Year:

Forthcoming articles
  1. Bruce Christianson (forthcoming). Not Just Cyberwarfare. Philosophy and Technology:1-5.
    Bringsjord and Licato provide a general meta-argument that cyberwarfare is so different from traditional kinetic warfare that no argument from analogy can allow the just war theory of Augustine and Aquinas to be pulled over from traditional warfare to cyberwarfare. I believe that this meta-argument is sound and that it applies not just to cyberwarfare: in particular, on my reading of the meta-argument, argument from analogy has never been adequate to allow JWT to be applied to the kind of warfare (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  2. Dominic Smith (forthcoming). Rewriting the Constitution: A Critique of 'Postphenomenology'. Philosophy and Technology:1-19.
    This paper builds a three-part argument in favour of a more transcendentally focused form of ‘postphenomenology’ than is currently practised in philosophy of technology. It does so by problematising two key terms, ‘constitution’ and ‘postphenomenology’, then by arguing in favour of a ‘transcendental empiricist’ approach that draws on the work of Foucault, Derrida, and, in particular, Deleuze. Part one examines ‘constitution’, as it moves from the context of Husserl’s phenomenology to Ihde and Verbeek’s ‘postphenomenology’. I argue that the term tends (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  3. Sadjad Soltanzadeh (forthcoming). Questioning Two Assumptions in the Metaphysics of Technological Objects. Philosophy and Technology:1-9.
    There are at least two assumptions which, except for very few occasions, have not been discussed by philosophers who have written on the metaphysics of technological objects. The first assumption is that to be a technology is an absolute matter and that all technological objects are equally technological. The second assumption is that the property of being technological is abstracted from existing things which happen to have this property in common. I appeal to the definition of technological objects as problem-solving (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  4. Litska Strikwerda (forthcoming). Present and Future Instances of Virtual Rape in Light of Three Categories of Legal Philosophical Theories on Rape. Philosophy and Technology:1-20.
    This paper is about the question of whether or not virtual rape should be considered a crime under current law. A virtual rape is the rape of an avatar (a person’s virtual representation) in a virtual world. In the future, possibilities for virtual rape of a person him- or herself will arise in virtual reality environments involving a haptic device or robotics. As the title indicates, I will study both these present and future instances of virtual rape in light of (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  5. Edward T. Barrett (forthcoming). Reliable Old Wineskins: The Applicability of the Just War Tradition to Military Cyber Operations. Philosophy and Technology:1-19.
    This article argues that the traditional jus ad bellum and jus in bello criteria are fully capable of providing the ethical guidance needed to legitimately conduct military cyber operations. The first part examines the criteria’s foundations by focusing on the notion of liability to defensive harm worked out by revisionist just war thinkers. The second part critiques the necessity of alternative frameworks, which its proponents assert are required to at least supplement the traditional just war criteria. Using the latter, the (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  6. Selmer Bringsjord & John Licato (forthcoming). By Disanalogy, Cyberwarfare Is Utterly New. Philosophy and Technology:1-20.
    We provide an underlying theory of argument by disanalogy, in order to employ it to show that cyberwarfare is fundamentally new. Once this general case is made, the battle is won: we are well on our way to establishing our main thesis: that Just War Theory itself must be modernized. Augustine and Aquinas had a stunningly long run, but today’s world, based as it is on digital information and increasingly intelligent information-processing, points the way to a beast so big and (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  7. Selmer Bringsjord & John Licato (forthcoming). Crossbows, von Clauswitz, and the Eternality of Software Shrouds: Reply to Christianson. Philosophy and Technology:1-3.
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  8. William Bülow & Cathrine Felix (forthcoming). On Friendship Between Online Equals. Philosophy and Technology:1-14.
    There is an ongoing debate about the value of virtual friendship. In contrast to previous authorships, this paper argues that virtual friendship can have independent value. It is argued that within an Aristotelian framework, some friendships that are perhaps impossible offline can exist online, i.e., some offline unequals can be online equals and thus form online friendships of independent value.
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  9. Inmaculada de Melo-Martín, Michael Hauskeller, Sandra Braman, Xavier Guchet & Tamar Sharon (forthcoming). Book Symposium on Human Nature in an Age of Biotechnology: The Case for Mediated Posthumanism By Tamar Sharon Springer, Dordrecht, 2014. Philosophy and Technology:1-19.
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  10. Massimo Durante (forthcoming). Violence, Just Cyber War and Information. Philosophy and Technology:1-17.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war , to revise the notion of violence on which (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  11. Maurizio D’Urso (forthcoming). The Cyber Combatant: A New Status for a New Warrior. Philosophy and Technology:1-4.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I will consider whether (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  12. Jan Kyrre Berg Friis (forthcoming). Measure and the Measureless. Philosophy and Technology.
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  13. Jan Kyrre Berg Friis (forthcoming). Interpreting the Visual. Philosophy and Technology.
    Direct download  
     
