Results for 'dangerous information'

991 found
Order:
  1. Some information is too dangerous to be on the internet.Vincent C. Müller - 2006 - Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  2.  58
    The danger of “fake news”: how using social media for information dissemination can inhibit the ethical decision making process.Rahul S. Chauhan, Shane Connelly, David C. Howe, Andrew T. Soderberg & Marisa Crisostomo - 2022 - Ethics and Behavior 32 (4):287-306.
    ABSTRACT Social media is becoming increasingly embedded in people’s daily lives. These virtual spaces are now regularly used as a tool for information dissemination. Drawing on the moral intensity literature combined with uses and gratifications theory, this research explores how using social media to consume information can affect the ethical decision-making process. This study compares the influence of two online media dissemination formats – an online news article and social media discussion thread – on individuals’ ethical perceptions and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  16
    The dangerous use of genetic information.David Eugene Johnson & Debora Jane Shaw - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):533-549.
    Purpose The purpose of this paper is to inform or alert readers to the extensive use and ready availability of genetic information that poses varying degrees of social and legal danger. The eugenics movement of the 1920s and the general acceptance of genetic essentialism provide context for considering contemporary examples of the problem. Design/methodology/approach This paper takes an argumentative approach, supporting proposals with ideas from historical and current research literature. Findings The limits of data protection, extensive use of direct-to-consumer (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  11
    The Information Revolution in the Post-Industrial Society: Dangers in Political Processes.Olga Kravchuk, Nataliia Shoturma, Ganna Grabina, Iryna Myloserdna, Vitalii Vedenieiev & Anastasiia Shtelmashenko - 2022 - Postmodern Openings 13 (4):113-126.
    The relevance of the study lies in the fact that the information and computer revolution has made it possible to create and include in the system of social circulation such information flows, which are currently sufficient to ensure the most rational use of nature, demographic, economic, industrial, agricultural and spiritual and cultural development of mankind. The phenomenon of the information revolution is the result of two parallel processes that can develop throughout history: an increase in the role (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  72
    Informed Consent: Good Medicine, Dangerous Side Effects.Bruce N. Waller & Robyn A. Repko - 2008 - Cambridge Quarterly of Healthcare Ethics 17 (1):66-74.
    Informed consent has passed through three stages. The first paternalistic stage lasted for many centuries: The doctor's diagnosis and healing arts were kept secret, and informing patients was regarded as professionally and ethically wrong. Second came the legal stage, when the right of patients to make informed decisions concerning their own treatment was imposed by the courts and reluctantly tolerated by medical professionals. The third informed consent stage emerged more recently: the general therapy stage. The therapeutic benefits of informed consent (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  21
    Dangerous Diagnostics: The Social Power of Biological Information by Dorothy Nelkin; Laurence Tancredi; Brainstorming: The Science and Politics of Opiate Research by Solomon H. Snyder; Gene Dreams: Wall Street, Academia, and the Rise of Biotechnology by Robert Teitelman.Marga Vicedo - 1991 - Isis 82 (2):408-409.
  7. Dangerous Diagnostics: The Social Power of Biological Information.Dorothy Nelson, Laurence Tancredi & Peter Singer - 1996 - Bioethics 10 (1):88.
    No categories
     
    Export citation  
     
    Bookmark  
  8. Dangerous Diagnostics: the Social Power of Biological Information by Dorothy Nelson and Laurence Tancredi.P. Singer - 1996 - Bioethics 10:88-88.
    No categories
     
    Export citation  
     
    Bookmark  
  9.  9
    On the safety and danger of ‘viral’ information from the perspective of the epistemological subject.Peter Gurský - 2021 - Ethics and Bioethics (in Central Europe) 11 (3-4):126-141.
    The present paper addresses the formal perspective of information with the focus on ‘untrue’ information presented as dangerous. Grounded in perspectivism, the epistemic subject is understood as decisive in informational transfer. In this context, ethics should focus on how the epistemic subject receives information. Regarding wide-spread information, the notions of danger and safety, the latter being a reaction to the former, essentially result from the fear mechanism of affective neural systems in higher mammals. The practice (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  19
    Friedrich Nietzsche and Information Society: Dangers of the Radical Social Division.Ihor Vdovychyn, Viktoriya Bun & Nataliia Khoma - 2022 - Dialogue and Universalism 32 (2):127-140.
    The purpose of the article is to analyse Friedrich Nietzsche’s ideas about the radical social division of society and the domination of the elite over the masses in the context of the latest socio-economic, technological and political realities of the post-industrial society. The authors emphasize the existing social demand for the study of threats that arise from social divisions due to the influence of the information society. In these processes, the authors trace a peculiar kind of recent interpretation of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11. Dangerous Reference Graphs and Semantic Paradoxes.Landon Rabern, Brian Rabern & Matthew Macauley - 2013 - Journal of Philosophical Logic 42 (5):727-765.
    The semantic paradoxes are often associated with self-reference or referential circularity. Yablo (Analysis 53(4):251–252, 1993), however, has shown that there are infinitary versions of the paradoxes that do not involve this form of circularity. It remains an open question what relations of reference between collections of sentences afford the structure necessary for paradoxicality. In this essay, we lay the groundwork for a general investigation into the nature of reference structures that support the semantic paradoxes and the semantic hypodoxes. We develop (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  12.  4
    Dangers in the Incommensurability of Globalization: Socio-Political Volatilities.Gary Backhaus & John Murungi (eds.) - 2008 - Cambridge Scholars Press.
    The thesis of incommensurability concerns the interrelation between subjective culture and objective culture through which the constitutive agency of chaos (incommensurability) emerges. The objectivations/products, the constituents of objective culture, carry their own Being, and this Being transcends the original subjective expressivities/intentions. The constitutive agency of this incommensurable interrelation becomes apparent in an age of globalization where its effects become global, bringing about dangerous socio-political volatilities. To illustrate, global warming has been neither the expressive intention of subjective culture nor a (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  5
    Danger! Metaphors at Work in Economics, Geophysiology, and the Internet.Sally Wyatt - 2004 - Science, Technology and Human Values 29 (2):242-261.
    The authoranalyzes the types of metaphors that are used to describe the Internetin issues of Wired magazine from before and after the dot-com collapse to understand the perceptions and expectations of some of the actors involved in the shaping of the Internet. In addition, the metaphors deployed in economics and geophysiology are used to demonstrate how metaphors can influence public debate, policy, and theory. The author argues that metaphors do not simply have a descriptive function but that they also carry (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  14.  33
    Dangerous Sex, Invisible Labor: Sex Work and the Law in India.Prabha Kotiswaran - 2011 - Princeton University Press.
    Popular representations of third-world sex workers as sex slaves and vectors of HIV have spawned abolitionist legal reforms that are harmful and ineffective, and public health initiatives that provide only marginal protection of sex workers' rights. In this book, Prabha Kotiswaran asks how we might understand sex workers' demands that they be treated as workers. She contemplates questions of redistribution through law within the sex industry by examining the political economies and legal ethnographies of two archetypical urban sex markets in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  15. The Dangers of Re-colonization: Possible Boundaries Between Latin American Philosophy and Indigenous Philosophy from Latin America.Jorge Sanchez-Perez - 2023 - Comparative Philosophy 14 (2).
    The field of Latin American philosophy has established itself as a relevant subfield of philosophical inquiry. However, there might be good reasons to consider that our focus on the subfield could have distracted us from considering another subfield that, although it might share some geographical proximity, does not share the same historical basic elements. In this paper, I argue for a possible and meaningful conceptual difference between Latin American Philosophy and Indigenous philosophy produced in Latin America. First, I raise what (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16. «DANGEROUS KNOWLEDGE» IN «THE RISK SOCIETY» (Age of Genetics and Biotec.Cheshko Valentin Glazko Valery I. (ed.) - 2007 - Publ.House "INGEK".
    At the heart of the book - two views (naturalist and humanist) on the dangers of and Prospects of "scientific and technological progress," that defining the face of modern civilization. Its leaders are now the information, genetic cal and biological technology.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  23
    Dangerous reading.James Kaminsky - 2000 - Inquiry: Critical Thinking Across the Disciplines 19 (4):41-50.
    This text uses an analysis of the problem of “intertextuality” to deconstruct Foucault’s critique of bourgeois rationality as a suggestion for metaphors in the social sciences, education included. It accepts“intertextuality” as a space that dissolves the distance between subject, object, and text. In so doing “intertextuality” takes the postmodern suggestion that “fiction” can be as informative as “fact” seriouslyand evidentially uses examples from fiction to “show” the dangers of postmodern discourse. In closing this text suggests questions that must be resolved (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  18.  8
    Dangerous reading.James Kaminsky - 2000 - Inquiry: Critical Thinking Across the Disciplines 19 (4):41-50.
    This text uses an analysis of the problem of “intertextuality” to deconstruct Foucault’s critique of bourgeois rationality as a suggestion for metaphors in the social sciences, education included. It accepts“intertextuality” as a space that dissolves the distance between subject, object, and text. In so doing “intertextuality” takes the postmodern suggestion that “fiction” can be as informative as “fact” seriouslyand evidentially uses examples from fiction to “show” the dangers of postmodern discourse. In closing this text suggests questions that must be resolved (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  16
    “Listening Dangerously”: Dialogue Training as Contemplative Pedagogy.Judith Simmer-Brown - 2013 - Buddhist-Christian Studies 33:33-40.
    In lieu of an abstract, here is a brief excerpt of the content:“Listening Dangerously”: Dialogue Training as Contemplative PedagogyJudith Simmer-BrownContemplative pedagogies in higher-education classrooms employ methods adapted from meditative practices in great religious traditions in order to enhance student learning and to fulfill the historic purpose of a liberal arts education: to discover the nature of human life. Our Western education systems were originally derived from religious settings in which questions about what it means to be human were paramount. Over (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  25
    Anonymity versus commitment: The dangers of education on the internet.Hubert L. Dreyfus - 1999 - Ethics and Information Technology 1 (1):15-20.
    I shall translate Kierkegaard's account of the dangers and opportunities of what he called the Press into a critique of the Internet so as to raise the question: what contribution -- for good or ill -- can the World Wide Web, with its ability to deliver vast amounts of information to users all over the world, make to educators trying to pass on knowledge and to develop skills and wisdom in their students? I will then use Kierkegaard's three-stage answer (...)
    Direct download  
     
    Export citation  
     
    Bookmark   13 citations  
  21.  5
    Dangers of the Defaults: A Tutorial on the Impact of Default Priors When Using Bayesian SEM With Small Samples.Sanne C. Smid & Sonja D. Winter - 2020 - Frontiers in Psychology 11.
    When Bayesian estimation is used to analyze Structural Equation Models, prior distributions need to be specified for all parameters in the model. Many popular software programs offer default prior distributions, which is helpful for novel users and makes Bayesian SEM accessible for a broad audience. However, when the sample size is small, those prior distributions are not always suitable and can lead to untrustworthy results. In this tutorial, we provide a non-technical discussion of the risks associated with the use of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22. Are genetic self-tests dangerous? Assessing the commercialization of genetic testing in terms of personal autonomy.Ludvig Beckman - 2004 - Theoretical Medicine and Bioethics 25 (5-6):387-398.
    Should a growing market for genetic self-tests be welcomed or feared? From the point of view of personal autonomy the increasing availability of predictive health information seems promising. Yet it is frequently pointed out that genetic information about future health may cause anxiety, distress and even loss of “life-hopes.” In this article the argument that genetic self-tests undermine personal autonomy is assessed and criticized. I contend that opportunities for autonomous choice are not reduced by genetic information but (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  23.  90
    Pharmaceutical information systems and possible implementations of informed consent - developing an heuristic.Thomas Ploug & Søren Holm - 2012 - BMC Medical Ethics 13 (1):30-.
    Background Denmark has implemented a comprehensive, nationwide pharmaceutical information system, and this system has been evaluated by the Danish Council of Ethics. The system can be seen as an exemplar of a comprehensive health information system for clinical use. Analysis The paper analyses 1) how informed consent can be implemented in the system and how different implementations create different impacts on autonomy and control of information, and 2) arguments directed towards justifying not seeking informed consent in this (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  24.  83
    Information, Bodies, and Heidegger: Tracing Visions of the Posthuman.Bradley B. Onishi - 2011 - Sophia 50 (1):101-112.
    Discussion of the posthuman has emerged in a wide set of fields through a diverse set of thinkers including Donna Haraway, Ray Kurzweil, Nick Bostrom, N. Katherine Hayles, and Francis Fukuyama, just to name a few. Despite his extensive critique of technology, commentators have not explored the fruitfulness of Heidegger's work for deciphering the various strands of posthumanism recently formulated in response to contemporary technological developments. Here, I employ Heidegger's critique of technology to trace opposing visions of the posthuman, visions (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  25.  3
    Information Ethics.Gregory E. Kaebnick - 2013 - Hastings Center Report 43 (2):2-2.
    The use of information raises a perplexing new set of questions in bioethics. One familiar subset of these has to do with the goal of improving medical practice by collecting information about it, in effect integrating practice and research. This topic was discussed in the January‐February 2013 issue of the Report and in this issue is taken up again in Policy and Politics, where Michelle Meyer connects the issue to the evidence‐based medicine movement. A somewhat less familiar set (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  27
    Knowledge mining and social dangerousness assessment in criminal justice: metaheuristic integration of machine learning and graph-based inference.Nicola Lettieri, Alfonso Guarino, Delfina Malandrino & Rocco Zaccagnino - 2023 - Artificial Intelligence and Law 31 (4):653-702.
    One of the main challenges for computational legal research is drawing up innovative heuristics to derive actionable knowledge from legal documents. While a large part of the research has been so far devoted to the extraction of purely legal information, less attention has been paid to seeking out in the texts the clues of more complex entities: legally relevant facts whose detection requires to link and interpret, as a unified whole, legal information and results of empirical analyses. This (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  17
    Nietzsche's Ethics of Danger.Tobias Kuehne - 2018 - Journal of Nietzsche Studies 49 (1):78-101.
    In September 1886, the poet and critic Josef Victor Widmann penned a review of BGE titled "Nietzsche's Dangerous Book,"1 observing that a keen sense of danger pervaded the work.2 Nietzsche, who often felt misunderstood and wrongfully attacked, responded enthusiastically to Widmann on June 28, 1887: Mainly, I have to thankfully inform you, after a year's time no less, that your review has been by far the most "intelligent" one that this uncongenial book has received until now. Poets are, after (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Dangerous ideas.S. M. Stauffer - 1997 - Journal of Information Ethics 6 (2).
     
    Export citation  
     
    Bookmark  
  29.  57
    Dangerous Questions at the Reference Desk: A Virtue Ethics Approach.Mark Lenker - 2008 - Journal of Information Ethics 17 (1):43-53.
  30.  41
    On the dangers of conflating strong and weak versions of a theory of consciousness.Matthias Michel & Hakwan Lau - 2020 - Philosophy and the Mind Sciences 1 (II).
    Some proponents of the Integrated Information Theory of consciousness profess strong views on the Neural Correlates of Consciousness, namely that large swathes of the neocortex, the cerebellum, at least some sensory cortices, and the so-called limbic system are all not essential for any form of conscious experiences. We argue that this connection is not incidental. Conflation between strong and weak versions of the theory has led these researchers to adopt definitions of NCC that are inconsistent with their own previous (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  31.  73
    Informed consent: response.A. Zachary - 2001 - Journal of Medical Ethics 27 (1):65-a-66.
    SIRI would like to acknowledge with regret that my sentence, of which Ms Stevens quotes half, is convoluted. A book review1 is necessarily condensed and perhaps if it creates a problem it is best to read the book. But, in the complex legal, moral and ethical dilemmas arising in subjects such as confidentiality, it is highly dangerous to take half a sentence out of context and use it to discuss a separate agenda, ie secrecy within the National Health Service (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  32.  23
    Withholding Information on Unapproved Drug Marketing Applications: The Public Has a Right to Know.Sammy Almashat & Michael Carome - 2017 - Journal of Law, Medicine and Ethics 45 (s2):46-49.
    The Food and Drug Administration, as a matter of long-standing policy, does not inform the public of instances whereby applications for new drugs or new indications for existing drugs have been rejected by the agency or withdrawn from consideration, nor does it disclose the agency’s analyses of the data submitted with such applications. This lack of transparency is unjustified and prevents patients, researchers, and healthcare providers from gaining insight into why a drug’s application was not approved. The FDA’s policy is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33. The Accra Confession as Dangerous Memory: Reformed Ecclesiology, the Ecological Crisis, and the Problem of Catholicity.Henry S. Kuo - 2020 - Religions 11 (7):1-17.
    This study presents the Accra Confession as a theological response to the ecological crisis from a Reformed perspective while also addressing its critical weakness, namely the problem of universality in both Reformed ecclesiology and global approaches to ecological destruction. Because of a fragile universality, both Reformed churches and global institutions find it difficult to agree on a concrete plan to address climate change. Theologically, this difficulty arrives not primarily from disagreement with the existence or causes of climate change but how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and harness (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Anonymity versus commitment: The dangers of education on the internet. [REVIEW]Hubert L. Dreyfus - 1999 - Ethics and Information Technology 1 (1):369-378.
    I shall translate Kierkegaard's account of the dangers and opportunities of what he called the Press into a critique of the Internet so as to raise the question: what contribution -- for good or ill -- can the World Wide Web, with its ability to deliver vast amounts of information to users all over the world, make to educators trying to pass on knowledge and to develop skills and wisdom in their students? I will then use Kierkegaard's three-stage answer (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  36.  6
    Trust in the Danger Zone: Individual Differences in Confidence in Robot Threat Assessments.Jinchao Lin, April Rose Panganiban, Gerald Matthews, Katey Gibbins, Emily Ankeney, Carlie See, Rachel Bailey & Michael Long - 2022 - Frontiers in Psychology 13.
    Effective human–robot teaming increasingly requires humans to work with intelligent, autonomous machines. However, novel features of intelligent autonomous systems such as social agency and incomprehensibility may influence the human’s trust in the machine. The human operator’s mental model for machine functioning is critical for trust. People may consider an intelligent machine partner as either an advanced tool or as a human-like teammate. This article reports a study that explored the role of individual differences in the mental model in a simulated (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  23
    Good intentions and dangerous assumptions: Research ethics committees and illicit drug use research.Kirsten Bell & Amy Salmon - 2012 - Research Ethics 8 (4):191-199.
    Illicit drug users are frequently identified as a ‘vulnerable population’ requiring ‘special protection’ and ‘additional safeguards’ in research. However, without specific guidance on how to enact these special protections and safeguards, research ethics committee (REC) members sometimes fall back on untested assumptions about the ethics of illicit drug use research. In light of growing calls for ‘evidence-based research ethics’, this commentary examines three common assumptions amongst REC members about what constitutes ethical research with drug users, and whether such assumptions are (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Anonymity versus commitment: The dangers of education on the internet. [REVIEW]Hubert L. Dreyfus - 2002 - Educational Philosophy and Theory 34 (4):369–378.
    I shall translate Kierkegaard's account of the dangers and opportunities of what he called the Press into a critique of the Internet so as to raise the question: what contribution -- for good or ill -- can the World Wide Web, with its ability to deliver vast amounts of information to users all over the world, make to educators trying to pass on knowledge and to develop skills and wisdom in their students? I will then use Kierkegaard's three-stage answer (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  39.  49
    Criminalizing Health-Related Behaviors Dangerous to Others? Disease Transmission, Transmission-Facilitation, and the Importance of Trust.Leslie Pickering Francis & John G. Francis - 2012 - Criminal Law and Philosophy 6 (1):47-63.
    Statutes criminalizing behavior that risks transmission of HIV/AIDS exemplify use of the criminal law against individuals who are victims of infectious disease. These statutes, despite their frequency, are misguided in terms of the goals of the criminal law and the public health aim of reducing overall burdens of disease, for at least three important reasons. First, they identify individual offenders for punishment, a paradigm that is misplaced in the most typical contexts of transmission of infectious disease and even for HIV/AIDS, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40. The Ethics of Information: Absolute Risk Reduction and Patient Understanding of Screening.Peter H. Schwartz & Eric M. Meslin - 2008 - Journal of General Internal Medicine 23 (6):867-870.
    Some experts have argued that patients should routinely be told the specific magnitude and absolute probability of potential risks and benefits of screening tests. This position is motivated by the idea that framing risk information in ways that are less precise violates the ethical principle of respect for autonomy and its application in informed consent or shared decisionmaking. In this Perspective, we consider a number of problems with this view that have not been adequately addressed. The most important challenges (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  41.  29
    Informal medicine: ethical analysis.F. J. Leavitt - 2005 - Journal of Medical Ethics 31 (12):689-692.
    Context: Doctors have been known to treat or give consultation to patients informally, with none of the usual record keeping or follow up. They may wish to know whether this practice is ethical.Objective: To determine whether this practice meets criteria of medical ethics.Design: Informal medicine is analysed according to standard ethical principles: autonomy, beneficence and non-maleficence, distributive and procedural justice, and caring.Setting: Hospital, medical school, and other settings where patients may turn to physicians for informal help.Conclusion: No generalisation can be (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  14
    Sensing Environmental Danger in the City.Torin Monahan & Jennifer T. Mokos - 2010 - International Review of Information Ethics 12:21-27.
    In this paper, we identify and discuss some of the ethical problems associated with digital sensors used to detect water contamination and air pollution in the United States. Such safety devices are often deployed unsystematically and with questionable efficacy, thereby structuring the life chances of people in unequal ways. Whereas most technological infrastructures are hidden from view . or at least from active awareness . until they cease to function, those infrastructures meant to monitor and/or regulate largely "invisible" public health (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  9
    Genes of a Dangerous Kind.Teresa Levy - 2000 - Global Bioethics 13 (3-4):67-77.
    The joint forces of information and biological technologies are shaping us in ways that defy our traditional views about the figures of the human. Moreover, determinist tendencies favoured by scientists and the seemingly autonomy of technology development are creating a conceptual framework that privileges the search for technological answers concerning many of the human problems, keeping at the margin questions pertaining to the symbolic realm. The prevailing atmosphere nurtures the emergent composition of the natural and the artificial. It is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  8
    Information and Human Liberty.Ota Weinberger - 1996 - Ratio Juris 9 (3):248-257.
    Political and juristic enquiry must be conceived of as an action theoretical approach. On the basis of his formal and finalistic action theory as well as his neo‐institutionalist view, the author sketches the role of information in modern democracy. He holds the view that democratic institutions are always in danger of being misused. The complex role of mass media, party propaganda and the detrimental effects of state propaganda are analyzed. The author deals with some general features of information (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  27
    African youths and the dangers of social networking: a culture-centered approach to using social media.Philip Effiom Ephraim - 2013 - Ethics and Information Technology 15 (4):275-284.
    With rising numbers of Facebook, Twitter and MXit users, Africa is increasingly gaining prominence in the sphere of social networking. Social media is increasingly becoming main stream; serving as important tools for facilitating interpersonal communication, business and educational activities. Qualitative analyses of relevant secondary data show that children and youths aged between 13 and 30 constitute Africa’s heaviest users of social media. Media reports have revealed cases of abuse on social media by youths. Social networks have severally been used as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  7
    The Hidden Danger in Family Environment: The Role of Self-Reported Parenting Style in Cognitive and Affective Empathy Among Offenders.Shaishai Wang, Huagang Hu, Xinyang Wang, Bo Dong & Tianyang Zhang - 2021 - Frontiers in Psychology 12.
    Parenting styles are considered to have an important influence on the development of individuals and have been associated with empathy. The present study aimed to investigate the self-reported different parenting styles in childhood and adolescence and associated cognitive and affective empathy among offenders. Men incarcerated in prison in Jiangsu Province in China were invited to participate. Each consenting participant was asked to complete the Parental Bonding Instrument to collect information regarding the parenting styles they experienced in childhood and adolescence (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  17
    Moments of Danger: Race, Gender, and Memories of Empire.Vron Ware - 1992 - History and Theory 31 (4):116-137.
    This essay arises out of a concern to understand how categories of racial, ethnic, and cultural difference--particularly between women--have been constructed in the past, in order to explore how these categories continue to be reproduced in more recent political and ideological conflicts. Until very recently, feminist theory relating to the writing of history has tended to emphasize questions of gender and their articulation with class, with the result that issues of "race" have been overlooked.Focusing on ideas about whiteness and the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Democracy within, justice without: The duties of informal political representatives.Wendy Salkin - 2022 - Noûs 56 (4):940-971.
    Informal political representation can be a political lifeline, particularly for oppressed and marginalized groups. Such representation can give these groups some say, however mediate, partial, and imperfect, in how things go for them. Coeval with the political goods such representation offers these groups are its particular dangers to them. Mindful of these dangers, skeptics challenge the practice for being, inter alia, unaccountable, unauthorized, inegalitarian, and oppressive. These challenges provide strong pro tanto reasons to think the practice morally impermissible. This paper (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49. The public's right to know: A dangerous notion.Brian Richardson - 2004 - Journal of Mass Media Ethics 19 (1):46 – 55.
    As the basis for federal and state freedom of information laws, the legal idea of a public right to know has been a blessing. As the often-invoked moral justification for the press's right to publish, however, it is dangerous, because an unfettered right to know would result in restrictions on the press's right to determine what to publish. By acknowledging their moral responsibility to provide audiences with information based on their need to know, journalists can avoid the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  11
    Bayesian Revision vs. Information Distortion.J. Edward Russo - 2018 - Frontiers in Psychology 9:410332.
    The rational status of the Bayesian calculus for revising likelihoods is compromised by the common but still unfamiliar phenomenon of information distortion. This bias is the distortion in the evaluation of a new datum toward favoring the currently preferred option in a decision or judgment. While the Bayesian calculus requires the independent combination of the prior probability and a new datum, information distortion invalidates such independence (because the prior influences the datum). Although widespread, information distortion has not (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 991