This category needs an editor. We encourage you to help if you are qualified.
Volunteer, or read more about what this involves.
Related categories
Subcategories:
599 found
Search inside:
(import / add options)   Sort by:
1 — 50 / 599
Material to categorize
  1. Alison Adam (2008). Ethics for Things. Ethics and Information Technology 10 (2-3):149-154.
    This paper considers the ways that Information Ethics (IE) treats things. A number of critics have focused on IE’s move away from anthropocentrism to include non-humans on an equal basis in moral thinking. I enlist Actor Network Theory, Dennett’s views on ‹as if’ intentionality and Magnani’s characterization of ‹moral mediators’. Although they demonstrate different philosophical pedigrees, I argue that these three theories can be pressed into service in defence of IE’s treatment of things. Indeed the support they lend to the (...)
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  2. Alison Adam (2005). Delegating and distributing morality: Can we inscribe privacy protection in a machine? [REVIEW] Ethics and Information Technology 7 (4):233-242.
    This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to (...)
    Remove from this list |
    Translate to English
    | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  3. Alison Adam (2002). Cyberstalking and Internet Pornography: Gender and the Gaze. [REVIEW] Ethics and Information Technology 4 (2):133-142.
    This paper is based on the premise that the analysis of some cyberethics problems would benefit from a feminist treatment. It is argued that both cyberstalking and Internet child pornography are two such areas which have a `gendered' aspect which has rarely been explored in the literature. Against a wide ranging feminist literature of potential relevance, the paper explores a number of cases through a focused approach which weaves together feminist concepts of privacy and the gaze.
    Remove from this list | Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  4. Alison Adam & Jacqueline Ofori-Amanfo (2000). Does Gender Matter in Computer Ethics? Ethics and Information Technology 2 (1):37-47.
  5. Philip E. Agre (2001). Supporting the Intellectual Life of a Democratic Society. Ethics and Information Technology 3 (4):289-298.
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  6. Anders Albrechtslund (2007). Ethics and Technology Design. Ethics and Information Technology 9 (1):63-72.
    This article offers a discussion of the connection between technology and values and, specifically, I take a closer look at ethically sound design. In order to bring the discussion into a concrete context, the theory of Value Sensitive Design (VSD) will be the focus point. To illustrate my argument concerning design ethics, the discussion involves a case study of an augmented window, designed by the VSD Research Lab, which has turned out to be a potentially surveillance-enabling technology. I call attention (...)
    Remove from this list | Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  7. Andrew Alexandra (2002). Academic Personality and the Commodification of Academic Texts. Ethics and Information Technology 4 (4):279-286.
    This paper explores the nature of, and justification for, copyright in academic texts in the light of recent developments in information technology, in particular the growth of electronic publication on the internet. Copyright, like other forms of property, is best thought of as a cluster of rights. A distinction is drawn within this cluster between first order `control rights' and higher order `commodity rights'. It is argued that copyright in academic texts is founded on its role as a means to (...)
    Remove from this list | Direct download (12 more)  
     
    My bibliography  
     
    Export citation  
  8. Adam Alison (2002). Cyberstalking and Internet Pornography: Gender and the Gaze. Ethics and Information Technology 4 (2).
    Remove from this list |
     
    My bibliography  
     
    Export citation  
  9. Colin Allen, Iva Smit & Wendell Wallach (2005). Artificial Morality: Top-Down, Bottom-Up, and Hybrid Approaches. [REVIEW] Ethics and Information Technology 7 (3):149-155.
    A principal goal of the discipline of artificial morality is to design artificial agents to act as if they are moral agents. Intermediate goals of artificial morality are directed at building into AI systems sensitivity to the values, ethics, and legality of activities. The development of an effective foundation for the field of artificial morality involves exploring the technological and philosophical issues involved in making computers into explicit moral reasoners. The goal of this paper is to discuss strategies for implementing (...)
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  10. Andoni Alonso & Carl Mitcham (2004). Software Libre 2004. Ethics and Information Technology 6 (1):65-67.
    Remove from this list | Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  11. Sheri A. Alpert (1996). Doctoral Essays in Computer Ethics. Science and Engineering Ethics 2 (2):225-247.
    Computer technologies are having a profoundly transforming effect on how the United States federal government operates. As technologies become more sophisticated, Federal agencies are becoming more innovative, devising creative ways to use these technologies for program delivery. One hopes that the near-term effect of these technology applications will be more efficient operation of government, the goal that generally leads to their implementation.
    Remove from this list | Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  12. Anton Alterman (2003). ``A Piece of Yourself'': Ethical Issues in Biometric Identification. [REVIEW] Ethics and Information Technology 5 (3):139-150.
    The proliferation of biometric identification technology raises difficult issues in the matter of security, privacy and identity. Though biometric "images" are not images per se, they are both unique representations of an individual in themsevles and a means of access to other identifying information. I compare biometric imaging with other kinds of identifying representations and find that there are issues specific to biometric ID's. Because they represent information that is written into the body they are directly related to one's sense (...)
    Remove from this list | Direct download (12 more)  
     
    My bibliography  
     
    Export citation  
  13. Jürgen Altmann (2013). Arms Control for Armed Uninhabited Vehicles: An Ethical Issue. [REVIEW] Ethics and Information Technology 15 (2):137-152.
    Arming uninhabited vehicles (UVs) is an increasing trend. Widespread deployment can bring dangers for arms-control agreements and international humanitarian law (IHL). Armed UVs can destabilise the situation between potential opponents. Smaller systems can be used for terrorism. Using a systematic definition existing international regulation of armed UVs in the fields of arms control, export control and transparency measures is reviewed; these partly include armed UVs, but leave large gaps. For preventive arms control a general prohibition of armed UVs would be (...)
    Remove from this list | Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  14. Jürgen Altmann, Peter Asaro, Noel Sharkey & Robert Sparrow (2013). Armed Military Robots: Editorial. [REVIEW] Ethics and Information Technology 15 (2):73-76.
    Remove from this list | Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  15. Shoshana Altschuller & Raquel Benbunan-Fich (2009). Is Music Downloading the New Prohibition? What Students Reveal Through an Ethical Dilemma. Ethics and Information Technology 11 (1):49-56.
    Although downloading music through unapproved channels is illegal, statistics indicate that it is widespread. The following study examines the attitudes and perceptions of college students that are potentially engaged in music downloading. The methodology includes a content analysis of the recommendations written to answer an ethical vignette. The vignette presented the case of a subject who faces the dilemma of whether or not to download music illegally. Analyses of the final reports indicate that there is a vast and inconsistent array (...)
    Remove from this list | Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  16. Thomas C. Anderson (2000). The Body and Communities in Cyberspace: A Mmarcellian Analysis. [REVIEW] Ethics and Information Technology 2 (3):153-158.
    Many who speak glowingly about the possibilities for human relations in cyberspace, or virtual communities, laud them precisely because such communities are to a great extent free of the real spatial-temporal restrictions rooted in the limitations of our bodies. In this paper I investigate the importance of the body in establishing and maintaining human relations by considering the thought of the twentieth century French philosopher Gabriel Marcel. Because Marcel emphasized the central importance of the body in one's personal self-identity as (...)
    Remove from this list | Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  17. Ronald C. Arkin (2002). Robot Ethics. Ethics and Information Technology 4 (4):305-318.
    Remove from this list | Direct download  
     
    My bibliography  
     
    Export citation  
  18. John Arquilla (1999). Can Information Warfare Ever Be Just? Ethics and Information Technology 1 (3):203-212.
    The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker''s true identity put serious pressure (...)
    Remove from this list | Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  19. John M. Artz (2001). Thinking About Technology: Foundations of the Philosophy of Technology, Joseph C. Pitt. [REVIEW] Ethics and Information Technology 2 (4):249-250.
    Remove from this list | Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  20. John M. Artz (1999). Human Values and the Design of Computer Technology, Edited by Batya Friedman. Ethics and Information Technology 1 (4):305-306.
    Remove from this list | Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  21. Ann Backus, Richard A. Spinello & Herman T. Tavani (2004). Genomics, Ethics, and ICT. Ethics and Information Technology 6 (1):1-3.
    Remove from this list | Direct download (12 more)  
     
    My bibliography  
     
    Export citation  
  22. Jane Bailey & Ian Kerr (2007). Seizing Control?: The Experience Capture Experiments of Ringley & Mann. [REVIEW] Ethics and Information Technology 9 (2):129-139.
    Will the proliferation of devices that provide the continuous archival and retrieval of personal experiences (CARPE) improve control over, access to and the record of collective knowledge as Vannevar Bush once predicted with his futuristic memex? Or is it possible that their increasing ubiquity might pose fundamental risks to humanity, as Donald Norman contemplated in his investigation of an imaginary CARPE device he called the “Teddy”? Through an examination of the webcam experiment of Jenni Ringley and the EyeTap experiments of (...)
    Remove from this list | Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  23. Maria Bakardjieva & Andrew Feenberg (2001). Involving the Virtual Subject. Ethics and Information Technology 2 (4):233-240.
    As users of computer networks have become more active in producing their own electronic records, in the form of transcripts of onlinediscussions, ethicists have attempted to interpret this new situation interms of earlier models of personal data protection. But thistransference results in unprecedented problems for researchers. Thispaper examines some of the central dichotomies and paradoxes in thedebate on research ethics online in the context of the concrete study ofa virtual community that we carried out. We argue that alienation, notprivacy, is (...)
    Remove from this list | Direct download (12 more)  
     
    My bibliography  
     
    Export citation  
  24. S. Ball Kirstie (2001). Situation Workplace Surveillance: Ethics and Computer-Based Performance Monition. Ethics and Information Technology 3 (3).
    Remove from this list |
     
    My bibliography  
     
    Export citation  
  25. Kirstie S. Ball (2001). Situating Workplace Surveillance: Ethics and Computer Based Performance Monitoring. [REVIEW] Ethics and Information Technology 3 (3):209-221.
    This paper examines the study of computer basedperformance monitoring (CBPM) in the workplaceas an issue dominated by questions of ethics.Its central contention paper is that anyinvestigation of ethical monitoring practice isinadequate if it simply applies best practiceguidelines to any one context to indicate,whether practice is, on balance, ethical or not. The broader social dynamics of access toprocedural and distributive justice examinedthrough a fine grained approach to the study ofworkplace social relations, and workplaceidentity construction, are also important here. This has three (...)
    Remove from this list | Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  26. Zonghao Bao & Kun Xiang (2006). Digitalization and Global Ethics. Ethics and Information Technology 8 (1):41-47.
    The extensive use of digital and network technology has pushed mankind from the industrial era into the information and digital era. In the digital era, digits are becoming an extensive global phenomenon and force. The ethical culture of digital globalization has provided not only a new space for cultural exchange and␣integration among nations, but also a new environment for the formation of new global ethical principles and concepts. This article investigates a theme of scholarly concern, the theme of global ethics (...)
    Remove from this list | Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  27. Porfirio Barroso (forthcoming). Four Principles of Internet Ethics. Ethics and Information Technology.
    Remove from this list |
     
    My bibliography  
     
    Export citation  
  28. Elizabeth H. Bassett & Kate O'Riordan (2002). Ethics of Internet Research: Contesting the Human Subjects Research Model. Ethics and Information Technology 4 (3):233-247.
    The human subjects researchmodel is increasingly invoked in discussions ofethics for Internet research. Here we seek toquestion the widespread application of thismodel, critiquing it through the two themes ofspace and textual form. Drawing on ourexperience of a previous piece ofresearch, we highlightthe implications of re-considering thetextuality of the Internet in addition to thespatial metaphors that are more commonlydeployed to describe Internet activity. Weargue that the use of spatial metaphors indescriptions of the Internet has shaped theadoption of the human subjects research (...)
    Remove from this list | Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  29. Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne (2012). Challenges of Ethical and Legal Responsibilities When Technologies' Uses and Users Change: Social Networking Sites, Decision-Making Capacity and Dementia. [REVIEW] Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and (...)
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  30. Keith Bauer (2004). Cybermedicine and the Moral Integrity of the Physician–Patient Relationship. Ethics and Information Technology 6 (2):83-91.
    Some critiques of cybermedicine claim that it is problematic because it fails to create physician–patient relationships. But, electronically mediated encounters do create such relationships. The issue is the nature and quality of those relationships and whether they are conducive to good patient care and meet the ethical ideals and standards of medicine. In this paper, I argue that effective communication and compassion are, in most cases, necessary for the establishment of trusting and morally appropriate physician–patient relationships. The creation of these (...)
    Remove from this list | Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  31. A. F. Beavers (2001). Philosophy and Computing: An Introduction, Luciano Floridi. Ethics and Information Technology 3 (4):299-301.
    Remove from this list |
     
