Results for 'H. Tavani'

(not author) ( search as author name )
986 found
Order:
  1.  66
    Computer ethics: philosophical enquiry.Deborah G. Johnson, James H. Moor & Herman T. Tavani - 2000 - Acm Sigcas Computers and Society 30 (4):6-9.
  2. Introduction to computer ethics: Philosophy enquiry. [REVIEW]Deborah G. Johnson, James H. Moor & Herman T. Tavani - 2001 - Ethics and Information Technology 3 (1):1-2.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  3. Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  4. The handbook of information and computer ethics.K. E. Himma & H. T. Tavani (eds.) - 2008 - Wiley.
  5. Intellectual Property Rights in a Networked World.H. Tavani & R. Spinello (eds.) - 2004 - Idea Group.
     
    Export citation  
     
    Bookmark  
  6.  44
    Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  10
    Book Review: Technology and the Future, Edited by Albert H. Teich. [REVIEW]Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (3):39-40.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8. The realm of the infinite.H. W. Woodin - 2011 - In Michał Heller & W. H. Woodin (eds.), Infinity: new research frontiers. New York: Cambridge University Press.
     
    Export citation  
     
    Bookmark   18 citations  
  9.  9
    Symposium on Bernard Gert's moral philosophy.Herman T. Tavani - 2007 - Metaphilosophy 38 (4):363-364.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  11.  1
    Politieke filosofie.H. E. S. Woldring - 1993 - Den Haag: Het Spectrum.
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  88
    Levels of Trust in the Context of Machine Ethics.Herman T. Tavani - 2015 - Philosophy and Technology 28 (1):75-90.
    Are trust relationships involving humans and artificial agents possible? This controversial question has become a hotly debated topic in the emerging field of machine ethics. Employing a model of trust advanced by Buechner and Tavani :39–51, 2011), I argue that the “short answer” to this question is yes. However, I also argue that a more complete and nuanced answer will require us to articulate the various levels of trust that are also possible in environments comprising both human agents and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  13.  46
    Some ethical reflections on cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.
    The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  54
    The Internet, ethical values, and conceptual frameworks: an introduction to Cyberethics.Richard A. Spinello & Herman T. Tavani - 2001 - Acm Sigcas Computers and Society 31 (2):5-7.
    What exactly is Cyberethics? How did the field develop? What are some of the central issues and themes in this field, and what methodologies are used by those working in this area of applied ethics? These and related questions are considered in the readings included in Chapter 1. It is perhaps important to note at the outset that the field that many are now beginning to refer to as "cyberethics" has until quite recently been referred to by the more general (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  46
    The genesis of Kant's critique of judgment.John H. Zammito - 1992 - Chicago: University of Chicago Press.
    In this philosophically sophisticated and historically significant work, John H. Zammito reconstructs Kant's composition of The Critique of Judgment and reveals that it underwent three major transformations before publication. He shows that Kant not only made his "cognitive" turn, expanding the project from a "Critique of Taste" to a Critique of Judgment but he also made an "ethical" turn. This "ethical" turn was provoked by controversies in German philosophical and religious culture, in particular the writings of Johann Herder and the (...)
  16. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  17.  22
    Crossing boundaries: ethics in interdisciplinary and intercultural relations: selected papers from the CEPE 2011 conference.Elizabeth A. Buchanan & Herman T. Tavani - 2013 - Acm Sigcas Computers and Society 43 (1):6-8.
    The Ninth International Conference on Computer Ethics: Philosophical Enquiry was held in Milwaukee, WI. Four papers originally presented at that conference are included in this issue of Computers and Society. The selected papers examine a wide range of information/computer-ethics-related issues, and taken together, they show great diversity in the field of information/computer ethics. We are continually negotiating with ethics, law, and policy in our technology-driven activities in the interconnected global arena. As we consider the themes within and among the papers (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  56
    Search engines and ethics.Herman Tavani - forthcoming - Stanford Encyclopedia of Philosophy.
  19. Locke, intellectual property rights, and the information commons.Herman T. Tavani - 2005 - Ethics and Information Technology 7 (2):87-97.
    This paper examines the question whether, and to what extent, John Locke’s classic theory of property can be applied to the current debate involving intellectual property rights (IPRs) and the information commons. Organized into four main sections, Section 1 includes a brief exposition of Locke’s arguments for the just appropriation of physical objects and tangible property. In Section 2, I consider some challenges involved in extending Locke’s labor theory of property to the debate about IPRs and digital information. In Section (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  20. Ethical reflections on the digital divide.Herman T. Tavani - 2003 - Journal of Information, Communication and Ethics in Society 1 (2):99-108.
    During the past decade, a fairly extensive literature on the digital divide has emerged. Many reports and studies have provided statistical data pertaining to sociological aspects of ‘the divide,’ while some studies have examined policy issues involving universal service and universal access. Other studies have suggested ways in which the digital divide could be better understood if it were ‘reconceptualized’ in terms of an alternative metaphor, e.g. a ‘divide’ having to do with literacy, power, content, or the environment. However, with (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  21. KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  22. Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  23.  55
    Plato's philosophers: the coherence of the dialogues.Catherine H. Zuckert - 2009 - Chicago: University of Chicago Press.
    Introduction: Platonic dramatology -- The political and philosophical problems. Using pre-Socratic philosophy to support political reform: the Athenian stranger ; Plato's Parmenides: Parmenides' critique of Socrates and Plato's critique of Parmenides ; Becoming Socrates ; Socrates interrogates his contemporaries about the noble and good -- Paradigms of philosophy. Socrates' positive teaching ; Timaeus-Critias: completing or challenging Socratic political philosophy? ; Socratic practice -- The trial and death of Socrates. The limits of human intelligence ; The Eleatic challenge ; The trial (...)
    Direct download  
     
    Export citation  
     
    Bookmark   30 citations  
  24. On the visually perceived direction of motion (Reprinted from Psychologische Forschung, vol 20, pg 325-380, 1935).H. Wallach - 1996 - In Enrique Villanueva (ed.), Perception. Ridgeview. pp. 25--11.
     
    Export citation  
     
    Bookmark  
  25. The Jaynes-Cummings model and the one-atom-maser.H. Walther - 1993 - In E. T. Jaynes, Walter T. Grandy & Peter W. Milonni (eds.), Physics and probability: essays in honor of Edwin T. Jaynes. New York: Cambridge University Press. pp. 33.
     
    Export citation  
     
    Bookmark  
  26.  7
    Een handvol filosofen: geschiedenis van de filosofiebeoefening aan de Vrije Universiteit in Amsterdam van 1880 tot 2012.H. E. S. Woldring - 2013 - Hilversum: Verloren.
    In 'Een handvol filosofen' staan de filosofen centraal die sinds de oprichting van de Vrije Universiteit in 1880 aan deze instelling verbonden zijn geweest. Het gaat hierbij niet alleen om de inhoud van hun werk, maar ook om de personen zelf. Er waren filosofiedocenten die zich met de universiteit identificeerden en zich volledig konden ontplooien. Er waren er echter ook voor wie dit niet gold, die geïsoleerd of in gewetensnood raakten. Veel filosofiestudenten waren actief betrokken bij wat er in hun (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. Optic flow estimation by means of the polynomial transform.H. Yuen, B. Escalante & J. L. Silvan - 2004 - In Robert Schwartz (ed.), Perception. Malden Ma: Blackwell. pp. 181-182.
     
    Export citation  
     
    Bookmark  
  28.  46
    Online file sharing: resolving the tensions between privacy and property interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  29.  30
    Computer ethics textbooks: a thirty-year retrospective.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (3):26-31.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  30. Cyberstalking, personal privacy, and moral responsibility.Herman T. Tavani & Frances S. Grodzinsky - 2002 - Ethics and Information Technology 4 (2):123-132.
    This essay examines some ethical aspects of stalkingincidents in cyberspace. Particular attention is focused on the Amy Boyer/Liam Youens case of cyberstalking, which has raised a number of controversial ethical questions. We limit our analysis to three issues involving this particular case. First, we suggest that the privacy of stalking victims is threatened because of the unrestricted access to on-linepersonal information, including on-line public records, currently available to stalkers. Second, we consider issues involving moral responsibility and legal liability for Internet (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Cecilia Sjöholm, Doing Aesthetics with Arendt: How to See Things.Elena Tavani - 2018 - Estetika: The European Journal of Aesthetics 55 (1):122-131.
    A review of Cecilia Sjöholm‘s Doing Aesthetics with Arendt: How to See Things.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  20
    Metabibliography of computers, ethics, and society: an annotated bibliography of bibliographies.Herman T. Tavani - 1997 - Acm Sigcas Computers and Society 27 (1):19-21.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Un Adorno di fine millennio.Elena Tavani - 1999 - Studi di Estetica 20:320.
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Search engines, personal information and the problem of privacy in public.Herman T. Tavani - 2005 - International Review of Information Ethics 3:39-45.
    The purpose of this paper is to show how certain uses of search-engine technology raise concerns for personal privacy. In particular, we examine some privacy implications involving the use of search engines to acquire information about persons. We consider both a hypothetical scenario and an actual case in which one or more search engines are used to find information about an individual. In analyzing these two cases, we note that both illustrate an existing problem that has been exacerbated by the (...)
     
    Export citation  
     
    Bookmark   2 citations  
  35.  81
    Trust and multi-agent systems: applying the diffuse, default model of trust to experiments involving artificial agents. [REVIEW]Jeff Buechner & Herman T. Tavani - 2011 - Ethics and Information Technology 13 (1):39-51.
    We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical model of trust based on Richard Holton’s interpretation of P. F. Strawson’s writings on freedom and resentment, and we show why this account of trust is difficult to extend to artificial agents (AAs) as well as to other non-human entities. (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  36. Climate Change and Decision Theory.Andrea S. Asker & H. Orri Stefánsson - 2023 - In Pellegrino Gianfranco & Marcello Di Paola (eds.), Handbook of Philosophy of Climate Change. Springer Nature. pp. 267-286.
    Many people are worried about the harmful effects of climate change but nevertheless enjoy some activities that contribute to the emission of greenhouse gas (driving, flying, eating meat, etc.), the main cause of climate change. How should such people make choices between engaging in and refraining from enjoyable greenhouse-gas-emitting activities? In this chapter, we look at the answer provided by decision theory. Some scholars think that the right answer is given by interactive decision theory, or game theory; and moreover think (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  30
    Cyberethics biliography 2001: a select list of recent works.Herman T. Tavani - 2001 - Acm Sigcas Computers and Society 31 (2):30-36.
    Included in the 2001 annual bibliography update is a select list of recent books and articles, each with a publisher's date of either 2000 or 2001. For an annotated list of selected books and articles published between 1998 and 2000, see the June 1999 and June 2000 issues of Computers and Society; and for a comprehensive list of books and articles published before 1997, see my Computing, ethics, and social responsiblity: a bibliography.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Privacy-enhancing technologies as a panacea for online privacy concerns. Some ethical considerations.Herman Tavani - 2000 - Journal of Information Ethics 9 (2):26-36.
     
    Export citation  
     
    Bookmark   2 citations  
  39. L'esperienza estetica come esperienza di immagini. Walter Benjamin e Theodor W. Adorno.Elena Tavani - 2010 - Aisthesis: Pratiche, Linguaggi E Saperi Dell’Estetico 3 (2).
     
    Export citation  
     
    Bookmark  
  40.  35
    Privacy online.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (4):11-19.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  23
    Announcements.Herman T. Tavani - 2000 - Ethics and Information Technology 2 (4):251-255.
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  16
    A computer ethics bibliography.Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (2):8-18.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  7
    Bibliography update '99: recent books and articles of interest.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (2):28-30.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  44.  39
    Cyberethics as an Interdisciplinary Field of Applied Ethics: Key Concepts, Perspectives, and Methodological Frameworks.Herman Tavani - 2006 - Journal of Information Ethics 15 (2):18-36.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  23
    Cyberethics bibliography 2005.Herman T. Tavani - 2005 - Acm Sigcas Computers and Society 35 (3):3.
    Included in the 2005 cyberethics bibliography update is an annotated list of more than fifty recent books; each has a publisher's date of 2002 or later. This list expands upon the books identified and annotated in cyberethics bibliography included in the June 2003 issue of ACM Computers and Society Magazine. For information about selected books published between 1998 and 2002, see the June 1999, June 2000, June 2001, and June 2002 issues of Computers and Society; and for a comprehensive list (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  46.  67
    Computer Ethics as a Field of Applied Ethics.Herman T. Tavani - 2012 - Journal of Information Ethics 21 (2):52-70.
    The present essay includes an overview of key milestones in the development of computer ethics as a field of applied ethics. It also describes the ongoing debate about the proper scope of CE, as a subfield both in applied ethics and computer science. Following a brief description of the cluster of ethical issues that CE scholars and practitioners have generally considered to be the standard or "mainstream" issues comprising the field thus far, the essay speculates about the future direction of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  74
    Computer ethics in the post-september 11 world.Herman T. Tavani, Frances S. Grodzinsky & Richard A. Spinello - 2003 - Ethics and Information Technology 5 (4):181-182.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  24
    Computer ethics: philosophical enquiry.Herman T. Tavani & Lucas D. Introna - 1999 - Acm Sigcas Computers and Society 29 (1):4-8.
  49.  6
    Cecilia Sjöholm, Doing Aesthetics with Arendt: How to See Things.Elena Tavani - 2020 - Estetika: The European Journal of Aesthetics 55 (1):122.
  50.  75
    Can we Develop Artificial Agents Capable of Making Good Moral Decisions?: Wendell Wallach and Colin Allen: Moral Machines: Teaching Robots Right from Wrong, Oxford University Press, 2009, xi + 273 pp, ISBN: 978-0-19-537404-9.Herman T. Tavani - 2011 - Minds and Machines 21 (3):465-474.
1 — 50 / 986