About this topic
Summary The Internet is a complex socio-technical system where various moral issues arise as humans interact with online technologies through interfaces, algorithms and hardware design. Internet ethics investigates ethical and societal aspects related to information and communication technologies – specifically the Internet – which arise at the interaction between users, designers, online service providers and policy. Some central topics include privacy, surveillance, personalisation, autonomy, nudging, well-being, disinformation and misinformation, filter bubbles, echo chambers online, bullying and harassment online. 
Key works Floridi 2010
Related categories

250 found
Order:
1 — 50 / 250
  1. Self-Trust and Critical Thinking Online: A Relational Account.Lavinia Marin & Samantha M. Copeland - manuscript
    An increasingly popular solution to the anti-scientific climate rising on social media platforms has been the appeal to more critical thinking from the user's side. In this paper, we zoom in on the ideal of critical thinking and unpack it in order to see, specifically, whether it can provide enough epistemic agency so that users endowed with it can break free from enclosed communities on social media (so called epistemic bubbles). We criticise some assumptions embedded in the ideal of critical (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  2. Ethical Pitfalls for Natural Language Processing in Psychology.Mark Alfano, Emily Sullivan & Amir Ebrahimi Fard - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    Knowledge is power. Knowledge about human psychology is increasingly being produced using natural language processing (NLP) and related techniques. The power that accompanies and harnesses this knowledge should be subject to ethical controls and oversight. In this chapter, we address the ethical pitfalls that are likely to be encountered in the context of such research. These pitfalls occur at various stages of the NLP pipeline, including data acquisition, enrichment, analysis, storage, and sharing. We also address secondary uses of the results (...)
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  3. The Missing Ingredient in the Case for Regulating Big Tech.Bartek Chomanski - forthcoming - Minds and Machines.
    Having been involved in a slew of recent scandals, many of the world’s largest technology companies (“Big Tech,” “Digital Titans”) embarked on devising numerous codes of ethics, intended to promote improved standards in the conduct of their business. These efforts have attracted largely critical interdisciplinary academic attention. The critics have identified the voluntary character of the industry ethics codes as among the main obstacles to their efficacy. This is because individual industry leaders and employees, flawed human beings that they are, (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. The Ethics of Matching: Mobile and Web-Based Dating and Hook Up Platforms.Michal Klincewicz, Lily E. Frank & Emma Jane - forthcoming - In Brian D. Earp, Clare Chambers & Lori Watson (eds.), Routledge Handbook of Philosophy of Sex and Sexuality. Routledge.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  5. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  6. Deepfakes, Deep Harms.Regina Rini & Leah Cohen - forthcoming - Journal of Ethics and Social Philosophy.
    Deepfakes are algorithmically modified video and audio recordings that project one person’s appearance on to that of another, creating an apparent recording of an event that never took place. Many scholars and journalists have begun attending to the political risks of deepfake deception. Here we investigate other ways in which deepfakes have the potential to cause deeper harms than have been appreciated. First, we consider a form of objectification, virtual domination, that occurs when deepfaked ‘frankenporn’ digitally fuses the parts of (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  7. Corporatised Identities ≠ Digital Identities: Algorithmic Filtering on Social Media and the Commercialisation of Presentations of Self.Charlie Harry Smith - forthcoming - In Christopher Burr & Luciano Floridi (eds.), Ethics of Digital Well-being: A Multidisciplinary Approach. Springer.
    Goffman’s (1959) dramaturgical identity theory requires modification when theorising about presentations of self on social media. This chapter contributes to these efforts, refining a conception of digital identities by differentiating them from ‘corporatised identities’. Armed with this new distinction, I ultimately argue that social media platforms’ production of corporatised identities undermines their users’ autonomy and digital well-being. This follows from the disentanglement of several commonly conflated concepts. Firstly, I distinguish two kinds of presentation of self that I collectively refer to (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Hey, Google, leave those kids alone: Against hypernudging children in the age of big data.James Smith & Tanya de Villiers-Botha - forthcoming - AI and Society:1-11.
    Children continue to be overlooked as a topic of concern in discussions around the ethical use of people’s data and information. Where children are the subject of such discussions, the focus is often primarily on privacy concerns and consent relating to the use of their data. This paper highlights the unique challenges children face when it comes to online interferences with their decision-making, primarily due to their vulnerability, impressionability, the increased likelihood of disclosing personal information online, and their developmental capacities. (...)
    Remove from this list   Direct download (3 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  9. Online Misinformation and “Phantom Patterns”: Epistemic Exploitation in the Era of Big Data.Megan Fritts & Frank Cabrera - 2022 - Southern Journal of Philosophy 60 (1):57-87.
    In this paper, we examine how the availability of massive quantities of data i.e., the “Big Data” phenomenon, contributes to the creation, spread, and harms of online misinformation. Specifically, we argue that a factor in the problem of online misinformation is the evolved human instinct to recognize patterns. While the pattern-recognition instinct is a crucial evolutionary adaptation, we argue that in the age of Big Data, these capacities have, unfortunately, rendered us vulnerable. Given the ways in which online media outlets (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  10. Augmented Reality, Augmented Epistemology, and the Real-World Web.Cody Turner - 2022 - Philosophy and Technology 35 (1):1-28.
    Augmented reality (AR) technologies function to ‘augment’ normal perception by superimposing virtual objects onto an agent’s visual field. The philosophy of augmented reality is a small but growing subfield within the philosophy of technology. Existing work in this subfield includes research on the phenomenology of augmented experiences, the metaphysics of virtual objects, and different ethical issues associated with AR systems, including (but not limited to) issues of privacy, property rights, ownership, trust, and informed consent. This paper addresses some epistemological issues (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  11. Disoriented and Alone in the “Experience Machine” - On Netflix, Shared World Deceptions and the Consequences of Deepening Algorithmic Personalization.Maria Brincker - 2021 - SATS 22 (1):75-96.
    Most online platforms are becoming increasingly algorithmically personalized. The question is if these practices are simply satisfying users preferences or if something is lost in this process. This article focuses on how to reconcile the personalization with the importance of being able to share cultural objects - including fiction – with others. In analyzing two concrete personalization examples from the streaming giant Netflix, several tendencies are observed. One is to isolate users and sometimes entirely eliminate shared world aspects. Another tendency (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12. Sharing (Mis) Information on Social Networking Sites. An Exploration of the Norms for Distributing Content Authored by Others.Lavinia Marin - 2021 - Ethics and Information Technology 23 (3):363-372.
    This article explores the norms that govern regular users’ acts of sharing content on social networking sites. Many debates on how to counteract misinformation on Social Networking Sites focus on the epistemic norms of testimony, implicitly assuming that the users’ acts of sharing should fall under the same norms as those for posting original content. I challenge this assumption by proposing a non-epistemic interpretation of information sharing on social networking sites which I construe as infrastructures for forms of life found (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13. A Digital Picture to Hold Us Captive? A Flusserian Interpretation of Misinformation Sharing on Social Media.Lavinia Marin - 2021 - Philosophy Today 65 (3):485–504.
    In this article I investigate online misinformation from a media philosophy perspective. I, thus move away from the debate focused on the semantic content, concerned with what is true or not about misinformation. I argue rather that online misinformation is the effect of an informational climate promoted by user micro-behaviours such as liking, sharing, and posting. Misinformation online is explained as the effect of an informational environment saturated with and shaped by techno-images in which most users act automatically under the (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14. Retweeting: Its Linguistic and Epistemic Value.Neri Marsili - 2021 - Synthese 198:10457–10483.
    This paper analyses the communicative and epistemic value of retweeting (and more generally of reposting content on social media). Against a naïve view, it argues that retweets are not acts of endorsement, motivating this diagnosis with linguistic data. Retweeting is instead modelled as a peculiar form of quotation, in which the reported content is indicated rather than reproduced. A relevance-theoretic account of the communicative import of retweeting is then developed, to spell out the complex mechanisms by which retweets achieve their (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Why Online Personalized Pricing is Unfair.Jeffrey Moriarty - 2021 - Ethics and Information Technology 23 (3):495-503.
    Online retailers are using advances in data collection and computing technologies to “personalize” prices, i.e., offer goods for sale to shoppers at their reservation prices, or the highest price they are willing to pay. In this paper, I offer a criticism of this practice. I begin by putting online personalized pricing in context. It is not something entirely new, but rather a kind of price discrimination, a familiar pricing practice. I then offer a fairness-based argument against it. When an online (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Weaponized Skepticism: An Analysis of Social Media Deception as Applied Political Epistemology.Regina Rini - 2021 - In Elizabeth Edenburg & Michael Hannon (eds.), Political Epistemology. Oxford: Oxford University Press. pp. 31-48.
    Since at least 2016, many have worried that social media enables authoritarians to meddle in democratic politics. The concern is that trolls and bots amplify deceptive content. In this chapter I argue that these tactics have a more insidious anti-democratic purpose. Lies implanted in democratic discourse by authoritarians are often intended to be caught. Their primary goal is not to successfully deceive, but rather to undermine the democratic value of testimony. In well-functioning democracies, our mutual reliance on testimony also generates (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  17. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Algorithms & Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press: Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18. The Ethics of Quitting Social Media.Robert Mark Simpson - 2021 - In Carissa Véliz (ed.), The Oxford Handbook of Digital Ethics. Oxford, UK:
    There are prima facie ethical reasons and prudential reasons for people to avoid or withdraw from social media platforms. But in response to pushes for people to quit social media, a number of authors have argued that there is something ethically questionable about quitting social media: that it involves — typically, if not necessarily — an objectionable expression of privilege on the part of the quitter. In this paper I contextualise privilege-based objections to quitting social media and explain the underlying (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19. Surveillance Capitalism: A Marx-Inspired Account.Nikhil Venkatesh - 2021 - Philosophy 96 (3):359-385..
    Some of the world's most powerful corporations practise what Shoshana Zuboff (2015; 2019) calls ‘surveillance capitalism’. The core of their business is harvesting, analysing and selling data about the people who use their products. In Zuboff's view, the first corporation to engage in surveillance capitalism was Google, followed by Facebook; recently, firms such as Microsoft and Amazon have pivoted towards such a model. In this paper, I suggest that Karl Marx's analysis of the relations between industrial capitalists and workers is (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Where the Stakeholders Are: Tapping Into Social Media During Value-Sensitive Design Research.Annuska Zolyomi - 2021 - Ethics and Information Technology 23 (1):59-62.
    Social media use is pervasive and demographically diverse; thus, researchers can investigate the social media behavior of a target population to extract its values as expressed in a web-based network. This article posits that social media is a relatively untapped resource for researchers engaged in value sensitive design. It proposes methods and ethical considerations for researchers during value sensitive design conceptual, technical, and empirical investigations.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Technologically scaffolded atypical cognition: The case of YouTube’s recommender system.Mark Alfano, Amir Ebrahimi Fard, J. Adam Carter, Peter Clutton & Colin Klein - 2020 - Synthese (1-2):1-24.
    YouTube has been implicated in the transformation of users into extremists and conspiracy theorists. The alleged mechanism for this radicalizing process is YouTube’s recommender system, which is optimized to amplify and promote clips that users are likely to watch through to the end. YouTube optimizes for watch-through for economic reasons: people who watch a video through to the end are likely to then watch the next recommended video as well, which means that more advertisements can be served to them. This (...)
    Remove from this list   Direct download (5 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   8 citations  
  22. Edward Snowden: Permanent Record: Metropolitan Books, Henry Holt and Company, New York, 2019, Pp. 340, ISBN 978-1250237231.Patrick D. Anderson - 2020 - Ethics and Information Technology 22 (2):129-132.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Video Games, Violence, and the Ethics of Fantasy: Killing Time.Christopher Bartel - 2020 - London: Bloomsbury Academic.
    Is it ever morally wrong to enjoy fantasizing about immoral things? Many video games allow players to commit numerous violent and immoral acts. But, should players worry about the morality of their virtual actions? A common argument is that games offer merely the virtual representation of violence. No one is actually harmed by committing a violent act in a game. So, it cannot be morally wrong to perform such acts. While this is an intuitive argument, it does not resolve the (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Genealogy of Algorithms: Datafication as Transvaluation.Virgil W. Brower - 2020 - le Foucaldien 6 (1):1-43.
    This article investigates religious ideals persistent in the datafication of information society. Its nodal point is Thomas Bayes, after whom Laplace names the primal probability algorithm. It reconsiders their mathematical innovations with Laplace's providential deism and Bayes' singular theological treatise. Conceptions of divine justice one finds among probability theorists play no small part in the algorithmic data-mining and microtargeting of Cambridge Analytica. Theological traces within mathematical computation are emphasized as the vantage over large numbers shifts to weights beyond enumeration in (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Fair Trade in Building Digital Knowledge Repositories: The Knowledge Economy as If Researchers Mattered.Giovanni De Grandis - 2020 - Medicine, Health Care and Philosophy 23 (4):549-563.
    Both a significant body of literature and the case study presented here show that digital knowledge repositories struggle to attract the needed level of data and knowledge contribution that they need to be successful. This happens also to high profile and prestigious initiatives. The paper argues that the reluctance of researchers to contribute can only be understood in light of the highly competitive context in which research careers need to be built nowadays and how this affects researchers’ quality of life. (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Digital Platforms and Responsible Innovation: Expanding Value Sensitive Design to Overcome Ontological Uncertainty.Mark de Reuver, Aimee van Wynsberghe, Marijn Janssen & Ibo van de Poel - 2020 - Ethics and Information Technology 22 (3):257-267.
    In this paper, we argue that the characteristics of digital platforms challenge the fundamental assumptions of value sensitive design. Traditionally, VSD methods assume that we can identify relevant values during the design phase of new technologies. The underlying assumption is that there is only epistemic uncertainty about which values will be impacted by a technology. VSD methods suggest that one can predict which values will be affected by new technologies by increasing knowledge about how values are interpreted or understood in (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Kevin Macnish: The Ethics of Surveillance: An Introduction: Routledge, London and New York, 2018, ISBN 978-1138643796, $45.95.Tony Doyle - 2020 - Ethics and Information Technology 22 (1):39-42.
  28. Children's Health in the Digital Age.Birgitta Dresp-Langley - 2020 - International Journal of Environmental Research and Public Health 9 (17):299..
    Can we identify potential long-term consequences of digitalisation on public health? Environmental studies, metabolic research, and state of the art research in neurobiology point towards the reduced amount of natural day and sunlight exposure of the developing child, as a consequence of increasingly long hours spent indoors online, as the single unifying source of a whole set of health risks identified worldwide, as is made clear in this review of currently available literature. Over exposure to digital environments, from abuse to (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. A Ghost Workers' Bill of Rights: How to Establish a Fair and Safe Gig Work Platform.Julian Friedland, David Balkin & Ramiro Montealegre - 2020 - California Management Review 62 (2).
    Many of us assume that all the free editing and sorting of online content we ordinarily rely on is carried out by AI algorithms — not human persons. Yet in fact, that is often not the case. This is because human workers remain cheaper, quicker, and more reliable than AI for performing myriad tasks where the right answer turns on ineffable contextual criteria too subtle for algorithms to yet decode. The output of this work is then used for machine learning (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. The Future of Value Sensitive Design.Batya Friedman, David Hendry, Steven Umbrello, Jeroen Van Den Hoven & Daisy Yoo - 2020 - Paradigm Shifts in ICT Ethics: Proceedings of the 18th International Conference ETHICOMP 2020.
    In this panel, we explore the future of value sensitive design (VSD). The stakes are high. Many in public and private sectors and in civil society are gradually realizing that taking our values seriously implies that we have to ensure that values effectively inform the design of technology which, in turn, shapes people’s lives. Value sensitive design offers a highly developed set of theory, tools, and methods to systematically do so.
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31. Splintering the Gamer’s Dilemma: Moral Intuitions, Motivational Assumptions, and Action Prototypes.Jens Kjeldgaard-Christiansen - 2020 - Ethics and Information Technology 22 (1):93-102.
    The gamer’s dilemma :31–36, 2009) asks whether any ethical features distinguish virtual pedophilia, which is generally considered impermissible, from virtual murder, which is generally considered permissible. If not, this equivalence seems to force one of two conclusions: either both virtual pedophilia and virtual murder are permissible, or both virtual pedophilia and virtual murder are impermissible. In this article, I attempt, first, to explain the psychological basis of the dilemma. I argue that the two different action types picked out by “virtual (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Excavating “Excavating AI”: The Elephant in the Gallery.Michael J. Lyons - 2020 - arXiv 2009:1-15.
    Two art exhibitions, “Training Humans” and “Making Faces,” and the accompanying essay “Excavating AI: The politics of images in machine learning training sets” by Kate Crawford and Trevor Paglen, are making substantial impact on discourse taking place in the social and mass media networks, and some scholarly circles. Critical scrutiny reveals, however, a self-contradictory stance regarding informed consent for the use of facial images, as well as serious flaws in their critique of ML training sets. Our analysis underlines the non-negotiability (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Three Contextual Dimensions of Information on Social Media: Lessons Learned From the COVID-19 Infodemic.Lavinia Marin - 2020 - Ethics and Information Technology.
    The COVID-19 pandemic has been accompanied on social media by an explosion of information disorders such as inaccurate, misleading and irrelevant information. Countermeasures adopted thus far to curb these informational disorders have had limited success because these did not account for the diversity of informational contexts on social media, focusing instead almost exclusively on curating the factual content of user’s posts. However, content-focused measures do not address the primary causes of the infodemic itself, namely the user’s need to post content (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Emotions and Digital Well-Being. The Rationalistic Bias of Social Media Design in Online Deliberations.Lavinia Marin & Sabine Roeser - 2020 - In Christopher Burr & Luciano Floridi (eds.), Ethics of Digital Well-being: A Multidisciplinary Approach. Cham: Springer. pp. 139-150.
    In this chapter we argue that emotions are mediated in an incomplete way in online social media because of the heavy reliance on textual messages which fosters a rationalistic bias and an inclination towards less nuanced emotional expressions. This incompleteness can happen either by obscuring emotions, showing less than the original intensity, misinterpreting emotions, or eliciting emotions without feedback and context. Online interactions and deliberations tend to contribute rather than overcome stalemates and informational bubbles, partially due to prevalence of anti-social (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Echo Chambers and Epistemic Bubbles.C. Thi Nguyen - 2020 - Episteme 17 (2):141-161.
    Recent conversation has blurred two very different social epistemic phenomena: echo chambers and epistemic bubbles. Members of epistemic bubbles merely lack exposure to relevant information and arguments. Members of echo chambers, on the other hand, have been brought to systematically distrust all outside sources. In epistemic bubbles, other voices are not heard; in echo chambers, other voices are actively undermined. It is crucial to keep these phenomena distinct. First, echo chambers can explain the post-truth phenomena in a way that epistemic (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark   80 citations  
  36. Introducing the Pervert’s Dilemma: A Contribution to the Critique of Deepfake Pornography.Carl Öhman - 2020 - Ethics and Information Technology 22 (2):133-140.
    Recent technological innovation has made video doctoring increasingly accessible. This has given rise to Deepfake Pornography, an emerging phenomenon in which Deep Learning algorithms are used to superimpose a person’s face onto a pornographic video. Although to most people, Deepfake Pornography is intuitively unethical, it seems difficult to justify this intuition without simultaneously condemning other actions that we do not ordinarily find morally objectionable, such as sexual fantasies. In the present article, I refer to this contradiction as the pervert’s dilemma. (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Internet Privacy, Technology, and Personal Information.Marjorie S. Price - 2020 - Ethics and Information Technology 22 (2):163-173.
    Computer programs are used to obtain and store information about the online activities of users of the web. Many people are concerned about this practice because they believe that it can violate users' rights to privacy or result in violations of them. This belief is based on the assumption that the information obtained and stored with the use of the programs includes personal information. My main aim in this paper is to argue that this assumption is false. I discuss the (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38. The Human Right to Free Internet Access.Merten Reglitz - 2020 - Journal of Applied Philosophy 37 (2): 314-331.
    In 2016, the United Nation’s General Assembly adopted a non-binding resolution regarding ‘The Promotion, Protection and Enjoyment of Human Rights on the Internet’. At the heart of this resolution is the UN’s concern that ‘rights that people have offline must also be protected online.’ While the UN thus recognises the importance of the Internet, it does so problematically selectively by focusing on protecting existing offline rights online. I argue instead that Internet access is itself a moral human right that requires (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. L’éthique des mégadonnées (Big Data) en recherche.Nicolae Sfetcu - 2020 - Drobeta Turnu Severin: MultiMedia Publishing.
    Les principaux problèmes rencontrés par les scientifiques qui travaillent avec des ensembles de données massives (mégadonnées, Big Data), en soulignant les principaux problèmes éthiques, tout en tenant compte de la législation de l'Union européenne. Après une brève Introduction au Big Data, la section Technologie présente les applications spécifiques de la recherche. Il suit une approche des principales questions philosophiques spécifiques dans Aspects philosophiques, et Aspects juridiques en soulignant les problèmes éthiques spécifiques du règlement de l'UE sur la protection des données (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  40. Quarantining Online Hate Speech: Technical and Ethical Perspectives.Stefanie Ullmann & Marcus Tomalin - 2020 - Ethics and Information Technology 22 (1):69-80.
    In this paper we explore quarantining as a more ethical method for delimiting the spread of Hate Speech via online social media platforms. Currently, companies like Facebook, Twitter, and Google generally respond reactively to such material: offensive messages that have already been posted are reviewed by human moderators if complaints from users are received. The offensive posts are only subsequently removed if the complaints are upheld; therefore, they still cause the recipients psychological harm. In addition, this approach has frequently been (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. The world is a big network. Pandemic, the Internet and institutions.Constantin Vica - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):136-161.
    2020 is the year of the first pandemic lived through the Internet. More than half of the world population is now online and because of self-isolation, our moral and social lives unfold almost exclusively online. Two pressing questions arise in this context: how much can we rely on the Internet, as a set of technologies, and how much should we trust online platforms and applications? In order to answer these two questions, I develop an argument based on two fundamental assumptions: (...)
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  42. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its use. We will (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Political Correctness Gone Viral.Waleed Aly & Robert Mark Simpson - 2019 - In Carl Fox & Joe Saunders (eds.), Media Ethics, Free Speech, and the Requirements of Democracy. London: pp. 125-143.
    Communicative practices in online and social media sometimes seem to amplify political conflict, and result in significant harms to people who become the targets of collective outrage. Many complaints that have been made about political correctness in the past, we argue, amount to little more than a veiled expression of resentment over the increasing influence enjoyed by progressive activists. But some complaints about political correctness take on a different complexion, in light of the technologically-driven changes to our communicative practices and (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Privacy in the Digital Age: Comparing and Contrasting Individual Versus Social Approaches Towards Privacy.Marcel Becker - 2019 - Ethics and Information Technology 21 (4):307-317.
    This paper takes as a starting point a recent development in privacy-debates: the emphasis on social and institutional environments in the definition and the defence of privacy. Recognizing the merits of this approach I supplement it in two respects. First, an analysis of the relation between privacy and autonomy teaches that in the digital age more than ever individual autonomy is threatened. The striking contrast between on the one hand offline vocabulary, where autonomy and individual decision making prevail, and on (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Ethics of Identity in the Time of Big Data.James Brusseau - 2019 - First Monday 24 (5-6):00-11.
    Compartmentalizing our distinct personal identities is increasingly difficult in big data reality. Pictures of the person we were on past vacations resurface in employers’ Google searches; LinkedIn which exhibits our income level is increasingly used as a dating web site. Whether on vacation, at work, or seeking romance, our digital selves stream together. One result is that a perennial ethical question about personal identity has spilled out of philosophy departments and into the real world. Ought we possess one, unified identity (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Planning for Ethical Agent-Agent Interaction.Jesse David Dinneen - 2019 - Good Systems: Ethical AI for CSCW, Workshop at CSCW '19: ACM SIGCHI Conference on Computer-Supported Cooperative Work.
    In this position paper for the 2019 CSCW workshop Good Systems: Ethical AI for CSCW I propose one tool and one idea for navigating the complex ethical problem space that results from the interaction of human and/or AI agents in shared, hopefully cooperative, computing environments.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  48. Big Data.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Odată cu creșterea volumului de date pe Internet, în media socială, cloud computing, dispozitive mobile și date guvernamentale, Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate. În fiecare zi, folosim și generăm tone de date, alimentând bazele de date ale agențiilor guvernamentale, companiilor private și chiar cetățenilor privați. Beneficiem în multe feluri de existența și utilizarea Big Data, dar trebuie să ne (...)
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  49. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’T.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  50. Mind the Gap! How the Digital Turn Upsets Intellectual Property.Constantin Vică & Emanuel-Mihail Socaciu - 2019 - Science and Engineering Ethics 25 (1):247-264.
    Intellectual property is one of the highly divisive issues in contemporary philosophical and political debates. The main objective of this paper is to explore some sources of tension between the formal rules of intellectual property (particularly copyright and patents) and the emerging informal norms of file sharing and open access in online environments. We look into the file sharing phenomena not only to illustrate the deepening gap between the two sets of norms, but to cast some doubt on the current (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 250