One of the most fascinating entries in Samuel Pepys diaries, from the 13th May 1665, recounts his experience of having been gifted a new pocket watch:To the ‘Change after office, and received my watch from the watchmaker, and a very fine [one] it is, given me by Briggs, the Scrivener… But, Lord! to see how much of my old folly and childishnesse hangs upon me still that I cannot forbear carrying my watch in my hand in the coach all this (...) afternoon, and seeing what o’clock it is one hundred times; and am apt to think with myself, how could I be so long without one; though I remember since, I had one, and found it a trouble, and resolved to carry one no more about me while I lived.Pepys’ excitement at being able to ‘see what o’clock it is’ might strike us as a very antiquated kind of thrill, but his account of the ‘trouble’ that follows from the distraction of being able to do so will most likely resonate with anyone with a smart phone. Like Pepys, many of us are familiar with the experience of carrying a small object around in our pocket with the capacity to distract and amuse. Many smart phone owners (myself included) may well have, like Pepys, ‘resolved to carry it no more about’ us—although (at least in my experience) such resolve inevitably breaks. (shrink)
The processes of computation and automation that produce digitized objects have displaced the concept of an image once conceived through optical devices such as a photographic plate or a camera mirror that were invented to accommodate the human eye. Computational images exist as information within networks mediated by machines. They are increasingly less about what art history understands as representation or photography considers indexing and more an operational product of data processing. Through genealogical, theoretical, and practice-based investigation, this dissertation project (...) traces a lineage of computation through images from early cybernetics to contemporary machine learning under algorithmic capitalist conditions of political economy. Objects include mundane examples such as smartphone cameras to sublime examples such as the imaging of black holes. It articulates new conditions and forms of perception and surveillance that result from contemporary technological development in computation. The project builds on theorists of computational media such as Friedrich Kittler, Wendy Hui Kyong Chun, Jussi Parikka, Shane Denson, and Alexander Galloway to examine the interplay between perception, computation, and epistemology. Further theoretical contribution builds on the work of Luciana Parisi and Jacques Ranciére’s articulation of aesthetics, and Michel Foucault’s gesture towards a heterotopia. Finally, it draws from Donna Haraway’s metaphors of the cyborg and sympoiesis to frame the capacity of art to transfigure the limitations of digital network culture into new possibilities for being. Here, it curates practices by Danielle Brathwaite-Shirley, Harun Farocki, Morehshin Allahyari, and Pierre Huyghe. (shrink)
This Open Access book explains the philosophy, design principles, and community organization of Decidim and provides essential insights into how the platform works. Decidim is the world leading digital infrastructure for participatory democracy, built entirely and collaboratively as free software, and used by more than 500 institutions with over three million users worldwide. -/- The platform allows any organization (government, association, university, NGO, neighbourhood, or cooperative) to support multitudinous processes of participatory democracy. In a context dominated by corporate-owned digital platforms, (...) in the era of increasing social structuring via Artificial Intelligence, Decidim stands as a public or community owned platform for collective human intelligence. Yet, the project is much more than its technological features. Decidim is in itself a crossroad of the various dimensions of the networked society, a detailed practical map of its complexities and conflicts. Theauthors distinguish three general dimensions of the project: (1) the political - shedding light on the democratic model that Decidim promotes and its impact on public policies and organizations, (2) the technopolitical - explaining how this technology is democratically designed and managed to produce and protect certain political effects, and (3) the technical - presenting the conditions of production, operation, and success of the project. This book systematically covers those three levels in an academically sound, technologically consistent, and politically innovative manner. Serving as a useful resource and handbook for the use of Decidim, it will not only appeal to students and scholars interested in participatory and digital democracy but also to professionals, policy-makers, and a wider audience interested in learning more about the Decidim platform. (shrink)
The last few years have seen the development of a new line of research around the relationship between digital platforms and activism. The influence of the internet and social media on the civic and political engagement of young people in particular has become clear. Digital platforms perform in this regard a set of functions crucial to activism in terms of communication, mobilization, and logistics. These are indispensable tools, especially to young people belonging to informal structures. Digital platforms have also been (...) shown to facilitate emotional and solidarity networks thus fostering a sense of community and a strengthening of collective identities. In this article we aim at examining this aspect based on in-depth interviews with young activists conducted in Portugal during a three-year project (2020–2022). We have concluded that, especially in certain activism contexts involving social groups of neglected or non-normative identities, digital platforms function as a crucial empowerment tool. These are linked to the emotional support for and recognition of the identities of these young people, incentivizing the creation of fields of political and social intervention. (shrink)
"Merten Reglitz makes a case for a new human right to free Internet access, arguing it is crucial for protecting and advancing fundamental moral interests. He examines the risks the Internet poses to our most important rights if it is not safeguarded by public institutions"--.
BARBA-KAY, Antón. A Web of Our Own Making: The Nature of Digital Formation. Cambridge: Cambridge University Press, 2023. x + 295 pp. Cloth, $29.99—This is a truly remarkable book, brimming with extensive research, penetrating insight, and poetic beauty. The book’s main theme is the cultural revolution caused by digital technology. As the book shows, we have always been shaped by our tools. With new ways of doing come new ways of being human. In this way, the digital revolution is continuous (...) with previous technological revolutions. But Barba-Kay argues that digital technology also represents a new, perhaps even final, stage in the history of technology. What makes digital technology so powerful—and so dangerous—is that it is a natural technology. (shrink)
Diffusion of responsibility is a well-known effect widely studied in a real-life setting. It can occur in a situation in which the more people observe a crisis event, the less likely it is that someone will react and provide real assistance. These days of a galloping digital revolution a question is to be raised as to whether the same effect can be observed in the online space of communication. In order to investigate this phenomenon we designed a study aimed at (...) testing whether people exposed to a situation of cyberbullying will decide to take action against it depending on how many other Internet users are also aware of that crisis. Results obtained by us confirmed the existence of the diffusion of responsibility in the Internet similar to that observed in our daily lives. We also confirmed that a well-known influence technique “Even a penny will help” (in our study “every reaction will help”) can be effectively used to model behaviour online. In our times of digital revolution, those outcomes can be a step both toward understanding human behaviour in the online setting, showing us that it is not that different from the one presented in real live face-to-face communication and toward helping deal with antisocial behaviour people face online on a daily basis. (shrink)
The prestige of an academic institution may be determined as a function of affiliations with other academic institutions. Using digital tools to data-scrape, data-mine, and perform network analysis on university websites, an approximation of numbers of academic affiliations may be measured. Especially observing the alma mater institutions of the faculty of employed institutions, these numbers show the relative employment of alumni and a proxy metric for the relative prestige of their degree-granting institutions. These affiliations can be charted and graphed to (...) determine the distributions of affiliations throughout an academic ecosystem from which we might draw conclusions about that system’s hierarchies and inequalities. Here we use anglophone PhD-granting philosophy departments as a case study for this methodology with tentative conclusions. (shrink)
During the Covid-19 pandemic, a considerable amount of people seem to have been lured into believing in conspiracy theories. These people deliberately disregard expert advice by virologists and physicians concerning social behaviour that is aimed at reducing the number of new infections. Disregarding traditional experts and their advice is just one example of what, in the philosophy of science, is referred to as a crisis of expertise – the phenomenon whereby people seem to have lost their trust in traditional expert (...) advice and are looking for alternatives. In the following paper, the trend to use Internet technology as an epistemic alternative will be analysed in detail by investigating the question of whether the Internet really allows people to become epistemically more autonomous. The focus will be on the epistemic and moral vulnerability of people resorting to new media tools instead of relying on traditional expert opinion. It will be shown that some important presuppositions about the Internet and, in particular, social media tools as alternative ways to collect information and find emotional support in a group of like-minded people cannot be maintained. (shrink)
The internet is a major part of our lives today. This applies to politics as well, and accordingly, the question of whether it is possible to realize democracy on the internet has arisen. Using the arguments of Hannah Arendt, the paper aims to determine what online democracy should look like. It is argued that the internet's decentralized structure is advantageous because it facilitates the implementation of the Arendtian system of political councils. Due to the character of online political platforms – (...) mainly social media – these political councils should ideally revolve around shared issues that simultaneously create the common world on the internet. At the same time, clear rules need to be laid down for the functioning of these online political councils. Based on Arendt's arguments, it is claimed in the paper that these rules include the principles of mutual promises and covenants on the issues themselves. It is also argued that because Arendt emphasizes the role of appearing in the public sphere, the process of authentication – that is, verifying that there is a concrete person with a physical body behind each online account that wants to actively participate in a particular online political council – is required. (shrink)
As there are more and more bilingual couples who ran vlogs to share their bilingual and intercultural lives on the internet, this paper seeks to delineate the sources of motivation for these couples to disclose their privacy through vlogging. Based on the sample of selected vlogs, a qualitative analysis has been conducted to obtain the sociolinguistic picture of the bilingual couples’ motivations to attract wider audiences via the internet. The analysis of vlogs, informed by a multimodal theoretical framework, focused on (...) the audiovisual and textual content of vlogs with regard to the subjective representations of films and texts resulting from these couples’ individual stories. The conducted study spotlights vlogging activities of bilingual couples who feel the need to share their intercultural and bilingual experiences on the internet. Our data suggest that bilingual couples vlog to express their hybrid identities by sharing how they cope with challenges and overcome linguistic barriers, as well as find ways to enjoy cross-cultural understanding. The paper explores the linguistic and cultural diversity from a new perspective of private vlogs created and maintained by bilingual couples. It unfolds an account of the less studied online context in which partners of different ethnic backgrounds make their private lives public, and illustrates how bilingual couples generate ideas to filming and sharing online. (shrink)
Despite growing understanding of the addictive qualities of the internet, and rising concerns about the effects of excessive internet use on personal wellbeing and mental health, the corresponding ethical debate is still in its infancy, and many of the relevant philosophical and conceptual frameworks are underdeveloped. Our goal in this chapter is to explore some of this evolving terrain. While there are unique ethical considerations that pertain to the formalisation of a disorder related to excessive internet use, our ethical concerns (...) (and indeed our mental health concerns) about whether certain technologies undermine wellbeing can and should be far broader than the debates about the appropriateness of particular diagnostic categories. In this chapter we introduce some of these wider debates with regards to persuasive digital technologies— particularly those which aim to maximise use, or even to encourage compulsive engagement—as well as the difficulty in articulating the harms involved in excessive internet use, especially where such use has not led to functional impairment. Following these conversations we briefly consider some more practical ethical implications, including regulation of certain design features, concerns about growing socioeconomic inequality in online services, and whether there should be a “right to disconnect.”. (shrink)
This paper argues that Internet access should be recognised as a human right because it has become practically indispensable for having adequate opportunities to realise our socio-economic human rights. This argument is significant for a philosophically informed public understanding of the Internet and because it provides the basis for creating new duties. For instance, accepting a human right to Internet access minimally requires guaranteeing access for everyone and protecting Internet access and use from certain objectionable interferences (e.g. surveillance, censorship, online (...) abuse). Realising this right thus requires creating an Internet that is crucially different from the one we currently have. The argument thus has wide-ranging implications. (shrink)
This chapter discusses the early, formative period of the Chinese approach to governing the internet from 1994 when China got connected to the global internet to the country’s participation in the World Summit on the Information Society (WSIS) in 2005. It examines and compares the Chinese academic discourse on cyber/information sovereignty and official policies of this period. It shows that the academic discourse preceded the official discourse in theorising and explicitly articulating cyber/information sovereignty, and that while the academic discourse was (...) broadly compatible with the official stance, important differences existed between the two in terms of argumentative tonality and conceptual and theoretical orientation. Our sources reveal that the official policy of that time is decidedly pragmatic and characterized by Bu Zhenglun (不争论), a turn away from theoretical debate; in this context, particularly digitalization was uncritically promoted as a means to further economic development. In contrast to that, the academic debate of that time was critical of digitalization and underlined the need to develop a form of cyber/information sovereignty to protect Chinese society from the negative side-effects of digitalization, which were connected to fears regarding regime change and even imagined as ‘cyber colonialism’. (shrink)
A history of the Internet and the story of the scientists behind its creation describes the 1960s effort funded by the Defense Department and the technologies that contributed to its monumental growth.
Regnant public accounts of Jewish sexual ethics—both external and internal—fall short of what they could accomplish. Using a Twitter thread on sexual ethics which falls into some key errors as a case study, I argue that Jewish ethicists are poised to address the thread's errors by offering sources for alternative moral frameworks. I examine how thinking with this Twitter thread can help us clarify what we mean by public scholarship more generally, what is wrong with some common public deployments of (...) specifically Jewish sources, and some implications of this for both Jewish and non‐Jewish publics. I conclude with some reflections about the role of traditional academic venues, such as the Journal of Religious Ethics, within this. (shrink)
The aim of this paper is to consider whether critical rationalism has any ideas which could usefully be applied to the internet. Today we tend to take the internet for granted and it is easy to forget that it was only about two decades ago that it began to be used to any significant extent. Accordingly in section 1 of the paper, there is a brief consideration of the history of the internet. At first sight this makes it looks implausible (...) that any of Popper’s ideas could be applicable to the internet, since Popper died before the internet came into general use. However, section 2 argues that Popper’s theory of World 3 does apply very well to the internet. This application is significant because, as shown in section 3, it leads to the problem of misinformation, which is one of the most significant problems generated by the internet. In section 4 there is an attempt to solve this problem using ideas taken from Popper’s epistemology. It is argued that there should be changes in education designed to prepare students for the internet age. Teaching in the internet age should focus on presenting to the students not just the accepted theories but also the evidence on which they are based. An illustration of how this might be done is given by considering an example from science teaching, namely the teaching of Newtonian mechanics in the last years of school or first years of university. (shrink)
The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on (...) developing anomaly detection systems. In recent years, machine learning (ML) has made remarkable progress, evolving from a lab novelty to a powerful tool in critical applications. ML has been proposed as a promising solution for addressing IoT security and privacy challenges. In this article, we conducted a study of the existing security and privacy challenges in the IoT environment. Subsequently, we present the latest ML-based models and solutions to address these challenges, summarizing them in a table that highlights the key parameters of each proposed model. Additionally, we thoroughly studied available datasets related to IoT technology. Through this article, readers will gain a detailed understanding of IoT architecture, security attacks, and countermeasures using ML techniques, utilizing available datasets. We also discuss future research directions for ML-based IoT security and privacy. Our aim is to provide valuable insights into the current state of research in this field and contribute to the advancement of IoT security and privacy. (shrink)
Fall prediction using machine learning has become one of the most fruitful and socially relevant applications of computer vision in gerontological research. Since its inception in the early 2000s, this subfield has proliferated into a robust body of research underpinned by various machine learning algorithms (including neural networks, support vector machines, and decision trees) as well as statistical modeling approaches (Markov chains, Gaussian mixture models, and hidden Markov models). Furthermore, some advancements have been translated into commercial and clinical practice, with (...) companies in various stages of development capitalizing on the aging population to develop new commercially available products. Yet despite the marvel of modern machine learning-enabled fall prediction, little research has been conducted to shed light on the security and privacy concerns that such systems pose for older adults. The present study employs an interdisciplinary lens in examining privacy issues associated with machine learning fall prediction and exploring the implications of these models in elderly care and the Internet of Medical Things (IoMT). Ultimately, a justice-informed set of best practices rooted in social geroscience is suggested to help fall prediction researchers and companies continue to advance the field while preserving elderly privacy and autonomy. (shrink)
This article has two related aims: to examine how the Internet might be rendered an object of coherent philosophical consideration and critique, and to contribute to divesting the term “transcendental” of the negative connotations it carries in contemporary philosophy of technology. To realise them, it refers to Kant’s transcendental approach. The key argument is that Kant’s “transcendental idealism” is one example of a more general and potentially thoroughgoing “transcendental” approach focused on conditions that much contemporary philosophy of technology misunderstands or (...) ignores, to the detriment of the field. Diverse contemporary approaches are engaged to make this claim, including those of Verbeek, Brey, Stiegler, Clark and Chalmers, Feenberg, and Fuchs. The article considers how these approaches stand in relation to tendencies towards determinism, subjectivism, and excessive forms of optimism and pessimism in contemporary considerations of the Internet. In terms of Kant’s transcendental idealism, specifically, it concludes by arguing that contemporary philosophy of technology does not go far enough in considering the Internet as a “regulative idea”; in terms of transcendental approaches more generally, it concludes by arguing that openness to the transcendental has the potential to call into question presuppositions regarding what constitutes an “empirical” object of enquiry in philosophy of technology, thereby, opening the field up to important new areas of research. (shrink)
‚Wie sehr vertrauen Sie Wissenschaft und Forschung?‘ – eine Frage, die nicht erst seit der Corona-Pandemie viel diskutiert wird. Manch einer würde kritisch korrigieren: ‚Vertrauen Sie überhaupt in Wissenschaft und Forschung?‘ Schlagwörter wie Vertrauens- und Glaubwürdigkeitskrise kommen damit in den Sinn. Oft angeführt wird hier der normative Rahmen wissenschaftlicher Praxis, auf welchen sich das Vertrauen dennoch stützen könne. Was passiert aber, wenn die zugrunde liegende Praxis massiv durch die zunehmende Digitalisierung ihrer Prozesse verändert wird?
From social media to search engines to Wikipedia, the internet is thoroughly embedded in how we produce, locate, and share knowledge around the world. Who Should We Be Online? provides an account of online knowledge that takes seriously the role of sexist, racist, transphobic, colonial, and capitalist forms of oppression. Frost-Arnold argues against analyzing internet users as a collection of identical generic people with smartphones. The novel epistemology developed in this book recognizes that we are differently embodied beings interacting within (...) systems of dominance. Our social identities and global inequalities shape who we are, who we can be online, and what we know. Tackling problems of online content moderation, fake news, and hoaxes, Frost-Arnold shows that oppressive online structures and practices help fuel ignorance. But she also reveals how the internet provides opportunities for marginalized people and activists to share knowledge online. Drawing on feminist accounts of objectivity, veritistic social epistemology, epistemologies of ignorance, virtue epistemology, and the epistemic injustice literature, this book argues for a social epistemology that values truth and objectivity, while recognizing that inequalities shape our collective ability to attain these goals. Timely and interdisciplinary, Who Should We Be Online? weaves together internet studies scholarship from across the humanities, social sciences, and computer science. Presenting case studies of moderators, imposters, tricksters, fakers, and lurkers, this book both explains the problems with our current internet ecosystem and imagines liberatory online futures. (shrink)
The current of cyberfeminism has been active for 30 years now, also referred to as the “third wave” of feminism. Despite being an ambiguous and multifaceted movement involving multiple instances, cyberfeminism is represented in the imagination by women with strong knowledge of media and digital technologies. The purpose of this article is to analyze the socially and culturally constructed value that the media assume in this movement. The very concept of identity is undergoing a phenomenon of control whereby it is (...) redefined by “control grids” (D. Haraway) that prevent free access to participation in life on the web. The utopian theories of feminists actually alternate with fundamental gender analyses within cyberspace that determine the amount of access to resources. The last phase of this phenomenon is instead characterized by the intent to break down gender inequalities through a series of digital products that produce changes in common perceptions: online magazines, YouTube channels, webinars, and entrepreneurship actions on the web. New media and, more generally, access to information are fundamental to social and political participation, in which the phenomenon of exclusion or production of inequalities is more visible. Gender divisions on the web also reinforce sociocultural barriers and sometimes create regressive and destructive forms of social bonds. Globalization also affects these dynamics and accentuates exaggerated forms of individualism and cognitive stiffening, which further accentuate the distinctive traits of gender inequalities in cyberspace. (shrink)
Leading prescriptions for addressing the spread of fake news, misinformation, and other forms of epistemically toxic content online target either the platform or platform users as a single site for intervention. Neither approach attends to the intense feedback between people, posts, and platforms. Leading prescriptions boil down to the suggestion that we make social media more like traditional media, whether by making platforms take active roles as gatekeepers, or by exhorting individuals to behave more like media professionals. Both approaches are (...) impracticable and wrong. (shrink)
There was considered the requests of using of Internet and modern infocommunication technologies on organizing student’s independent works in this article. There was analyzed pedagogic conditions of organizing student’s independent work by Internet. The authors research the efficiency of using of info – communication technologies in this process.
The article is devoted to the study of neologisms in the Russian language, which are widely used in Internet communication. The article considers the In ternet as a special communicative environment in which the language is undergoing changes. New phenomena that appear on the web need to be named. The nomination process can take place in two ways: the formation of new words, as well as the emergence of new meanings for words. The study of Internet vocabulary is an urgent (...) problem for the modern Russian language. The author made an attempt to summarize new material on the topic under study, to analyze the lexical units selected during the study of Internet discourse in Russian. The paper considers the factors influencing the formation of Internet neologisms, identifies a number of their lexico-semantic groups. The conclusion is made about the inevitability of changes in the word-formation system of the Russian language, which occur under the influence of the Internet environment in the context of the globalization of the language space. (shrink)
The article shows the concept of information technology, the role of using information technology in increasing the effectiveness of teaching natural sciences. Methods of teaching the subject of information technology are considered. The dominant activity in the field of social production is the collection, production, processing, storage, transmission and use of information. The modern means of microprocessor and computer technology, as well as based on various means of exchange of information, the active use of the intellectual potential of society and (...) its members in scientific, industrial and other activities, the development of all spheres of social production, the intellectualization of labor activity, the combination of information technologies with scientific, industrial, information high-level services, access to reliable sources of information for any member of society, visualization of the information provided, the importance of the information used and constantly updated information technology, attention is paid to the effective use of an intermediary in the training of medical personnel. (shrink)
May you live in interesting times, the famous maxim quotes. Undoubtedly, at least in the historical context, periods of political, social, scientific, or economic riots – or at least commotion, ferment, crisis – have certainly earned such a title. So have the epochs which were subject to radical transformations distorting traditional relationships and institutions, existing patterns and rules. The abovementioned “interestingness” is thus a function of a radical change, challenge and variability, somewhat a derivative of erosion, and of all that (...) we associate it with the notion of revolution or turn, be it political, social, economic, environmental, or scientific. The paper’s core aim is to examine the nowadays constantly revised, questioned, thus, shaking demarcation between science and pseudoscience in the light of new trends such as misinformation, denialism, internetisation and memoisation of scientific discourses. (shrink)
This essay presents a collage of free-floating notes, thoughts, quotes, memes, YouTube comments on the reception of pop music on the internet. Content and questioning concern music reaction videos on YouTube, centring on my engagement with a particular online reaction - that of YouTuber ‘TCtheTopCat’ as they film themselves listening and responding to the track 'Reborn', from the eponymous 2018 album ‘Kids See Ghosts’. As audiovisual, autobiographical narratives, what kind of accounts and experiences do music reaction videos instigate and circulate? (...) What kind of reactions do they action and re-action? How do concepts of 'otobiography' and 'sonic fiction' help towards understanding these online music experiences, iterations, exchanges? How do music reaction videos extend logics of autobiographical signing and countersigning already present in processes of music production and reception? To what extent do my musical listening, my engagement with reaction videos, and my writing about these things here in this zine / journal, constitute instances of my 'commodification of difference'? (shrink)
The medical use of computing and information and communication technologies (ICTs) has a history of several decades, but the emergence of the internet, and especially the web and social media, created a new situation. As a result, currently the term eHealth is widely used – and the usage of the internet (and mobile) “technologies” in healthcare (among the patients and professionals, too) tends to be usual practice. There are more and more signs of the institutionalization of this new sub-disciplinary field (...) of medicine, such as social organizations, healthcare institutes, scientific journals, regular conferences, etc. In this paper, collecting the most relevant developments we will try to characterize this state of affairs in the field. Moreover, as it is well-known, the use of the internet has an enormous impact on society, social systems and subsystems, and even on the everyday life of people. This extended practice also influences medicine and healthcare as social subsystems, and fundamentally transforms some of their characteristics. In this paper, we try to show several important dimensions of these changes. (shrink)
Examples of extended cognition typically involve the use of technologically low-grade bio-external resources (e.g., the use of pen and paper to solve long multiplication problems). The present paper describes a putative case of extended cognizing based around a technologically advanced mixed reality device, namely, the Microsoft HoloLens. The case is evaluated from the standpoint of a mechanistic perspective. In particular, it is suggested that a combination of organismic (e.g., the human individual) and extra-organismic (e.g., the HoloLens) resources form part of (...) a common mechanism that realizes a bona fide cognitive routine. In addition to demonstrating how the theoretical resources of neo-mechanical philosophy might be used to evaluate extended cognitive systems, the present paper illustrates one of the ways in which mixed reality devices, virtual objects (i.e., holograms), and online (Internet-accessible) computational routines might be incorporated into human cognitive processes. This, it is suggested, speaks to the recent interest in mixed/virtual reality technologies across a number of disciplines. It also introduces us to issues that cross-cut disparate fields of philosophical research, such as the philosophy of science and the philosophy of technology. (shrink)
We present a novel model of individual people, online posts, and media platforms to explain the online spread of epistemically toxic content such as fake news and suggest possible responses. We argue that a combination of technical features, such as the algorithmically curated feed structure, and social features, such as the absence of stable social-epistemic norms of posting and sharing in social media, is largely responsible for the unchecked spread of epistemically toxic content online. Sharing constitutes a distinctive communicative act, (...) governed by a dedicated norm and motivated to a large extent by social identity maintenance. But confusion about this norm and its lack of inherent epistemic checks lead readers to misunderstand posts, attribute excess or insufficient credibility to posts, and allow posters to evade epistemic accountability—all contributing to the spread of epistemically toxic content online. This spread can be effectively addressed if people and platforms add significantly more context to shared posts and platforms nudge people to develop and follow recognized epistemic norms of posting and sharing. (shrink)
In the article the problem of transformation of the information received by the user on the Internet into his knowledge is investigated. The paper uses the main special scientific and logical research methods used in the social and humanitarian sciences. At the same time, the methods of systematic and value-worldview analysis of the phenomena of the spiritual world of a person are distinguished by the degree of significance, which allow us to study the problem of the dialectic of knowledge and (...) information on the Internet not in isolation, but in connection with the main phenomena of the spiritual life of people, taking into account the priority of value-worldview structures. The goal of the work is to find a priority factor that provides a higher degree of accuracy in the transformation of information from the Internet into human knowledge. It is shown that the nature of the world wide web to a certain extent complicates the process of translating information coming to a person into his knowledge. It is concluded that the condition for the transformation of information received by the user on the Internet is the cognitive activity of a person, due primarily to the development of its value and ideological sphere. If the cognizing person has sufficiently developed and stable value – ideological foundations of personality, he successfully realizes himself as a developing subject, an active participant in knowledge. On the contrary, insufficiently stable value-worldview sphere can lead to passive perception of information by the individual, adaptation to reality, simplification of personality. Information from the Internet in the most adequate form is transformed into a person’s knowledge on the basis of his own cognitive activity, in the presence of intellectual and volitional capabilities for verifying the information available on the Network. (shrink)
For most people, the internet is now the most dominant source of socially useful knowledge. Its widespread use has made knowledge more accessible, more widely distributed, and more commonly produced. -/- But the internet is also widely seen—and not just by philosophers—as raising a number of distinct epistemological problems. Some of those problems concern the metaphysics of knowledge—the extent to which knowledge via the internet is understood as outsourced, or even extended, knowledge. Others concern the type of knowledge the internet (...) can give us—whether, for example, the knowledge we gain by using our digital devices is a kind of testimonial knowledge. -/- In this chapter, we will focus on a third issue: how our uses of the internet to gain information affect our epistemic agency—or our capacity to take responsibility for our own epistemically relevant mental states and our wider contributions to our epistemic environment. In the early days of digital technology, the internet was generally seen as increasing our epistemic agency for the simple reason that it made information (and presumably knowledge) more accessible and widespread. But in recent years, such optimism has been tempered due to the rise of fake news, massive amounts of misinformation online, and the average consumer’s seeming credulity with regard to what they read on social media. The chapter will outline these objections and critically examine them, arguing that both our epistemic agency and our ability to responsibly exercise such agency can be undermined by some uses of the internet, even as those same uses increase agency in other ways. (shrink)
This article created to address the current state of affairs, which has resulted in an insufficient progress and innovation system. The purpose of this overview article is to increase educate society's knowledge of how to use modern and innovative technologies based on need, cultural aspects, social context, and state context. As a result, I used secondary sources to assist readers understand how state actors and policies might best respond to society's aspirations to use and communicate through technology and information, as (...) well as innovation, in a fair and equitable approach. It might be either positive or negative. Modernization and innovation can primarily noticed constructively. It means that before bringing forward and totally researching [technology], we must analyse what we need, how we treat it, and why we use it. (shrink)
This paper responds to the question of whether the Internet has made lectures obsolete and Matthew Pickles’ investigation of why lectures persist. It is written as a pastiche of R.K. Narayan, about whom a somewhat parallel question is probably asked. Pickles refers to a logic lecturer so dry people went swimming, and a pastiche approach is an alternative.
This edited book collection offers strong theoretical and philosophical insight into how digital platforms and their constituent algorithms interact with belief systems to achieve deception, and how related vices such as lies, bullshit, misinformation, disinformation, and ignorance contribute to deception. This inter-disciplinary collection explores how we can better understand and respond to these problematic practices. The Epistemology of Deceit in a Postdigital Era: Dupery by Design will be of interest to anyone concerned with deception in a ‘postdigital’ era including fake (...) news, and propaganda online. The election of populist governments across the world has raised concerns that fake news in online platforms is undermining the legitimacy of the press, the democratic process, and the authority of sources such as science, the social sciences and qualified experts. The global reach of Google, YouTube, Twitter, Facebook, and other platforms has shown that they can be used to create and spread fake and misleading news quickly and without control. These platforms operate and thrive in an increasingly balkanised media eco-system where networks of users will predominantly access and consume information that conforms to their existing worldviews. Conflicting positions, even if relevant and authoritative, are suppressed, or overlooked in everyday digital information consumption. Digital platforms have contributed to the prolific spread of false information, enabled ignorance in online news consumers, and fostered confusion over determining fact from fiction. The collection explores: Deception, what it is, and how its proliferation is achieved in online platforms. Truth and the appearance of truth, and the role digital technologies play in pretending to represent truth. How we can counter these vices to protect ourselves and our institutions from their potentially baneful effects. Chapter 15 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. (shrink)
Purpose With the rapid improvement in digital infrastructure, the popularity of digital devices and smartphones in every pocket, the yearning to stay connected with others has increased manifold, especially in youngsters. This has raised multiple concerns primarily related to the problematic usage of the internet (PUI). The current research study aims to scrutinize the association between PUI, psychological and mental health (PMH), social media fatigue (SMF), fear of missing out (FOMO), desire to disconnect (DD) and its relation with a novel (...) phenomenon of joy of missing out (JOMO). Design/methodology/approach The present research study embraces the empirical research method through quantitative analysis. The proposed theoretical model was empirically tested using primary data, collected through a self-designed structured questionnaire. The study sample included individuals between 16 and 39 years of age as these are the most active demographics on social media. The model is empirically tested with the help of structural equation modeling applied using software IBM AMOS 20.0 and SPSS 22.0. Initially, first-order confirmatory factor analysis was conducted, to measure and test the fit indices of the proposed model. Secondly, path analysis using structural equation modeling was carried out for the model. Findings Empirical synthesis of this research shows that PUI significantly and positively impacts mental and psychological health, FOMO and SMF. Also, SMF significantly and positively affects the DD which significantly and positively affects the JOMO. However, as depicted by the results of this study, FOMO have no considerable impact on SMF. Originality/value A study that connects the PUI with PMH, SMF and FOMO is rare to find. Second, this study uses data collected from social media users of India in the age group of 16–39 years. This slice of the population is most active in internet, and internet-enabled platform and are scantly studied, especially in the Indian context. This makes the study more exciting and crucial. (shrink)
The literature has widely studied the market response to the financial news or events but mainly focused on the stock market. This article associates the concept of internet news with the bond market response and attempts to examine how credit rating agencies and bond investors, two important bond participants, react to financial news on the internet with a range of multiply regressions. Our empirical study leads to several findings. First, CRAs tend to ignore the warnings of financial news on the (...) internet, whereas bond investors strongly react to such news. Second, there is an asymmetry in bond investors’ reactions to good news compared to bad news, with investors being more sensitive to bad news. Third, there is heterogeneity in the psychological reaction where bond investors do not react to the news about central state-owned enterprises but to the news about other enterprises. Finally, there is an asymmetric response driven by news timeliness that bond investors are more sensitive to the latest news articles than old ones. Overall, our study confirms the existence of psychological reactions to the financial news on the internet in China’s bond market, which has significance for keeping bond market participants from overreacting or underreacting to market news. (shrink)