Year:

Forthcoming articles
  1. Dominic Smith (forthcoming). Rewriting the Constitution: A Critique of 'Postphenomenology'. Philosophy and Technology:1-19.
    This paper builds a three-part argument in favour of a more transcendentally focused form of ‘postphenomenology’ than is currently practised in philosophy of technology. It does so by problematising two key terms, ‘constitution’ and ‘postphenomenology’, then by arguing in favour of a ‘transcendental empiricist’ approach that draws on the work of Foucault, Derrida, and, in particular, Deleuze. Part one examines ‘constitution’, as it moves from the context of Husserl’s phenomenology to Ihde and Verbeek’s ‘postphenomenology’. I argue that the term tends (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  2. Slawomir J. Nasuto, John Mark Bishop, Etienne B. Roesch & Matthew C. Spencer (forthcoming). Zombie Mouse in a Chinese Room. Philosophy and Technology:1-15.
    John Searle’s Chinese Room Argument (CRA) purports to demonstrate that syntax is not sufficient for semantics, and, hence, because computation cannot yield understanding, the computational theory of mind, which equates the mind to an information processing system based on formal computations, fails. In this paper, we use the CRA, and the debate that emerged from it, to develop a philosophical critique of recent advances in robotics and neuroscience. We describe results from a body of work that contributes to blurring the (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  3. Litska Strikwerda (forthcoming). Present and Future Instances of Virtual Rape in Light of Three Categories of Legal Philosophical Theories on Rape. Philosophy and Technology:1-20.
    This paper is about the question of whether or not virtual rape should be considered a crime under current law. A virtual rape is the rape of an avatar (a person’s virtual representation) in a virtual world. In the future, possibilities for virtual rape of a person him- or herself will arise in virtual reality environments involving a haptic device or robotics. As the title indicates, I will study both these present and future instances of virtual rape in light of (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  4. Mario Villalobos & Dave Ward (forthcoming). Living Systems: Autonomy, Autopoiesis and Enaction. Philosophy and Technology:1-15.
    The autopoietic theory and the enactive approach are two theoretical streams that, in spite of their historical link and conceptual affinities, offer very different views on the nature of living beings. In this paper, we compare these views and evaluate, in an exploratory way, their respective degrees of internal coherence. Focusing the analyses on certain key notions such as autonomy and organizational closure, we argue that while the autopoietic theory manages to elaborate an internally consistent conception of living beings, the (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  5. William Bülow & Cathrine Felix (forthcoming). On Friendship Between Online Equals. Philosophy and Technology:1-14.
    There is an ongoing debate about the value of virtual friendship. In contrast to previous authorships, this paper argues that virtual friendship can have independent value. It is argued that within an Aristotelian framework, some friendships that are perhaps impossible offline can exist online, i.e., some offline unequals can be online equals and thus form online friendships of independent value.
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  6. Pompeu Casanovas (forthcoming). Semantic Web Regulatory Models: Why Ethics Matter. Philosophy and Technology:1-23.
    The notion of validity fulfils a crucial role in legal theory. In the emerging Web 3.0, Semantic Web languages, legal ontologies, and normative multi-agent systems (nMAS) are designed to cover new regulatory needs. Conceptual models for complex regulatory systems shape the characteristic features of rules, norms, and principles in different ways. This article outlines one of such multilayered governance models, designed for the CAPER platform, and offers a definition of Semantic Web Regulatory Models (SWRM). It distinguishes between normative-SWRM and institutional-SWRM. (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  7. Marc Champagne & Ryan Tonkens (forthcoming). Bridging the Responsibility Gap in Automated Warfare. Philosophy and Technology:1-13.
    Sparrow (J Appl Philos 24:62–77, 2007) argues that military robots capable of making their own decisions would be independent enough to allow us denial for their actions, yet too unlike us to be the targets of meaningful blame or praise—thereby fostering what Matthias (Ethics Inf Technol 6:175–183, 2004) has dubbed “the responsibility gap.” We agree with Sparrow that someone must be held responsible for all actions taken in a military conflict. That said, we think Sparrow overlooks the possibility of what (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  8. Robert Clowes (forthcoming). Thinking in the Cloud: The Cognitive Incorporation of Cloud-Based Technology. Philosophy and Technology:1-36.
