Results for 'User led surveillance'

983 found
Order:
  1.  74
    Digital Vigilantism as Weaponisation of Visibility.Daniel Trottier - 2017 - Philosophy and Technology 30 (1):55-72.
    This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  2.  9
    New priorities for disability research in Europe: Towards a user-led agenda.Mark Priestley, Lisa Waddington & Carlotta Bessozi - 2010 - Alter - European Journal of Disability Research / Revue Européenne de Recherche Sur le Handicap 4 (4):239-255.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Surveillance Capitalism: a Marx-inspired account.Nikhil Venkatesh - 2021 - Philosophy 96 (3):359-385..
    Some of the world's most powerful corporations practise what Shoshana Zuboff (2015; 2019) calls ‘surveillance capitalism’. The core of their business is harvesting, analysing and selling data about the people who use their products. In Zuboff's view, the first corporation to engage in surveillance capitalism was Google, followed by Facebook; recently, firms such as Microsoft and Amazon have pivoted towards such a model. In this paper, I suggest that Karl Marx's analysis of the relations between industrial capitalists and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  4. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  69
    Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  6.  86
    Surveillance, Snowden, and Big Data: Capacities, consequences, critique.David Lyon - 2014 - Big Data and Society 1 (2).
    The Snowden revelations about National Security Agency surveillance, starting in 2013, along with the ambiguous complicity of internet companies and the international controversies that followed provide a perfect segue into contemporary conundrums of surveillance and Big Data. Attention has shifted from late C20th information technologies and networks to a C21st focus on data, currently crystallized in “Big Data.” Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   42 citations  
  7.  35
    Surveillance, Self and Smartphones: Tracking Practices in the Nightlife.Tjerk Timan & Anders Albrechtslund - 2018 - Science and Engineering Ethics 24 (3):853-870.
    This paper is the result of the EMERGING ICT FOR CITIZEN VEILLANCE-workshop organized by the JRC, Ispra, Italy, March 2014. The aim of this paper is to explore how the subject participates in surveillance situations with a particular focus on how users experience everyday tracking technologies and practices. Its theoretical points of departure stem from Surveillance Studies in general and notions of participatory surveillance and empowering exhibitionism :199–215, 2004) in particular. We apply these theoretical notions on smartphones (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  50
    Telecare, Surveillance, and the Welfare State.Tom Sorell & Heather Draper - 2012 - American Journal of Bioethics 12 (9):36-44.
    In Europe, telecare is the use of remote monitoring technology to enable vulnerable people to live independently in their own homes. The technology includes electronic tags and sensors that transmit information about the user's location and patterns of behavior in the user's home to an external hub, where it can trigger an intervention in an emergency. Telecare users in the United Kingdom sometimes report their unease about being monitored by a ?Big Brother,? and the same kind of electronic (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  9.  41
    Surveillance and persuasion.Michael Nagenborg - 2014 - Ethics and Information Technology 16 (1):43-49.
    This paper is as much about surveillance as about persuasive technologies (PTs). With regard to PTs it raises the question about the ethical limits of persuasion. It will be argued that even some forms of self-imposed persuasive soft surveillance technologies may be considered unethical. Therefore, the ethical evaluation of surveillance technologies should not be limited to privacy issues. While it will also be argued that PTs may become instrumental in pre-commitment strategies, it will also be demonstrated that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  12
    Municipal surveillance regulation and algorithmic accountability.P. M. Krafft, Michael Katell & Meg Young - 2019 - Big Data and Society 6 (2).
