Related categories

75 found
Order:
1 — 50 / 75
  1. The Myth of Media Interactivity.K. Abe - 2009 - Theory, Culture and Society 26 (2-3):73-88.
    Since the 1980s, a number of discourses have celebrated the coming of the information society in Japan. In those discourses, enabling media interactivity has been emphasized as the objective of technological innovations, creating a sort of `myth' of media interactivity. This article tries to investigate the close relationship between media interactivity and surveillance modality in newly emergent information and communication technologies, especially SNS on the Internet. While the traditional image of surveillance society is gloomy and repressive, contemporary, ubiquitous surveillance appears (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  2. Cyberstalking and Internet Pornography: Gender and the Gaze. [REVIEW]Alison Adam - 2002 - Ethics and Information Technology 4 (2):133-142.
    This paper is based on the premise that the analysis of some cyberethics problems would benefit from a feminist treatment. It is argued that both cyberstalking and Internet child pornography are two such areas which have a `gendered' aspect which has rarely been explored in the literature. Against a wide ranging feminist literature of potential relevance, the paper explores a number of cases through a focused approach which weaves together feminist concepts of privacy and the gaze.
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography  
  3. The Japanese Sense of Information Privacy.Andrew A. Adams, Kiyoshi Murata & Yohko Orito - 2009 - AI and Society 24 (4):327-341.
    We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as Benedict in The chrysanthemum and the sword: patterns of Japanese culture. Houghton Mifflin, Boston, 1946. In this paper we distinguish between information privacy and physical privacy. As we show, there is good evidence for social norms of limits on the sharing and use of personal information (i.e. information privacy) from traditional interactions in (...)
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    My bibliography  
  4. A New Solution to the Gamer’s Dilemma.Rami Ali - 2015 - Ethics and Information Technology 17 (4):267-274.
    Luck (2009) argues that gamers face a dilemma when it comes to performing certain virtual acts. Most gamers regularly commit acts of virtual murder, and take these acts to be morally permissible. They are permissible because unlike real murder, no one is harmed in performing them; their only victims are computer-controlled characters, and such characters are not moral patients. What Luck points out is that this justification equally applies to virtual pedophelia, but gamers intuitively think that such acts are not (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  5. The Body and Communities in Cyberspace: A Mmarcellian Analysis. [REVIEW]Thomas C. Anderson - 2000 - Ethics and Information Technology 2 (3):153-158.
    Many who speak glowingly about the possibilities for human relations in cyberspace, or virtual communities, laud them precisely because such communities are to a great extent free of the real spatial-temporal restrictions rooted in the limitations of our bodies. In this paper I investigate the importance of the body in establishing and maintaining human relations by considering the thought of the twentieth century French philosopher Gabriel Marcel. Because Marcel emphasized the central importance of the body in one's personal self-identity as (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  6. Including the Social and Ethical Implications of Computing in the Computer Science Curriculum.Florence Appel - 1998 - Acm Sigcas Computers and Society 28 (2):56-57.
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  7. Identity in the Information Society-Special Issue, Edited by J. Backhouse, B.-J. Koops, V. Matyas.James Backhouse, B. -J. Koops & V. Matyas - 2008 - Identity in the Information Society 1 (1):1-228.
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  8. Resolving the Gamers Dilemma.Christopher Bartel - 2012 - Ethics and Information Technology 14 (1):11-16.
    Morgan Luck raises a potentially troubling problem for gamers who enjoy video games that allow the player to commit acts of virtual murder. The problem simply is that the arguments typically advanced to defend virtual murder in video games would appear to also support video games that allowed gamers to commit acts of virtual paedophilia. Luck’s arguments are persuasive, however, there is one line of argument that he does not consider, which may provide the relevant distinction: as virtual paedophilia involves (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    My bibliography   9 citations  
  9. Science, Technology, and Responsibility.Fiorella Battaglia, Nikil Mukerji & Julian Nida-Rümelin - 2014 - In Fiorella Battaglia, Nikil Mukerji & Julian Nida-Rümelin (eds.), Rethinking Responsibility in Science and Technology. Pisa University Press. pp. 7-11.
    The empirical circumstances in which human beings ascribe responsibility to one another are subject to change. Science and technology play a great part in this transformation process. Therefore, it is important for us to rethink the idea, the role and the normative standards behind responsibility in a world that is constantly changing under the influence of scientific and technological progress. This volume is a contribution to that joint societal effort.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  10. Bio-Social Cybernetic Determination, or Responsible Freedom? In Philosophy and Technology II. Information Technology and Computers in Theory and Practice.H. Beck - 1986 - Boston Studies in the Philosophy of Science 90:85-95.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  11. International Federation for Information Processing's Framework for Computer Ethics.Professor J. Berleur - 1996 - Science and Engineering Ethics 2 (2):155-165.
    This paper reviews codes of ethics and codes of conduct from different countries. The differences and similarities between code content and between attitudes are considered. Distinction is drawn between a code of ethics and a code of conduct. Recommendations are made for establishing a common framework for IFIP (International Federation for Information Process) Member or Affiliate Societies.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  12. Why I Am Not Going to Buy a Computer.Wendell Berry - 2010 - In Craig Hanks (ed.), Technology and Values: Essential Readings. Wiley-Blackwell.
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  13. Ethical Considerations in the Conduct of Electronic Surveillance Research.Ashok J. Bharucha, Alex John London, David Barnard, Howard Wactlar, Mary Amanda Dew & Charles F. Reynolds - 2006 - Journal of Law, Medicine and Ethics 34 (3):611-619.
    The extant clinical literature indicates profound problems in the assessment, monitoring, and documentation of care in long-term care facilities. The lack of adequate resources to accommodate higher staff-to-resident ratios adds additional urgency to the goal of identifying more costeffective mechanisms to provide care oversight. The ever expanding array of electronic monitoring technologies in the clinical research arena demands a conceptual and pragmatic framework for the resolution of ethical tensions inherent in the use of such innovative tools. CareMedia is a project (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  14. Computing Professionals and the 'Peace Dividend'.Andy Bissett - 1997 - Business Ethics 6 (2):81–86.
    For the last four decades much of the world’s most advanced technical resources have been devoted to military systems; but with the end of the Cold War economic and technical resources are being freed to yield the so‐called ‘peace dividend’. This promotes the possibility of a more ethical orientation to many information technologists’ work, and also represents the chance to argue for, and develop, more socially useful and responsible applications of computer technology, in accordance with the development of professional ideals (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  15. Using Information Technology to Create Global Classrooms: Benefits and Ethical Dilemmas.York W. Bradshaw, Johannes Britz, Theo Bothma & Coetzee Bester - 2007 - International Review of Information Ethics 7:09.
    The global digital divide represents one of the most significant examples of international inequality. In North America and Western Europe, nearly 70% of citizens use the Internet on a regular basis, whereas in Africa less than 4% do so. Such inequality impacts business and trade, online education and libraries, telemedicine and health resources, and political information and e-government. In response, a group of educators and community leaders in South Africa and the United States have used various information technologies to create (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  16. Current Issues in Computing and Philosophy.P. Brey, A. Briggle & K. Waelbers (eds.) - 2008 - IOS Press.
  17. Invoking Politics and Ethics in the Design of Information Technology: Undesigning the Design. [REVIEW]Martin Brigham & Lucas D. Introna - 2007 - Ethics and Information Technology 9 (1):1-10.
    It is a truism that the design and deployment of information and communication technologies is vital to everyday life, the conduct of work and to social order. But how are individual, organisational and societal choices made? What might it mean to invoke a politics and an ethics of information technology design and use? This editorial paper situates these questions within the trajectory of preoccupations and approaches to the design and deployment of information technology since computerisation began in the 1940s. Focusing (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  18. Ethical Issues of 'Morality Mining': When the Moral Identity of Individuals Becomes a Focus of Data-Mining.Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley - 2013 - In Hakikur Rahman & I. Ramos (eds.), Ethical Data Mining Applications for Socio-Economic Development. IGI Global. pp. 1-21.
  19. The Invisible Robots of Global Finance.Mark Coeckelbergh - 2015 - Acm Sigcas Computers and Society 45 (3):287-289.
    One of the barriers for doing ethics of technology in the domain of finance is that financial technologies usually remain invisible. These hidden and unseen devices, machines, and infrastructures have to be revealed. This paper shows how the “robots” of finance, which function as distance technologies, are not only themselves invisible, but also hide people and places, which is ethically and politically problematic. Furthermore, “the market” appears as a ghostly artificial agent, again rendering humans invisible and making it difficult to (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  20. The Impact of the Internet on Our Moral Lives R. J. Cavalier ,The Impact of the Internet on Our Moral Lives, 249 Pp., $26.95/£16.75 Paperback. [REVIEW]Giovanni De Grandis - 2006 - Politics and Ethics Review 2 (2):224-226.
  21. Sharing Moral Responsibility with Robots: A Pragmatic Approach.Gordana Dodig Crnkovic & Daniel Persson - 2008 - In Holst, Per Kreuger & Peter Funk (eds.), Frontiers in Artificial Intelligence and Applications Volume 173. IOS Press Books.
    Roboethics is a recently developed field of applied ethics which deals with the ethical aspects of technologies such as robots, ambient intelligence, direct neural interfaces and invasive nano-devices and intelligent soft bots. In this article we look specifically at the issue of (moral) responsibility in artificial intelligent systems. We argue for a pragmatic approach, where responsibility is seen as a social regulatory mechanism. We claim that having a system which takes care of certain tasks intelligently, learning from experience and making (...)
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    My bibliography   3 citations  
  22. Game Ethics-Homo Ludens as a Computer Game Designer and Consumer.Gordana Dodig-Crnkovic & Thomas Larsson - 2005 - International Review of Information Ethics 4 (12):19-23.
    Play and games are among the basic means of expression in intelligent communication, influenced by the relevant cultural environment. Games have found a natural expression in the contemporary computer era in which communications are increasingly mediated by computing technology. The widespread use of e-games results in conceptual and policy vacuums that must be examined and understood. Humans involved in design-ing, administering, selling, playing etc. computer games encounter new situations in which good and bad, right and wrong, are not defined by (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  23. The Social Disutility of Software Ownership.David M. Douglas - 2011 - Science and Engineering Ethics 17 (3):485-502.
    Software ownership allows the owner to restrict the distribution of software and to prevent others from reading the software’s source code and building upon it. However, free software is released to users under software licenses that give them the right to read the source code, modify it, reuse it, and distribute the software to others. Proponents of free software such as Richard M. Stallman and Eben Moglen argue that the social disutility of software ownership is a sufficient justification for prohibiting (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  24. Virtual Worlds and Moral Evaluation.Jeff Dunn - 2012 - Ethics and Information Technology 14 (4):255-265.
    Consider the multi-user virtual worlds of online games such as EVE and World of Warcraft, or the multi-user virtual world of Second Life. Suppose a player performs an action in one of these worlds, via his or her virtual character, which would be wrong, if the virtual world were real. What is the moral status of this virtual action? In this paper I consider arguments for and against the Asymmetry Thesis: the thesis that such virtual actions are never wrong. I (...)
    Remove from this list   Direct download (11 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  25. Computer Simulations in Science and Engineering. Concept, Practices, Perspectives.Juan Manuel Durán - 2018 - Springer.
  26. “The Nature of Avatars: A Response to Roxanne Kurtz’s ‘My Avatar, My Choice’.”.Scott Forschler - 2016 - APA Newsletter on Philosophy and Computers 16 (1):48-51.
    Roxanne Kurtz has argued that the "virtual rape" of a character in a computer-generated world (an avatar) shares many (though obviously not all) of the wrong-making features of physical rape in the real world. I agree in part, but argue that, due to the typical features of virtual worlds, its wrongfulness is dominated by the harm it does to the avatar user's capacity for social interaction and self-representation. In the course of the argument I hope to shed more light upon (...)
    Remove from this list  
    Translate
     
     
    Export citation  
     
    My bibliography  
  27. The Ethical Limitations of Online Grading Systems.Joseph S. Fulda - 2005 - British Journal of Educational Technology 36 (3):559-561.
    Discusses how the radio button and its technological cousins, graying out and "incompletely filled out" check-box forms "not accepted," and the like, compromise ethics in the context of professional autonomy of faculty in the matter of grading. Three case studies are given, based on my personal experience as a professor and instructor. -/- The point generalizes to all contexts, however, and can be read to object to all such radio-button forms, from multiple-choice tests for students, to surveys, etc.
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  28. A Gift of Fire: Social Legal, and Ethical Issues in Computing by Sara Baase. [REVIEW]Joseph S. Fulda - 2000 - Ethics and Information Technology 2 (4):241-247.
    Extremely favorable review, with hardly any criticisms at all.
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  29. A Vindication of the Rights of Machines.David J. Gunkel - 2014 - Philosophy and Technology 27 (1):113-132.
    This essay responds to the machine question in the affirmative, arguing that artifacts, like robots, AI, and other autonomous systems, can no longer be legitimately excluded from moral consideration. The demonstration of this thesis proceeds in four parts or movements. The first and second parts approach the subject by investigating the two constitutive components of the ethical relationship—moral agency and patiency. In the process, they each demonstrate failure. This occurs not because the machine is somehow unable to achieve what is (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography   13 citations  
  30. Frontiers in Artificial Intelligence and Applications Volume 173.Anders Holst, , Per Kreuger & Peter Funk (eds.) - 2008 - IOS Press Books.
    Remove from this list  
    Translate
     
     
    Export citation  
     
    My bibliography  
  31. Coding the Dictatorship of ‘the They:’ A Phenomenological Critique of Digital Rights Management.Gordon Hull - forthcoming - In J. Jeremy Wisnewski Mark Sanders (ed.), Ethics and Phenomenology. Lexington Books.
    This paper uses Heidegger’s discussion of artifacts in Being and Time to motivate a phenomenological critique of Digital Rights Management regimes such as the one that allows DVDs to require one to watch commercials and copyright notices. In the first section, I briefly sketch traditional ethical approaches to intellectual property and indicate the gap that a phenomenological approach can fill. In section 2, following Heidegger’s discussion in Being and Time, I analyze DRM technologies as exemplary of the breakdown of things (...)
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    My bibliography   1 citation  
  32. Singular Justice and Software Piracy.Lucas D. Introna - 2007 - Business Ethics: A European Review 16 (3):264-277.
    This paper assumes that the purpose of ethics is to open up a space for the possibility of moral conduct in the flow of everyday life. If this is the case then we can legitimately ask: "How then do we do ethics"? To attempt an answer to this important question, the paper presents some suggestions from the work of Emmanuel Levinas and Jacques Derrida. With Levinas, it is argued that ethics happens in the singularity of the face of the Other (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  33. Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    My bibliography   12 citations  
  34. Artificial Moral Cognition: From Functionalism to Autonomous Moral Agents.Muntean Ioan & Don Howard - forthcoming - In Powers Tom (ed.), Philosophy and Computing: Essays in epistemology, philosophy of mind, logic, and ethics. Springer.
    This paper proposes a model of the Artificial Autonomous Moral Agent (AAMA), discusses a standard of moral cognition for AAMA, and compares it with other models of artificial normative agency. It is argued here that artificial morality is possible within the framework of a “moral dispositional functionalism.” This AAMA is able to “read” the behavior of human actors, available as collected data, and to categorize their moral behavior based on moral patterns herein. The present model is based on several analogies (...)
    Remove from this list  
     
    Export citation  
     
    My bibliography  
  35. Web Browser as a Forensic Computing Tool.B. Jain - manuscript
    Cyber crimes have become more prevalent and damaging with reported annual loss of billions of dollars globally. The anonymity on the Internet and the possibility of launching attacks remotely have made it more difficult to find the origin of the crime and tracing back the criminals. Cyber crime consists of specific crimes dealing with computers and networks (such as hacking) and the facilitation of traditional crime through the use of computers (child pornography, hate crimes, telemarketing /Internet fraud). In addition to (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  36. Moral Philosophy and Information Technology.Jeroen den Hoven John Weckervant (ed.) - 2008 - Cambridge University Press.
    Remove from this list  
    Translate
     
     
    Export citation  
     
    My bibliography  
  37. Computers as Surrogate Agents.Deborah G. Johnson & Thomas M. Powers - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 251.
  38. Privacy is an Essentially Contested Concept: A Multidimensional Analytic for Mapping Privacy.Colin Koopman, Deirdre Mulligan & Nick Doty - 2016 - Philosophical Transactions of the Royal Society A 374 (2083).
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    My bibliography   1 citation  
  39. Hacking: The Performance of Technology? [REVIEW]Cathy Legg - 2005 - Techne 9 (2):151-154.
    The word “hacker” has an interesting double meaning: one vastly more widespread connotation of technological mischief, even criminality, and an original meaning amongst the tech savvy as a term of highest approbation. Both meanings, however, share the idea that hackers possess a superior ability to manipulate technology according to their will (and, as with God, this superior ability to exercise will is a source of both mystifying admiration and fear). This book mainly concerns itself with the former meaning. To Thomas (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  40. Unveiling the Link Between Logical Fallacies and Web Persuasion.Antonio Lieto & Fabiana Vernero - 2013 - In ACM Proceedings of the 5th Web Science Conference, Paris. ACM.
    In the last decade Human-Computer Interaction (HCI) has started to focus attention on forms of persuasive interaction where computer technologies have the goal of changing users behavior and attitudes according to a predefined direction. In this work, we hypothesize a strong connection between logical fallacies (forms of reasoning which are logically invalid but cognitively effective) and some common persuasion strategies adopted within web technologies. With the aim of empirically evaluating our hypothesis, we carried out a pilot study on a sample (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  41. Preface.B. Ingemar B. Lindahl - 1988 - Theoretical Medicine 9 (2).
  42. Are ICTs Prerequisites for the Eradication of Poverty?H. P. P. Lotter - 2007 - International Review of Information Ethics 7:09.
    I provide a philosophical analysis of the claim that ICTs are necessary preconditions for the eradication of poverty. What are the links between information and communication technologies (ICTs) and poverty? I first define technology and then give a brief depiction of ICTs. Thereafter I define poverty and give a brief explanation of its context and causes. Next I discuss the relationship between poverty and ICTs in three paradigm cases: [i] the role of ICTs in poor societies, [ii] the effect of (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  43. The German Ethics Code for Automated and Connected Driving.Christoph Luetge - 2017 - Philosophy and Technology 30 (4):547-558.
    The ethics of autonomous cars and automated driving have been a subject of discussion in research for a number of years :28–58, 2016). As levels of automation progress, with partially automated driving already becoming standard in new cars from a number of manufacturers, the question of ethical and legal standards becomes virulent. For exam-ple, while automated and autonomous cars, being equipped with appropriate detection sensors, processors, and intelligent mapping material, have a chance of being much safer than human-driven cars in (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  44. The Ethical Dimension of the German Federal Constitutional Court's Decision Concerning Data Retention.Christoph Luetge - 2009 - Open Ethics Journal 3 (1):8-12.
    In March 2008, the German Federal Constitutional Court (GFCC) has passed an important, even though preliminary, decision concerning data retention. The GFCC’s decision accepts the storage of data, but greatly restricts their use to serious offenses like murder and organized crime. From an ethical point of view, it is particularly interesting to look at the justification given by the GFCC, which relies heavily on the argument that the “impartiality” (Unbefangenheit) of communication will be thoroughly damaged if feelings of being watched (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  45. Internet Ethics.Steve Matthews - 2012 - International Encyclopedia of Ethics.
    In the past sixty years computer technology has revolutionized the way information is processed, stored, distributed, and communicated. These changes have greatly affected myriad ways of life including especially the activities of government, commerce and social life broadly construed. This entry will not attempt to cover the broad sweep of ethical issues raised by information and computer technology. It will focus on those questions within computer ethics raised by the Internet.
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography  
  46. Identity and Information Technology.Steve Matthews - 2008 - In Jeroen den Hoven John Weckervant (ed.), Moral Philosophy and Information Technology. Cambridge University Press. pp. 142.
    Remove from this list   Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  47. Podstawy etyki komputerowej(W. Bober, Powinność w świeciecyfrowym. Etyka komputerowa w świetle współczesnej filozofii moralnej). [REVIEW]M. Miłkowski - 2009 - Etyka 42:171-174.
    Remove from this list  
    Translate
     
     
    Export citation  
     
    My bibliography  
  48. From Public Data to Private Information: The Case of the Supermarket.Vincent C. Müller - 2009 - In Maria Bottis (ed.), Proceedings of the 8th International Conference Computer Ethics: Philosophical Enquiry. Corfu, Greece: Nomiki Bibliothiki. pp. 500-507.
    The background to this paper is that in our world of massively increasing personal digital data any control over the data about me seems illusionary – informational privacy seems a lost cause. On the other hand, the production of this digital data seems a necessary component of our present life in the industrialized world. A framework for a resolution of this apparent dilemma is provided if by the distinction between (meaningless) data and (meaningful) information. I argue that computational data processing (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  49. Expert Identification and Selection: Legal Liability Concerns and Directions. [REVIEW]Kathleen Mykytyn, Peter P. Mykytyn & Stephen Lunce - 1993 - AI and Society 7 (3):225-237.
    Legal liabilities pertaining to the identification and selection of domain experts is an issue that could adversely impact expert systems developers. Problems pertaining to flawed knowledge, improperly defined expertise, and behavioural and psychological impediments are just some of the issues. This paper examines the torts of strict products liability and negligence that system developers could incur as a result of expert-related difficulties. Parallels from legal scholars and federal and state court decisions are discussed relevant to expert system projects and developers. (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  50. Surveillance and Persuasion.Michael Nagenborg - 2014 - Ethics and Information Technology 16 (1):43-49.
    This paper is as much about surveillance as about persuasive technologies (PTs). With regard to PTs it raises the question about the ethical limits of persuasion. It will be argued that even some forms of self-imposed persuasive soft surveillance technologies may be considered unethical. Therefore, the ethical evaluation of surveillance technologies should not be limited to privacy issues. While it will also be argued that PTs may become instrumental in pre-commitment strategies, it will also be demonstrated that the use of (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
1 — 50 / 75