    Technologies and artefacts have long played a role in the structure of human memory and our cognitive lives more generally. Recent years have seen an explosion in the production and use of a new regime of information technologies that might have powerful implications for our minds. Electronic-Memory (E-Memory), powerful, portable and wearable digital gadgetry and “the cloud” of ever-present data services allow us to record, store and access an ever-expanding range of information both about and of relevance to our lives. (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  9. Marc J. De Vries, Andrew Feenberg, Arne De Boever & Aud Sissel Hoel (forthcoming). Book Symposium on The Philosophy of Simondon: Between Technology and Individuation. Philosophy and Technology:1-26.
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  10. Massimo Durante (forthcoming). The Democratic Governance of Information Societies. A Critique to the Theory of Stakeholders. Philosophy and Technology:1-22.
    This paper criticizes the tendency to view the extension of the class of social actors, which stems from the process of democratization of data, as also implying the extension of the class of the political actors involved in the process of governance of the Information Society. The paper argues that social actors can upgrade to political actors once they become real interlocutors, namely political actors that can participate in the formation of the political discourse (which underlies political decisions) and that (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  11. Massimo Durante (forthcoming). Violence, Just Cyber War and Information. Philosophy and Technology:1-17.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war , to revise the notion of violence on which (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  12. Luciano Floridi (forthcoming). The Politics of Uncertainty. Philosophy and Technology:1-4.
    What is uncertainty? There are of course several possible definitions, offered by different fields, from epistemology to statistics, but, in the background, one usually finds some kind of relation with the lack of information, in the following sense. Suppose we define semantic or factual information as the combination of a question plus the relevant, correct answer. If one has both the question and the correct answer, one is informed: “was Berlin the capital of Germany in 2010? Yes”. If one has (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  13. Jan Kyrre Berg Friis (forthcoming). Measure and the Measureless. Philosophy and Technology.
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  14. Jan Kyrre Berg Friis (forthcoming). Interpreting the Visual. Philosophy and Technology.
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  15. Donald Gillies (forthcoming). Technological Origins of the Einsteinian Revolution. Philosophy and Technology:1-30.
    The Einsteinian revolution, which began around 1905, was one of the most remarkable in the history of physics. It replaced Newtonian mechanics, which had been accepted as completely correct for nearly 200 years, by the special and general theories of relativity. It also eliminated the aether, which had dominated physics throughout the nineteenth century. This paper poses the question of why this momentous scientific revolution began. The suggested answer is in terms of the remarkable series of discoveries and inventions which (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  16. Frances S. Grodzinsky, Keith W. Miller & Marty J. Wolf (forthcoming). Developing Automated Deceptions and the Impact on Trust. Philosophy and Technology:1-15.
    As software developers design artificial agents (AAs), they often have to wrestle with complex issues, issues that have philosophical and ethical importance. This paper addresses two key questions at the intersection of philosophy and technology: What is deception? And when is it permissible for the developer of a computer artifact to be deceptive in the artifact’s development? While exploring these questions from the perspective of a software developer, we examine the relationship of deception and trust. Are developers using deception to (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  17. Ejvind Hansen (forthcoming). Hackers in Hiding: A Foucaultian Analysis. Philosophy and Technology:1-15.
    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given. In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  18. Robert Hassan (forthcoming). Our Post-Modern Vanity: The Cult of Efficiency and the Regress to the Boundary of the Animal World. Philosophy and Technology:1-19.
    This essay argues that through a new and radical relationship with digital technologies that are oriented towards networking and automaticity, humans have become estranged from what philosopher Arnold Gehlen termed the ‘circle of action’ (handlungskreis) that expressed our ancient adaptation to tool use and constituted the basis for our capacity for reflective consciousness. The objectification of the material and analogue relationship that enabled humans to ‘act’ upon the world and to construct the basis for our collective endeavours, this paper shows, (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  19. Stephen Hetherington (forthcoming). Technological Knowledge-That As Knowledge-How: A Comment. Philosophy and Technology:1-6.
    Norström has argued that contemporary epistemological debates about the conceptual relations between knowledge-that and knowledge-how need to be supplemented by a concept of technological knowledge—with this being a further kind of knowledge. But this paper argues that Norström has not shown why technological knowledge-that is so distinctive because Norström has not shown that such knowledge cannot be reduced conceptually to a form of knowledge-how. The paper thus applies practicalism to the case of technological knowledge-that. Indeed, the paper shows why Norström’s (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  20. Robin K. Hill (forthcoming). What an Algorithm Is. Philosophy and Technology:1-25.
