Switch to: References

Add citations

You must login to add citations.
  1. The Politics of Becoming: Anonymity and Democracy in the Digital Age.Hans Asenbaum - 2023 - Oxford: Oxford University Press.
    When we participate in political debate or protests, we are judged by how we look, which clothes we wear, by our skin colour, gender and body language. This results in exclusions and limits our freedom of expression. The Politics of Becoming explores radical democratic acts of disidentification to counter this problem. Anonymity in masked protest, graffiti, and online de-bate interrupts our everyday identities. This allows us to live our multiple selves. In the digital age, anonymity becomes an inherent part of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Philosophy of the Internet. A Discourse on the Nature of the Internet.Laszlo Ropolyi - 2013 - Budapest: Eötvös University.
  • Child pornography and deception on the internet: some ethical considerations.John Weckert & Barney Dalgarno - 2006 - Journal of Information, Communication and Ethics in Society 4 (4):205-213.
    Technology facilitates certain behaviours. This underlies the argument that the Internet may not be as benign as we might like to think. It is argued in this paper, through examination of the case of the capture of a large number of people on charges of possession of child pornography, that the Internet constitutes a kind of unintentional entrapment. Some consequences of this are explored.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech and high (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Transparency and social responsibility issues for wikipedia.Adele Santana & Donna J. Wood - 2009 - Ethics and Information Technology 11 (2):133-144.
    Wikipedia is known as a free online encyclopedia. Wikipedia uses largely transparent writing and editing processes, which aim at providing the user with quality information through a democratic collaborative system. However, one aspect of these processes is not transparent—the identity of contributors, editors, and administrators. We argue that this particular lack of transparency jeopardizes the validity of the information being produced by Wikipedia. We analyze the social and ethical consequences of this lack of transparency in Wikipedia for all users, but (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  • Kierkegaard and the internet: Existential reflections on education and community.Brian T. Prosser & Andrew Ward - 2000 - Ethics and Information Technology 2 (3):167-180.
    If the rhetorical and economic investment of educators, policy makers and the popular press in the United States is any indication, then unbridled enthusiasm for the introduction of computer mediated communication (CMC) into the educational process is wide-spread. In large part this enthusiasm is rooted in the hope that through the use of Internet-based CMC we may create an expanded community of learners and educators not principally bounded by physical geography. The purpose of this paper is to reflect critically upon (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Ties That Blind: Conceptualizing Anonymity.Julie Ponesse - 2014 - Journal of Social Philosophy 45 (3):304-322.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Sincerely, Anonymous.Grace Paterson - 2020 - Thought: A Journal of Philosophy 9 (3):167-176.
    This paper provides an account of anonymous speech treated as anonymized speech. It is argued that anonymous speech acts are best defined by reference to intentional acts of blocking a speaker's identification as opposed to the various epistemic effects that imperfectly correlate with these actions. The account is used to examine two important subclasses of anonymized speech: speech using pseudonyms, and speech anonymized in a specifically communicative manner. Several pragmatic and ethical issues with anonymized speech are considered.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones.Jennifer Parisi & Gordon A. Gow - 2008 - Bulletin of Science, Technology and Society 28 (1):60-68.
    In recent years there has been concern among law enforcement and national security organizations about the use of “anonymous” prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates oppose such regulatory measures, arguing that there is little practical value in attempting to register prepaid mobile devices, and the issue raises important questions about a citizen's entitlement to anonymity in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Aesthetics of navigational performance in hypertext.Parthasarathi Banerjee - 2004 - AI and Society 18 (4):297-309.
    A hypertext learner navigates with a instinctive feeling for a knowledge. The learner does not know her queries, although she has a feeling for them. A learner’s navigation appears as complete upon the emergence of an aesthetic pleasure, called rasa. The order of arrival or the associational logic and even the temporal order are not relevant to this emergence. The completeness of aesthetics is important. The learner does not look for the intention of the writer, neither does she look for (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The ties that bind: connections, comet cursors, and consent.D. G. Johnson & K. W. Miller - 2001 - Acm Sigcas Computers and Society 31 (1):12-16.
    Electronic communication and commerce facilitate the collection of information about individual use of the Internet. Focusing on the case of Comet Systems Inc. and its data gathering practices, this paper explores the technical details of gathering personal information in databases in general and the special character of the privacy issue raised by 'anonymous' information about individual behavior on the Internet. The case analysis suggests new insights for our understanding of privacy and frames a discussion of policy alternatives with respect to (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  • Treating sensitive topics online: a privacy dilemma.Paula Helm - 2018 - Ethics and Information Technology 20 (4):303-313.
    This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Ethics of Pseudonymous Publication.Joseph Fulda - 2007 - Journal of Information Ethics 16 (2):75-89.
    This article explores the ethics of pseudonymous publication of nonfiction by examining what and why an author might hide behind the veil of pseudonymity, when this is and is not appropriate, and when it is deemed appropriate what measures should be taken to ensure accountability despite the veil. The argument begins by assuming that the sole duty an author has qua author is to his audience and centers on issues in both ethics and philosophy of language.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Trustworthiness and truth: The epistemic pitfalls of internet accountability.Karen Frost-Arnold - 2014 - Episteme 11 (1):63-81.
    Since anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. This paper provides a veritistic argument that accountability mechanisms can cause significant epistemic problems for internet encyclopedias and social media communities. I show that accountability mechanisms can undermine both the dissemination of true beliefs and the detection of error. Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   57 citations  
  • Public anonymity and the connected world.Tony Doyle & Judy Veranas - 2014 - Ethics and Information Technology 16 (3):207-218.
    We defend public anonymity in the light of the threat posed by digital technology. Once people could reasonably assume that they were fairly anonymous when they left the house. They neither drove nor walked around with GPS devices; they paid their highway tolls in cash; they seldom bought on credit; and no cameras marked their strolls in the park or their walks down the street. Times have changed. We begin with a brief discussion of the concept of anonymity. We then (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • The problem of humiliation in peer review.Debra R. Comer & Michael Schwartz - 2014 - Ethics and Education 9 (2):141-156.
    This paper examines the problem of vituperative feedback from peer reviewers. We argue that such feedback is morally unacceptable, insofar as it humiliates authors and damages their dignity. We draw from social-psychological research to explore those aspects of the peer-review process in general and the anonymity of blind reviewing in particular that contribute to reviewers’ humiliating comments. We then apply Iris Murdoch's ideas about a virtuous consciousness and humility to make the case that peer referees have a moral obligation not (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Limits of data anonymity: lack of public awareness risks trust in health system activities. [REVIEW]Caroline Brall & Felix Gille - 2021 - Life Sciences, Society and Policy 17 (1):1-8.
    Public trust is paramount for the well functioning of data driven healthcare activities such as digital health interventions, contact tracing or the build-up of electronic health records. As the use of personal data is the common denominator for these healthcare activities, healthcare actors have an interest to ensure privacy and anonymity of the personal data they depend on. Maintaining privacy and anonymity of personal data contribute to the trustworthiness of these healthcare activities and are associated with the public willingness to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Drone culture: perspectives on autonomy and anonymity.Garfield Benjamin - 2022 - AI and Society 37 (2):635-645.
    This article addresses the problematic perspectives of drone culture. In critiquing focus on the drone’s apparent ‘autonomy’, it argues that such devices function as part of a socio-technical network. They are relational parts of human–machine interaction that, in our changing geopolitical realities, have a powerful influence on politics, reputation and warfare. Drawing on Žižek’s conception of parallax, the article stresses the importance of culture and perception in forming the role of the drone in widening power asymmetries. It examines how perceptions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Logical Structure of Intentional Anonymity.Michał Barcz, Jarek Gryz & Adam Wierzbicki - 2019 - Diametros 16 (60):1-17.
    It has been noticed by several authors that the colloquial understanding of anonymity as mere unknown-ness is insufficient. This common-sense notion of anonymity does not recognize the role of the goal for which the anonymity is sought. Starting with the distinction between the intentional and unintentional anonymity (which are usually taken to be the same) and the general concept of the non-coordinatability of traits, we offer a logical analysis of anonymity and identification (understood as de-anonymization). In our enquiry, we focus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Anonymous Arguments.Andrew Aberdein - forthcoming - Ethical Theory and Moral Practice:1-13.
    Anonymous argumentation has recently been the focus of public controversy: flash points include the outing of pseudonymous bloggers by newspapers and the launch of an academic journal that expressly permits pseudonymous authorship. However, the controversy is not just a recent one—similar debates took place in the nineteenth century over the then common practice of anonymous journalism. Amongst the arguments advanced by advocates of anonymous argumentation in either era is the contention that it is essential if the widest range of voices (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Online Deliberation: Design, Research, and Practice.Todd Davies & Seeta Peña Gangadharan (eds.) - 2009 - CSLI Publications/University of Chicago Press.
    Can new technology enhance purpose-driven, democratic dialogue in groups, governments, and societies? Online Deliberation: Design, Research, and Practice is the first book that attempts to sample the full range of work on online deliberation, forging new connections between academic research, technology designers, and practitioners. Since some of the most exciting innovations have occurred outside of traditional institutions, and those involved have often worked in relative isolation from each other, work in this growing field has often failed to reflect the full (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the current leading definitions (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  • The Ties That Blind: The Moral Value of Anonymity.Ponesse Julie - unknown
    This paper has two main aims: one is to understand the mechanisms that allow anonymity to facilitate both good and bad ends; the other is to use this understanding to determine the value of anonymity relative to its disvalue across a variety of moral and socio-political domains. Building on previous work in which I characterize anonymity by what I call the ‘central anonymity paradigm,’ I argue here that anonymity is primarily instrumentally valuable as a strategic device to procure some other (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark