This category needs an editor. We encourage you to help if you are qualified.
Volunteer, or read more about what this involves.
Related categories
Subcategories:
655 found
Search inside:
(import / add options)   Order:
1 — 50 / 655
Material to categorize
  1. K. Abe (2009). The Myth of Media Interactivity: Technology, Communications and Surveillance in Japan. Theory, Culture and Society 26 (2-3):73-88.
    Since the 1980s, a number of discourses have celebrated the coming of the information society in Japan. In those discourses, enabling media interactivity has been emphasized as the objective of technological innovations, creating a sort of `myth' of media interactivity. This article tries to investigate the close relationship between media interactivity and surveillance modality in newly emergent information and communication technologies, especially SNS on the Internet. While the traditional image of surveillance society is gloomy and repressive, contemporary, ubiquitous surveillance appears (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  2. Alison Adam (2002). Cyberstalking and Internet Pornography: Gender and the Gaze. [REVIEW] Ethics and Information Technology 4 (2):133-142.
    This paper is based on the premise that the analysis of some cyberethics problems would benefit from a feminist treatment. It is argued that both cyberstalking and Internet child pornography are two such areas which have a `gendered' aspect which has rarely been explored in the literature. Against a wide ranging feminist literature of potential relevance, the paper explores a number of cases through a focused approach which weaves together feminist concepts of privacy and the gaze.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  3. Alison Adam & Jacqueline Ofori-Amanfo (2000). Does Gender Matter in Computer Ethics? Ethics and Information Technology 2 (1):37-47.
  4. Philip E. Agre (2001). Supporting the Intellectual Life of a Democratic Society. Ethics and Information Technology 3 (4):289-298.
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  5. Anders Albrechtslund (2007). Ethics and Technology Design. Ethics and Information Technology 9 (1):63-72.
    This article offers a discussion of the connection between technology and values and, specifically, I take a closer look at ethically sound design. In order to bring the discussion into a concrete context, the theory of Value Sensitive Design (VSD) will be the focus point. To illustrate my argument concerning design ethics, the discussion involves a case study of an augmented window, designed by the VSD Research Lab, which has turned out to be a potentially surveillance-enabling technology. I call attention (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  6. Andrew Alexandra (2002). Academic Personality and the Commodification of Academic Texts. Ethics and Information Technology 4 (4):279-286.
    This paper explores the nature of, and justification for, copyright in academic texts in the light of recent developments in information technology, in particular the growth of electronic publication on the internet. Copyright, like other forms of property, is best thought of as a cluster of rights. A distinction is drawn within this cluster between first order `control rights' and higher order `commodity rights'. It is argued that copyright in academic texts is founded on its role as a means to (...)
    Remove from this list   Direct download (12 more)  
     
    Export citation  
     
    My bibliography  
  7. Rami Ali (2015). A New Solution to the Gamer’s Dilemma. Ethics and Information Technology 17 (4):267-274.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  8. Andoni Alonso & Carl Mitcham (2004). Software Libre 2004. Ethics and Information Technology 6 (1):65-67.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  9. Sheri A. Alpert (1996). Doctoral Essays in Computer Ethics. Science and Engineering Ethics 2 (2):225-247.
    Computer technologies are having a profoundly transforming effect on how the United States federal government operates. As technologies become more sophisticated, Federal agencies are becoming more innovative, devising creative ways to use these technologies for program delivery. One hopes that the near-term effect of these technology applications will be more efficient operation of government, the goal that generally leads to their implementation.
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  10. Anton Alterman (2003). ``A Piece of Yourself'': Ethical Issues in Biometric Identification. [REVIEW] Ethics and Information Technology 5 (3):139-150.
    The proliferation of biometric identification technology raises difficult issues in the matter of security, privacy and identity. Though biometric "images" are not images per se, they are both unique representations of an individual in themsevles and a means of access to other identifying information. I compare biometric imaging with other kinds of identifying representations and find that there are issues specific to biometric ID's. Because they represent information that is written into the body they are directly related to one's sense (...)
    Remove from this list   Direct download (12 more)  
     
    Export citation  
     
    My bibliography   6 citations  
  11. Jürgen Altmann (2013). Arms Control for Armed Uninhabited Vehicles: An Ethical Issue. [REVIEW] Ethics and Information Technology 15 (2):137-152.
    Arming uninhabited vehicles (UVs) is an increasing trend. Widespread deployment can bring dangers for arms-control agreements and international humanitarian law (IHL). Armed UVs can destabilise the situation between potential opponents. Smaller systems can be used for terrorism. Using a systematic definition existing international regulation of armed UVs in the fields of arms control, export control and transparency measures is reviewed; these partly include armed UVs, but leave large gaps. For preventive arms control a general prohibition of armed UVs would be (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  12. Jürgen Altmann, Peter Asaro, Noel Sharkey & Robert Sparrow (2013). Armed Military Robots: Editorial. [REVIEW] Ethics and Information Technology 15 (2):73-76.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  13. Shoshana Altschuller & Raquel Benbunan-Fich (2009). Is Music Downloading the New Prohibition? What Students Reveal Through an Ethical Dilemma. Ethics and Information Technology 11 (1):49-56.
    Although downloading music through unapproved channels is illegal, statistics indicate that it is widespread. The following study examines the attitudes and perceptions of college students that are potentially engaged in music downloading. The methodology includes a content analysis of the recommendations written to answer an ethical vignette. The vignette presented the case of a subject who faces the dilemma of whether or not to download music illegally. Analyses of the final reports indicate that there is a vast and inconsistent array (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   6 citations  
  14. Thomas C. Anderson (2000). The Body and Communities in Cyberspace: A Mmarcellian Analysis. [REVIEW] Ethics and Information Technology 2 (3):153-158.
    Many who speak glowingly about the possibilities for human relations in cyberspace, or virtual communities, laud them precisely because such communities are to a great extent free of the real spatial-temporal restrictions rooted in the limitations of our bodies. In this paper I investigate the importance of the body in establishing and maintaining human relations by considering the thought of the twentieth century French philosopher Gabriel Marcel. Because Marcel emphasized the central importance of the body in one's personal self-identity as (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  15. John Arquilla (1999). Can Information Warfare Ever Be Just? Ethics and Information Technology 1 (3):203-212.
    The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker''s true identity put serious pressure (...)
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  16. John M. Artz (2001). Thinking About Technology: Foundations of the Philosophy of Technology, Joseph C. Pitt. [REVIEW] Ethics and Information Technology 2 (4):249-250.
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  17. John M. Artz (1999). Human Values and the Design of Computer Technology, Edited by Batya Friedman. Ethics and Information Technology 1 (4):305-306.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  18. Ann Backus, Richard A. Spinello & Herman T. Tavani (2004). Genomics, Ethics, and ICT. Ethics and Information Technology 6 (1):1-3.
    Remove from this list   Direct download (12 more)  
     
    Export citation  
     
    My bibliography  
  19. Jane Bailey & Ian Kerr (2007). Seizing Control?: The Experience Capture Experiments of Ringley & Mann. [REVIEW] Ethics and Information Technology 9 (2):129-139.
    Will the proliferation of devices that provide the continuous archival and retrieval of personal experiences (CARPE) improve control over, access to and the record of collective knowledge as Vannevar Bush once predicted with his futuristic memex? Or is it possible that their increasing ubiquity might pose fundamental risks to humanity, as Donald Norman contemplated in his investigation of an imaginary CARPE device he called the “Teddy”? Through an examination of the webcam experiment of Jenni Ringley and the EyeTap experiments of (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  20. Maria Bakardjieva & Andrew Feenberg (2001). Involving the Virtual Subject. Ethics and Information Technology 2 (4):233-240.
    As users of computer networks have become more active in producing their own electronic records, in the form of transcripts of onlinediscussions, ethicists have attempted to interpret this new situation interms of earlier models of personal data protection. But thistransference results in unprecedented problems for researchers. Thispaper examines some of the central dichotomies and paradoxes in thedebate on research ethics online in the context of the concrete study ofa virtual community that we carried out. We argue that alienation, notprivacy, is (...)
    Remove from this list   Direct download (12 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  21. S. Ball Kirstie (2001). Situation Workplace Surveillance: Ethics and Computer-Based Performance Monition. Ethics and Information Technology 3 (3).
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  22. Kirstie S. Ball (2001). Situating Workplace Surveillance: Ethics and Computer Based Performance Monitoring. [REVIEW] Ethics and Information Technology 3 (3):209-221.
    This paper examines the study of computer basedperformance monitoring (CBPM) in the workplaceas an issue dominated by questions of ethics.Its central contention paper is that anyinvestigation of ethical monitoring practice isinadequate if it simply applies best practiceguidelines to any one context to indicate,whether practice is, on balance, ethical or not. The broader social dynamics of access toprocedural and distributive justice examinedthrough a fine grained approach to the study ofworkplace social relations, and workplaceidentity construction, are also important here. This has three (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  23. Zonghao Bao & Kun Xiang (2006). Digitalization and Global Ethics. Ethics and Information Technology 8 (1):41-47.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  24. Porfirio Barroso (forthcoming). Four Principles of Internet Ethics. Ethics and Information Technology.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  25. Christopher Bartel (2015). Free Will and Moral Responsibility in Video Games. Ethics and Information Technology 17 (4):285-293.
    Can a player be held morally responsible for the choices that she makes within a videogame? Do the moral choices that the player makes reflect in any way on the player’s actual moral sensibilities? Many videogames offer players the options to make numerous choices within the game, including moral choices. But the scope of these choices is quite limited. I attempt to analyze these issues by drawing on philosophical debates about the nature of free will. Many philosophers worry that, if (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  26. Elizabeth H. Bassett & Kate O'Riordan (2002). Ethics of Internet Research: Contesting the Human Subjects Research Model. Ethics and Information Technology 4 (3):233-247.
    The human subjects researchmodel is increasingly invoked in discussions ofethics for Internet research. Here we seek toquestion the widespread application of thismodel, critiquing it through the two themes ofspace and textual form. Drawing on ourexperience of a previous piece ofresearch, we highlightthe implications of re-considering thetextuality of the Internet in addition to thespatial metaphors that are more commonlydeployed to describe Internet activity. Weargue that the use of spatial metaphors indescriptions of the Internet has shaped theadoption of the human subjects research (...)
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  27. Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne (2012). Challenges of Ethical and Legal Responsibilities When Technologies' Uses and Users Change: Social Networking Sites, Decision-Making Capacity and Dementia. [REVIEW] Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  28. Fiorella Battaglia, Nikil Mukerji & Julian Nida-Rümelin (eds.) (2014). Rethinking Responsibility in Science and Technology. Pisa University Press.
    The idea of responsibility is deeply embedded into the “lifeworld” of human beings and not subject to change. However, the empirical circumstances in which we act and ascribe responsibility to one another are subject to change. Science and technology play a great part in this transformation process. Therefore, it is important for us to rethink the idea, the role and the normative standards behind responsibility in a world that is constantly being transformed under the influence of scientific and technological progress. (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  29. Keith Bauer (2004). Cybermedicine and the Moral Integrity of the Physician–Patient Relationship. Ethics and Information Technology 6 (2):83-91.
    Some critiques of cybermedicine claim that it is problematic because it fails to create physician–patient relationships. But, electronically mediated encounters do create such relationships. The issue is the nature and quality of those relationships and whether they are conducive to good patient care and meet the ethical ideals and standards of medicine. In this paper, I argue that effective communication and compassion are, in most cases, necessary for the establishment of trusting and morally appropriate physician–patient relationships. The creation of these (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  30. A. F. Beavers (2001). Philosophy and Computing: An Introduction, Luciano Floridi. Ethics and Information Technology 3 (4):299-301.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  31. Anthony F. Beavers (2010). Wendell Wallach and Colin Allen: Moral Machines: Teaching Robots Right From Wrong. [REVIEW] Ethics and Information Technology 12 (4):357-358.
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  32. Anthony F. Beavers (2001). Luciano Floridi, Philosophy and Computing: An Introduction. [REVIEW] Ethics and Information Technology 3 (4):299-301.
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  33. Colin J. Bennett (2001). Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web. [REVIEW] Ethics and Information Technology 3 (3):195-208.
    This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  34. J. Berleur (1996). International Federation for Information Processing's Framework for Computer Ethics. Science and Engineering Ethics 2 (2):155-165.
    This paper reviews codes of ethics and codes of conduct from different countries. The differences and similarities between code content and between attitudes are considered. Distinction is drawn between a code of ethics and a code of conduct. Recommendations are made for establishing a common framework for IFIP (International Federation for Information Process) Member or Affiliate Societies.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  35. Tommaso Bertolotti & Lorenzo Magnani (2013). A Philosophical and Evolutionary Approach to Cyber-Bullying: Social Networks and the Disruption of Sub-Moralities. Ethics and Information Technology 15 (4):285-299.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  36. Cristina Bicchieri & Azi Lev-On (2011). Studying the Ethical Implications of E-Trust in the Lab. Ethics and Information Technology 13 (1):5-15.
    The paper presents results of recent laboratory experiments that study if and how computer-mediated communication affects cooperation and trust. It is argued that communication medium does not matter much for trust-building and maintenance, whereas relevant pre-play communication and group size can have a major influence. The implications of the findings for the design of sites that depend on trusting communities are discussed.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  37. David G. W. Birch (2008). Psychic ID: A Blueprint for a Modern National Identity Scheme. Identity in the Information Society 1 (1):189-201.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  38. William F. Birdsall (2011). Human Capabilities and Information and Communication Technology: The Communicative Connection. [REVIEW] Ethics and Information Technology 13 (2):93-106.
    The potential contributions information and communication technology (ICT) can make to advancing human capabilities are acknowledged by both the capability approach (CA) and ICT communities. However, there is a lack of genuine engagement between the two communities. This paper addresses the question: How can a collaborative dialogue between the CA and ICT communities be advanced? A prerequisite to exploring collaboratively the potential use of particular technologies with specific capabilities is a conceptual framework within which a dialogue can be undertaken to (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    My bibliography  
  39. Frans A. J. Birrer (2005). Data Mining to Combat Terrorism and the Roots of Privacy Concerns. Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  40. D. Birsch (2002). Gordon Graham, the Internet: A Philosophical Inquiry. [REVIEW] Ethics and Information Technology 4 (4):325-328.
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  41. Douglas Birsch (2004). Moral Responsibility for Harm Caused by Computer System Failures. Ethics and Information Technology 6 (4):233-245.
    When software is written and then utilized in complex computer systems, problems often occur. Sometimes these problems cause a system to malfunction, and in some instances such malfunctions cause harm. Should any of the persons involved in creating the software be blamed and punished when a computer system failure leads to persons being harmed? In order to decide whether such blame and punishment are appropriate, we need to first consider if the people are “morally responsible”. Should any of the people (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  42. Russell Blackford (2012). Robots and Reality: A Reply to Robert Sparrow. [REVIEW] Ethics and Information Technology 14 (1):41-51.
    We commonly identify something seriously defective in a human life that is lived in ignorance of important but unpalatable truths. At the same time, some degree of misapprehension of reality may be necessary for individual health and success. Morally speaking, it is unclear just how insistent we should be about seeking the truth. Robert Sparrow has considered such issues in discussing the manufacture and marketing of robot ‘pets’, such as Sony’s doglike ‘AIBO’ toy and whatever more advanced devices may supersede (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  43. Jean-François Blanchette (1999). Information Warfare and Security by Dorothy E. Denning. Ethics and Information Technology 1 (3):237-238.
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  44. Jean-Francois Blanchette (1999). Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie and Susan Landau. [REVIEW] Ethics and Information Technology 1 (2):167-169.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  45. Utpal Bose (2012). An Ethical Framework in Information Systems Decision Making Using Normative Theories of Business Ethics. Ethics and Information Technology 14 (1):17-26.
    As business environments become more complex and reliant on information systems, the decisions made by managers affect a growing number of stakeholders. This paper proposes a framework based on the application of normative theories in business ethics to facilitate the evaluation of IS related ethical dilemmas and arrive at fair and consistent decisions. The framework is applied in the context of an information privacy dilemma to demonstrate the decision making process. The ethical dilemma is analyzed using each one of the (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  46. Maria C. Bottis, Frances S. Grodzinsky & Herman T. Tavani (2010). Editorial: Moral Luck, Social Networking Sites, and Trust on the Web. [REVIEW] Ethics and Information Technology 12 (4):297-298.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  47. Engin Bozdag (2013). Bias in Algorithmic Filtering and Personalization. Ethics and Information Technology 15 (3):209-227.
    Online information intermediaries such as Facebook and Google are slowly replacing traditional media channels thereby partly becoming the gatekeepers of our society. To deal with the growing amount of information on the social web and the burden it brings on the average user, these gatekeepers recently started to introduce personalization features, algorithms that filter information per individual. In this paper we show that these online services that filter information are not merely algorithms. Humans not only affect the design of the (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  48. Engin Bozdag & Jeroen van den Hoven (2015). Breaking the Filter Bubble: Democracy and Design. Ethics and Information Technology 17 (4):249-265.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  49. Sandra Braman (2007). When Nightingales Break the Law: Silence and the Construction of Reality. [REVIEW] Ethics and Information Technology 9 (4):281-295.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  50. Philip Brey (2008). Do We Have Moral Duties Towards Information Objects? Ethics and Information Technology 10 (2-3):109-114.
    In this paper, a critique will be developed and an alternative proposed to Luciano Floridi’s approach to Information Ethics (IE). IE is a macroethical theory that is to both serve as a foundation for computer ethics and to guide our overall moral attitude towards the world. The central claims of IE are that everything that exists can be described as an information object, and that all information objects, qua information objects, have intrinsic value and are therefore deserving of moral respect. (...)
    Remove from this list   Direct download (13 more)  
     
    Export citation  
     
    My bibliography   3 citations  
1 — 50 / 655