson, Twitter, and the Black Lives Matter Movement.Anastasia Chan, Marinus Ferreira & Mark Alfano - forthcoming - In Fernando Aguiar-Gonzalez & Antonio Gaitan (eds.), Experimental Methods in Moral Philosophy. Routledge.
    On 25 May 2020, Officer Derek Chauvin asphyxiated George Floyd in Minneapolis — a murder that was captured in a confronting nine-minute bystander video that set off a firestorm of activity on online social networks, in the streets of the United States, and even worldwide. These protests captured the collective rage, dissatisfaction, and resentment personally and vicariously experienced towards the widespread systematic injustice and mistreatment of African Americans by police and vigilantes. The scale of these protests, both online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Cyberbullying: Effect on work place production.James Nambusi Makhulo - 2019 - Africa International Journal of Multidisciplinary Research 2 (1).
    Cyber bullying affects many adolescents and teens on a daily basis; it is a form of violence that can do lasting harm to people at different ages and social status in a society. Cyber bullying is real experience that has been in existence for a quite a long time; Bullying statistics show that cyber bullying is a serious problem among teens and gaining roots among adults. By being more aware of cyber bullying, teens and adults can help to fight it. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. COVID-19 MYTHOLOGY AND NETIZENS PARRHESIA IDEOLOGICAL EFFECTS OF CORONAVIRUS MYTHS ON SOCIAL MEDIA USERS.Muhammad Hasyim - 2020 - Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17 (4):1398-1409.
    Social Media is a new media of information flow gateway that can be accessed by the public, easily and freely. Social Media is an interactive information technology which not only can netizens access information, but they can also make news (information, comments, etc.) and share it on the internet. Easy access to information has caused ideological effects on society. This research aims to examine the ideological effects of the myths about COVID-19 on social media. The data collection was done through (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Effects of Porn: A Critical Analysis.Rory Collins - 2019 - 1890: A Journal of Undergraduate Research 3:28-40.
    The impacts of pornography are varied and complex. Performers are often thought to be victims of abuse and exploitation, while viewers are regularly accused of becoming desensitized to sexual violence. Further, porn is held by some to perpetuate damaging racial and gender stereotypes. I contend that these accusations, though not entirely baseless, are undermined for two reasons: they rest on questionable empirical evidence and ignore many of the positive consequences porn may have. In this article, I organize my analysis from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Beyond restorative justice: Social justice as a new objective for criminal justice.Gavrielides Theo & Nestor Kourakis - 2019 - London: Routledge.
    The author considers that the Penal Sciences face a wide range of human pathogenic issues, ranging from terrorism and human trafficking to corruption and the use of substances and are, thus, the ideal discipline for investigating the various scientific issues and the implementation of the scientific findings arising from such investigations. He also believes that the Penal Sciences, being inextricably linked to human values and constitutional rights, are, by their nature, beneficial towards the promotion and consolidation of values, such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  26
    An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey. [REVIEW]Tosin Ige - manuscript
    Phishing is one of the most effective ways in which cybercriminals get sensitive details such as credentials for online banking, digital wallets, state secrets, and many more from potential victims. They do this by spamming users with malicious URLs with the sole purpose of tricking them into divulging sensitive information which is later used for various cybercrimes. In this research, we did a comprehensive review of current state-of-the-art machine learning and deep learning phishing detection techniques to expose their vulnerabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. An Ethic of Plurality: Reconciling Politics and Morality in Hannah Arendt.Alice MacLachlan - 2006 - History and Judgment: IWM JVF Conference Vol. 21.
    My concern in this paper is how to reconcile a central tension in Hannah Arendt’s thinking, one that – if left unresolved – may make us reluctant to endorse her political theory. Arendt was profoundly and painfully aware of the horrors of political evil; in fact, she is almost unparalleled in 20 th century thought in her concern for the consequences of mass political violence, the victims of political atrocities, and the most vulnerable in political society – the stateless, the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  24. Hazardous Child Labor in Bangladesh: A critical evaluation of the legal and policy framework vis a vis practical challenges.Md Mahmudul Hoque - 2022 - Proceedings of the World Conference on Children and Youth.
    Bangladesh is a signatory of the International Labor Organization’s two landmark conventions on child labor – No.138 on Minimum Age and No. 182 on the Worst Forms of Child Labor. The Bangladesh Labor Act, 2006 prohibits the employment of any child in child labor’s worst forms, including hazardous ones. To eliminate hazardous child labor (HCL) from the country, the government published a list of 38 activities/processes as hazardous to children. However, emerging data suggest that HCL still exists widely in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Craft Theory And The Creation Of A New Capitalism.Jonathan Morgan - 2018 - The New Polis.
    This paper challenges the notion that the only way to progress to a post-capitalist society is through the wholesale destruction of the capitalist economic system. Instead, I argue that Craft —an existential state and praxis informed by the creation and maintenance of objects of utility—is uniquely situated to effectively reclaim these systems due to its its focus on materiality over abstraction and its unique position as a socially aware form of praxis. This argument focuses not on competition, but on hyper-abstraction (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Giving Up, Expecting Hope, and Moral Transformation.Kathryn J. Norlock - 2017 - Reasonable Responses: The Thought of Trudy Govier.
    Open Access: Trudy Govier (FR) argues for “conditional unforgivability,” yet avers that we should never give up on a human being. She not only says it is justifiable to take a “hopeful and respectful attitude” toward one’s wrongdoers, she indicates that it is wrong not to; she says it is objectionable to adopt an attitude that any individual is “finally irredeemable” or “could never change,” because such an attitude “anticipates and communicates the worst” (137). Govier’s recommendation to hold a hopeful (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Symbolic Violence in Religious Discourse in Indonesia.Andi Alfian - 2021 - Proceedings of the 1St International Conference on Social and Islamic Studies (Icsis).
    Religious discourse is one of the instruments that are often used by the dominant class (the majority, who are in power) to carry out a symbolic violence mechanism against the dominated class (the minority, who are ruled). For example, through religious discourses that seem plural and open, the power and domination of the dominant class are continuously perpetuated. This study aims to analyze the symbolic violence that occurs in religious discourse in Indonesia, especially in the study of religion, by reviewing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Văn minh làm giàu từ góc nhìn của một người Việt.Dân-Trí Online - 2007 - Dân Trí Online.
    (Dân trí) - Bạn hãy thử hình dung một bức tranh thể hiện hình ảnh một thương gia cưỡi một chú lạc đà. Dưới chân họ chỉ có cát nóng bỏng của sa mạc khô cằn, phía sau lưng họ là ánh mặt trời chói lòa, bỏng rát. Hai bên đường chỉ có sương rồng gai góc, như biểu trưng cho hành trình vất vả đầy chông gai. Một điều gây bất ngờ: chú lạc đà lại kéo theo một chiếc (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Encountering Evil: The Evil-god Challenge from Religious Experience.Asha Lancaster-Thomas - 11th July Online - European Journal for Philosophy of Religion 12 (3):0-0.
    It is often thought that religious experiences provide support for the cumulative case for the existence of the God of classical monotheism. In this paper, I formulate an Evil-god challenge that invites classical monotheists to explain why, based on evidence from religious experience, the belief in an omnipotent, omniscient, omnibenevolent god is significantly more reasonable than the belief in an omnipotent, omniscient, evil god. I demonstrate that religious experiences substantiate the existence of Evil-god more so than they do the existence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  31. Online Deliberation Design: Choices, Criteria, and Evidence.Todd Davies & Reid Chandler - 2012 - In Nabatchi Tina, Gastil John, Weiksner G. Michael & Leihninger Matt (eds.), Democracy in Motion: Evaluating the Practice and Impact of Deliberative Civic Engagement. Oxford University Press. pp. 103-131.
    This chapter reviews empirical evidence bearing on the design of online forums for deliberative civic engagement. Dimensions of design are defined for different aspects of the deliberation: its purpose, the target population, the spatiotemporal distance separating participants, the communication medium, and the deliberative process to be followed. After a brief overview of criteria for evaluating different design options, empirical findings are organized around design choices. Research has evolved away from treating technology for online deliberation dichotomously (either present or (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Two Victim Paradigms and the Problem of ‘Impure’ Victims.Diana Tietjens Meyers - 2011 - Humanity 2 (2):255-275.
    Philosophers have had surprisingly little to say about the concept of a victim although it is presupposed by the extensive philosophical literature on rights. Proceeding in four stages, I seek to remedy this deficiency and to offer an alternative to the two current paradigms that eliminates the Othering of victims. First, I analyze two victim paradigms that emerged in the late 20th century along with the initial iteration of the international human rights regime – the pathetic victim paradigm and the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Free online services: enabling, disenfranchising, disempowering.Luciano Floridi - 2015 - Philosophy and Technology 28 (2):163-166.