    A wave of recent scholarship has warned about the potential for discriminatory harms of algorithmic systems, spurring an interest in algorithmic accountability and regulation. Meanwhile, parallel concerns about surveillance practices have already led to multiple successful regulatory efforts of surveillance technologies—many of which have algorithmic components. Here, we examine municipal surveillance regulation as offering lessons for algorithmic oversight. Taking the 2017 Seattle Surveillance Ordinance as our primary case study and surveying efforts across five other cities, we (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  13
    Revocable Anonymisation in Video Surveillance: A ‘Digital Cloak of Invisibility’.Feiten Linus, Sebastian Sester, Christian Zimmermann, Sebastian Weydner-Volkmann, Laura Wehle & Bernd Becker - 2016 - In Feiten Linus, Sebastian Sester, Christian Zimmermann, Sebastian Weydner-Volkmann, Laura Wehle & Bernd Becker (eds.), Technology and Intimacy: Choice or Coercion. HCC 2016. IFIP Advances in Information and Communication Technology, vol 474. Cham.: pp. 314-327.
    Video surveillance is an omnipresent phenomenon in today’s metropolitan life. Mainly intended to solve crimes, to prevent them by realtime-monitoring or simply as a deterrent, video surveillance has also become interesting in economical contexts; e.g. to create customer profiles and analyse patterns of their shopping behaviour. The extensive use of video surveillance is challenged by legal claims and societal norms like not putting everybody under generalised suspicion or not recording people without their consent. In this work we (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  55
    AI led ethical digital transformation: framework, research and managerial implications.Kumar Saurabh, Ridhi Arora, Neelam Rani, Debasisha Mishra & M. Ramkumar - 2022 - Journal of Information, Communication and Ethics in Society 20 (2):229-256.
    Purpose Digital transformation leverages digital technologies to change current processes and introduce new processes in any organisation’s business model, customer/user experience and operational processes. Artificial intelligence plays a significant role in achieving DT. As DT is touching each sphere of humanity, AI led DT is raising many fundamental questions. These questions raise concerns for the systems deployed, how they should behave, what risks they carry, the monitoring and evaluation control we have in hand, etc. These issues call for the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Causation: A User’s Guide.L. A. Paul & Ned Hall - 2013 - Oxford: Oxford University Press UK. Edited by Edward J. Hall.
    Causation is at once familiar and mysterious. Neither common sense nor extensive philosophical debate has led us to anything like agreement on the correct analysis of the concept of causation, or an account of the metaphysical nature of the causal relation. Causation: A User's Guide cuts a clear path through this confusing but vital landscape. L. A. Paul and Ned Hall guide the reader through the most important philosophical treatments of causation, negotiating the terrain by taking a set of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   106 citations  
  14.  24
    Big Data and surveillance: Hype, commercial logics and new intimate spheres.William Webster & Kirstie Ball - 2020 - Big Data and Society 7 (1).
    Big Data Analytics promises to help companies and public sector service providers anticipate consumer and service user behaviours so that they can be targeted in greater depth. The attempts made by these organisations to connect analytically with users raise questions about whether surveillance, and its associated ethical and rights-based concerns, are intensified. The articles in this special themed issue explore this question from both organisational and user perspectives. They highlight the hype which firms use to drive consumer, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Moving Beyond Frail Democracy: Youth-led youth studies and social policy.Theo Gavrielides - 2014 - In Peter James Kelly & Annelies Kamp (eds.), A Critical Youth Studies for the 21st Century. Brill. pp. 426-442.
    This chapter claims that only rarely do critical youth studies and social policy include young people in a truly participatory way. The implications of and reasons for this failure are explored. Moreover, through evidence collected over a 3 year youth-led research programme, the chapter investigates how the tools found within the field of user-led, action research can be used for the construction of evidence-based youth policy and the development of new theoretical and methodological models for critical youth studies. A (...)
     
    Export citation  
     
    Bookmark  
  16.  49
    Reframing biometric surveillance: from a means of inspection to a form of control.Avi Marciano - 2019 - Ethics and Information Technology 21 (2):127-136.
    This paper reviews the social scientific literature on biometric surveillance, with particular attention to its potential harms. It maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Demonstrating these harms with examples from the United States, the European Union, and Israel, I propose that biometric surveillance be addressed, evaluated and reframed as a new form of control rather than simply another means (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Modern Forms of Surveillance and Control.Dustin Gray - 2022 - Filozofia i Nauka. Studia Filozoficzne I Interdyscyplinarne 10 (Special):213-228.
    In todays advanced society, there is rising concern for data privacy and the diminution thereof on the internet. I argue from the position that for one to enjoy privacy, one must be able to effectively exercise autonomous action. I offer in this paper a survey of the many ways in which persons autonomy is severely limited due to a variety of privacy invasions that come not only through the use of modern technological apparatuses, but as well simply by existing in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18. Data Capitalism: Redefining the Logics of Surveillance and Privacy.Sarah Myers West - 2019 - Business and Society 58 (1):20-41.
    This article provides a history of private sector tracking technologies, examining how the advent of commercial surveillance centered around a logic of data capitalism. Data capitalism is a system in which the commoditization of our data enables an asymmetric redistribution of power that is weighted toward the actors who have access and the capability to make sense of information. It is enacted through capitalism and justified by the association of networked technologies with the political and social benefits of online (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  19.  46
    The ideal application of surveillance technology in residential care for people with dementia.Alistair R. Niemeijer, Brenda J. M. Frederiks, Marja F. I. A. Depla, Johan Legemaate, Jan A. Eefsting & Cees M. P. M. Hertogh - 2011 - Journal of Medical Ethics 37 (5):303-310.
    Background As our society is ageing, nursing homes are finding it increasingly difficult to deal with an expanding population of patients with dementia and a decreasing workforce. A potential answer to this problem might lie in the use of technology. However, the use and application of surveillance technology in dementia care has led to considerable ethical debate among healthcare professionals and ethicists, with no clear consensus to date. Aim To explore how surveillance technology is viewed by care professionals (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  67
    Editorial introduction – surveillance and privacy.Philip Brey - 2005 - Ethics and Information Technology 7 (4):183-184.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  8
    Capitalizing on transparency: Commercial surveillance and pharmaceutical marketing after the Physician Sunshine Act.Piotr Ozieranski & Shai Mulinari - 2022 - Big Data and Society 9 (1).
    How corporations surveil and influence consumers using big data tools is a major area of research and public debate. However, few studies explore it in relation to physicians in the USA, even though they have been surveilled and targeted by the pharmaceutical industry since at least the 1950s. Indeed, in 2010, concerns about the pharmaceutical industry's undue influence led to the passing of the Physician Sunshine Act, a unique piece of transparency legislation that requires companies to report their financial ties (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  4
    Patient‐led innovation and global health justice: Open‐source digital health technology for type 1 diabetes care.Bianca Jansky, Tereza Hendl & Azakhiwe Z. Nocanda - forthcoming - Bioethics.
    Health innovation is mainly envisioned in direct connection to medical research institutions or pharmaceutical and technology companies. Yet, these types of innovation often do not meet the needs and expectations of individuals affected by health conditions. With the emergence of digital health technologies and social media, we can observe a shift, which involves people living with illness modifying and improving medical and health devices outside of the formal research and development sector, figuring both as users and innovators. This patient‐led innovation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  29
    Privacy and beyond: socio-ethical concerns of ‘on-the-job’ surveillance.Jijo James Indiparambil - 2019 - Asian Journal of Business Ethics 8 (1):73-105.
    Current sophisticated technologies in the workplace offer inexpensive and user-friendly devices and the means to control ‘on-the-job’ behaviour. This promises high profitability, productivity and liability alleviation. Yet, it also gives rise to a socio-ethical crisis of incessant surveillance that often overrules its anticipated benefits and motives of control and care. The dilemma is twofold: First, scholarly studies undertaken on this issue from a principally administrative and legal point of view tend to lack a moral framework and so prove (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Situating workplace surveillance: Ethics and computer based performance monitoring. [REVIEW]Kirstie S. Ball - 2001 - Ethics and Information Technology 3 (3):209-221.
    This paper examines the study of computer basedperformance monitoring (CBPM) in the workplaceas an issue dominated by questions of ethics.Its central contention paper is that anyinvestigation of ethical monitoring practice isinadequate if it simply applies best practiceguidelines to any one context to indicate,whether practice is, on balance, ethical or not. The broader social dynamics of access toprocedural and distributive justice examinedthrough a fine grained approach to the study ofworkplace social relations, and workplaceidentity construction, are also important here. This has three (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  25.  14
    A proxy for privacy uncovering the surveillance ecology of mobile apps.Sofie Flensburg & Signe Sophus Lai - 2020 - Big Data and Society 7 (2).
    The article develops a methodological and empirical approach for gauging the ways Big Data can be collected and distributed through mobile apps. This approach focuses on the infrastructural components that condition the disclosure of smartphone users’ data – namely the permissions that apps request and the third-party corporations they work with. We explore the surveillance ecology of mobile apps and thereby the privacy implications of everyday smartphone use through three analytical perspectives: The first focuses on the ‘appscapes’ of individual (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  18
    “Understanding” Asians: Anti-Asian Racism, Sentimentality, Sentiment Analysis, and Digital Surveillance.Lisa Nakamura, Grace Kyungwon Hong & Wendy Hui Kyong Chun - 2024 - Critical Inquiry 50 (3):425-451.
    This article addresses how Asian racialization grounds contemporary social media experimentation on—and comprehensive surveillance of—users. To make this point, we focus on the relationship between the sentimentality of white benevolence as an expression of US empire and the social scientific history of sentiment analysis, which derives from early twentieth-century analyses of women workers and Japanese internment camps. The drive to “read” the inscrutable other—framed as a benevolent alternative to direct coercion—underlies methods to better capture and control individuals by understanding (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  14
    Public health measures and the rise of incidental surveillance: Considerations about private informational power and accountability.B. A. Kamphorst & A. Henschke - 2023 - Ethics and Information Technology 25 (4):1-14.
    The public health measures implemented in response to the COVID-19 pandemic have resulted in a substantially increased shared reliance on private infrastructure and digital services in areas such as healthcare, education, retail, and the workplace. This development has (i) granted a number of private actors significant (informational) power, and (ii) given rise to a range of digital surveillance practices incidental to the pandemic itself. In this paper, we reflect on these secondary consequences of the pandemic and observe that, even (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  7
    Das Problem der Integration utilitaristischer Argumentation in die theologische Ethik.Ekkehard Steinhäuser - 1997 - New York: P. Lang.
    Diese Arbeit stellt sowohl die Leistungskraft wie auch die Grenze des Utilitarismus dar. Sie bedient sich dazu der Methode der exemplarischen Auseinandersetzung mit den systemtheoretischen Elementen des Utilitarismus. Verfolgt wird das Ziel, die Moglichkeit der Integration utilitaristischer Argumentation in die theologische Ethik zu prufen. Dazu werden typisch utilitaristische Argumentationsmuster aus theologischer Sicht bewertet. Die Arbeit ist ein Schritt auf dem Weg, eine neue Verhaltnisbestimmung von Utilitarismus und theologischer Ethik vorzunehmen. Es wird gezeigt, dass sowohl in der Systemtheorie wie auch in (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  6
    Governmentality and guru-led movements in India: Some arguments from the field.Samta P. Pandya - 2016 - European Journal of Social Theory 19 (1):74-93.
    The concept of governmentality has a textual and philosophical basis as well as being concerned with what might be called the practices of government. This article discusses and develops the governmentality argument with respect to the guru-led movements. It outlines the basics of Michel Foucault’s concept of governmentality, its analytical frame, the fact that governmentality moves beyond only the practices of the state and its nuances in a neoliberal frame of reference, drawing on Zygmunt Bauman and others. It then discusses (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  20
    The views of genitourinary medicine (GUM) clinic users on unlinked anonymous testing for HIV: evidence from a pilot study of clinics in two English cities.J. Datta, A. Kessel, K. Wellings, K. Nanchahal, D. Marks & G. Kinghorn - 2011 - Journal of Medical Ethics 37 (11):668-672.
    A study was undertaken of the views of users of two genitourinary medicine (GUM) clinics in England on unlinked anonymous testing (UAT) for HIV. The UAT programme measures the prevalence of HIV in the population, including undiagnosed prevalence, by testing residual blood (from samples taken for clinical purposes) which is anonymised and irreversibly unlinked from the source. 424 clinic users completed an anonymous questionnaire about their knowledge of, and attitudes towards, UAT. Only 1/7 (14%) were aware that blood left over (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  31.  8
    Between Protest and Counter-Expertise: User Knowledge, Activism, and the Making of Urban Cycling Networks in the Netherlands Since the 1970s.Henk-Jan Dekker - 2022 - NTM Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin 30 (3):281-309.
    Around 1970, high numbers of traffic casualties among cyclists led to the creation of numerous local protest movements in the Netherlands. While activists employed protest strategies, their main interest lie in the way they exemplify a highly successful instance of “lay expertise”; the idea that users of a technology have a fundamentally different and valuable perspective on a technology than experts or system-builders. Specifically, cyclists claimed to be more knowledgeable about cycling conditions and safety than the state-employed engineers and traffic (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  26
    Ethics of sleep tracking: techno-ethical particularities of consumer-led sleep-tracking with a focus on medicalization, vulnerability, and relationality.Nadia Primc, Jonathan Hunger, Robert Ranisch, Eva Kuhn & Regina Müller - 2023 - Ethics and Information Technology 25 (1):1-12.
    Consumer-targeted sleep tracking applications (STA) that run on mobile devices (e.g., smartphones) promise to be useful tools for the individual user. Assisted by built-in and/or external sensors, these apps can analyze sleep data and generate assessment reports for the user on their sleep duration and quality. However, STA also raise ethical questions, for example, on the autonomy of the sleeping person, or potential effects on third parties. Nevertheless, a specific ethical analysis of the use of these technologies is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  69
    PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. [REVIEW]Seda Gürses - 2010 - Identity in the Information Society 3 (3):539-563.
    “Privacy as confidentiality” has been the dominant paradigm in computer science privacy research. Privacy Enhancing Technologies (PETs) that guarantee confidentiality of personal data or anonymous communication have resulted from such research. The objective of this paper is to show that such PETs are indispensable but are short of being the privacy solutions they sometimes claim to be given current day circumstances. Using perspectives from surveillance studies we will argue that the computer scientists’ conception of privacy through data or communication (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark  
  34.  39
    Challenges to the modernist identity of psychiatry! User empowerment and recovery.Pat Bracken & Philip Thomas - 2013 - In K. W. M. Fulford (ed.), The Oxford Handbook of Philosophy and Psychiatry. Oxford University Press. pp. 123.
    This chapter argues that the modernist agenda, currently dominant in mainstream psychiatry, serves as a disempowering force for service users. By structuring the world of mental health according to a technological logic, this agenda is usually seen as promoting a liberation from "myths" about mental illness that led to stigma and oppression in the past. However, it is argued that this approach systematically separates mental distress from background contextual issues and sidelines non-technological aspects of mental health such as relationships, values, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  10
    Between Protest and Counter-Expertise: User Knowledge, Activism, and the Making of Urban Cycling Networks in the Netherlands Since the 1970sZwischen Protest und Gegenexpertise: Nutzererlebnis, Aktivismus und das Entstehen der städtischen Radwegenetze in den Niederlanden seit 1970.Henk-Jan Dekker - 2022 - NTM Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin 30 (3):281-309.
    Around 1970, high numbers of traffic casualties among cyclists led to the creation of numerous local protest movements in the Netherlands. While activists employed protest strategies, their main interest lie in the way they exemplify a highly successful instance of “lay expertise”; the idea that users of a technology have a fundamentally different and valuable perspective on a technology than experts or system-builders. Specifically, cyclists claimed to be more knowledgeable about cycling conditions and safety than the state-employed engineers and traffic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  83
    Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web. [REVIEW]Colin J. Bennett - 2001 - Ethics and Information Technology 3 (3):195-208.
    This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37. Facing the future: Seeking ethics for everyday surveillance[REVIEW]David Lyon - 2001 - Ethics and Information Technology 3 (3):171-180.
    Surveillance has become a routine, everyday occurrence ininformational societies. Many agencies have an interest in personal data, and a wide spectrum of them use searchabledatabases to classify and catalogue such data. From policingto welfare to the Internet and e-commerce, personal data havebecome very valuable, economically and administratively. Whilequestions of privacy are indeed raised by such surveillance,the processes described here have as much to do with social sorting,and thus present new problems of automated categorization of datasubjects. Privacy and data (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  38.  19
    Human–Computer Interaction Research Needs a Theory of Social Structure: The Dark Side of Digital Technology Systems Hidden in User Experience.Ryan Gunderson - 2022 - Human Studies 45 (3):529-550.
    A sociological revision of Aron Gurwitsch provides a helpful layered theory of conscious experience as a four-domain structure: _the theme_, _the thematic field_, _the halo_, and _the social horizon_. The social horizon—the totality of the social world that is unknown, vaguely known, taken for granted, or ignored by the subject despite objectively influencing the thoughts and actions of the subject—, helps conceptualize how everyday human–computer interaction (HCI) can obscure social structures. Two examples illustrate the usefulness of this framework: (1) illuminating (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  43
    Neither good, nor bad, but dangerous: Surveillance as an ethical paradox. [REVIEW]Graham Sewell & James R. Barker - 2001 - Ethics and Information Technology 3 (3):181-194.
    We argue for a discursive ethic of surveillancethat accounts for the paradoxes that thephenomenon presents to today's organisationalmembers. We first we develop a genealogy ofprivacy and illustrate its relation tosurveillance, focusing on the antinomianrelationship between the public and private. Then we review the common ethicaltensions that arise in today's technologicallyintensive workplace. Lastly, we develop acritical approach to the ethical status ofprivacy and surveillance – a micro-ethics – that remains open todiscursively-based negotiation by those whofind themselves at the verypoint of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  40.  5
    Selected Behaviors and Addiction Risk Among Users of Urban Multimedia Games.Mateusz Grajek, Łukasz Olszewski, Karolina Krupa-Kotara, Agnieszka Białek-Dratwa & Krzysztof Sas-Nowosielski - 2022 - Frontiers in Psychology 13.
    IntroductionThe rapid development of technology has led to the transfer of entertainment to the virtual world. Many games and multimedia applications use the so-called augmented reality. With the development of a new technological branch, a new health problem has emerged, which is infoholic addiction, attracting people with the specific functionality that is cyberspace and the virtual world.ObjectiveThe study aimed to assess health behaviors and the risk of addiction among users of urban multimedia games. Research methodology. The study was conducted among (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  20
    A Comparative Analysis of Personalisation: Balancing an Ethic of Care with User Empowerment.Kirstein Rummery - 2011 - Ethics and Social Welfare 5 (2):138-152.
    Developments in the provision of care and support services for disabled and older people across developed welfare states have led to the expansion of personalisation (sometimes called cash-for-care, direct payments, care payments, etc.) schemes, whereby cash is paid in substitute for care services and support. Although these schemes vary considerably in their scope and operation (sometimes paying carers directly, sometimes enabling disabled and older people to act as direct employers, sometimes mixing paid and unpaid care), they share the characteristics of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  42.  1
    Die Fluchtbahn des Subjekts: Beiträge zu Ästhetik und Kulturphilosophie.Gerhard Schweppenhäuser - 2001 - Münster: Lit.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  9
    Life after privacy: reclaiming democracy in a surveillance society: Cambridge University Press, 2020, ISBN: 978-1-108-81191-0. [REVIEW]Everet Smith - 2022 - Ethics and Information Technology 24 (3):1-4.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  3
    Theodor W. Adorno: An Introduction.Gerhard Schweppenhäuser (ed.) - 2009 - Durham [NC]: Duke University Press.
    Theodor W. Adorno was one of the twentieth century’s most important thinkers. In light of two pivotal developments—the rise of fascism, which culminated in the Holocaust, and the standardization of popular culture as a commodity indispensable to contemporary capitalism—Adorno sought to evaluate and synthesize the essential insights of Western philosophy by revisiting the ethical and sociological arguments of his predecessors: Kant, Nietzsche, Hegel, and Marx. This book, first published in Germany in 1996, provides a succinct introduction to Adorno’s challenging and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  3
    Bild und Gedanke: Hermann Schweppenhäuser zum Gedenken.Gerhard Schweppenhäuser & Hermann Schweppenhäuser (eds.) - 2017 - [Wiesbaden]: Springer VS.
    Die Beiträge des Bandes loten Tiefe und Wirkung der Schriften des Philosophen Hermann Schweppenhäuser aus. Schweppenhäuser (1928-2015) gehörte zum engsten Kreis um Adorno und Horkheimer, führte die kritische Theorie als dialektische Philosophie weiter und verband sie mit dem Denkstil Walter Benjamins, dessen Schriften er mit Rolf Tiedemann herausgegeben hat. Schweppenhäuser hinterlässt ein vielfältiges philosophisches und schriftstellerisches Werk: Abhandlungen, Essays, Aphorismen und Handbuchartikel, lyrische Formen und kurze Prosa. Die Autorinnen und Autoren geben in diesem Gedenkbuch Resonanz davon, wie sich ihnen die (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. Was des Kaisers ist.Richard Häuser - 1968 - Frankfurt am Main,: J. Knecht.
    No categories
     
    Export citation  
     
    Bookmark  
  47.  45
    Handbuch Angewandte Ethik.Ralf Stoecker, Christian Neuhäuser & Marie-Luise Raters (eds.) - 2011 - Stuttgart: Verlag J.B. Metzler.
    Ethische Fragen betreffen alle Gesellschaftsbereiche. Sie stellen sich bei Themen wie sozialer Gerechtigkeit sowie in politischen oder ökologischen Debatten. Das Handbuch erfasst die Angewandte Ethik systematisch und historisch, beschreibt ihre rechtliche und institutionelle Situation sowie die relevanten Teilbereiche, wie z.B. Forschungs-, Wirtschafts- und Bioethik. Im Zentrum stehen konkrete Fragen aus dem Privat- und Sozialleben des Menschen, der medizinischen Ethik sowie der Umwelt- und Tierethik.
    No categories
  48. Die kommunikativ verflüssigte Moral.Gerhard Schweppenhäuser - 1989 - In Gerhard Bolte & Christoph Türcke (eds.), Unkritische Theorie: gegen Habermas. Lüneburg: zu Klampen.
    No categories
     
    Export citation  
     
    Bookmark  
  49. Kierkegaards Angriff auf die Spekulation.Hermann Schweppenhäuser - 1967 - [Frankfurt a. M.]: Suhrkamp.
  50.  2
    Kultur - philosophische Spurensuche.Gerhard Schweppenhäuser & Jörg H. Gleiter (eds.) - 2000 - Weimar [Thuringia, Germany]: Bauhaus-Universität Weimar Universitätsverlag.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 983