    My bibliography  
     
    Export citation  
  14. Donald Gillies (forthcoming). Technological Origins of the Einsteinian Revolution. Philosophy and Technology:1-30.
    The Einsteinian revolution, which began around 1905, was one of the most remarkable in the history of physics. It replaced Newtonian mechanics, which had been accepted as completely correct for nearly 200 years, by the special and general theories of relativity. It also eliminated the aether, which had dominated physics throughout the nineteenth century. This paper poses the question of why this momentous scientific revolution began. The suggested answer is in terms of the remarkable series of discoveries and inventions which (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  15. Ludovica Glorioso (forthcoming). Cyber Conflicts: Addressing the Regulatory Gap. Philosophy and Technology:1-6.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high value on an (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  16. Ejvind Hansen (forthcoming). Hackers in Hiding: A Foucaultian Analysis. Philosophy and Technology:1-15.
    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given. In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  17. Stephen Hetherington (forthcoming). Technological Knowledge-That As Knowledge-How: A Comment. Philosophy and Technology:1-6.
    Norström has argued that contemporary epistemological debates about the conceptual relations between knowledge-that and knowledge-how need to be supplemented by a concept of technological knowledge—with this being a further kind of knowledge. But this paper argues that Norström has not shown why technological knowledge-that is so distinctive because Norström has not shown that such knowledge cannot be reduced conceptually to a form of knowledge-how. The paper thus applies practicalism to the case of technological knowledge-that. Indeed, the paper shows why Norström’s (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  18. Robin K. Hill (forthcoming). What an Algorithm Is. Philosophy and Technology:1-25.
    The algorithm, a building block of computer science, is defined from an intuitive and pragmatic point of view, through a methodological lens of philosophy rather than that of formal computation. The treatment extracts properties of abstraction, control, structure, finiteness, effective mechanism, and imperativity, and intentional aspects of goal and preconditions. The focus on the algorithm as a robust conceptual object obviates issues of correctness and minimality. Neither the articulation of an algorithm nor the dynamic process constitute the algorithm itself. Analysis (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  19. Sune Hannibal Holm (forthcoming). Synthetic Biology and Biological Interests. Philosophy and Technology.
    Direct download  
     
    My bibliography  
     
    Export citation  
  20. Andrew Iliadis, Nandita Biswas Mellamphy, Jean-Hugues Barthélémy, Marc J. De Vries & Nathalie Simondon (forthcoming). Book Symposium on Le Concept D’Information Dans la Science Contemporaine. Philosophy and Technology:1-23.
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  21. Morgan Luck (forthcoming). Against Norström’s Argument for Technological Knowing How Not Being an Instance of Knowing That. Philosophy and Technology:1-7.
    In this paper, I evaluate an argument offered by Per Norström in section 8 of his paper Knowing how, knowing that, knowing technology. The argument is for the proposition that some instance of knowing how is not an instance of knowing that; the instance in question being one of technological know-how. This conclusion contradicts Stanley and Williamson’s proposal that all instances of knowing how are instances of knowing that. I provide reason to think that there are problems with Norström’s argument.
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  22. Phillip McReynolds (forthcoming). How to Think About Cyber Conflicts Involving Non-State Actors. Philosophy and Technology:1-22.
    A great deal of attention has been paid in recent years to the legality of the actions of states and state agents in international and non-international cyber conflicts. Less attention has been paid to ethical considerations in these situations, and very little has been written regarding the ethics of the participation of non-state actors in such conflicts. In this article, I analyze different categories of non-state participation in cyber operations and undertake to show under what conditions such actions, though illegal, (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  23. Per Norström (forthcoming). Knowing How, Knowing That, Knowing Technology. Philosophy and Technology:1-13.
    A wide variety of skills, abilities and knowledge are used in technological activities such as engineering design. Together, they enable problem solving and artefact creation. Gilbert Ryle’s division of knowledge into knowing how and knowing that is often referred to when discussing this technological knowledge. Ryle’s view has been questioned and criticised by those who claim that there is only one type, for instance, Jason Stanley and Timothy Williamson who claim that knowing how is really a form of knowing that (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  24. Ugo Pagallo (forthcoming). Cyber Force and the Role of Sovereign States in Informational Warfare. Philosophy and Technology:1-19.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors of cyber (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  25. Wolfgang Pietsch (forthcoming). The Causal Nature of Modeling with Big Data. Philosophy and Technology:1-35.
    I argue for the causal character of modeling in data-intensive science, contrary to widespread claims that big data is only concerned with the search for correlations. After discussing the concept of data-intensive science and introducing two examples as illustration, several algorithms are examined. It is shown how they are able to identify causal relevance on the basis of eliminative induction and a related difference-making account of causation. I then situate data-intensive modeling within a broader framework of an epistemology of scientific (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  26. Mithun Bantwal Rao, Joost Jongerden, Pieter Lemmens & Guido Ruivenkamp (forthcoming). Technological Mediation and Power: Postphenomenology, Critical Theory, and Autonomist Marxism. Philosophy and Technology:1-26.
    This article focuses on the power of technological mediation from the point of view of autonomist Marxism . The first part of the article discusses the theories developed on technological mediation in postphenomenology and critical theory of technology with regard to their respective power perspectives and ways of coping with relations of power embedded in technical artifacts and systems. Rather than focusing on the clashes between the hermeneutic postphenomenological approach and the dialectics of critical theory, it is argued that in (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  27. Steffen Steinert (forthcoming). Taking Stock of Extension Theory of Technology. Philosophy and Technology:1-18.
    In this paper, I will focus on the extension theories of technology. I will identify four influential positions that have been put forward: technology as an extension of the human organism, technology as an extension of the lived body and the senses, technology as an extension of our intentions and desires, and technology as an extension of our faculties and capabilities. I will describe and critically assess these positions one by one and highlight their advantages and their shortcomings and limitations. (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  28. Dingmar van Eck (forthcoming). Validating Function-Based Design Methods: An Explanationist Perspective. Philosophy and Technology:1-21.
    Analysis of the adequacy of engineering design methods, as well as analysis of the utility of concepts of function often invoked in these methods, is a neglected topic in both philosophy of technology and in engineering proper. In this paper, I present an approach—dubbed an explanationist perspective—for assessing the adequacy of function-based design methods. Engineering design is often intertwined with explanation, for instance, in reverse engineering and subsequent redesign, knowledge base-assisted designing, and diagnostic reasoning. I argue that the presented approach (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  29. Effy Vayena & John Tasioulas (forthcoming). We the Scientists”: A Human Right to Citizen Science. Philosophy and Technology:1-7.
    The flourishing of citizen science is an exciting phenomenon with the potential to contribute significantly to scientific progress. However, we lack a framework for addressing in a principled and effective manner the pressing ethical questions it raises. We argue that at the core of any such framework must be the human right to science. Moreover, we stress an almost entirely neglected dimension of this right—the entitlement it confers on all human beings to participate in the scientific process in all of (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  30. Pak-Hang Wong (forthcoming). Consenting to Geoengineering. Philosophy and Technology:1-16.
    Researchers have explored questions concerning public participation and consent in geoengineering governance. Yet, the notion of consent has received little attention from researchers, and it is rarely discussed explicitly, despite being prescribed as a normative requirement for geoengineering research and being used in rejecting some geoengineering options. As it is noted in the leading geoengineering governance principles, i.e. the Oxford Principles, there are different conceptions of consent; the idea of consent ought to be unpacked more carefully if, and when, we (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
 Previous issues
  
Next issues