About this topic
Summary Over the past decades the ubiquitous use of information technologies and the growth of the Internet contributed to exposing the importance of the ethical dimensions of information. Information ethics addresses the question as to whether information has or should have a moral value. Specifically, the main problem that information ethics addresses is how one should behave when information is collected, shared, produced or destroyed. Information ethics poses questions of normative ethics and metaethics: the issues are about how one should behave (normative ethics) and how right and wrong should be defined when information and its dynamics are considered (metaethics). The scope of such questions is quite wide and as such information ethics ranges over multiple domains and is part of several branches of applied ethics - computer ethics, medical ethics, business ethics and librarian ethics, to name a few.
Key works Conceptual foundations of information ethics as an ethical framework have been provided in Floridi 2013. A collection of essays on issues concerning information and computer ethics can be found in Himma & Tavani 2008 and Floridi 2010. An analysis of information ethics developed following a continental approach has been provided in Capurro 2006. The following are ethical analyses focusing on the moral value of information to address issues such as privacy (Floridi 2006) (Tavani 2008), online trust (Turilli et al 2012), information transparency (Turilli & Floridi 2009), internet neutrality (Turilli et al 2010) and cyber warfare (Taddeo forthcoming).
Introductions Buchanan 1999, Floridi 1999, Floridi 2006
Related categories

240 found
Order:
1 — 50 / 240
  1. The Battle of Samoa Revisited.Web Censoring Widens Across Southeast Asia - forthcoming - Journal of Information Ethics.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  2. Ethics Across Information Cultures.Elia V. Chepaitis - forthcoming - International Business Ethics.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  3. On Teaching Information.Roy Gladstone - forthcoming - Journal of Thought.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  4. Conceptualizing Self-Documentation.Tim Gorichanaz - forthcoming - Online Information Review 43.
    Purpose: Self-documentation is an increasingly common phenomenon, but it is not yet well understood. This paper provides a philosophical framework for analyzing examples of self-documentation on the dimensions of ontology, epistemology and ethics. Design/methodology/approach: The framework addresses these three major areas of philosophic thought by operationalizing insights from philosophy, chiefly the work of Martin Heidegger. Heidegger’s concepts of authenticity and fallenness inform the poles of each dimension of the framework. Findings: Ontologically, self-documentation may manifest as document (authentic) or data (fallen); (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  5. The Transfer of Patients 'Ethics Information Among Cooperating Institutions: A Future Function of Ethics Networks Jocelyn C. White, Md'.Esq Janine Sarti - forthcoming - Hec Forum: An Interdisciplinary Journal on Hospitals' Ethical and Legal Issues.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  6. Information Before Information Theory: The Politics of Data Beyond the Perspective of Communication.Colin Koopman - forthcoming - New Media and Society.
    Scholarship on the politics of new media widely assumes that communication functions as a sufficient conceptual paradigm for critically assessing new media politics. This article argues that communication-centric analyses fail to engage the politics of information itself, limiting information only to its consequences for communication, and neglecting information as it reaches into our selves, lives, and actions beyond the confines of communication. Furthering recent new media historiography on the “information theory” of Shannon and Wiener, the article reveals both the primacy (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  7. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  8. An Ethical Framework for Presenting Scientific Results to Policy-Makers.S. Andrew Schroeder - forthcoming - Kennedy Institute of Ethics Journal.
    Scientists have the ability to influence policy in important ways through how they present their results. Surprisingly, existing codes of scientific ethics have little to say about such choices. I propose that we can arrive at a set of ethical guidelines to govern scientists’ presentation of information to policymakers by looking to bioethics: roughly, just as a clinician should aim to promote informed decision-making by patients, a scientist should aim to promote informed decision-making by policymakers. Though this may sound like (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  9. Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  10. Ethical Analysis on the Application of Neurotechnology for Human Augmentation in Physicians and Surgeons.Soaad Hossain & Syed Ishtiaque Ahmed - 2021 - In Kohei Arai, Supriya Kapoor & Rahul Bhatia (eds.), Proceedings of the Future Technologies Conference (FTC) 2020. Switzerland: pp. 78-99.
    With the shortage of physicians and surgeons and increase in demand worldwide due to situations such as the COVID-19 pandemic, there is a growing interest in finding solutions to help address the problem. A solution to this problem would be to use neurotechnology to provide them augmented cognition, senses and action for optimal diagnosis and treatment. Consequently, doing so can negatively impact them and others. We argue that applying neurotechnology for human enhancement in physicians and surgeons can cause injustices, and (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to the right to privacy are (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Genes Are the New Black: Racism and 'Roots' in the Age of 23andMe.William H. Harwood - 2020 - Social Philosophy Today:153-177.
    Although there is much discussion in scientific and law journals regarding direct-to-consumer genetic testing (DTCGT), there is a paucity of philosophical-ethical examination of how such services threaten to repeat the essentialist, racial-projects of the past. On the one hand, testing for ancestry can be cathartic: for those lacking familial history as to when and how they came to be where they are, DTCGT can offer powerful access to their lineage and identity-formation. On the other hand, DTCGT inevitably reinscribes problematic epistemologies (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  13. The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data.Georgy Ishmaev - 2020 - Philosophy and Technology 33 (3):411-432.
    This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest present solutions aimed at reorganizing data flows in the Internet of Things architectures, enabling the secure and decentralized exchange of data between network participants. However, as this paper argues, the promised benefits are counterbalanced by a significant shift towards the propertization of private data, underlying these proposals. Considering the unique capacity (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  14. Beyond the Concept of Anonymity: What is Really at Stake?Björn Lundgren - 2020 - In Kevin Macnish & Jai Galliott (eds.), Big Data and Democracy. pp. 201-216.
    The aim of this paper is to discuss anonymity and the threats against it—in the form of deanonymization technologies. The question in the title is approached by conceptual analysis: I ask what kind of concept we need and how it ought to be conceptualized given what is really at stake. By what is at stake I mean the values that are threatened by various deanonymization technologies. It will be argued that while previous conceptualizations of anonymity may be reasonable—given a standard (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. How Software Developers Can Fix Part of GDPR’s Problem of Click-Through Consents.Björn Lundgren - 2020 - AI and Society 35 (3):759-760.
    It is argued that GDPR suffer from a practical problem of click-through consents, which developers of web browsers should resolve.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its use. We will (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17. Democratizing Algorithmic Fairness.Pak-Hang Wong - 2020 - Philosophy and Technology 33 (2):225-244.
    Algorithms can now identify patterns and correlations in the (big) datasets, and predict outcomes based on those identified patterns and correlations with the use of machine learning techniques and big data, decisions can then be made by algorithms themselves in accordance with the predicted outcomes. Yet, algorithms can inherit questionable values from the datasets and acquire biases in the course of (machine) learning, and automated algorithmic decision-making makes it more difficult for people to see algorithms as biased. While researchers have (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  18. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
    This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. Strange Loops: Apparent Versus Actual Human Involvement in Automated Decision-Making.Kiel Brennan-Marquez, Karen Levy & Daniel Susser - 2019 - Berkeley Technology Law Journal 34 (3).
    The era of AI-based decision-making fast approaches, and anxiety is mounting about when, and why, we should keep “humans in the loop” (“HITL”). Thus far, commentary has focused primarily on two questions: whether, and when, keeping humans involved will improve the results of decision-making (making them safer or more accurate), and whether, and when, non-accuracy-related values—legitimacy, dignity, and so forth—are vindicated by the inclusion of humans in decision-making. Here, we take up a related but distinct question, which has eluded the (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. The Canary in the Gold Mine: Ethics, Privacy, and Big Data Analytics.William H. Harwood - 2019 - Dialogue and Universalism 29 (3):141-150.
    This paper offers a sketch of the complicated conflicts which arise—and metastasize seemingly daily—in the era of Big Data. Given the public’s ubiquitous-yet-ostensibly-voluntary data surrender, and industry’s ubiquitous-yet-ostensibly-anodyne collection of the same, inaction is not an option for any near-just society. By revisiting the philosophical basis for Panoptic apparatus, sketching the tumultuous history of US contract law trying to protect the public from itself, and comparing existing industry codes for similarly-situated—read: terrifyingly invasive—fields, the paper will provide a preliminary framework for (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  22. Open Sourcing Normative Assumptions on Privacy and Other Moral Values in Blockchain Applications.Georgy Ishmaev - 2019 - Dissertation, Delft University of Technology
    The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such technological determinism, however, hardly provides insights of sufficient depth on the moral significance of blockchain technology. This thesis argues rather, that very much like the cryptographic tools before them, blockchains develop in a (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. How We Became Our Data: A Genealogy of the Informational Person.Colin Koopman - 2019 - Chicago, IL, USA: University of Chicago Press.
    We are now acutely aware, as if all of the sudden, that data matters enormously to how we live. How did information come to be so integral to what we can do? How did we become people who effortlessly present our lives in social media profiles and who are meticulously recorded in state surveillance dossiers and online marketing databases? What is the story behind data coming to matter so much to who we are? -/- In How We Became Our Data, (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  24. Transparency Trade-Offs: Priority Setting, Scarcity, and Health Fairness.Govind Persad - 2019 - In I. Glenn Cohen, Barbara Evans, Holly Lynch & Carmel Shachar (eds.), Transparency in Health and Health Care. New York: Cambridge UP.
    This chapter argues that rather than viewing transparency as a right, we should regard it as a finite resource whose allocation involves tradeoffs. It then argues that those tradeoffs should be resolved by using a multi-principle approach to distributive justice. The relevant principles include maximizing welfare, maximizing autonomy, and giving priority to the worst off. Finally, it examines some of the implications for law of recognizing the tradeoffs presented by transparency proposals.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2019 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. In this article, however, (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Era posverdad: Comunicación, política y filosofía.David Villena Saldaña - 2019 - Psicopraxia 1 (1):17-26.
    According to the Oxford dictionaries, the term ‘post-truth’ is the word of the year 2016. This title was granted to ‘post-truth’ because of its virtual omnipresence in the reviews and assessments of several political events that took place during that year. The present essay shows how post-truth politicians try to connect with people, and offers a reflection on the philosophical implications of this new attitude towards truth and empirical evidence.
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  27. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’T.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  28. The Info-Computational Turn in Bioethics.Constantin Vică - 2019 - In Emilian Mihailov, Tenzin Wangmo, Victoria Federiuc & Bernice Elger (eds.), Contemporary Debates in Bioethics: European Perspectives. De Gruyter Open. pp. 108-120.
    Our technological lifeworld has become an info-computational media populated by data and algorithms, an artificial environment for life and shared experiences. In this chapter, I tried to sketch three new assumptions for bioethics – it is hardly possible to substantiate ethical guidelines or an idea of normativity in an aprioristic manner; moral status is a function of data entities, not something solely human; agency is plural and thus is shared or sometimes delegated – in order to chart a proposal for (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29. Mind the Gap! How the Digital Turn Upsets Intellectual Property.Constantin Vică & Emanuel-Mihail Socaciu - 2019 - Science and Engineering Ethics 25 (1):247-264.
    Intellectual property is one of the highly divisive issues in contemporary philosophical and political debates. The main objective of this paper is to explore some sources of tension between the formal rules of intellectual property (particularly copyright and patents) and the emerging informal norms of file sharing and open access in online environments. We look into the file sharing phenomena not only to illustrate the deepening gap between the two sets of norms, but to cast some doubt on the current (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. An Ethics Framework for Big Data in Health and Research.Vicki Xafis, G. Owen Schaefer, Markus K. Labude, Iain Brassington, Angela Ballantyne, Hannah Yeefen Lim, Wendy Lipworth, Tamra Lysaght, Cameron Stewart, Shirley Sun, Graeme T. Laurie & E. Shyong Tai - 2019 - Asian Bioethics Review 11 (3):227-254.
    Ethical decision-making frameworks assist in identifying the issues at stake in a particular setting and thinking through, in a methodical manner, the ethical issues that require consideration as well as the values that need to be considered and promoted. Decisions made about the use, sharing, and re-use of big data are complex and laden with values. This paper sets out an Ethics Framework for Big Data in Health and Research developed by a working group convened by the Science, Health and (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  31. Nghiên cứu do NAFOSTED tài trợ vừa được công bố trên tạp chí Scientific Data.Ngọc Huyền - 2018 - Khoa Học and Phát Triển 2018 (9):1-3.
    Nhóm nghiên cứu thuộc dự án Mạng lưới các nhà khoa học xã hội Việt Nam (NVSS) vừa có bài công bố trên Scientific Data, một tạp chí uy tín về khoa học dữ liệu, giáo dục và thống kê-xác suất thuộc Nature Research.
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  32. Infopolitics, Biopolitics, Anatomopolitics.Colin Koopman - 2018 - Graduate Faculty Philosophy Journal 39 (1):103-128.
    This paper argues for a distinctive concept of "infopolitics" as a theoretical tool for understanding how new regimes of data are exerting increasing political control of our lives. It seems almost undeniable today that there is a politics at stake in such ubiquitous features of our society as social media interaction, electioneering (and election hacking) through those interactions, cell phone addiction, personal information monetization, the lack of security in personal data markets, and massively-scaled state surveillance. Yet, even if the fact (...)
    Remove from this list   Direct download (4 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  33. Against Nature: The Metaphysics of Information Systems.David Kreps - 2018 - London, UK: Routledge.
    Against Nature – Chapter Abstracts Chapter 1. A Transdisciplinary Approach. In this short book you will find philosophy – metaphysical and political - economics, critical theory, complexity theory, ecology, sociology, journalism, and much else besides, along with the signposts and reference texts of the Information Systems field. Such transdisciplinarity is a challenge for both author and reader. Such books are often problematic: sections that are just old hat to one audience are by contrast completely new and difficult to another. My (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, KTH Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the current leading definitions (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  35. Homesteading the Noosphere: The Ethics of Owning Biological Information.Robert R. Wadholm - 2018 - Northern Plains Ethics Journal 6 (1):47-63.
    The idea of homesteading can be extended to the realm of biological entities, to the ownership of information wherein organisms perform artifactual functions as a result of human development. Can the information of biological entities be ethically “homesteaded”: should humans (or businesses) have ownership rights over this information from the basis of mere development and possession, as in Locke’s theory of private property? I offer three non-consequentialist arguments against such homesteading: the information makeup of biological entities is not commonly owned, (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  36. The Meaning of ‘Other’ in Classifications: Formal Methods Meet Artistic Research.Patrick Allo - 2017 - Philosophy and Technology 30 (4):541-545.
    This commentary is a reflection on a collaboration with the artist Rossella Biscotti and comments on how artistic research and logico-mathematical methods can be used to contribute to the development of critical perspectives on contemporary data practices.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37. Informação, conhecimento e modelos.Marcos Antonio Alves, Daniel Martínez-Ávila & Maria Cláudia Cabrini Gracio (eds.) - 2017 - Campinas-Marília/Brasil: Coleção CLE-Unicamp/Cultura Acadêmica-UNESP.
    We are in the information age. Nowadays, the information is a high power commodity. Your domain and handling have high economic, political, social value. However, we still know little about it. What is the information? How do we store it, retrieve it and manipulate it? Everyone have or should have equal access to information? What is the relationship between information and knowledge? How can both influence and be influenced by the action? Can they are modeled? The models can contribute to (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  38. 'Information as a Condition of Justice in Financial Markets: The Regulation of Credit-Rating Agencies.Boudewijn De Bruin - 2017 - In Lisa Maria Herzog (ed.), Just Financial Markets? Finance in a Just Society. Oxford: Oxford University Press. pp. 250-270.
    This chapter argues for deregulation of the credit-rating market. Credit-rating agencies are supposed to contribute to the informational needs of investors trading bonds. They provide ratings of debt issued by corporations and governments, as well as of structured debt instruments (e.g. mortgage-backed securities). As many academics, regulators, and commentators have pointed out, the ratings of structured instruments turned out to be highly inaccurate, and, as a result, they have argued for tighter regulation of the industry. This chapter shows, however, that (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39. The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And it (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40. Secrecy, Transparency and Government Whistleblowing.William H. Harwood - 2017 - Philosophy and Social Criticism 43 (2):164-186.
    In the first part of the 21st century, the complicated relationship between transparency and security reached a boiling point with revelations of extra-judicial CIA activities, near universal NSA monitoring and unprecedented whistleblowing – and prosecution of whistleblowers under the Espionage Act. This article examines the dual necessities of security and transparency for any democracy, and the manner in which whistleblowers radically saddle this Janus-faced relationship. Then I will move to contemporary examples of whistleblowing, showing how and why some prove more (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41. Information Cultures in the Digital Age.Matthew Kelly & Jared Bielby (eds.) - 2016 - Wiesbaden, Germany: Springer VS.
    For several decades Rafael Capurro has been at the forefront of defining the relationship between information and modernity through both phenomenological and ethical formulations. In exploring both of these themes Capurro has re-vivified the transcultural and intercultural expressions of how we bring an understanding of information to bear on scientific knowledge production and intermediation. Capurro has long stressed the need to look deeply into how we contextualize the information problems that scientific society creates for us and to re-incorporate a pragmatic (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Data Science and Mass Media: Seeking a Hermeneutic Ethics of Information.Christine James - 2015 - Proceedings of the Society for Phenomenology and Media, Vol. 15, 2014, Pages 49-58 15 (2014):49-58.
    In recent years, the growing academic field called “Data Science” has made many promises. On closer inspection, relatively few of these promises have come to fruition. A critique of Data Science from the phenomenological tradition can take many forms. This paper addresses the promise of “participation” in Data Science, taking inspiration from Paul Majkut’s 2000 work in Glimpse, “Empathy’s Impostor: Interactivity and Intersubjectivity,” and some insights from Heidegger’s "The Question Concerning Technology." The description of Data Science provided in the scholarly (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  44. Comparative Philosophies in Intercultural Information Ethics.Bielby Jared - 2015 - Confluence 2:233-253.
    The following review explores Intercultural Information Ethics in terms of comparative philosophy, supporting IIE as the most relevant and significant development of the field of Information Ethics. The focus of the review is threefold. First, it will review the core presumption of the field of IIE, that being the demand for an intermission in the pursuit of a founding philosophy for IE in order to first address the philosophical biases of IE by western philosophy. Second, a history of the various (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Human Rights and Access to Information.Bartlomiej Lenart & Miranda Koshelek - 2015 - Progressive Librarian (43).
    Unresolved disagreements on issues of access, censorship, and privacy within the information profession can be dangerous when entrepreneurial interests outweigh the public good and as corporations anticipate financial gain from placing limitations on information retrieval and use. The information profession can benefit from a grounding of its core values in a robust moral framework that can coherently place demands on interested parties. We argue that grounding the core values of privacy and ubiquitous access to information in a needs-based theory of (...)
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  46. Human Rights as Subject and Guide to LIS Research and Practice.Kay Mathiesen - 2015 - Journal for the Association of Information Science and Technology 66 (7):1305-1322.
    In this “global information age” accessing, disseminating, and controlling information is an increasingly important aspect of human life. Often these interests are expressed in the language of human rights—e.g., rights to expression, privacy, and intellectual property. As the discipline concerned with, “Facilitating the effective communication of desired information between human generator and human user” (Belkin, 1975, 22), Library and Information Science (LIS) has a central role in facilitating communication about human rights and ensuring the respect for human rights in information (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Derecho al olvido en Internet: Google y la doctrina europea.David Villena Saldaña - 2015 - Contratexto 23 (23):259-269.
    This essay accounts for part of the moral, social and legal problems behind the attempts for justifying and implementing the so-called right to be forgotten in the Internet. Such right implies that –under certain circumstances–individuals are entitled to demand that search engines remove links containing their personal information. Our inquiry reflects on a ruling issued by the Court of Justice of the European Union and made public on May 13th 2014, as well as on the recommendations conveyed in Article 29 (...)
    Remove from this list   Direct download (3 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  48. Information Societies, Ethical Enquiries.Mariarosaria Taddeo & Elizabeth Buchanan - 2015 - Philosophy and Technology 28 (1):5-10.
    The special issue collects a selection of papers presented during the Computer Ethics: Philosophical Enquiries 2013 conference. This is a series of conferences organized by the International Association for Ethics and Information Technology , a professional organization formed in 2001 and which gathers experts in information and computer ethics prompting interdisciplinary research and discussions on ethical problems related to design and deployment of information and communication technologies . During the past two decades, CEPE conferences have been a focal point for (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. Philosophy, Computing and Information Science.Ruth Hagengruber & Uwe Riss (eds.) - 2014 - Chatto & Pickering.
    Over the last four decades computers and the internet have become an intrinsic part of all our lives, but this speed of development has left related philosophical enquiry behind. Featuring the work of computer scientists and philosophers, these essays provide an overview of an exciting new area of philosophy that is still taking shape.
    Remove from this list  
     
    Export citation  
     
    Bookmark   1 citation  
  50. The Philosophical Library.Rick Lewis - 2014 - Philosophy Now 103:22-22.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 240