Related

Contents
356 found
Order:
1 — 50 / 356
  1. Acceleration AI Ethics, the Debate between Innovation and Safety, and Stability AI’s Diffusion versus OpenAI’s Dall-E.James Brusseau - manuscript
    One objection to conventional AI ethics is that it slows innovation. This presentation responds by reconfiguring ethics as an innovation accelerator. The critical elements develop from a contrast between Stability AI’s Diffusion and OpenAI’s Dall-E. By analyzing the divergent values underlying their opposed strategies for development and deployment, five conceptions are identified as common to acceleration ethics. Uncertainty is understood as positive and encouraging, rather than discouraging. Innovation is conceived as intrinsically valuable, instead of worthwhile only as mediated by social (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Ethics of Identity in the Time of Big Data - Delivered at 25th Annual International Vincentian Business Ethics Conference (IVBEC), 2018, St. John’s University, New York.James Brusseau - manuscript
    According to Facebook’s Mark Zuckerberg, big data reality means, “The days of having a different image for your co-workers and for others are coming to an end, which is good because having multiple identities represents a lack of integrity.” Two sets of questions follow. One centers on technology and asks how big data mechanisms collapse our various selves (work-self, family-self, romantic-self) into one personality. The second question set shifts from technology to ethics by asking whether we want the kind of (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  3. Virtual Reality Interview (Metaphysics and Epistemology): "Welcome Back!".Erick Jose Ramirez & Miles Elliott - manuscript
    This is a virtual reality simulation that imagines its subject as emerging from a long stint in Robert Nozick's "Experience Machine." The simulation is an interview (with many branching paths) meant to gauge the subject's views on the metaphysics of virtual objects and the ethics of virtual actions. It draws heavily from the published work of David Chalmers, Mark Silcox, Jon Cogburn, Morgan Luck, and Nick Bostrom. *Requires an Oculus Rift (or Rift-S) or HTC Vive and a VR capable computer. (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  4. Legal aspects of Big Data - GDPR.Nicolae Sfetcu - manuscript
    The use of Big Data presents significant legal problems, especially in terms of data protection. The existing legal framework of the European Union based in particular on the Directive no. 46/95/EC and the General Regulation on the Protection of Personal Data provide adequate protection. But for Big Data, a comprehensive and global strategy is needed. The evolution over time was from the right to exclude others to the right to control their own data and, at present, to the rethinking of (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  5. An Introduction to the Ethics of Social Media.Douglas R. Campbell - forthcoming - Indianapolis: Hackett Publishing Press.
    This book will be published in the second half of 2025. It has eight chapters: 1. privacy; 2. the attention economy; 3. nudging; 4. echo chambers and polarization; 5. misinformation; 6. cancel culture: online shaming and caring; 7. friendship; and 8. the duty to quit. Each chapter has several cases to prompt discussion and reflection, as well as a glossary of key terms and an annotated bibliography.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  6. Book review: This is Technology Ethics: An Introduction, by Sven Nyholm. [REVIEW]Tobias Flattery - forthcoming - Journal of Moral Philosophy.
  7. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student success (however defined). Learning (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. An Analysis For A Just Cyber Warfare.Mariarosaria Taddeo - forthcoming - In Warfare. Fourth International Conference of Cyber Conflict. NATO CCD COE and IEEE Publication.
    Remove from this list  
     
    Export citation  
     
    Bookmark   13 citations  
  10. The philosophical basis of algorithmic recourse.Suresh Venkatasubramanian & Mark Alfano - forthcoming - Fairness, Accountability, and Transparency Conference 2020.
    Philosophers have established that certain ethically important val- ues are modally robust in the sense that they systematically deliver correlative benefits across a range of counterfactual scenarios. In this paper, we contend that recourse – the systematic process of reversing unfavorable decisions by algorithms and bureaucracies across a range of counterfactual scenarios – is such a modally ro- bust good. In particular, we argue that two essential components of a good life – temporally extended agency and trust – are under- (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  11. The challenge of regulating digital privacy.Bartek Chomanski - 2025 - Critical Review of International Social and Political Philosophy.
    This paper argues that if the critics of the currently dominant notice-and-consent model of governing digital data transactions are correct, then they should oppose political reforms of the model. The crux of the argument is as follows: the reasons the critics give for doubting the effectiveness of notice-and-consent in protecting user privacy (namely, ordinary users’ various cognitive deficiencies and the inherent inscrutability of the subject matter) are also reasons for doubting the effectiveness of protecting user privacy through democratic or regulatory (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  12. Reimagining Digital Well-Being. Report for Designers & Policymakers.Daan Annemans, Matthew Dennis, , Gunter Bombaerts, Lily E. Frank, Tom Hannes, Laura Moradbakhti, Anna Puzio, Lyanne Uhlhorn, Titiksha Vashist, , Anastasia Dedyukhina, Ellen Gilbert, Iliana Grosse-Buening & Kenneth Schlenker - 2024 - Report for Designers and Policymakers.
    This report aims to offer insights into cutting-edge research on digital well-being. Many of these insights come from a 2-day academic-impact event, The Future of Digital Well-Being, hosted by a team of researchers working with the Royal Netherlands Academy of Arts and Sciences (KNAW) in February 2024. Today, achieving and maintaining well-being in the face of online technologies is a multifaceted challenge that we believe requires using theoretical resources of different research disciplines. This report explores diverse perspectives on how digital (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  13. Technology and pronouns: disrupting the ‘Natural Attitude about Gender’.Maren Behrensen - 2024 - Ethics and Information Technology 26 (3):1-10.
    I consider how video conferencing platforms have changed practices of pronoun sharing, how this development fits into recent philosophical work on conceptual and social disruption, and how it might be an effective tool to disrupt the ‘natural attitude about gender’.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Not Just A Tool: Why Social-Media Use Is Bad and Bad For Us, and The Duty to Quit.Douglas R. Campbell - 2024 - Journal of Global Ethics 20 (1):107-112.
    With an eye on the future of global ethics, I argue that social-media technologies are not morally neutral tools but are, for all intents and purposes, a kind of agent. They nudge us to do things that are bad for us. Moreover, I argue that we have a duty to quit using social-media platforms, not just on account of possible duties to preserve our own well-being but because users are akin to test subjects on whom developers are testing new nudges, (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Dual-Use in Cybersecurity Research. Towards a New Culture of Research Ethics.Kaya Cassing & Sebastian Weydner-Volkmann - 2024 - In Elisabeth Ehrensperger, Jeannette Behringer, Michael Decker, Bert Droste-Franke, Nils B. Heyen, Mashid Sotoudeh & Birgit Weimert, Gestreamt, gelikt, flüchtig – schöne neue Kulturwelt? Digitalisierung und Kultur im Licht der Technikfolgenabschätzung. Baden-Baden: Nomos. pp. 349-359.
    The fact that information and communication technologies (ICTs) increasingly shape our online and offline lifeworlds has lead to the emergence of a new societal threat in the form of vulnerabilities in critical ICT systems that may be exploited by malicious actors. Cybersecurity researchers work on finding such vulnerabilities and on identifying new attack vectors, i.e. they systematically step into the role of attackers. Normatively, however, the goal of this research is to strengthen ICTs against cyberattacks and, thus, to reduce the (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  16. Entrevista a Juan Grompone.Jesús Miguel Delgado Del Aguila - 2024 - Polifonías. Revista de Educación 13 (26):219-227.
    Esta entrevista se hizo con el propósito de polemizar sobre el nuevo uso al que se está adecuando el lenguaje a partir de los avances informáticos, los cuales están en constante evolución y tienen diversos soportes tecnológicos que permiten su desarrollo, como las computadoras, las tabletas o los celulares. Desde este avance consuetudinario, Juan Grompone considera que distintos métodos de estudio o aprendizaje de antaño ya no son compatibles en esta era; es decir, han perdido vigencia por su falta de (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  17. Ảnh hưởng của các sản phẩm trí tuệ nhân tạo tạo sinh lên ngành báo chí và truyền thông: Hành vi và kinh tế báo chí.Manh-Tung Ho, T. Hong-Kong Nguyen & Tung-Duong Hoang - 2024 - Tạp Chí Thông Tin Và Truyền Thông 8 (8/2024):80-89.
    Sự thâm nhập của trí tuệ nhân tạo (AI) tạo sinh vào ngành báo chí đã tạo nên sự thay đổi về xu hướng tiêu thụ và sản xuất thông tin. Cụ thể, có năm thay đổi trong xu hướng hành vi tiêu thụ và sản xuất thông tin như sau: việc tạo ra nội dung trở nên dễ dàng và đa dạng hơn; AI tạo sinh có thể là tiếp điểm mới của con người đối với dòng chảy của (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  18. (1 other version)Vices in Gaming: Virtue Ethics and Endorsement View.Deniz A. Kaya - 2024 - Journal of Value Inquiry 58 (3):425–441.
    Can video games or the playing of such games be morally objectionable? Many attempts to justify our intuitions about the morality of certain games or game activities are either unsuccessful or fall short. This is mainly due to a normative gap between reality and virtuality that classical approaches to moral philosophy cannot bridge. I am investigating to what extent an accurate action analysis can help us to justify our intuitions that, in some cases, something is ethically wrong with video games. (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Can we solve the Gamer’s Dilemma by resisting it?Morgan Luck - 2024 - Ethics and Information Technology 26 (2):1-8.
    The Gamer’s Dilemma (Luck, 2009a) is a paradox concerning the moral permissibility of two types of acts performed within computer games. Some attempt to resolve the dilemma by finding a relevant difference between these two acts (Bartel, 2012; Patridge, 2013; Young, 2016; Nader, 2020; Kjeldgaard-Christiansen, 2020; and Milne & Ivankovic, 2021), or to dissolve the dilemma by arguing that the permissibility of these acts is not as they seem (Ali, 2015; Ramirez, 2020). More recently some have attempted to resist the (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Undisruptable or stable concepts: can we design concepts that can avoid conceptual disruption, normative critique, and counterexamples?Björn Lundgren - 2024 - Ethics and Information Technology 26 (2):1-11.
    It has been argued that our concepts can be disrupted or challenged by technology or normative concerns, which raises the question of whether we can create, design, engineer, or define more robust concepts that avoid counterexamples and conceptual challenges that can lead to conceptual disruption. In this paper, it is argued that we can. This argument is presented through a case study of a definition in the technological domain.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. AI through the looking glass: an empirical study of structural social and ethical challenges in AI.Mark Ryan, Nina De Roo, Hao Wang, Vincent Blok & Can Atik - 2024 - AI and Society 1 (1):1-17.
    This paper examines how professionals (N = 32) working on artificial intelligence (AI) view structural AI ethics challenges like injustices and inequalities beyond individual agents' direct intention and control. This paper answers the research question: What are professionals’ perceptions of the structural challenges of AI (in the agri-food sector)? This empirical paper shows that it is essential to broaden the scope of ethics of AI beyond micro- and meso-levels. While ethics guidelines and AI ethics often focus on the responsibility of (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Sự gia tăng của AI tạo sinh và những rủi ro tiềm ẩn cho con người.Hoang Tung-Duong, Dang Tuan-Dung & Manh-Tung Ho - 2024 - Tạp Chí Thông Tin Và Truyền Thông 9 (9/2024):66-73.
    Sự xuật hiện của các công cụ AI tạo sinh trên nền tảng các mô hình ngôn ngữ lớn (LLMs) đã đem đến một công cụ mới cho con người, đặc biệt là trong các ngành sư phạm, báo chí, nhưng chúng cũng đem đến nhiều vấn đề Trong bài viết này, nhóm tác giả sẽ chỉ ra những những bất cập mới xuất hiện hoặc những vấn đề đã tồn tại nhưng có nguy cơ được đẩy lên cao hơn (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  23. The Values of the Virtual.Rami Ali - 2023 - Journal of Applied Philosophy 40 (2):231-245.
    How do we assign values to virtual items, which include virtual objects, properties, events, subjects, worlds, environments, and experiences? In this article, I offer a framework for answering this question. After considering different value theses in the literature, I argue that whether we think these theses mutually exclusive or not turns on our view about the number of value-salient kinds virtual items belong to. Virtual monism is the view that virtual Xs belong to only one value-salient kind in relation to (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  24. To pay or not to pay? handling crowdsourced participants who drop out from a research study.Raquel Benbunan-Fich - 2023 - Ethics and Information Technology 25 (3):1-14.
    This article examines whether a crowdsourced research participant who quits a study before its completion should receive any monetary compensation. The study is focused on participants recruited from Amazon Mechanical Turk, the most widely used crowdsourcing platform, and examines the tensions between participants’ rights and research objectives when online labor markets are used to recruit research participants. The discussion is informed by the recent literature on online research with crowdsourced samples, evidence from human subjects’ practices at top US universities, and (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Between death and suffering: resolving the gamer’s dilemma.Thomas Coghlan & Damian Cox - 2023 - Ethics and Information Technology 25 (3):1-9.
    The gamer’s dilemma, initially proposed by Luck (Ethics and Information Technology 11(1):31–36, 2009) posits a moral comparison between in-game acts of murder and in-game acts of paedophilia within single-player videogames. Despite each activity lacking the obvious harms of their real-world equivalents, common intuitions suggest an important difference between them. Some responses to the dilemma suggest that intuitive responses to the two cases are based on important differences between the acts themselves or their social meaning. Others challenge the fundamental assumptions of (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  26. A systematic review of almost three decades of value sensitive design (VSD): what happened to the technical investigations?Anne Gerdes & Tove Faber Frandsen - 2023 - Ethics and Information Technology 25 (2):1-16.
    This article presents a systematic literature review documenting how technical investigations have been adapted in value sensitive design (VSD) studies from 1996 to 2023. We present a systematic review, including theoretical and applied studies that either discuss or conduct technical investigations in VSD. This systematic review contributes to the VSD community when seeking to further refine the methodological framework for carrying out technical investigations in VSD.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Integrating Ethics into Computer Science Education: Multi-, Inter-, and Transdisciplinary Approaches.Trystan S. Goetze - 2023 - Proceedings of the 54Th Acm Technical Symposium on Computer Science Education V. 1 (Sigcse 2023).
    While calls to integrate ethics into computer science education go back decades, recent high-profile ethical failures related to computing technology by large technology companies, governments, and academic institutions have accelerated the adoption of computer ethics education at all levels of instruction. Discussions of how to integrate ethics into existing computer science programmes often focus on the structure of the intervention—embedded modules or dedicated courses, humanists or computer scientists as ethics instructors—or on the specific content to be included—lists of case studies (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Okay, Google, Can I Trust You? An Anti-trust Argument for Antitrust.Trystan S. Goetze - 2023 - In David Collins, Iris Vidmar Jovanović, Mark Alfano & Hale Demir-Doğuoğlu, The Moral Psychology of Trust. Lexington Books. pp. 237-257.
    In this chapter, I argue that it is impossible to trust the Big Tech companies, in an ethically important sense of trust. The argument is not that these companies are untrustworthy. Rather, I argue that the power to hold the trustee accountable is a necessary component of this sense of trust, and, because these companies are so powerful, they are immune to our attempts, as individuals or nation-states, to hold them to account. It is, therefore, literally impossible to trust Big (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29. Can AlphaGo be apt subjects for Praise/Blame for "Move 37"?Mubarak Hussain - 2023 - Aies '23: Aaai/Acm Conference on Ai, Ethics, and Society, Montréal, Qc, Canada, August.
    This paper examines whether machines (algorithms/programs/ AI systems) are apt subjects for praise or blame for some actions or performances. I consider "Move 37" of AlphaGo as a case study. DeepMind’s AlphaGo is an AI algorithm developed to play the game of Go. The AlphaGo utilizes Deep Neural Networks. As AlphaGo is trained through reinforcement learning, the AI algorithm can improve itself over a period of time. Such AI models can go beyond the intended task and perform novel and unpredictable (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  30. The Effectiveness of Embedded Values Analysis Modules in Computer Science Education: An Empirical Study.Matthew Kopec, Meica Magnani, Vance Ricks, Roben Torosyan, John Basl, Nicholas Miklaucic, Felix Muzny, Ronald Sandler, Christo Wilson, Adam Wisniewski-Jensen, Cora Lundgren, Kevin Mills & Mark Wells - 2023 - Big Data and Society 10 (1).
    Embedding ethics modules within computer science courses has become a popular response to the growing recognition that CS programs need to better equip their students to navigate the ethical dimensions of computing technologies like AI, machine learning, and big data analytics. However, the popularity of this approach has outpaced the evidence of its positive outcomes. To help close that gap, this empirical study reports positive results from Northeastern’s program that embeds values analysis modules into CS courses. The resulting data suggest (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Has Montefiore and Formosa resisted the Gamer’s Dilemma?Morgan Luck - 2023 - Ethics and Information Technology 25 (2):1-6.
    Montefiore and Formosa (Ethics Inf Technol 24:31, 2022) provide a useful way of narrowing the Gamer’s Dilemma to cases where virtual murder seems morally permissible, but not virtual child molestation. They then resist the dilemma by theorising that the intuitions supporting it are not moral. In this paper, I consider this theory to determine whether the dilemma has been successfully resisted. I offer reason to think that, when considering certain variations of the dilemma, Montefiore and Formosa’s theory may not be (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  32. Introduction to Digital Humanism.Erich Prem (ed.) - 2023 - Springer Nature.
    This open access textbook introduces and defines digital humanism from a diverse range of disciplines. Following the 2019 Vienna Manifesto, the book calls for a digital humanism that describes, analyzes, and, most importantly, influences the complex interplay of technology and humankind, for a better society and life, fully respecting universal human rights. The book is organized in three parts: Part I “Background” provides the multidisciplinary background needed to understand digital humanism in its philosophical, cultural, technological, historical, social, and economic dimensions. (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Approaches to ethical AI.Erich Prem - 2023 - In Introduction to Digital Humanism. Springer Nature. pp. 225-239.
    This chapter provides an overview of existing proposals to address ethical issues of AI systems with a focus on ethical frameworks. A large number of such frameworks have been proposed with the aim to ensure the development of AI systems aligned with human values and morals. The frameworks list key ethical values that an AI system should follow. For the most part, they can be regarded as instances of philosophical principlism. This paper provides an overview of such frameworks and their (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  34. On algorithmic content moderation.Erich Prem & Brigitte Krenn - 2023 - In Introduction to Digital Humanism. Springer Nature. pp. 481-493.
    This chapter provides an overview of the challenges involved in algorithmic content moderation. Content moderation is the organized practice of screening user-generated content (UGC) on Internet sites, social media, and other online outlets to determine the appropriateness of the content for a given site, locality, or jurisdiction. The most common technical approaches consist in using classifier systems that assign predefined category labels to individual posts. We briefly introduce pre- and post-moderation and provide real-world examples of algorithmic moderation systems used by (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35. A Kantian response to the Gamer’s Dilemma.Samuel Ulbricht - 2023 - Ethics and Information Technology 25 (3):1-11.
    The Gamer’s Dilemma consists of three intuitively plausible but conflicting assertions: (i) Virtual murder is morally permissible. (ii) Virtual child molestation is morally forbidden. (iii) There is no relevant moral difference between virtual murder and virtual child molestation in computer games. Numerous attempts to resolve (or dissolve) the Gamer’s Dilemma line the field of computer game ethics. Mostly, the phenomenon is approached using expressivist argumentation: Reprehensible virtual actions express something immoral in their performance but are not immoral by themselves. Consequentialists, (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  36. Oggetti buoni: Per una tecnologia sensibile ai valori.Steven Umbrello - 2023 - Rome: Fandango.
    Non possiamo immaginare un mondo senza le nostre tecnologie e i nostri strumenti. In molti modi, le nostre tecnologie sono ciò che ci definisce come esseri umani, separandoci dal resto del regno animale. Tuttavia, pensare alle nostre tecnologie come semplici strumenti, strumenti che possono essere usati nel bene o nel male, ci rende vulnerabili agli effetti sistemici e duraturi che le tecnologie hanno sulla nostra società, sui comportamenti, e sulle generazioni future. Oggetti Buoni esplora come le tecnologie incarnano i valori (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Moral autonomy of patients and legal barriers to a possible duty of health related data sharing.Anton Vedder & Daniela Spajić - 2023 - Ethics and Information Technology 25 (1):1-11.
    Informed consent bears significant relevance as a legal basis for the processing of personal data and health data in the current privacy, data protection and confidentiality legislations. The consent requirements find their basis in an ideal of personal autonomy. Yet, with the recent advent of the global pandemic and the increased use of eHealth applications in its wake, a more differentiated perspective with regards to this normative approach might soon gain momentum. This paper discusses the compatibility of a moral duty (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Design for values and conceptual engineering.Herman Veluwenkamp & Jeroen van den Hoven - 2023 - Ethics and Information Technology 25 (1):1-12.
    Politicians and engineers are increasingly realizing that values are important in the development of technological artefacts. What is often overlooked is that different conceptualizations of these abstract values lead to different design-requirements. For example, designing social media platforms for deliberative democracy sets us up for technical work on completely different types of architectures and mechanisms than designing for so-called liquid or direct forms of democracy. Thinking about Democracy is not enough, we need to design for the proper conceptualization of these (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  39. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Using Open, Public Data for Security Provision: Ethical Perspectives on Risk-Based Border Checks in the EU.Sebastian Weydner-Volkmann - 2023 - European Journal for Security Research 8:25–42.
    This article explores the use of open-source intelligence (OSINT) techniques as part of data-driven border checks in the EU. While the idea to group travelers into risk categories in order to differentiate the intensity of border checks has been criticized for its likely impact on privacy and other fundamental rights, the exclusive use of “open,” “public” data was proposed as an alternative that mitigates these issues. However, OSINT remains a rather vague term, as it is unclear what constitutes “open” or (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Forschende in der Angriffsrolle.Sebastian Weydner-Volkmann & Kaya Cassing - 2023 - Zeitschrift für Praktische Philosophie 10 (1): 79-104.
    Infolge der tiefgreifenden Durchdringung unserer Lebenswelt mit digitalen Systemen hat sich die gesamtgesellschaftliche Anforderung formiert, diese Systeme gegen immer neue Formen von Angriffen absichern zu können. In diesem Beitrag zeigen wir, inwiefern der IT-Sicherheitsforschung hierbei eine zentrale Rolle zukommt, aber auch, dass im Rahmen dieser Rolle eine besondere forschungsethische Problematik entsteht. Weil IT-Sicherheitsrisiken strukturell neuartige Probleme für die gesellschaftliche Gewährleistung von Sicherheit aufwerfen, treten Forschende systematisch auch in die Rolle der Angreifenden. Dabei erhöhen Forschende durch den notwendigen Schritt der Veröffentlichung (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Specifying a principle of cryptographic justice as a response to the problem of going dark.Michael Wilson - 2023 - Ethics and Information Technology 25 (3):1-15.
    Over the past decade, the Five Eyes Intelligence community has argued cryptosystems with end-to-end encryption (E2EE) are disrupting the acquisition and analysis of digital evidence. They have labelled this phenomenon the ‘problem of going dark’. Consequently, several jurisdictions have passed ‘responsible encryption’ laws that limit access to E2EE. Based upon a rhetorical analysis (Cunningham in Understanding rhetoric: a guide to critical reading and argumentation, BrownWalker Press, Boca Raton, 2018) of official statements about ‘going dark’, it is argued there is a (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43. A framework for the application of socio-technical design methodology.Adnan Ahmad, Brian Whitworth & Elisa Bertino - 2022 - Ethics and Information Technology 24 (4):1-20.
    Socio-technical systems (STS) have become prominent platforms for online social interactions. Yet, they are still struggling to incorporate basic social ideas for many different and new online activities. This has resulted in unintended exposure of users’ personal data and a rise in online threats as users have now become a desirable target for malicious activities. To address such challenges, various researchers have argued that STS should support user-oriented configurations to protect their users from online social abuse. Some methodologies have also (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. The video gamer’s dilemmas.Rami Ali - 2022 - Ethics and Information Technology 24 (2).
    The gamer’s dilemma offers three plausible but jointly inconsistent premises: (1) Virtual murder in video games is morally permissible. (2) Virtual paedophelia in video games is not morally permissible. (3) There is no morally relevant difference between virtual murder and virtual paedophelia in video games. In this paper I argue that the gamer’s dilemma can be understood as one of three distinct dilemmas, depending on how we understand two key ideas in Morgan Luck’s (2009) original formulation. The two ideas are (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  45. Quantum of Wisdom.Colin Allen & Brett Karlan - 2022 - In Greg Viggiano, Quantum Computing and AI: Social, Ethical, and Geo-Political Implications. pp. 157-166.
    Practical quantum computing devices and their applications to AI in particular are presently mostly speculative. Nevertheless, questions about whether this future technology, if achieved, presents any special ethical issues are beginning to take shape. As with any novel technology, one can be reasonably confident that the challenges presented by "quantum AI" will be a mixture of something new and something old. Other commentators (Sevilla & Moreno 2019), have emphasized continuity, arguing that quantum computing does not substantially affect approaches to value (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  46. Mind the Gap: Autonomous Systems, the Responsibility Gap, and Moral Entanglement.Trystan S. Goetze - 2022 - Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency (FAccT ’22).
    When a computer system causes harm, who is responsible? This question has renewed significance given the proliferation of autonomous systems enabled by modern artificial intelligence techniques. At the root of this problem is a philosophical difficulty known in the literature as the responsibility gap. That is to say, because of the causal distance between the designers of autonomous systems and the eventual outcomes of those systems, the dilution of agency within the large and complex teams that design autonomous systems, and (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  47. Tracing app technology: an ethical review in the COVID-19 era and directions for post-COVID-19. [REVIEW]Ehsan Hajiramezanali, Shahriar Esmaeili, Kambiz Rasoulkhani, Ali Akbari, Ali Mostafavi, Amir Esmalian & Saleh Afroogh - 2022 - Ethics and Information Technology 24 (3):1-15.
    We conducted a systematic literature review on the ethical considerations of the use of contact tracing app technology, which was extensively implemented during the COVID-19 pandemic. The rapid and extensive use of this technology during the COVID-19 pandemic, while benefiting the public well-being by providing information about people’s mobility and movements to control the spread of the virus, raised several ethical concerns for the post-COVID-19 era. To investigate these concerns for the post-pandemic situation and provide direction for future events, we (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48. (1 other version)Vices in Gaming: Virtue Ethics and Endorsement View.Deniz A. Kaya - 2022 - Journal of Value Inquiry:1-17.
    Can video games or the playing of such games be morally objectionable? Many attempts to justify our intuitions about the morality of certain games or game activities are either unsuccessful or fall short. This is mainly due to a normative gap between reality and virtuality that classical approaches to moral philosophy cannot bridge. I am investigating to what extent an accurate action analysis can help us to justify our intuitions that, in some cases, something is ethically wrong with video games. (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49. Resisting the Gamer’s Dilemma.Thomas Montefiore & Paul Formosa - 2022 - Ethics and Information Technology 24 (3):1-13.
    Intuitively, many people seem to hold that engaging in acts of virtual murder in videogames is morally permissible, whereas engaging in acts of virtual child molestation is morally impermissible. The Gamer’s Dilemma (Luck in Ethics Inf Technol 11:31–36, 2009) challenges these intuitions by arguing that it is unclear whether there is a morally relevant difference between these two types of virtual actions. There are two main responses in the literature to this dilemma. First, attempts to resolve the dilemma by defending (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  50. Ethical Digital Technology in Practice.Simon Rogerson - 2022 - New York, NY, USA: Auerbach Publications, Taylor & Francis Group.
    Digital technology is about people. It is about those who plan, develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines, professional journals and (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 356