Switch to: References

Add citations

You must login to add citations.
  1. Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • The technological construction of social power.Philip Brey - 2008 - Social Epistemology 22 (1):71 – 95.
    This essay presents a theory of the role of technology in the distribution and exercise of social power. The paper studies how technical artefacts and systems are used to construct, maintain or strengthen power relations between agents, whether individuals or groups, and how their introduction and use in society differentially empowers and disempowers agents. The theory is developed in three steps. First, a definition of power is proposed, based on a careful discussion of opposing definitions of power, and it is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  • Evaluating the social and cultural implications of the internet.Philip Brey - 2005 - Acm Sigcas Computers and Society 35 (3):1.
    Since the internet's breakthrough as a mass medium, it has become a topic of discussion because of its implications for society. At one extreme, one finds those who only see great benefits and consider the Internet a tool for freedom, commerce, connectivity, and other societal benefits. At the other extreme, one finds those who lament the harms and disadvantages of the Internet, and who consider it a grave danger to existing social structures and institutions, to culture, morality and human relations. (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark  
  • Disclosive computer ethics.Philip Brey - 2000 - Acm Sigcas Computers and Society 30 (4):10-16.
    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   45 citations  
  • The “black box” at work.Ifeoma Ajunwa - 2020 - Big Data and Society 7 (2).
    An oversized reliance on big data-driven algorithmic decision-making systems, coupled with a lack of critical inquiry regarding such systems, combine to create the paradoxical “black box” at work. The “black box” simultaneously demands a higher level of transparency from the worker in regard to data collection, while shrouding the decision-making in secrecy, making employer decisions even more opaque to the worker. To access employment, the worker is commanded to divulge highly personal information, and when hired, must submit further still to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations