About this topic
Summary The Internet is a complex socio-technical system where various moral issues arise as humans interact with online technologies through interfaces, algorithms and hardware design. Internet ethics investigates ethical and societal aspects related to information and communication technologies – specifically the Internet – which arise at the interaction between users, designers, online service providers and policy. Some central topics include privacy, surveillance, personalisation, autonomy, nudging, well-being, disinformation and misinformation, filter bubbles, echo chambers online, bullying and harassment online. 
Key works Floridi 2010
Related categories

221 found
Order:
1 — 50 / 221
  1. added 2020-05-18
    Digital Platforms and Responsible Innovation: Expanding Value Sensitive Design to Overcome Ontological Uncertainty.Mark de Reuver, Aimee van Wynsberghe, Marijn Janssen & Ibo van de Poel - forthcoming - Ethics and Information Technology.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. added 2020-05-17
    Online Shaming.Kathryn J. Norlock - 2017 - Social Philosophy Today 33:187-197.
    Online shaming is a subject of import for social philosophy in the Internet age, and not simply because shaming seems generally bad. I argue that social philosophers are well-placed to address the imaginal relationships we entertain when we engage in social media; activity in cyberspace results in more relationships than one previously had, entailing new and more responsibilities, and our relational behaviors admit of ethical assessment. I consider the stresses of social media, including the indefinite expansion of our relationships and (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3. added 2020-05-16
    Retweeting: Its Linguistic and Epistemic Value.Neri Marsili - forthcoming - Synthese.
    This paper analyses the communicative and epistemic value of retweeting (and more generally of reposting content on social media). Against a naïve view, it argues that retweets are not acts of endorsement, motivating this diagnosis with linguistic data. Retweeting is instead modelled as a peculiar form of quotation, in which the reported content is indicated rather than reproduced. A relevance-theoretic account of the communicative import of retweeting is then developed, to spell out the complex mechanisms by which retweets achieve their (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  4. added 2020-05-06
    Ethics of Identity in the Time of Big Data.James Brusseau - 2019 - First Monday 24 (5-6):00-11.
    Compartmentalizing our distinct personal identities is increasingly difficult in big data reality. Pictures of the person we were on past vacations resurface in employers’ Google searches; LinkedIn which exhibits our income level is increasingly used as a dating web site. Whether on vacation, at work, or seeking romance, our digital selves stream together. One result is that a perennial ethical question about personal identity has spilled out of philosophy departments and into the real world. Ought we possess one, unified identity (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. added 2020-04-30
    L’Éthique des Mégadonnées (Big Data) En Recherche.Nicolae Sfetcu - 2020 - Drobeta Turnu Severin: MultiMedia Publishing.
    Les principaux problèmes rencontrés par les scientifiques qui travaillent avec des ensembles de données massives (mégadonnées, Big Data), en soulignant les principaux problèmes éthiques, tout en tenant compte de la législation de l'Union européenne. Après une brève Introduction au Big Data, la section Technologie présente les applications spécifiques de la recherche. Il suit une approche des principales questions philosophiques spécifiques dans Aspects philosophiques, et Aspects juridiques en soulignant les problèmes éthiques spécifiques du règlement de l'UE sur la protection des données (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  6. added 2020-04-16
    Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    No categories
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. added 2020-04-14
    The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - forthcoming - Science and Engineering Ethics:1-18.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its use. We will (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8. added 2020-03-20
    Search Engines, Free Speech Coverage, and the Limits of Analogical Reasoning.Heather Whitney & Robert Mark Simpson - 2019 - In Susan Brison & Katharine Gelber (eds.), Free Speech in the Digital Age. pp. 33-41.
    This paper investigates whether search engines and other new modes of online communication should be covered by free speech principles. It criticizes the analogical reason-ing that contemporary American courts and scholars have used to liken search engines to newspapers, and to extend free speech coverage to them based on that likeness. There are dissimilarities between search engines and newspapers that undermine the key analogy, and also rival analogies that can be drawn which don’t recommend free speech protection for search engines. (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9. added 2020-03-06
    Technologically Scaffolded Atypical Cognition: The Case of YouTube’s Recommender System.Mark Alfano, Amir Ebrahimi Fard, J. Adam Carter, Peter Clutton & Colin Klein - forthcoming - Synthese.
    YouTube has been implicated in the transformation of users into extremists and conspiracy theorists. The alleged mechanism for this radicalizing process is YouTube’s recommender system, which is optimized to amplify and promote clips that users are likely to watch through to the end. YouTube optimizes for watch-through for economic reasons: people who watch a video through to the end are likely to then watch the next recommended video as well, which means that more advertisements can be served to them. This (...)
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  10. added 2020-03-04
    Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  11. added 2020-02-10
    The Human Right to Free Internet Access.Merten Reglitz - 2020 - Journal of Applied Philosophy 37 (2):314-331.
    In 2016, the United Nation’s General Assembly adopted a non-binding resolution regarding ‘The Promotion, Protection and Enjoyment of Human Rights on the Internet’. At the heart of this resolution is the UN’s concern that ‘rights that people have offline must also be protected online.’ While the UN thus recognises the importance of the Internet, it does so problematically selectively by focusing on protecting existing offline rights online. I argue instead that Internet access is itself a moral human right that requires (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  12. added 2020-01-22
    A Ghost Workers' Bill of Rights: How to Establish a Fair and Safe Gig Work Platform.Julian Friedland, David Balkin & Ramiro Montealegre - 2020 - California Management Review 62 (2).
    Many of us assume that all the free editing and sorting of online content we ordinarily rely on is carried out by AI algorithms — not human persons. Yet in fact, that is often not the case. This is because human workers remain cheaper, quicker, and more reliable than AI for performing myriad tasks where the right answer turns on ineffable contextual criteria too subtle for algorithms to yet decode. The output of this work is then used for machine learning (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  13. added 2020-01-13
    Big Data.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Odată cu creșterea volumului de date pe Internet, în media socială, cloud computing, dispozitive mobile și date guvernamentale, Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate. În fiecare zi, folosim și generăm tone de date, alimentând bazele de date ale agențiilor guvernamentale, companiilor private și chiar cetățenilor privați. Beneficiem în multe feluri de existența și utilizarea Big Data, dar trebuie să ne (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  14. added 2020-01-11
    Internet Privacy, Technology, and Personal Information.Marjorie S. Price - 2020 - Ethics and Information Technology 22 (2):163-173.
    Computer programs are used to obtain and store information about the online activities of users of the web. Many people are concerned about this practice because they believe that it can violate users' rights to privacy or result in violations of them. This belief is based on the assumption that the information obtained and stored with the use of the programs includes personal information. My main aim in this paper is to argue that this assumption is false. I discuss the (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. added 2020-01-11
    Privacy, Autonomy, and Personalised Targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2019 - In Carissa Véliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific individuals or (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. added 2020-01-11
    A Roadmap Towards Improving Managed Security Services From a Privacy Perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. added 2020-01-11
    Lockbox: Mobility, Privacy and Values in Cloud Storage. [REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
    This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18. added 2020-01-11
    Contextual Integrity’s Decision Heuristic and the Tracking by Social Network Sites.RathKanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.
    The findings of our experiments showed that social network sites such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19. added 2020-01-11
    The Internet, Children, and Privacy: The Case Against Parental Monitoring.Kay Mathiesen - 2013 - Ethics and Information Technology 15 (4):263-274.
    It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20. added 2020-01-11
    Anita Allen: Unpopular Privacy: What Must We Hide?: Oxford University Press, Oxford, New York, 2011, Xv + 259 Pp, ISBN: 978-0195141375. [REVIEW]Tony Doyle - 2013 - Ethics and Information Technology 15 (1):63-67.
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  21. added 2020-01-11
    Enacting Taboos as a Means to an End; but What End? On the Morality of Motivations for Child Murder and Paedophilia Within Gamespace.Garry Young - 2013 - Ethics and Information Technology 15 (1):13-23.
    Video games are currently available which permit the virtual murder of children. No such games are presently available which permit virtual paedophilia. Does this disparity reflect a morally justifiable position? Focusing solely on different player motivations, I contrast two version of a fictitious game—one permitting the virtual murder of children, the other virtual paedophilia—in order to establish whether the selective prohibition of one activity over the other can be morally justified based on player motivation alone. I conclude that it cannot, (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  22. added 2020-01-11
    Considering the Ethical Implications of Social Media in Social Work Education.Rana Duncan-Daston, Maude Hunter-Sloan & Elise Fullmer - 2013 - Ethics and Information Technology 15 (1):35-43.
    The ethical implications of the explosion of social media outlets for social work education are explored in this paper. Given that social work education has a dual focus, both of educating students and of socializing practitioners into the profession, the issue of the blurring between what is social and what is professional gains particular salience for both educators and students. Recommendations for educators to ethically address the need to maintain a consistent professional presence online and to avoid potentially harmful dual (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23. added 2020-01-11
    Ethics of Social Networks for Special Needs Users.Caroline Rizza & Ângela Guimarães Pereira - 2013 - Ethics and Information Technology 15 (4):249-251.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  24. added 2020-01-11
    Ethical Considerations in an Online Community: The Balancing Act. [REVIEW]Cecile Paris, Nathalie Colineau, Surya Nepal, Sanat Kumar Bista & Gina Beschorner - 2013 - Ethics and Information Technology 15 (4):301-316.
    With the emergence and rapid growth of Social Media, a number of government departments in several countries have embraced Social Media as a privilege channel to interact with their constituency. We are exploring, in collaboration with the Australian Department of Human Services, the possibility to exploit the potential of social networks to support specific groups of citizens. To this end, we have developed Next Step, an online community to help people currently receiving welfare payments find a job and become financially (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25. added 2020-01-11
    African Youths and the Dangers of Social Networking: A Culture-Centered Approach to Using Social Media.Philip Effiom Ephraim - 2013 - Ethics and Information Technology 15 (4):275-284.
    With rising numbers of Facebook, Twitter and MXit users, Africa is increasingly gaining prominence in the sphere of social networking. Social media is increasingly becoming main stream; serving as important tools for facilitating interpersonal communication, business and educational activities. Qualitative analyses of relevant secondary data show that children and youths aged between 13 and 30 constitute Africa’s heaviest users of social media. Media reports have revealed cases of abuse on social media by youths. Social networks have severally been used as (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. added 2020-01-11
    Who Cares? Practical Ethics and the Problem of Underage Users on Social Networking Sites.Brian O’Neill - 2013 - Ethics and Information Technology 15 (4):253-262.
    Internet companies place a high priority on the safety of their services and on their corporate social responsibility towards protection of all users, especially younger ones. However, such efforts are undermined by the large numbers of children who circumvent age restrictions and lie about their age to gain access to such platforms. This paper deals with the ethical issues that arise in this not-so-hypothetical situation. Who, for instance, bears responsibility for children’s welfare in this context? Are parents/carers ethically culpable in (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  27. added 2020-01-11
    Information Ethics in the Context of Smart Devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28. added 2020-01-11
    The Obstacles Against Reaching the Highest Level of Aristotelian Friendship Online.Robert Sharp - 2012 - Ethics and Information Technology 14 (3):231-239.
    The ubiquity of online social networks has led to the phenomena of having friends that are known only through online interaction. In many cases, no physical interaction has taken place, but still people consider each other friends. This paper analyzes whether these friendships would satisfy the conditions of Aristotle’s highest level of friendship–what he calls perfect friendship. Since perfect friendship manifests through a shared love of virtue, physical proximity would seem to be unnecessary at first glance. However, I argue that (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  29. added 2020-01-11
    How Shall I Compare Thee? Comparing the Prudential Value of Actual Virtual Friendship.Johnny Hartz Søraker - 2012 - Ethics and Information Technology 14 (3):209-219.
    It has become commonplace to hold the view that virtual surrogates for the things that are good in life are inferior to their actual, authentic counterparts, including virtual education, virtual skill-demanding activities and virtual acts of creativity. Virtual friendship has also been argued to be inferior to traditional, embodied forms of friendship. Coupled with the view that virtual friendships threaten to replace actual ones, the conclusion is often made that we ought to concentrate our efforts on actual friendships rather than (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  30. added 2020-01-11
    Why Virtual Friendship is No Genuine Friendship.Barbro Fröding & Martin Peterson - 2012 - Ethics and Information Technology 14 (3):201-207.
    Based on a modern reading of Aristotle’s theory of friendship, we argue that virtual friendship does not qualify as genuine friendship. By ‘virtual friendship’ we mean the type of friendship that exists on the internet, and seldom or never is combined with real life interaction. A ‘traditional friendship’ is, in contrast, the type of friendship that involves substantial real life interaction, and we claim that only this type can merit the label ‘genuine friendship’ and thus qualify as morally valuable. The (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  31. added 2020-01-11
    On Crimes and Punishments in Virtual Worlds: Bots, the Failure of Punishment and Players as Moral Entrepreneurs. [REVIEW]Stefano Paoli & Aphra Kerr - 2012 - Ethics and Information Technology 14 (2):73-87.
    This paper focuses on the role of punishment as a critical social mechanism for cheating prevention in MMORPGs. The role of punishment is empirically investigated in a case study of the MMORPG Tibia (Cipsoft 1997–2011 ) ( http://www.tibia.com ) and by focusing on the use of bots to cheat. We describe the failure of punishment in Tibia, which is perceived by players as one of the elements facilitating the proliferation of bots. In this process some players act as a moral (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  32. added 2020-01-11
    Information Technology and Privacy: Conceptual Muddles or Privacy Vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33. added 2020-01-11
    The Reality of Friendship Within Immersive Virtual Worlds.Nicholas John Munn - 2012 - Ethics and Information Technology 14 (1):1-10.
    In this article I examine a recent development in online communication, the immersive virtual worlds of Massively Multiplayer Online Role-Playing Games (MMORPGs). I argue that these environments provide a distinct form of online experience from the experience available through earlier generation forms of online communication such as newsgroups, chat rooms, email and instant messaging. The experience available to participants in MMORPGs is founded on shared activity, while the experience of earlier generation online communication is largely if not wholly dependent on (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  34. added 2020-01-11
    Theft of Virtual Items in Online Multiplayer Computer Games: An Ontological and Moral Analysis. [REVIEW]Litska Strikwerda - 2012 - Ethics and Information Technology 14 (2):89-97.
    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This legal question has both an ontological and a moral component. The question whether or not virtual items count as “objects” that can be “stolen” is an ontological question. The question whether or (...)
    Remove from this list   Direct download (12 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35. added 2020-01-11
    Flourishing on Facebook: Virtue Friendship & New Social Media.Shannon Vallor - 2012 - Ethics and Information Technology 14 (3):185-199.
    The widespread and growing use of new social media, especially social networking sites such as Facebook and Twitter, invites sustained ethical reflection on emerging forms of online friendship. Social scientists and psychologists are gathering a wealth of empirical data on these trends, yet philosophical analysis of their ethical implications remains comparatively impoverished. In particular, there have been few attempts to explore how traditional ethical theories might be brought to bear upon these developments, or what insights they might offer, if any. (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  36. added 2020-01-11
    On Crimes and Punishments in Virtual Worlds: Bots, the Failure of Punishment and Players as Moral Entrepreneurs.Stefano De Paoli & Aphra Kerr - 2012 - Ethics and Information Technology 14 (2):73-87.
    This paper focuses on the role of punishment as a critical social mechanism for cheating prevention in MMORPGs. The role of punishment is empirically investigated in a case study of the MMORPG Tibia and by focusing on the use of bots to cheat. We describe the failure of punishment in Tibia, which is perceived by players as one of the elements facilitating the proliferation of bots. In this process some players act as a moral enterprising group contributing to the reform (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  37. added 2020-01-11
    Challenges of Ethical and Legal Responsibilities When Technologies' Uses and Users Change: Social Networking Sites, Decision-Making Capacity and Dementia. [REVIEW]Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne - 2012 - Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38. added 2020-01-11
    The Role of Cloud Computing in Managing the Deluge of Potentially Private Genetic Data.Dov Greenbaum & Mark Gerstein - 2011 - American Journal of Bioethics 11 (11):39-41.
    The American Journal of Bioethics, Volume 11, Issue 11, Page 39-41, November 2011.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39. added 2020-01-11
    The Case for E-Trust.Mariarosaria Taddeo & Luciano Floridi - 2011 - Ethics and Information Technology 13 (1):1-3.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  40. added 2020-01-11
    Searching for Health: The Topography of the First Page. [REVIEW]Jill McTavish, Roma Harris & Nadine Wathen - 2011 - Ethics and Information Technology 13 (3):227-240.
    Members of the lay public are turning increasingly to the internet to answer health-related questions. Some authors suggest that the widespread availability of online health information has dislodged medical knowledge from its traditional institutional base and enabled a growing role for alternative or previously unrecognized health perspectives and ‘lay health expertise’. Others have argued, however, that the organization of information retrieved from influential search engines, particularly Google, has merely intensified mainstream perspectives because of the growing consolidation of the internet with (...)
    Remove from this list   Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  41. added 2020-01-11
    Rethinking Disability in Amartya Sen’s Approach: ICT and Equality of Opportunity. [REVIEW]Mario Toboso - 2011 - Ethics and Information Technology 13 (2):107-118.
    This article presents an analysis of the concept of disability in Amartya Sen’s capabilities and functionings approach in the context of Information and Communication Technologies (ICT). Following a critical review of the concept of disability—from its traditional interpretation as an essentially medical concept to its later interpretation as a socially constructed category—we will introduce the concept of functional diversity. The importance of human diversity in the capabilities and functionings approach calls for incorporating this concept into the analysis of well-being and (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  42. added 2020-01-11
    Studying the Ethical Implications of E-Trust in the Lab.Cristina Bicchieri & Azi Lev-On - 2011 - Ethics and Information Technology 13 (1):5-15.
    The paper presents results of recent laboratory experiments that study if and how computer-mediated communication affects cooperation and trust. It is argued that communication medium does not matter much for trust-building and maintenance, whereas relevant pre-play communication and group size can have a major influence. The implications of the findings for the design of sites that depend on trusting communities are discussed.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43. added 2020-01-11
    The Case of Online Trust.Matteo Turilli, Mariarosaria Taddeo & Antonino Vaccaro - 2010 - Knowledge, Technology & Policy 23 (3-4):333-345.
    This paper contributes to the debate on online trust addressing the problem of whether an online environment satisfies the necessary conditions for the emergence of trust. The paper defends the thesis that online environments can foster trust, and it does so in three steps. Firstly, the arguments proposed by the detractors of online trust are presented and analysed. Secondly, it is argued that trust can emerge in uncertain and risky environments and that it is possible to trust online identities when (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  44. added 2020-01-11
    PAPA Knows Best: Principles for the Ethical Sharing of Information on Social Networking Sites. [REVIEW]James L. Parrish - 2010 - Ethics and Information Technology 12 (2):187-193.
    The advent of social networking sites has changed the face of the information society Mason wrote of 23 years ago necessitating a reevaluation of the social contracts designed to protect the members of the society. Despite the technological and societal changes that have happened over the years, the information society is still based on the exchange of information. This paper examines various historical events involving social networking sites through the lens of the PAPA framework (Mason 1986 ) to highlight select (...)
    Remove from this list   Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  45. added 2020-01-11
    Defending the Morality of Violent Video Games.Marcus Schulzke - 2010 - Ethics and Information Technology 12 (2):127-138.
    The effect of violent video games is among the most widely discussed topics in media studies, and for good reason. These games are immensely popular, but many seem morally objectionable. Critics attack them for a number of reasons ranging from their capacity to teach players weapons skills to their ability to directly cause violent actions. This essay shows that many of these criticisms are misguided. Theoretical and empirical arguments against violent video games often suffer from a number of significant shortcomings (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  46. added 2020-01-11
    Moral Luck and Computer Ethics: Gauguin in Cyberspace. [REVIEW]David Sanford Horner - 2010 - Ethics and Information Technology 12 (4):299-312.
    Issue Title: Moral Luck, Social Networking Sites, and Trust on the Web I argue that the problem of 'moral luck' is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its 'logical malleability', leads to ever greater levels of complexity, unreliability and uncertainty. The ever widening contexts of application in turn lead to greater scope for the operation of chance and the phenomenon of moral luck. Moral luck bears down most heavily (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  47. added 2020-01-11
    What Should We Share?: Understanding the Aim of Intercultural Information Ethics.Pak-Hang Wong - 2009 - Acm Sigcas Computers and Society 39 (3):50-58.
    The aim of Intercultural Information Ethics (IIE), as Ess aptly puts, is to “(a) address both local and global issues evoked by ICTs / CMC, etc., (b) in a ways that both sustain local traditions / values / preference, etc. and (c) provide shared, (quasi-) universal responses to central ethical problems” (Ess 2007a, 102). This formulation of the aim of IIE, however, is not unambiguous. In this paper, I will discuss two different understandings of the aim of IIE, one of (...)
    Remove from this list   Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  48. added 2020-01-11
    Can Anybody Hear Us? Taiwan and Internet.Philippe Ricaud - 2009 - Hermès: La Revue Cognition, communication, politique 55 (3):141 - +.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  49. added 2020-01-11
    A Critical Evaluation of Information Security Risks Associated with Networked Information Systems: A Case Study of Beitbridge Town Council.Newten Mujena - unknown
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  50. added 2020-01-11
    Online Diaries: Reflections on Trust, Privacy, and Exhibitionism. [REVIEW]Paul B. de Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
    Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their (...)
    Remove from this list   Direct download (10 more)  
     
    Export citation  
     
    Bookmark   10 citations  
1 — 50 / 221