This category needs an editor. We encourage you to help if you are qualified.
Volunteer, or read more about what this involves.
Related categories

758 found
Order:
1 — 50 / 758
Material to categorize
  1. The Myth of Media Interactivity.K. Abe - 2009 - Theory, Culture and Society 26 (2-3):73-88.
    Since the 1980s, a number of discourses have celebrated the coming of the information society in Japan. In those discourses, enabling media interactivity has been emphasized as the objective of technological innovations, creating a sort of `myth' of media interactivity. This article tries to investigate the close relationship between media interactivity and surveillance modality in newly emergent information and communication technologies, especially SNS on the Internet. While the traditional image of surveillance society is gloomy and repressive, contemporary, ubiquitous surveillance appears (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  2. Cyberstalking and Internet Pornography: Gender and the Gaze. [REVIEW]Alison Adam - 2002 - Ethics and Information Technology 4 (2):133-142.
    This paper is based on the premise that the analysis of some cyberethics problems would benefit from a feminist treatment. It is argued that both cyberstalking and Internet child pornography are two such areas which have a `gendered' aspect which has rarely been explored in the literature. Against a wide ranging feminist literature of potential relevance, the paper explores a number of cases through a focused approach which weaves together feminist concepts of privacy and the gaze.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  3. Does Gender Matter in Computer Ethics?Alison Adam & Jacqueline Ofori-Amanfo - 2000 - Ethics and Information Technology 2 (1):37-47.
  4. Supporting the Intellectual Life of a Democratic Society.Philip E. Agre - 2001 - Ethics and Information Technology 3 (4):289-298.
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  5. Ethics and Technology Design.Anders Albrechtslund - 2007 - Ethics and Information Technology 9 (1):63-72.
    This article offers a discussion of the connection between technology and values and, specifically, I take a closer look at ethically sound design. In order to bring the discussion into a concrete context, the theory of Value Sensitive Design (VSD) will be the focus point. To illustrate my argument concerning design ethics, the discussion involves a case study of an augmented window, designed by the VSD Research Lab, which has turned out to be a potentially surveillance-enabling technology. I call attention (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  6. Academic Personality and the Commodification of Academic Texts.Andrew Alexandra - 2002 - Ethics and Information Technology 4 (4):279-286.
    This paper explores the nature of, and justification for, copyright in academic texts in the light of recent developments in information technology, in particular the growth of electronic publication on the internet. Copyright, like other forms of property, is best thought of as a cluster of rights. A distinction is drawn within this cluster between first order `control rights' and higher order `commodity rights'. It is argued that copyright in academic texts is founded on its role as a means to (...)
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  7. Software Libre 2004.Andoni Alonso & Carl Mitcham - 2004 - Ethics and Information Technology 6 (1):65-67.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  8. Doctoral Essays in Computer Ethics.Sheri A. Alpert - 1996 - Science and Engineering Ethics 2 (2):225-247.
    Computer technologies are having a profoundly transforming effect on how the United States federal government operates. As technologies become more sophisticated, Federal agencies are becoming more innovative, devising creative ways to use these technologies for program delivery. One hopes that the near-term effect of these technology applications will be more efficient operation of government, the goal that generally leads to their implementation.
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  9. ``A Piece of Yourself'': Ethical Issues in Biometric Identification. [REVIEW]Anton Alterman - 2003 - Ethics and Information Technology 5 (3):139-150.
    The proliferation of biometric identification technology raises difficult issues in the matter of security, privacy and identity. Though biometric "images" are not images per se, they are both unique representations of an individual in themsevles and a means of access to other identifying information. I compare biometric imaging with other kinds of identifying representations and find that there are issues specific to biometric ID's. Because they represent information that is written into the body they are directly related to one's sense (...)
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography   7 citations  
  10. Is Music Downloading the New Prohibition? What Students Reveal Through an Ethical Dilemma.Shoshana Altschuller & Raquel Benbunan-Fich - 2009 - Ethics and Information Technology 11 (1):49-56.
    Although downloading music through unapproved channels is illegal, statistics indicate that it is widespread. The following study examines the attitudes and perceptions of college students that are potentially engaged in music downloading. The methodology includes a content analysis of the recommendations written to answer an ethical vignette. The vignette presented the case of a subject who faces the dilemma of whether or not to download music illegally. Analyses of the final reports indicate that there is a vast and inconsistent array (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   7 citations  
  11. The Body and Communities in Cyberspace: A Mmarcellian Analysis. [REVIEW]Thomas C. Anderson - 2000 - Ethics and Information Technology 2 (3):153-158.
    Many who speak glowingly about the possibilities for human relations in cyberspace, or virtual communities, laud them precisely because such communities are to a great extent free of the real spatial-temporal restrictions rooted in the limitations of our bodies. In this paper I investigate the importance of the body in establishing and maintaining human relations by considering the thought of the twentieth century French philosopher Gabriel Marcel. Because Marcel emphasized the central importance of the body in one's personal self-identity as (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  12. Against the Moral Turing Test: Accountable Design and the Moral Reasoning of Autonomous Systems.Arnold Thomas & Scheutz Matthias - 2016 - Ethics and Information Technology 18 (2):103-115.
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  13. Against the Moral Turing Test: Accountable Design and the Moral Reasoning of Autonomous Systems.Arnold Thomas & Scheutz Matthias - 2016 - Ethics and Information Technology 18 (2):103-115.
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  14. Can Information Warfare Ever Be Just?John Arquilla - 1999 - Ethics and Information Technology 1 (3):203-212.
    The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker''s true identity put serious pressure (...)
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  15. Thinking About Technology: Foundations of the Philosophy of Technology, Joseph C. Pitt. [REVIEW]John M. Artz - 2001 - Ethics and Information Technology 2 (4):249-250.
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  16. Human Values and the Design of Computer Technology, Edited by Batya Friedman.John M. Artz - 1999 - Ethics and Information Technology 1 (4):305-306.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  17. Genomics, Ethics, and ICT.Ann Backus, Richard A. Spinello & Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):1-3.
    Remove from this list   Direct download (12 more)  
     
    Export citation  
     
    My bibliography  
  18. Seizing Control?: The Experience Capture Experiments of Ringley & Mann. [REVIEW]Jane Bailey & Ian Kerr - 2007 - Ethics and Information Technology 9 (2):129-139.
    Will the proliferation of devices that provide the continuous archival and retrieval of personal experiences (CARPE) improve control over, access to and the record of collective knowledge as Vannevar Bush once predicted with his futuristic memex? Or is it possible that their increasing ubiquity might pose fundamental risks to humanity, as Donald Norman contemplated in his investigation of an imaginary CARPE device he called the “Teddy”? Through an examination of the webcam experiment of Jenni Ringley and the EyeTap experiments of (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  19. Technologies of Artificial Sensations.Alexey S. Bakhirev - manuscript
    Technologies based on emergence will allow to reproduce sensations on non-biological carriers by making devices feel. These technologies will change fundamentally not only the approach to the creation of artificial intelligence, but also create artificial worlds of a totally different level. Which, unlike virtual models, will really exist for themselves. This approach differs completely from the methods currently used in digital technologies. Possibly the principles described herein will give a rise to many new trends.
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    My bibliography  
  20. Situation Workplace Surveillance: Ethics and Computer-Based Performance Monition.S. Ball Kirstie - 2001 - Ethics and Information Technology 3 (3).
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  21. Situating Workplace Surveillance: Ethics and Computer Based Performance Monitoring. [REVIEW]Kirstie S. Ball - 2001 - Ethics and Information Technology 3 (3):209-221.
    This paper examines the study of computer basedperformance monitoring (CBPM) in the workplaceas an issue dominated by questions of ethics.Its central contention paper is that anyinvestigation of ethical monitoring practice isinadequate if it simply applies best practiceguidelines to any one context to indicate,whether practice is, on balance, ethical or not. The broader social dynamics of access toprocedural and distributive justice examinedthrough a fine grained approach to the study ofworkplace social relations, and workplaceidentity construction, are also important here. This has three (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  22. Digitalization and Global Ethics.Zonghao Bao & Kun Xiang - 2006 - Ethics and Information Technology 8 (1):41-47.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  23. Free Will and Moral Responsibility in Video Games.Christopher Bartel - 2015 - Ethics and Information Technology 17 (4):285-293.
    Can a player be held morally responsible for the choices that she makes within a videogame? Do the moral choices that the player makes reflect in any way on the player’s actual moral sensibilities? Many videogames offer players the options to make numerous choices within the game, including moral choices. But the scope of these choices is quite limited. I attempt to analyze these issues by drawing on philosophical debates about the nature of free will. Many philosophers worry that, if (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  24. Ethics of Internet Research: Contesting the Human Subjects Research Model.Elizabeth H. Bassett & Kate O'Riordan - 2002 - Ethics and Information Technology 4 (3):233-247.
    The human subjects researchmodel is increasingly invoked in discussions ofethics for Internet research. Here we seek toquestion the widespread application of thismodel, critiquing it through the two themes ofspace and textual form. Drawing on ourexperience of a previous piece ofresearch, we highlightthe implications of re-considering thetextuality of the Internet in addition to thespatial metaphors that are more commonlydeployed to describe Internet activity. Weargue that the use of spatial metaphors indescriptions of the Internet has shaped theadoption of the human subjects research (...)
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography   5 citations  
  25. Challenges of Ethical and Legal Responsibilities When Technologies' Uses and Users Change: Social Networking Sites, Decision-Making Capacity and Dementia. [REVIEW]Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne - 2012 - Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  26. Rethinking Responsibility in Science and Technology.Fiorella Battaglia, Nikil Mukerji & Julian Nida-Rümelin (eds.) - 2014 - Pisa University Press.
    The idea of responsibility is deeply embedded into the “lifeworld” of human beings and not subject to change. However, the empirical circumstances in which we act and ascribe responsibility to one another are subject to change. Science and technology play a great part in this transformation process. Therefore, it is important for us to rethink the idea, the role and the normative standards behind responsibility in a world that is constantly being transformed under the influence of scientific and technological progress. (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  27. Cybermedicine and the Moral Integrity of the Physician–Patient Relationship.Keith Bauer - 2004 - Ethics and Information Technology 6 (2):83-91.
    Some critiques of cybermedicine claim that it is problematic because it fails to create physician–patient relationships. But, electronically mediated encounters do create such relationships. The issue is the nature and quality of those relationships and whether they are conducive to good patient care and meet the ethical ideals and standards of medicine. In this paper, I argue that effective communication and compassion are, in most cases, necessary for the establishment of trusting and morally appropriate physician–patient relationships. The creation of these (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  28. Philosophy and Computing: An Introduction, Luciano Floridi.A. F. Beavers - 2001 - Ethics and Information Technology 3 (4):299-301.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  29. Wendell Wallach and Colin Allen: Moral Machines: Teaching Robots Right From Wrong. [REVIEW]Anthony F. Beavers - 2010 - Ethics and Information Technology 12 (4):357-358.
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  30. Luciano Floridi, Philosophy and Computing: An Introduction. [REVIEW]Anthony F. Beavers - 2001 - Ethics and Information Technology 3 (4):299-301.
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  31. Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web. [REVIEW]Colin J. Bennett - 2001 - Ethics and Information Technology 3 (3):195-208.
    This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by (...)
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  32. Black Boxes on Wheels: Research Challenges and Ethical Problems in MEA-Based Robotics.Martin Mose Bentzen - 2017 - Ethics and Information Technology 19 (1):19-28.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  33. International Federation for Information Processing's Framework for Computer Ethics.J. Berleur - 1996 - Science and Engineering Ethics 2 (2):155-165.
    This paper reviews codes of ethics and codes of conduct from different countries. The differences and similarities between code content and between attitudes are considered. Distinction is drawn between a code of ethics and a code of conduct. Recommendations are made for establishing a common framework for IFIP (International Federation for Information Process) Member or Affiliate Societies.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  34. A Philosophical and Evolutionary Approach to Cyber-Bullying: Social Networks and the Disruption of Sub-Moralities.Tommaso Bertolotti & Lorenzo Magnani - 2013 - Ethics and Information Technology 15 (4):285-299.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  35. Studying the Ethical Implications of E-Trust in the Lab.Cristina Bicchieri & Azi Lev-On - 2011 - Ethics and Information Technology 13 (1):5-15.
    The paper presents results of recent laboratory experiments that study if and how computer-mediated communication affects cooperation and trust. It is argued that communication medium does not matter much for trust-building and maintenance, whereas relevant pre-play communication and group size can have a major influence. The implications of the findings for the design of sites that depend on trusting communities are discussed.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  36. Psychic ID: A Blueprint for a Modern National Identity Scheme.David G. W. Birch - 2008 - Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? Can we assemble a (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  37. Human Capabilities and Information and Communication Technology: The Communicative Connection. [REVIEW]William F. Birdsall - 2011 - Ethics and Information Technology 13 (2):93-106.