    My bibliography  
     
    Export citation  
  32. Anthony F. Beavers (forthcoming). Moral Machines and the Threat of Ethical Nihilism. In Patrick Lin, George Bekey & Keith Abney (eds.), Robot Ethics: The Ethical and Social Implication of Robotics.
    In his famous 1950 paper where he presents what became the benchmark for success in artificial intelligence, Turing notes that "at the end of the century the use of words and general educated opinion will have altered so much that one will be able to speak of machines thinking without expecting to be contradicted" (Turing 1950, 442). Kurzweil (1990) suggests that Turing's prediction was correct, even if no machine has yet to pass the Turing Test. In the wake of the (...)
    Remove from this list |
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  33. Anthony F. Beavers (2010). Wendell Wallach and Colin Allen: Moral Machines: Teaching Robots Right From Wrong. [REVIEW] Ethics and Information Technology 12 (4):357-358.
    Remove from this list | Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  34. Anthony F. Beavers (2001). Luciano Floridi, Philosophy and Computing: An Introduction. [REVIEW] Ethics and Information Technology 3 (4):299-301.
    Remove from this list | Direct download (9 more)  
     
    My bibliography  
     
    Export citation  
  35. Colin J. Bennett (2001). Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web. [REVIEW] Ethics and Information Technology 3 (3):195-208.
    This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by (...)
    Remove from this list | Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  36. J. Berleur (1996). International Federation for Information Processing's Framework for Computer Ethics. Science and Engineering Ethics 2 (2):155-165.
    This paper reviews codes of ethics and codes of conduct from different countries. The differences and similarities between code content and between attitudes are considered. Distinction is drawn between a code of ethics and a code of conduct. Recommendations are made for establishing a common framework for IFIP (International Federation for Information Process) Member or Affiliate Societies.
    Remove from this list | Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  37. Tommaso Bertolotti & Lorenzo Magnani (2013). A Philosophical and Evolutionary Approach to Cyber-Bullying: Social Networks and the Disruption of Sub-Moralities. Ethics and Information Technology 15 (4):285-299.
    Remove from this list | Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  38. Cristina Bicchieri & Azi Lev-On (2011). Studying the Ethical Implications of E-Trust in the Lab. Ethics and Information Technology 13 (1):5-15.
    The paper presents results of recent laboratory experiments that study if and how computer-mediated communication affects cooperation and trust. It is argued that communication medium does not matter much for trust-building and maintenance, whereas relevant pre-play communication and group size can have a major influence. The implications of the findings for the design of sites that depend on trusting communities are discussed.
    Remove from this list | Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  39. William F. Birdsall (2011). Human Capabilities and Information and Communication Technology: The Communicative Connection. [REVIEW] Ethics and Information Technology 13 (2):93-106.
    The potential contributions information and communication technology (ICT) can make to advancing human capabilities are acknowledged by both the capability approach (CA) and ICT communities. However, there is a lack of genuine engagement between the two communities. This paper addresses the question: How can a collaborative dialogue between the CA and ICT communities be advanced? A prerequisite to exploring collaboratively the potential use of particular technologies with specific capabilities is a conceptual framework within which a dialogue can be undertaken to (...)
    Remove from this list | Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  40. Frans A. J. Birrer (2005). Data Mining to Combat Terrorism and the Roots of Privacy Concerns. Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, (...)
    Remove from this list | Direct download (9 more)  
     
    My bibliography  
     
    Export citation  
  41. D. Birsch (2002). Gordon Graham, the Internet: A Philosophical Inquiry. [REVIEW] Ethics and Information Technology 4 (4):325-328.
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  42. Douglas Birsch (2004). Moral Responsibility for Harm Caused by Computer System Failures. Ethics and Information Technology 6 (4):233-245.
    When software is written and then utilized in complex computer systems, problems often occur. Sometimes these problems cause a system to malfunction, and in some instances such malfunctions cause harm. Should any of the persons involved in creating the software be blamed and punished when a computer system failure leads to persons being harmed? In order to decide whether such blame and punishment are appropriate, we need to first consider if the people are “morally responsible”. Should any of the people (...)
    Remove from this list | Direct download (9 more)  
     
    My bibliography  
     
    Export citation  
  43. Russell Blackford (2012). Robots and Reality: A Reply to Robert Sparrow. [REVIEW] Ethics and Information Technology 14 (1):41-51.
    We commonly identify something seriously defective in a human life that is lived in ignorance of important but unpalatable truths. At the same time, some degree of misapprehension of reality may be necessary for individual health and success. Morally speaking, it is unclear just how insistent we should be about seeking the truth. Robert Sparrow has considered such issues in discussing the manufacture and marketing of robot ‘pets’, such as Sony’s doglike ‘AIBO’ toy and whatever more advanced devices may supersede (...)
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  44. Jean-François Blanchette (1999). Information Warfare and Security by Dorothy E. Denning. Ethics and Information Technology 1 (3):237-238.
    Remove from this list | Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  45. Jean-Francois Blanchette (1999). Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie and Susan Landau. [REVIEW] Ethics and Information Technology 1 (2):167-169.
    Remove from this list | Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  46. Brian P. Bloomfield & Theo Vurdubakis (2003). Imitation Games: Turing, Menard, Van Meegeren. [REVIEW] Ethics and Information Technology 5 (1):27-38.
    For many, the very idea of an artificialintelligence has always been ethicallytroublesome. The putative ability of machinesto mimic human intelligence appears to callinto question the stability of taken forgranted boundaries between subject/object,identity/similarity, free will/determinism,reality/simulation, etc. The artificiallyintelligent object thus appears to threaten thehuman subject with displacement and redundancy.This article takes as its starting point AlanTuring''s famous ''imitation game,'' (the socalled ''Turing Test''), here treated as aparable of the encounter between human originaland machine copy – the born and the made. Thecultural (...)
    Remove from this list | Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  47. Utpal Bose (2012). An Ethical Framework in Information Systems Decision Making Using Normative Theories of Business Ethics. Ethics and Information Technology 14 (1):17-26.
    As business environments become more complex and reliant on information systems, the decisions made by managers affect a growing number of stakeholders. This paper proposes a framework based on the application of normative theories in business ethics to facilitate the evaluation of IS related ethical dilemmas and arrive at fair and consistent decisions. The framework is applied in the context of an information privacy dilemma to demonstrate the decision making process. The ethical dilemma is analyzed using each one of the (...)
    Remove from this list | Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  48. Maria C. Bottis, Frances S. Grodzinsky & Herman T. Tavani (2010). Editorial: Moral Luck, Social Networking Sites, and Trust on the Web. [REVIEW] Ethics and Information Technology 12 (4):297-298.
    Remove from this list | Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  49. Engin Bozdag (2013). Bias in Algorithmic Filtering and Personalization. Ethics and Information Technology 15 (3):209-227.
    Online information intermediaries such as Facebook and Google are slowly replacing traditional media channels thereby partly becoming the gatekeepers of our society. To deal with the growing amount of information on the social web and the burden it brings on the average user, these gatekeepers recently started to introduce personalization features, algorithms that filter information per individual. In this paper we show that these online services that filter information are not merely algorithms. Humans not only affect the design of the (...)
    Remove from this list | Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  50. Sandra Braman (2007). When Nightingales Break the Law: Silence and the Construction of Reality. [REVIEW] Ethics and Information Technology 9 (4):281-295.
    Strikingly, theorizing about digital technologies has led us to recognize many habitual subjects of research as figures against fields that are also worthy of study. Communication, for example, becomes visible only against the field of silence. Silence is critically important for the construction of reality – and the social construction of reality has a complement, the also necessary contemplative construction of reality. Silence is so sensitive and fragile that an inability to achieve it, or to get rid of it, or (...)
    Remove from this list | Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
1 — 50 / 599