    Free online services have become an essential part of onlife experience in the digital society. And yet, such digital gifts can be argued to represent a modern-day Trojan horse. This paper advances the theory that, far from being “free”, the digital gift economy disempowers and disenfranchises users, eroding privacy and promoting inequality. It concludes that what is needed to improve the situation is better taxation and stricter regulation of the advertising industry.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Synchronous Online Philosophy Courses: An Experiment in Progress.Fritz McDonald - 2018 - APA Newsletter on Philosophy and Computers 18 (1):37-40.
    There are two main ways to teach a course online: synchronously or asynchronously. In an asynchronous course, students can log on at their convenience and do the course work. In a synchronous course, there is a requirement that all students be online at specific times, to allow for a shared course environment. In this article, the author discusses the strengths and weaknesses of synchronous online learning for the teaching of undergraduate philosophy courses. The author discusses specific strategies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. ‘Half Victim, Half Accomplice’: Cat Person and Narcissism.Filipa Melo Lopes - 2021 - Ergo: An Open Access Journal of Philosophy 7:701-729.
    At the end of 2017, Kristen Roupenian’s short story, Cat Person, went viral. Published at the height of the #MeToo movement, it depicted a ‘toxic date’ and a disturbing sexual encounter between Margot, a college student, and Robert, an older man she meets at work. The story was widely viewed as a relatable denunciation of women’s powerlessness and routine victimization. In this paper, I push against this common reading. I propose an alternative feminist interpretation through the lens of Simone (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Online Intellectual Virtues and the Extended Mind.Lukas Schwengerer - 2021 - Social Epistemology 35 (3):312-322.
    The internet has become an ubiquitous epistemic source. However, it comes with several drawbacks. For instance, the world wide web seems to foster filter bubbles and echo chambers and includes search results that promote bias and spread misinformation. Richard Heersmink suggests online intellectual virtues to combat these epistemically detrimental effects . These are general epistemic virtues applied to the online environment based on our background knowledge of this online environment. I argue that these online intellectual virtues (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  38. Online Public Shaming: Virtues and Vices.Paul Billingham & Tom Parr - 2020 - Journal of Social Philosophy 51 (3):371-390.
    We are witnessing increasing use of the Internet, particular social media, to criticize (perceived or actual) moral failings and misdemeanors. This phenomenon of so-called ‘online public shaming’ could provide a powerful tool for reinforcing valuable social norms. But it also threatens unwarranted and severe punishments meted out by online mobs. This paper analyses the dangers associated with the informal enforcement of norms, drawing on Locke, but also highlights its promise, drawing on recent discussions of social norms. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  39. Online Artistic Activism: Case-Study of Hungarian-Romanian Intercultural Communication.Gizela Horváth & Rozália Klára Bakó - 2016 - Santalka: Filosofija, Komunikacija 24 (1):48–58.
    Technical reproduction in general, and photography in particular have changed the status and practices of art. Similarly, the expansion of Web 2.0 interactive spaces presents opportunities and challenges to artistic communities. Present study focuses on artistic activism: socially sensitive artists publish their creation on the internet on its most interactive space – social media. These artworks carry both artistic and social messages. Such practices force us to reinterpret some elements of the classical art paradigm: its autonomy, authorship, uniqueness (as opposed (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Victims of eugenic sterilisation in Utah: cohort demographics and estimate of living survivors.Tabery James & Lida Sarafraz - 2023 - The Lancet Regional Health–Americas.
    Eugenicists at the beginning of the twentieth century feared that the "unfit" were outbreeding the "fit" and promoted interventions like sterilisation as a solution to the perceived problem. Over 60,000 people were sterilised across the United States, victims of eugenic programs implemented in 32 states. Utah had a particularly aggressive eugenic sterilisation program, hailed by eugenicists for sterilising such a large proportion of its population, and lasting well into the 1970s. The goal of the present study was to determine who, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Online Deliberation: Design, Research, and Practice.Todd Davies & Seeta Peña Gangadharan (eds.) - 2009 - CSLI Publications/University of Chicago Press.
    Can new technology enhance purpose-driven, democratic dialogue in groups, governments, and societies? Online Deliberation: Design, Research, and Practice is the first book that attempts to sample the full range of work on online deliberation, forging new connections between academic research, technology designers, and practitioners. Since some of the most exciting innovations have occurred outside of traditional institutions, and those involved have often worked in relative isolation from each other, work in this growing field has often failed to reflect (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Online Shaming.Kathryn J. Norlock - 2017 - Social Philosophy Today 33:187-197.
    Online shaming is a subject of import for social philosophy in the Internet age, and not simply because shaming seems generally bad. I argue that social philosophers are well-placed to address the imaginal relationships we entertain when we engage in social media; activity in cyberspace results in more relationships than one previously had, entailing new and more responsibilities, and our relational behaviors admit of ethical assessment. I consider the stresses of social media, including the indefinite expansion of our relationships (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  43. The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  44. Utilising online eye-tracking to discern the impacts of cultural backgrounds on fake and real news decision-making.Amanda Brockinton, Sam Hirst, Ruijie Wang, John McAlaney & Shelley Thompson - 2022 - Frontiers in Psychology 13:999780.
    Introduction: Online eye-tracking has been used in this study to assess the impacts of different cultural backgrounds on information discernment. An online platform called RealEye allowed participants to engage in the eye-tracking study from their personal computer webcams, allowing for higher ecological validity and a closer replication of social media interaction. -/- Methods: The study consisted of two parts with a total of five visuals of social media posts mimicking news posts on Twitter, Instagram, and Facebook. Participants were (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Preference Toward Identified Victims and Rescue Duties.Tomasz Żuradzki - 2015 - American Journal of Bioethics 15 (2):25-27.
    Jeremy R. Garrett claims that the nature and scope of our rescue duties cannot be properly understood and addressed without reference to social context or institutional background conditions. In my comment I focus not on social or institutional but on psychological background conditions that are also necessary for the conceptualization of rescue cases. These additional conditions are of crucial importance since an entire paradigm of “rescue medicine” is founded, as Garret notices, on the powerful and immediate “impulse to rescue” (Garrett (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Online Misinformation and “Phantom Patterns”: Epistemic Exploitation in the Era of Big Data.Megan Fritts & Frank Cabrera - 2021 - Southern Journal of Philosophy 60 (1):57-87.
    In this paper, we examine how the availability of massive quantities of data i.e., the “Big Data” phenomenon, contributes to the creation, spread, and harms of online misinformation. Specifically, we argue that a factor in the problem of online misinformation is the evolved human instinct to recognize patterns. While the pattern-recognition instinct is a crucial evolutionary adaptation, we argue that in the age of Big Data, these capacities have, unfortunately, rendered us vulnerable. Given the ways in which (...) media outlets profit from the spread of misinformation by preying on this pattern-finding instinct, we conceptualize the problem that we identify as a morally objectionable form of “epistemic exploitation.” As we argue, the consumer of digital misinformation is often exploited by having her pattern-recognition instinct used against her. This exploitation is morally objectionable because it deprives her of an epistemic good to which she has a right. This epistemic good is the integrity of the pattern-recognition instinct itself which, we argue, is a capacity that allows us to participate in uniquely human goods. While our primary goal is to bring attention to this form of epistemic exploitation, we conclude by briefly evaluating some general solutions to the growing problem of online misinformation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. (1 other version)Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Online update: Temporal, modal, and de se anaphora in polysynthetic discourse.Maria Bittner - 2007 - In Chris Barker & Pauline I. Jacobson (eds.), Direct compositionality. New York: Oxford University Press. pp. 11--363.
    This paper introduces a framework for direct surface composition by online update. The surface string is interpreted as is, with each morpheme in turn updating the input state of information and attention. A formal representation language, Logic of Centering, is defined and some crosslinguistic constraints on lexical meanings and compositional operations are formulated.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  49. Belonging Online: Rituals, Sacred Objects, and Mediated Interations.Lucy Osler - forthcoming - In Luna Dolezal & Danielle Petherbridge (eds.), Phenomenology of Belonging.
    In this chapter, I explore how experiences of social belonging might emerge and be sustained in online communities, drawing from the work on rituals by Randall Collins. I argue that rather than viewing mediated interactions in terms of whether they are suitable substitutes for face-to-face interactions, we should consider mediated encounters in their own right. This allows us to recognize the creative ways that people can create rituals in a mediated setting and thus support and create a sense of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Online Deliberation and #CivicTech: A Symposium.Weiyu Zhang, Todd Davies & Anna Przybylska - 2021 - Journal of Deliberative Democracy 17 (1):76-77.
    Online deliberation is one important instance of civic tech that is both for and by the citizens, through engaging citizens in Internet-supported deliberative discussions on public issues. This article explains the origins of a set of symposium articles in this journal issue based on the 2017 'International Conference on Deliberation and Decision Making: Interdisciplinary Perspectives on Civic Tech' held in Singapore. Symposium articles are presented in a sequence that flows from designing decision making systems to platforms to specific technological (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 968