    The potential contributions information and communication technology (ICT) can make to advancing human capabilities are acknowledged by both the capability approach (CA) and ICT communities. However, there is a lack of genuine engagement between the two communities. This paper addresses the question: How can a collaborative dialogue between the CA and ICT communities be advanced? A prerequisite to exploring collaboratively the potential use of particular technologies with specific capabilities is a conceptual framework within which a dialogue can be undertaken to (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    My bibliography  
  38. Data Mining to Combat Terrorism and the Roots of Privacy Concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  39. Gordon Graham, the Internet: A Philosophical Inquiry. [REVIEW]D. Birsch - 2002 - Ethics and Information Technology 4 (4):325-328.
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  40. Moral Responsibility for Harm Caused by Computer System Failures.Douglas Birsch - 2004 - Ethics and Information Technology 6 (4):233-245.
    When software is written and then utilized in complex computer systems, problems often occur. Sometimes these problems cause a system to malfunction, and in some instances such malfunctions cause harm. Should any of the persons involved in creating the software be blamed and punished when a computer system failure leads to persons being harmed? In order to decide whether such blame and punishment are appropriate, we need to first consider if the people are “morally responsible”. Should any of the people (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  41. Information Warfare and Security by Dorothy E. Denning.Jean-François Blanchette - 1999 - Ethics and Information Technology 1 (3):237-238.
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  42. Privacy on the Line: The Politics of Wiretapping and Encryption by Whitfield Diffie and Susan Landau. [REVIEW]Jean-Francois Blanchette - 1999 - Ethics and Information Technology 1 (2):167-169.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  43. Embedded Ethics: Some Technical and Ethical Challenges.Vincent Bonnemains, Claire Saurel & Catherine Tessier - 2018 - Ethics and Information Technology 20 (1):41-58.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  44. An Ethical Framework in Information Systems Decision Making Using Normative Theories of Business Ethics.Utpal Bose - 2012 - Ethics and Information Technology 14 (1):17-26.
    As business environments become more complex and reliant on information systems, the decisions made by managers affect a growing number of stakeholders. This paper proposes a framework based on the application of normative theories in business ethics to facilitate the evaluation of IS related ethical dilemmas and arrive at fair and consistent decisions. The framework is applied in the context of an information privacy dilemma to demonstrate the decision making process. The ethical dilemma is analyzed using each one of the (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography  
  45. Editorial: Moral Luck, Social Networking Sites, and Trust on the Web. [REVIEW]Maria C. Bottis, Frances S. Grodzinsky & Herman T. Tavani - 2010 - Ethics and Information Technology 12 (4):297-298.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  46. Breaking the Filter Bubble: Democracy and Design.Engin Bozdag & Jeroen van den Hoven - 2015 - Ethics and Information Technology 17 (4):249-265.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  47. When Nightingales Break the Law: Silence and the Construction of Reality. [REVIEW]Sandra Braman - 2007 - Ethics and Information Technology 9 (4):281-295.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  48. Editorial Introduction – Surveillance and Privacy.Philip Brey - 2005 - Ethics and Information Technology 7 (4):183-184.
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  49. Freedom and Privacy in Ambient Intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
    This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography   17 citations  
  50. Method in Computer Ethics: Towards a Multi-Level Interdisciplinary Approach. [REVIEW]Philip Brey - 2000 - Ethics and Information Technology 2 (2):125-129.
    This essay considers methodological aspects ofcomputer ethics and argues for a multi-levelinterdisciplinary approach with a central role forwhat is called disclosive computer ethics. Disclosivecomputer ethics is concerned with the moraldeciphering of embedded values and norms in computersystems, applications and practices. In themethodology for computer ethics research proposed inthe essay, research takes place at three levels: thedisclosure level, in which ideally philosophers,computer scientists and social scientists collaborateto disclose embedded normativity in computer systemsand practices, the theoretical level, in whichphilosophers develop and modify (...)
    Remove from this list   Direct download (12 more)  
     
    Export citation  
     
    My bibliography   6 citations  
1 — 50 / 758