    The algorithm, a building block of computer science, is defined from an intuitive and pragmatic point of view, through a methodological lens of philosophy rather than that of formal computation. The treatment extracts properties of abstraction, control, structure, finiteness, effective mechanism, and imperativity, and intentional aspects of goal and preconditions. The focus on the algorithm as a robust conceptual object obviates issues of correctness and minimality. Neither the articulation of an algorithm nor the dynamic process constitute the algorithm itself. Analysis (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  21. Michael H. G. Hoffmann (forthcoming). Changing Philosophy Through Technology: Complexity and Computer-Supported Collaborative Argument Mapping. Philosophy and Technology:1-22.
    Technology is not only an object of philosophical reflection but also something that can change this reflection. This paper discusses the potential of computer-supported argument visualization tools for coping with the complexity of philosophical arguments. I will show, in particular, how the interactive and web-based argument mapping software “AGORA-net” can change the practice of philosophical reflection, communication, and collaboration. AGORA-net allows the graphical representation of complex argumentations in logical form and the synchronous and asynchronous collaboration on those “argument maps” on (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  22. Sune Hannibal Holm (forthcoming). Synthetic Biology and Biological Interests. Philosophy and Technology.
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  23. Morgan Luck (forthcoming). Against Norström’s Argument for Technological Knowing How Not Being an Instance of Knowing That. Philosophy and Technology:1-7.
    In this paper, I evaluate an argument offered by Per Norström in section 8 of his paper Knowing how, knowing that, knowing technology. The argument is for the proposition that some instance of knowing how is not an instance of knowing that; the instance in question being one of technological know-how. This conclusion contradicts Stanley and Williamson’s proposal that all instances of knowing how are instances of knowing that. I provide reason to think that there are problems with Norström’s argument.
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  24. Björn Lundgren (forthcoming). The Information Liar Paradox: A Problem for Floridi's RSDI Definition. Philosophy and Technology:1-5.
    In this commentary, I discuss the effects of the liar paradox on Floridi’s definition on semantic information. In particular, I show that there is at least one sentence that creates a contradictory result for Floridi’s definition of semantic information that does not affect the standard definition.
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  25. Phillip McReynolds (forthcoming). How to Think About Cyber Conflicts Involving Non-State Actors. Philosophy and Technology:1-22.
    A great deal of attention has been paid in recent years to the legality of the actions of states and state agents in international and non-international cyber conflicts. Less attention has been paid to ethical considerations in these situations, and very little has been written regarding the ethics of the participation of non-state actors in such conflicts. In this article, I analyze different categories of non-state participation in cyber operations and undertake to show under what conditions such actions, though illegal, (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  26. Per Norström (forthcoming). Knowing How, Knowing That, Knowing Technology. Philosophy and Technology:1-13.
    A wide variety of skills, abilities and knowledge are used in technological activities such as engineering design. Together, they enable problem solving and artefact creation. Gilbert Ryle’s division of knowledge into knowing how and knowing that is often referred to when discussing this technological knowledge. Ryle’s view has been questioned and criticised by those who claim that there is only one type, for instance, Jason Stanley and Timothy Williamson who claim that knowing how is really a form of knowing that (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  27. Marco Nørskov (forthcoming). Revisiting Ihde's Fourfold “Technological Relationships”: Application and Modification. Philosophy and Technology:1-19.
    The question of how we relate to the world via technology is fundamental to the philosophy of technology. One of the leading experts, the contemporary philosopher Don Ihde, has addressed this core issue in many of his works and introduced a fourfold classification of technology-based relationships. The conceptual paper at hand offers a modification of Ihde’s theory, but unlike previous research, it explores the functional compositions of Ihde’s categories instead of complementing them with additional relational categories. The result is a (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  28. Ugo Pagallo (forthcoming). Cyber Force and the Role of Sovereign States in Informational Warfare. Philosophy and Technology:1-19.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors of cyber (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  29. Ugo Pagallo (forthcoming). The Realignment of the Sources of the Law and Their Meaning in an Information Society. Philosophy and Technology:1-17.
    The paper examines the realignment of the legal sources in an information society, by considering first of all the differences with the previous system of sources, dubbed as the “Westphalian model”. The current system is tripartite, rather than bipartite, for the sources of transnational law should be added to the traditional dichotomy between national and international law. In addition, the system is dualistic, rather than monistic, because the tools of legal constructivism, such as codes or statutes, have to be complemented (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  30. Mithun Bantwal Rao, Joost Jongerden, Pieter Lemmens & Guido Ruivenkamp (forthcoming). Technological Mediation and Power: Postphenomenology, Critical Theory, and Autonomist Marxism. Philosophy and Technology:1-26.
