Switch to: Citations

Add references

You must login to add references.
  1. Do Artifacts Have Politics?Langdon Winner - 1980 - Daedalus 109 (1):121--136.
    In controversies about technology and society, there is no idea more pro vocative than the notion that technical things have political qualities. At issue is the claim that the machines, structures, and systems of modern material culture can be accurately judged not only for their contributions of efficiency and pro-ductivity, not merely for their positive and negative environmental side effects, but also for the ways in which they can embody specific forms of power and authority. Since ideas of this kind (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   277 citations  
  • The Scientist Qua Scientist Makes Value Judgments.Richard Rudner - 1953 - Philosophy of Science 20 (1):1-6.
    The question of the relationship of the making of value judgments in a typically ethical sense to the methods and procedures of science has been discussed in the literature at least to that point which e. e. cummings somewhere refers to as “The Mystical Moment of Dullness.” Nevertheless, albeit with some trepidation, I feel that something more may fruitfully be said on the subject.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   318 citations  
  • What is Computer Ethics?James H. Moor - 1985 - Metaphilosophy 16 (4):266-275.
  • Technology with No Human Responsibility?Deborah G. Johnson - 2015 - Journal of Business Ethics 127 (4):707-715.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  • Engaging Values Despite Neutrality: Challenges and Approaches to Values Reflection During the Design of Internet Infrastructure.Katie Shilton - 2018 - Science, Technology, and Human Values 43 (2):247-269.
    Internet protocol development is a social process, and resulting protocols are shaped by their developers’ politics and values. This article argues that the work of protocol development poses barriers to developers’ reflection upon values and politics in protocol design. A participant observation of a team developing internet protocols revealed that difficulties defining the stakeholders in an infrastructure and tensions between local and global viewpoints both complicated values reflection. Further, Internet architects tended to equate a core value of interoperability with values (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Values and Pragmatic Action: The Challenges of Introducing Ethical Intelligence in Technical Design Communities.Noëmi Manders-Huits & Michael Zimmer - 2009 - International Review of Information Ethics 10 (2):37-45.
    Various Value-Conscious Design frameworks have recently emerged to introduce moral and ethical intelligence into business and technical design contexts, with the goal of proactively influencing the design of technologies to account for moral and ethical values during the conception and design process. Two attempts to insert ethical intelligence into technical design communities to influence the design of technologies in ethical- and value-conscious ways are described, revealing discouraging results. Learning from these failed attempts, the article identifies three key challenges of pragmatic (...)
    No categories
     
    Export citation  
     
    Bookmark   17 citations  
  • Marketing and the Vulnerable.George G. Brenkert - 1998 - The Ruffin Series of the Society for Business Ethics 1:7-20.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Marketing and the Vulnerable.George G. Brenkert - 1998 - The Ruffin Series of the Society for Business Ethics 1998:7-20.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Marketing, Consumers and Technology: Perspectives for Enhancing Ethical Transactions.Gene R. Laczniak & Patrick E. Murphy - 2006 - Business Ethics Quarterly 16 (3):313-321.
    The advance of technology has influenced marketing in a number of ways that have ethical implications. Growth in use of the Internetand e-commerce has placed electronic “cookies,” spyware, spam, RFIDs, and data mining at the forefront of the ethical debate. Some marketers have minimized the significance of these trends. This overview paper examines these issues and introduces the two articles that follow. It is hoped that these entries will further the important “marketing and technology” ethical debate.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • Marketing, Consumers and Technology: Perspectives for Enhancing Ethical Transactions.Gene R. Laczniak & Patrick E. Murphy - 2006 - Business Ethics Quarterly 16 (3):313-322.
    Abstract: The advance of technology has influenced marketing in a number of ways that have ethical implications. Growth in use of the Internet and e-commerce has placed electronic “cookies,” spyware, spam, RFIDs, and data mining at the forefront of the ethical debate. Some marketers have minimized the significance of these trends. This overview paper examines these issues and introduces the two articles that follow. It is hoped that these entries will further the important “marketing and technology” ethical debate.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • Method in Computer Ethics: Towards a Multi-Level Interdisciplinary Approach. [REVIEW]Philip Brey - 2000 - Ethics and Information Technology 2 (2):125-129.
    This essay considers methodological aspects ofcomputer ethics and argues for a multi-levelinterdisciplinary approach with a central role forwhat is called disclosive computer ethics. Disclosivecomputer ethics is concerned with the moraldeciphering of embedded values and norms in computersystems, applications and practices. In themethodology for computer ethics research proposed inthe essay, research takes place at three levels: thedisclosure level, in which ideally philosophers,computer scientists and social scientists collaborateto disclose embedded normativity in computer systemsand practices, the theoretical level, in whichphilosophers develop and modify (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  • Morally Contentious Technology-Field Intersections: The Case of Biotechnology in the United States. [REVIEW]Benjamin M. Cole & Preeta M. Banerjee - 2013 - Journal of Business Ethics 115 (3):555-574.
    Technologies can be not only contentious—overthrowing existing ways of doing things—but also morally contentious—forcing deep reflection on personal values and societal norms. This article investigates that what may impede the acceptance of a technology and/or the development of the field that supports or exploits it, the lines between which often become blurred in the face of morally contentious content. Using a unique dataset with historically important timing—the United States Biotechnology Study fielded just 9 months after the public announcement of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development.Katie Shilton & Daniel Greene - 2019 - Journal of Business Ethics 155 (1):131-146.
    Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful spaces for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   16 citations  
  • The Subject and Power.Michel Foucault - 1982 - Critical Inquiry 8 (4):777-795.
    I would like to suggest another way to go further toward a new economy of power relations, a way which is more empirical, more directly related to our present situation, and which implies more relations between theory and practice. It consists of taking the forms of resistance against different forms of power as a starting point. To use another metaphor, t consists of using this resistance as a chemical catalyst so as to bring to light power relations, locate their position, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   556 citations  
  • Public Trust in Business and Its Determinants.Bidhan Parmar, Kirsten Martin & Michael Pirson - 2019 - Business and Society 58 (1):132-166.
    Public trust in business, defined as the degree to which the public—meaning society at large—trusts business in general, is largely understudied. This article suggests four domains of existing trust research from which scholars of public trust in business can draw. The authors then propose four main hypotheses, which aim to predict the determinants of public trust, and test these hypotheses using a factorial vignette methodology. These results will provide scholars with more direction as this article is, to the authors’ knowledge, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations