About this topic
Key works Floridi 2007
Introductions Moor 1985  Floridi 2010
Related categories

796 found
1 — 50 / 796
Material to categorize
  1. Ethics and Technology Design.Anders Albrechtslund - 2007 - Ethics and Information Technology 9 (1):63-72.
    This article offers a discussion of the connection between technology and values and, specifically, I take a closer look at ethically sound design. In order to bring the discussion into a concrete context, the theory of Value Sensitive Design (VSD) will be the focus point. To illustrate my argument concerning design ethics, the discussion involves a case study of an augmented window, designed by the VSD Research Lab, which has turned out to be a potentially surveillance-enabling technology. I call attention (...)
  2. Software Libre 2004.Andoni Alonso & Carl Mitcham - 2004 - Ethics and Information Technology 6 (1):65-67.
  3. Doctoral Essays in Computer Ethics.Sheri A. Alpert - 1996 - Science and Engineering Ethics 2 (2):225-247.
    Computer technologies are having a profoundly transforming effect on how the United States federal government operates. As technologies become more sophisticated, Federal agencies are becoming more innovative, devising creative ways to use these technologies for program delivery. One hopes that the near-term effect of these technology applications will be more efficient operation of government, the goal that generally leads to their implementation.
  4. ``A Piece of Yourself'': Ethical Issues in Biometric Identification. [REVIEW]Anton Alterman - 2003 - Ethics and Information Technology 5 (3):139-150.
    The proliferation of biometric identification technology raises difficult issues in the matter of security, privacy and identity. Though biometric "images" are not images per se, they are both unique representations of an individual in themsevles and a means of access to other identifying information. I compare biometric imaging with other kinds of identifying representations and find that there are issues specific to biometric ID's. Because they represent information that is written into the body they are directly related to one's sense (...)
  5. Is Music Downloading the New Prohibition? What Students Reveal Through an Ethical Dilemma.Shoshana Altschuller & Raquel Benbunan-Fich - 2009 - Ethics and Information Technology 11 (1):49-56.
    Although downloading music through unapproved channels is illegal, statistics indicate that it is widespread. The following study examines the attitudes and perceptions of college students that are potentially engaged in music downloading. The methodology includes a content analysis of the recommendations written to answer an ethical vignette. The vignette presented the case of a subject who faces the dilemma of whether or not to download music illegally. Analyses of the final reports indicate that there is a vast and inconsistent array (...)
  6. Against the Moral Turing Test: Accountable Design and the Moral Reasoning of Autonomous Systems.Arnold Thomas & Scheutz Matthias - 2016 - Ethics and Information Technology 18 (2):103-115.
  7. Against the Moral Turing Test: Accountable Design and the Moral Reasoning of Autonomous Systems.Arnold Thomas & Scheutz Matthias - 2016 - Ethics and Information Technology 18 (2):103-115.
  8. HRI Ethics and Type-Token Ambiguity: What Kind of Robotic Identity is Most Responsible?Thomas Arnold & Matthias Scheutz - forthcoming - Ethics and Information Technology.
  9. Can Information Warfare Ever Be Just?John Arquilla - 1999 - Ethics and Information Technology 1 (3):203-212.
    The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker''s true identity put serious pressure (...)
  10. Thinking About Technology: Foundations of the Philosophy of Technology, Joseph C. Pitt. [REVIEW]John M. Artz - 2001 - Ethics and Information Technology 2 (4):249-250.
  11. Human Values and the Design of Computer Technology, Edited by Batya Friedman.John M. Artz - 1999 - Ethics and Information Technology 1 (4):305-306.
  12. Genomics, Ethics, and ICT.Ann Backus, Richard A. Spinello & Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):1-3.
  13. Seizing Control?: The Experience Capture Experiments of Ringley & Mann. [REVIEW]Jane Bailey & Ian Kerr - 2007 - Ethics and Information Technology 9 (2):129-139.
    Will the proliferation of devices that provide the continuous archival and retrieval of personal experiences (CARPE) improve control over, access to and the record of collective knowledge as Vannevar Bush once predicted with his futuristic memex? Or is it possible that their increasing ubiquity might pose fundamental risks to humanity, as Donald Norman contemplated in his investigation of an imaginary CARPE device he called the “Teddy”? Through an examination of the webcam experiment of Jenni Ringley and the EyeTap experiments of (...)
  14. Special Operations Remote Advise and Assist: An Ethics Assessment.Deane-Peter Baker - forthcoming - Ethics and Information Technology.
  15. Technologies of Artificial Sensations.Alexey S. Bakhirev - manuscript
    Technologies based on emergence will allow to reproduce sensations on non-biological carriers by making devices feel. These technologies will change fundamentally not only the approach to the creation of artificial intelligence, but also create artificial worlds of a totally different level. Which, unlike virtual models, will really exist for themselves. This approach differs completely from the methods currently used in digital technologies. Possibly the principles described herein will give a rise to many new trends.
  16. Situation Workplace Surveillance: Ethics and Computer-Based Performance Monition.S. Ball Kirstie - 2001 - Ethics and Information Technology 3 (3).
  17. Situating Workplace Surveillance: Ethics and Computer Based Performance Monitoring. [REVIEW]Kirstie S. Ball - 2001 - Ethics and Information Technology 3 (3):209-221.
    This paper examines the study of computer basedperformance monitoring (CBPM) in the workplaceas an issue dominated by questions of ethics.Its central contention paper is that anyinvestigation of ethical monitoring practice isinadequate if it simply applies best practiceguidelines to any one context to indicate,whether practice is, on balance, ethical or not. The broader social dynamics of access toprocedural and distributive justice examinedthrough a fine grained approach to the study ofworkplace social relations, and workplaceidentity construction, are also important here. This has three (...)
  18. Digitalization and Global Ethics.Zonghao Bao & Kun Xiang - 2006 - Ethics and Information Technology 8 (1):41-47.
  19. Free Will and Moral Responsibility in Video Games.Christopher Bartel - 2015 - Ethics and Information Technology 17 (4):285-293.
    Can a player be held morally responsible for the choices that she makes within a videogame? Do the moral choices that the player makes reflect in any way on the player’s actual moral sensibilities? Many videogames offer players the options to make numerous choices within the game, including moral choices. But the scope of these choices is quite limited. I attempt to analyze these issues by drawing on philosophical debates about the nature of free will. Many philosophers worry that, if (...)
  20. Ethics of Internet Research: Contesting the Human Subjects Research Model.Elizabeth H. Bassett & Kate O'Riordan - 2002 - Ethics and Information Technology 4 (3):233-247.
    The human subjects researchmodel is increasingly invoked in discussions ofethics for Internet research. Here we seek toquestion the widespread application of thismodel, critiquing it through the two themes ofspace and textual form. Drawing on ourexperience of a previous piece ofresearch, we highlightthe implications of re-considering thetextuality of the Internet in addition to thespatial metaphors that are more commonlydeployed to describe Internet activity. Weargue that the use of spatial metaphors indescriptions of the Internet has shaped theadoption of the human subjects research (...)
  21. Challenges of Ethical and Legal Responsibilities When Technologies' Uses and Users Change: Social Networking Sites, Decision-Making Capacity and Dementia. [REVIEW]Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne - 2012 - Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and (...)
  22. Rethinking Responsibility in Science and Technology.Fiorella Battaglia, Nikil Mukerji & Julian Nida-Rümelin (eds.) - 2014 - Pisa University Press.
    The idea of responsibility is deeply embedded into the “lifeworld” of human beings and not subject to change. However, the empirical circumstances in which we act and ascribe responsibility to one another are subject to change. Science and technology play a great part in this transformation process. Therefore, it is important for us to rethink the idea, the role and the normative standards behind responsibility in a world that is constantly being transformed under the influence of scientific and technological progress. (...)
  23. Cybermedicine and the Moral Integrity of the Physician–Patient Relationship.Keith Bauer - 2004 - Ethics and Information Technology 6 (2):83-91.
    Some critiques of cybermedicine claim that it is problematic because it fails to create physician–patient relationships. But, electronically mediated encounters do create such relationships. The issue is the nature and quality of those relationships and whether they are conducive to good patient care and meet the ethical ideals and standards of medicine. In this paper, I argue that effective communication and compassion are, in most cases, necessary for the establishment of trusting and morally appropriate physician–patient relationships. The creation of these (...)
  24. Philosophy and Computing: An Introduction, Luciano Floridi.A. F. Beavers - 2001 - Ethics and Information Technology 3 (4):299-301.
  25. Wendell Wallach and Colin Allen: Moral Machines: Teaching Robots Right From Wrong. [REVIEW]Anthony F. Beavers - 2010 - Ethics and Information Technology 12 (4):357-358.
  26. Luciano Floridi, Philosophy and Computing: An Introduction. [REVIEW]Anthony F. Beavers - 2001 - Ethics and Information Technology 3 (4):299-301.
  27. Going Dark: Anonymising Technology in Cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
  28. Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web. [REVIEW]Colin J. Bennett - 2001 - Ethics and Information Technology 3 (3):195-208.
    This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by (...)
  29. Black Boxes on Wheels: Research Challenges and Ethical Problems in MEA-Based Robotics.Martin Mose Bentzen - 2017 - Ethics and Information Technology 19 (1):19-28.
  30. International Federation for Information Processing's Framework for Computer Ethics.J. Berleur - 1996 - Science and Engineering Ethics 2 (2):155-165.
    This paper reviews codes of ethics and codes of conduct from different countries. The differences and similarities between code content and between attitudes are considered. Distinction is drawn between a code of ethics and a code of conduct. Recommendations are made for establishing a common framework for IFIP (International Federation for Information Process) Member or Affiliate Societies.
  31. A Philosophical and Evolutionary Approach to Cyber-Bullying: Social Networks and the Disruption of Sub-Moralities.Tommaso Bertolotti & Lorenzo Magnani - 2013 - Ethics and Information Technology 15 (4):285-299.
  32. Studying the Ethical Implications of E-Trust in the Lab.Cristina Bicchieri & Azi Lev-On - 2011 - Ethics and Information Technology 13 (1):5-15.
    The paper presents results of recent laboratory experiments that study if and how computer-mediated communication affects cooperation and trust. It is argued that communication medium does not matter much for trust-building and maintenance, whereas relevant pre-play communication and group size can have a major influence. The implications of the findings for the design of sites that depend on trusting communities are discussed.
  33. Psychic ID: A Blueprint for a Modern National Identity Scheme.David G. W. Birch - 2008 - Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? Can we assemble a (...)
  34. Human Capabilities and Information and Communication Technology: The Communicative Connection. [REVIEW]William F. Birdsall - 2011 - Ethics and Information Technology 13 (2):93-106.
    The potential contributions information and communication technology (ICT) can make to advancing human capabilities are acknowledged by both the capability approach (CA) and ICT communities. However, there is a lack of genuine engagement between the two communities. This paper addresses the question: How can a collaborative dialogue between the CA and ICT communities be advanced? A prerequisite to exploring collaboratively the potential use of particular technologies with specific capabilities is a conceptual framework within which a dialogue can be undertaken to (...)
  35. Data Mining to Combat Terrorism and the Roots of Privacy Concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, (...)
  36. Gordon Graham, the Internet: A Philosophical Inquiry. [REVIEW]D. Birsch - 2002 - Ethics and Information Technology 4 (4):325-328.
  37. Moral Responsibility for Harm Caused by Computer System Failures.Douglas Birsch - 2004 - Ethics and Information Technology 6 (4):233-245.
    When software is written and then utilized in complex computer systems, problems often occur. Sometimes these problems cause a system to malfunction, and in some instances such malfunctions cause harm. Should any of the persons involved in creating the software be blamed and punished when a computer system failure leads to persons being harmed? In order to decide whether such blame and punishment are appropriate, we need to first consider if the people are “morally responsible”. Should any of the people (...)
  38. Information Warfare and Security by Dorothy E. Denning.Jean-François Blanchette - 1999 - Ethics and Information Technology 1 (3):237-238.
  39. Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie and Susan Landau. [REVIEW]Jean-Francois Blanchette - 1999 - Ethics and Information Technology 1 (2):167-169.
  40. Embedded Ethics: Some Technical and Ethical Challenges.Vincent Bonnemains, Claire Saurel & Catherine Tessier - 2018 - Ethics and Information Technology 20 (1):41-58.
  41. An Ethical Framework in Information Systems Decision Making Using Normative Theories of Business Ethics.Utpal Bose - 2012 - Ethics and Information Technology 14 (1):17-26.
    As business environments become more complex and reliant on information systems, the decisions made by managers affect a growing number of stakeholders. This paper proposes a framework based on the application of normative theories in business ethics to facilitate the evaluation of IS related ethical dilemmas and arrive at fair and consistent decisions. The framework is applied in the context of an information privacy dilemma to demonstrate the decision making process. The ethical dilemma is analyzed using each one of the (...)
  42. Editorial: Moral Luck, Social Networking Sites, and Trust on the Web. [REVIEW]Maria C. Bottis, Frances S. Grodzinsky & Herman T. Tavani - 2010 - Ethics and Information Technology 12 (4):297-298.
  43. Breaking the Filter Bubble: Democracy and Design.Engin Bozdag & Jeroen van den Hoven - 2015 - Ethics and Information Technology 17 (4):249-265.
  44. When Nightingales Break the Law: Silence and the Construction of Reality. [REVIEW]Sandra Braman - 2007 - Ethics and Information Technology 9 (4):281-295.
  45. Editorial Introduction – Surveillance and Privacy.Philip Brey - 2005 - Ethics and Information Technology 7 (4):183-184.
  46. Freedom and Privacy in Ambient Intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
    This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.
  47. Method in Computer Ethics: Towards a Multi-Level Interdisciplinary Approach. [REVIEW]Philip Brey - 2000 - Ethics and Information Technology 2 (2):125-129.
    This essay considers methodological aspects ofcomputer ethics and argues for a multi-levelinterdisciplinary approach with a central role forwhat is called disclosive computer ethics. Disclosivecomputer ethics is concerned with the moraldeciphering of embedded values and norms in computersystems, applications and practices. In themethodology for computer ethics research proposed inthe essay, research takes place at three levels: thedisclosure level, in which ideally philosophers,computer scientists and social scientists collaborateto disclose embedded normativity in computer systemsand practices, the theoretical level, in whichphilosophers develop and modify (...)
  48. Anticipating Ethical Issues in Emerging IT.Philip A. E. Brey - 2012 - Ethics and Information Technology 14 (4):305-317.
    In this essay, a new approach to the ethics of emerging information technology will be presented, called anticipatory technology ethics (ATE). The ethics of emerging technology is the study of ethical issues at the R&D and introduction stage of technology development through anticipation of possible future devices, applications, and social consequences. In the essay, I will first locate emerging technology in the technology development cycle, after which I will consider ethical approaches to emerging technologies, as well as obstacles in developing (...)
  49. Editorial Introduction – Ethics of New Information Technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109-109.
  50. Real Friends: How the Internet Can Foster Friendship. [REVIEW]Adam Briggle - 2008 - Ethics and Information Technology 10 (1):71-79.
1 — 50 / 796