    This article focuses on the power of technological mediation from the point of view of autonomist Marxism . The first part of the article discusses the theories developed on technological mediation in postphenomenology and critical theory of technology with regard to their respective power perspectives and ways of coping with relations of power embedded in technical artifacts and systems. Rather than focusing on the clashes between the hermeneutic postphenomenological approach and the dialectics of critical theory, it is argued that in (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  31. Judith Simon & Charles Ess (forthcoming). The ONLIFE Initiative—a Concept Reengineering Exercise. Philosophy and Technology:1-6.
    Background and ProcessIn February 2012, the European Commission launched “The ONLIFE Initiative—a Concept Reengineering Exercise” within the context of the Digital Agenda for Europe. Initiated by Nicole Dewandre of the EC and chaired by Luciano Floridi , scholars from various academic backgrounds were invited to discuss the impact of information and communication technologies on individual, social and public lives. Of particular concern were the policy-relevant consequences of ICT-related developments. Taking Hannah Arendt’s The Human Condition To begin with, we took the (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  32. Sadjad Soltanzadeh (forthcoming). Humanist and Nonhumanist Aspects of Technologies as Problem Solving Physical Instruments. Philosophy and Technology:1-18.
    A form of metaphysical humanism in the field of philosophy of technology can be defined as the claim that besides technologies’ physical aspects, purely human attributes are sufficient to conceptualize technologies. Metaphysical nonhumanism, on the other hand, would be the claim that the meanings of the operative words in any acceptable conception of technologies refer to the states of affairs or events which are in a way or another shaped by technologies. In this paper, I focus on the conception of (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  33. Steffen Steinert (forthcoming). Taking Stock of Extension Theory of Technology. Philosophy and Technology:1-18.
    In this paper, I will focus on the extension theories of technology. I will identify four influential positions that have been put forward: technology as an extension of the human organism, technology as an extension of the lived body and the senses, technology as an extension of our intentions and desires, and technology as an extension of our faculties and capabilities. I will describe and critically assess these positions one by one and highlight their advantages and their shortcomings and limitations. (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  34. Mariarosaria Taddeo & Elizabeth Buchanan (forthcoming). Information Societies, Ethical Enquiries. Philosophy and Technology:1-6.
    The special issue collects a selection of papers presented during the Computer Ethics: Philosophical Enquiries 2013 conference. This is a series of conferences organized by the International Association for Ethics and Information Technology , a professional organization formed in 2001 and which gathers experts in information and computer ethics prompting interdisciplinary research and discussions on ethical problems related to design and deployment of information and communication technologies . During the past two decades, CEPE conferences have been a focal point for (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  35. Herman T. Tavani (forthcoming). Levels of Trust in the Context of Machine Ethics. Philosophy and Technology:1-16.
    Are trust relationships involving humans and artificial agents (AAs) possible? This controversial question has become a hotly debated topic in the emerging field of machine ethics. Employing a model of trust advanced by Buechner and Tavani (Ethics and Information Technology 13(1):39–51, 2011), I argue that the “short answer” to this question is yes. However, I also argue that a more complete and nuanced answer will require us to articulate the various levels of trust that are also possible in environments comprising (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  36. Shannon Vallor (forthcoming). Moral Deskilling and Upskilling in a New Machine Age: Reflections on the Ambiguous Future of Character. Philosophy and Technology:1-18.
    This paper explores the ambiguous impact of new information and communications technologies (ICTs) on the cultivation of moral skills in human beings. Just as twentieth century advances in machine automation resulted in the economic devaluation of practical knowledge and skillsets historically cultivated by machinists, artisans, and other highly trained workers (Braverman 1974), while also driving the cultivation of new skills in a variety of engineering and white collar occupations, ICTs are also recognized as potential causes of a complex pattern of (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  37. Dingmar van Eck (forthcoming). Validating Function-Based Design Methods: An Explanationist Perspective. Philosophy and Technology:1-21.
    Analysis of the adequacy of engineering design methods, as well as analysis of the utility of concepts of function often invoked in these methods, is a neglected topic in both philosophy of technology and in engineering proper. In this paper, I present an approach—dubbed an explanationist perspective—for assessing the adequacy of function-based design methods. Engineering design is often intertwined with explanation, for instance, in reverse engineering and subsequent redesign, knowledge base-assisted designing, and diagnostic reasoning. I argue that the presented approach (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation