This category needs an editor. We encourage you to help if you are qualified.
Volunteer, or read more about what this involves.
Related categories
Siblings:
31 found
Search inside:
(import / add options)   Sort by:
  1. James Backhouse, B. -J. Koops & V. Matyas (2008). Identity in the Information Society-Special Issue, Edited by J. Backhouse, B.-J. Koops, V. Matyas. Identity in the Information Society 1 (1):1-228.
    Remove from this list | Direct download  
     
    My bibliography  
     
    Export citation  
  2. Christopher Bartel (2012). Resolving the Gamer's Dilemma. Ethics and Information Technology 14 (1):11-16.
    Morgan Luck raises a potentially troubling problem for gamers who enjoy video games that allow the player to commit acts of virtual murder. The problem simply is that the arguments typically advanced to defend virtual murder in video games would appear to also support video games that allowed gamers to commit acts of virtual paedophilia. Luck’s arguments are persuasive, however, there is one line of argument that he does not consider, which may provide the relevant distinction: as virtual paedophilia involves (...)
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  3. Martin Brigham & Lucas D. Introna (2007). Invoking Politics and Ethics in the Design of Information Technology: Undesigning the Design. [REVIEW] Ethics and Information Technology 9 (1):1-10.
    It is a truism that the design and deployment of information and communication technologies is vital to everyday life, the conduct of work and to social order. But how are individual, organisational and societal choices made? What might it mean to invoke a politics and an ethics of information technology design and use? This editorial paper situates these questions within the trajectory of preoccupations and approaches to the design and deployment of information technology since computerisation began in the 1940s. Focusing (...)
    Remove from this list | Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  4. Gordana Dodig Crnkovic & Daniel Persson (2008). Sharing Moral Responsibility with Robots: A Pragmatic Approach. In Holst, Per Kreuger & Peter Funk (eds.), Frontiers in Artificial Intelligence and Applications Volume 173. IOS Press Books.
    Roboethics is a recently developed field of applied ethics which deals with the ethical aspects of technologies such as robots, ambient intelligence, direct neural interfaces and invasive nano-devices and intelligent soft bots. In this article we look specifically at the issue of (moral) responsibility in artificial intelligent systems. We argue for a pragmatic approach, where responsibility is seen as a social regulatory mechanism. We claim that having a system which takes care of certain tasks intelligently, learning from experience and making (...)
    Remove from this list |
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  5. David M. Douglas (2011). The Social Disutility of Software Ownership. Science and Engineering Ethics 17 (3):485-502.
    Software ownership allows the owner to restrict the distribution of software and to prevent others from reading the software’s source code and building upon it. However, free software is released to users under software licenses that give them the right to read the source code, modify it, reuse it, and distribute the software to others. Proponents of free software such as Richard M. Stallman and Eben Moglen argue that the social disutility of software ownership is a sufficient justification for prohibiting (...)
    Remove from this list | Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  6. Joseph S. Fulda (2005). The Ethical Limitations of Online Grading Systems. British Journal of Educational Technology 36 (3):559-561.
    Discusses how the radio button and its technological cousins, graying out and "incompletely filled out" check-box forms "not accepted," and the like, compromise ethics in the context of professional autonomy of faculty in the matter of grading. Three case studies are given, based on my personal experience as a professor and instructor. -/- The point generalizes to all contexts, however, and can be read to object to all such radio-button forms, from multiple-choice tests for students, to surveys, etc.
    Remove from this list | Direct download  
     
    My bibliography  
     
    Export citation  
  7. Joseph S. Fulda (2000). A Gift of Fire: Social Legal, and Ethical Issues in Computing by Sara Baase. [REVIEW] Ethics and Information Technology 2 (4):241-247.
    Extremely favorable review, with hardly any criticisms at all.
    Remove from this list | Direct download (9 more)  
     
    My bibliography  
     
    Export citation  
  8. David J. Gunkel (2014). A Vindication of the Rights of Machines. Philosophy and Technology 27 (1):113-132.
    This essay responds to the machine question in the affirmative, arguing that artifacts, like robots, AI, and other autonomous systems, can no longer be legitimately excluded from moral consideration. The demonstration of this thesis proceeds in four parts or movements. The first and second parts approach the subject by investigating the two constitutive components of the ethical relationship—moral agency and patiency. In the process, they each demonstrate failure. This occurs not because the machine is somehow unable to achieve what is (...)
    Remove from this list | Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  9. Gordon Hull (forthcoming). Coding the Dictatorship of ‘the They:’ A Phenomenological Critique of Digital Rights Management. In J. Jeremy Wisnewski Mark Sanders (ed.), Ethics and Phenomenology. Lexington Books.
    This paper uses Heidegger’s discussion of artifacts in Being and Time to motivate a phenomenological critique of Digital Rights Management regimes such as the one that allows DVDs to require one to watch commercials and copyright notices. In the first section, I briefly sketch traditional ethical approaches to intellectual property and indicate the gap that a phenomenological approach can fill. In section 2, following Heidegger’s discussion in Being and Time, I analyze DRM technologies as exemplary of the breakdown of things (...)
    Remove from this list |
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  10. Lucas D. Introna (2007). Singular Justice and Software Piracy. Business Ethics 16 (3):264–277.
    This paper assumes that the purpose of ethics is to open up a space for the possibility of moral conduct in the flow of everyday life. If this is the case then we can legitimately ask: "How then do we do ethics"? To attempt an answer to this important question, the paper presents some suggestions from the work of Emmanuel Levinas and Jacques Derrida. With Levinas, it is argued that ethics happens in the singularity of the face of the Other (...)
    Remove from this list | Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  11. Lucas D. Introna (1997). Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy 28 (3):259-275.
    Remove from this list | Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  12. Deborah G. Johnson & Thomas M. Powers (2008). Computers as Surrogate Agents. In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. 251.
    Remove from this list | Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  13. Cathy Legg (2005). Hacking: The Performance of Technology? [REVIEW] Techne 9 (2):151-154.
    The word “hacker” has an interesting double meaning: one vastly more widespread connotation of technological mischief, even criminality, and an original meaning amongst the tech savvy as a term of highest approbation. Both meanings, however, share the idea that hackers possess a superior ability to manipulate technology according to their will (and, as with God, this superior ability to exercise will is a source of both mystifying admiration and fear). This book mainly concerns itself with the former meaning. To Thomas (...)
    Remove from this list | Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  14. B. Ingemar B. Lindahl (1988). Preface. Theoretical Medicine 9 (2).
    Remove from this list | Direct download  
     
    My bibliography  
     
    Export citation  
  15. H. P. P. Lotter (2007). Are ICTs Prerequisites for the Eradication of Poverty? International Review of Information Ethics 7:09.
    I provide a philosophical analysis of the claim that ICTs are necessary preconditions for the eradication of poverty. What are the links between information and communication technologies (ICTs) and poverty? I first define technology and then give a brief depiction of ICTs. Thereafter I define poverty and give a brief explanation of its context and causes. Next I discuss the relationship between poverty and ICTs in three paradigm cases: [i] the role of ICTs in poor societies, [ii] the effect of (...)
    Remove from this list | Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  16. Christoph Luetge (2009). The Ethical Dimension of the German Federal Constitutional Court's Decision Concerning Data Retention. Open Ethics Journal 3 (1):8-12.
    In March 2008, the German Federal Constitutional Court (GFCC) has passed an important, even though preliminary, decision concerning data retention. The GFCC’s decision accepts the storage of data, but greatly restricts their use to serious offenses like murder and organized crime. From an ethical point of view, it is particularly interesting to look at the justification given by the GFCC, which relies heavily on the argument that the “impartiality” (Unbefangenheit) of communication will be thoroughly damaged if feelings of being watched (...)
    Remove from this list | Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  17. Steve Matthews (2008). Identity and Information Technology. In Jeroen den Hoven John Weckervant (ed.), Moral Philosophy and Information Technology. Cambridge University Press. 142.
    Remove from this list | Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  18. Philip J. Nickel (2011). Ethics in E-Trust and E-Trustworthiness: The Case of Direct Computer-Patient Interfaces. Ethics and Information Technology 13 (2):355-363.
    In this paper, I examine the ethics of e - trust and e - trustworthiness in the context of health care, looking at direct computer-patient interfaces (DCPIs), information systems that provide medical information, diagnosis, advice, consenting and/or treatment directly to patients without clinicians as intermediaries. Designers, manufacturers and deployers of such systems have an ethical obligation to provide evidence of their trustworthiness to users. My argument for this claim is based on evidentialism about trust and trustworthiness: the idea that trust (...)
    Remove from this list | Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  19. William J. Rapaport (1986). Ethical Issues in the Use of Computers. Teaching Philosophy 9 (3):275-278.
    Remove from this list | Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  20. Jeff Sanders & Matteo Turilli (2007). Dynamics of Control. First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering (TASE '07):440-449.
    This paper proposes a notion, the ?ambit? of an action, that allows the degree of distribution of an action in a multiagent system to be quantified without regard to its functionality. It demonstrates the use of that notion in the design, analysis and implementation of dynamically-reconfigurable multi-agent systems. It distinguishes between the extensional (or system) view and intensional (or agent-based) view of such a system and shows how, using the notion of ambit, the step-wise derivation paradigm of Formal Methods can (...)
    Remove from this list |
    Translate to English
    |
     
    My bibliography  
     
    Export citation  
  21. Robert Francis John Seddon (2013). Getting 'Virtual' Wrongs Right. Ethics and Information Technology 15 (1):1-11.
    Whilst some philosophical progress has been made on the ethical evaluation of playing video games, the exact subject matter of this enquiry remains surprisingly opaque. ‘Virtual murder’, simulation, representation and more are found in a literature yet to settle into a tested and cohesive terminology. Querying the language of the virtual in particular, I suggest that it is at once inexplicit and laden with presuppositions potentially liable to hinder anyone aiming to construct general philosophical claims about an ethics of gameplay, (...)
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  22. Robert Sparrow (2009). Predators or Ploughshares? Arms Control of Robotic Weapons. IEEE Technology and Society 28 (1):25-29.
    Remove from this list |
    Translate to English
    |
     
    My bibliography  
     
    Export citation  
  23. Robert Sparrow (2002). The March of the Robot Dogs. Ethics and Information Technology 4 (4):305-318.
    Following the success of Sony Corporation’s “AIBO”, robot cats and dogs are multiplying rapidly. “Robot pets” employing sophisticated artificial intelligence and animatronic technologies are now being marketed as toys and companions by a number of large consumer electronics corporations. -/- It is often suggested in popular writing about these devices that they could play a worthwhile role in serving the needs of an increasingly aging and socially isolated population. Robot companions, shaped like familiar household pets, could comfort and entertain lonely (...)
    Remove from this list | Direct download (21 more)  
     
    My bibliography  
     
    Export citation  
  24. Bernd Carsten Stahl, Richard Heersmink, Philippe Goujon, Catherine Flick, Jeroen van den Hoven, Kutoma Wakunuma, Veikko Ikonen & Michael Rader (2010). Identifying the Ethics of Emerging Information and Communication Technologies: An Essay on Issues, Concepts and Method. International Journal of Technoethics 1 (4):20-38.
    Ethical issues of information and communication technologies (ICTs) are important because they can have significant effects on human liberty, happiness, and people’s ability to lead a good life. They are also of functional interest because they can determine whether technologies are used and whether their positive potential can unfold. For these reasons, policy makers are interested in finding out what these issues are and how they can be addressed. The best way of creating ICT policy that is sensitive to ethical (...)
    Remove from this list |
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  25. Bernd Stahl, Richard Heersmink, Philippe Goujon, Catherine Flick, Jeroen van den Hoven, Kutoma Wakunuma, Veikko Ikonen & Michael Rader (2010). Issues, Concepts and Methods Relating to the Identification of the Ethics of Emerging ICTs. Communications of the IIMA 10 (1):33-43.
    Ethical issues of information and communication technologies (ICTs) are important because they can have significant effects on human liberty, happiness, their ability to lead a good life. They are also of functional interest because they can determine whether technologies are used and whether their positive potential can unfold. For these reasons policy makers are interested in finding out what these issues are and how they can be addressed. The best way of creating ICT policy that is sensitive to ethical issues (...)
    Remove from this list |
    Translate to English
    | Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  26. Peter Suber (2011). Suber: Leader of a Leaderless Revolution. Information Today, July/August 2011.
    Interview with Peter Suber by Richard Poynder, on open access to research.
    Remove from this list |
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  27. Mariarosaria Taddeo (forthcoming). An Analysis For A Just Cyber Warfare. In Warfare. Fourth International Conference of Cyber Conflict. NATO CCD COE and IEEE Publication.
    Remove from this list |
     
    My bibliography  
     
    Export citation  
  28. Ryan Tonkens (2009). A Challenge for Machine Ethics. Minds and Machines 19 (3):421-438.
    That the successful development of fully autonomous artificial moral agents (AMAs) is imminent is becoming the received view within artificial intelligence research and robotics. The discipline of Machines Ethics, whose mandate is to create such ethical robots, is consequently gaining momentum. Although it is often asked whether a given moral framework can be implemented into machines, it is never asked whether it should be. This paper articulates a pressing challenge for Machine Ethics: To identify an ethical framework that is both (...)
    Remove from this list | Direct download (12 more)  
     
    My bibliography  
     
    Export citation  
  29. Matteo Turilli (2008). Ethics and the Practice of Software Design. In P. Brey, A. Briggle & K. Waelbers (eds.), Current Issues in Computing and Philosophy. IOS Press.
    The paper offers an analysis of the problem of integrating ethical principles into the practice of software design. The approach is grounded on a review of the relevant literature from Computer Ethics and Professional Ethics. The paper is divided into four sections. The first section reviews some key questions that arise when the ethical impact of computational artefacts is analysed. The inner informational nature of such questions is used to argue in favour of the need for a specific branch of (...)
    Remove from this list |
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  30. Matteo Turilli (2007). Ethical Protocols Design. Ethics and Information Technology 9 (1):49-62.
    The paper offers a solution to the problem of specifying computational systems that behave in accordance with a given set of ethical principles. The proposed solution is based on the concepts of ethical requirements and ethical protocols. A new conceptual tool, called the Control Closure of an operation, is defined and used to translate ethical principles into ethical requirements and protocols. The concept of Generalised Informational Privacy (GIP) is used as a paradigmatic example of an ethical principle. GIP is defined (...)
    Remove from this list | Direct download (9 more)  
     
    My bibliography  
     
    Export citation  
  31. Rene Von Schomberg (ed.) (2011). Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields. Publications Office of the European Union.