Switch to: References

Add citations

You must login to add citations.
  1. A Pragmatic Theory of Computational Artefacts.Alessandro G. Buda & Giuseppe Primiero - 2024 - Minds and Machines 34 (1):139-170.
    Some computational phenomena rely essentially on pragmatic considerations, and seem to undermine the independence of the specification from the implementation. These include software development, deviant uses, esoteric languages and recent data-driven applications. To account for them, the interaction between pragmatics, epistemology and ontology in computational artefacts seems essential, indicating the need to recover the role of the language metaphor. We propose a User Levels (ULs) structure as a pragmatic complement to the Levels of Abstraction (LoAs)-based structure defining the ontology and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Computational Artifacts: the Things of Computer Science.Raymond Turner - 2019 - Philosophy and Technology 10 (2):47-69.
    The reviewers Rapaport, Stephanou, Angius, Primiero, and Bringsjord of Turner cover a broad range of topics in the philosophy of computer science. They either challenge the positions outlined in Turner or offer a more refined analysis. This article is a response to their challenges.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Computational Artifacts: the Things of Computer Science.Raymond Turner - 2020 - Philosophy and Technology 33 (2):357-367.
    The reviewers Rapaport, Stephanou, Angius, Primiero, and Bringsjord of Turner cover a broad range of topics in the philosophy of computer science. They either challenge the positions outlined in Turner or offer a more refined analysis. This article is a response to their challenges.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • An Information-based Solution for the Puzzle of Testimony and Trust.Mariarosaria Taddeo - 2010 - Social Epistemology 24 (4):285-299.
    In this paper, I offer a contribution to the debate on testimony that rests on three elements: the definition of semantic information, the analysis of trust as a second?order property of first?order relations, and Floridi?s Network Theory of Account (NTA). I argue that testimony transmits semantic information and it is neither grounded on trust nor justified by it. Instead, I show that testimony is an occurrence of a first?order relation of communication affected by the second?order property of trust. I then (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Why There is no General Solution to the Problem of Software Verification.John Symons & Jack K. Horner - 2020 - Foundations of Science 25 (3):541-557.
    How can we be certain that software is reliable? Is there any method that can verify the correctness of software for all cases of interest? Computer scientists and software engineers have informally assumed that there is no fully general solution to the verification problem. In this paper, we survey approaches to the problem of software verification and offer a new proof for why there can be no general solution.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Why There is no General Solution to the Problem of Software Verification.John Symons & Jack J. Horner - 2020 - Foundations of Science 25 (3):541-557.
    How can we be certain that software is reliable? Is there any method that can verify the correctness of software for all cases of interest? Computer scientists and software engineers have informally assumed that there is no fully general solution to the verification problem. In this paper, we survey approaches to the problem of software verification and offer a new proof for why there can be no general solution.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Can we trust Big Data? Applying philosophy of science to software.John Symons & Ramón Alvarado - 2016 - Big Data and Society 3 (2).
    We address some of the epistemological challenges highlighted by the Critical Data Studies literature by reference to some of the key debates in the philosophy of science concerning computational modeling and simulation. We provide a brief overview of these debates focusing particularly on what Paul Humphreys calls epistemic opacity. We argue that debates in Critical Data Studies and philosophy of science have neglected the problem of error management and error detection. This is an especially important feature of the epistemology of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  • Art: Brought to You by Creative Machines.Steffen Steinert - 2017 - Philosophy and Technology 30 (3):267-284.
    In this paper, I argue that machines can create works of art. My argument is based on an analysis of the so-called creative machines and focuses on technical functions and intentions. If my proposal is correct, then creative machines are technical artifacts with the proper function to bring about works of art. My account is based on sensible conceptual connections between makers, technical artifacts, intentions, and the creation of art. One upshot of the account presented here is that we do (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is new to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Building General Knowledge of Mechanisms in Information Security.Jonathan M. Spring & Phyllis Illari - 2019 - Philosophy and Technology 32 (4):627-659.
    We show how more general knowledge can be built in information security, by the building of knowledge of mechanism clusters, some of which are multifield. By doing this, we address in a novel way the longstanding philosophical problem of how, if at all, we come to have knowledge that is in any way general, when we seem to be confined to particular experiences. We also address the issue of building knowledge of mechanisms by studying an area that is new to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Why Separation Logic Works.David Pym, Jonathan M. Spring & Peter O’Hearn - 2019 - Philosophy and Technology 32 (3):483-516.
    One might poetically muse that computers have the essence both of logic and machines. Through the case of the history of Separation Logic, we explore how this assertion is more than idle poetry. Separation Logic works because it merges the software engineer’s conceptual model of a program’s manipulation of computer memory with the logical model that interprets what sentences in the logic are true, and because it has a proof theory which aids in the crucial problem of scaling the reasoning (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • On the Ontology of the Computing Process and the Epistemology of the Computed.Giuseppe Primiero - 2014 - Philosophy and Technology 27 (3):485-489.
    Software-intensive science challenges in many ways our current scientific methods. This affects significantly our notion of science and scientific interpretation of the world, driving at the same time the philosophical debate. We consider some issues prompted by SIS in the light of the philosophical categories of ontology and epistemology.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • On Malfunction, Mechanisms and Malware Classification.Giuseppe Primiero, Frida J. Solheim & Jonathan M. Spring - 2019 - Philosophy and Technology 32 (2):339-362.
    Malware has been around since the 1980s and is a large and expensive security concern today, constantly growing over the past years. As our social, professional and financial lives become more digitalised, they present larger and more profitable targets for malware. The problem of classifying and preventing malware is therefore urgent, and it is complicated by the existence of several specific approaches. In this paper, we use an existing malware taxonomy to formulate a general, language independent functional description of malware (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Design, Malfunction, Validity: Three More Tasks for the Philosophy of Computing.Giuseppe Primiero - 2020 - Philosophy and Technology 33 (2):331-337.
    We present a review of Raymond Turner’s Book Computational Artifacts – Towards a Philosophy of Computer Science, focusing on three main topics: Design, Malfunction, and Validity.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • A theory of change for prioritised resilient and evolvable software systems.Giuseppe Primiero, Franco Raimondi & Taolue Chen - 2019 - Synthese 198 (S23):5719-5744.
    The process of completing, correcting and prioritising specifications is an essential but very complex task for the maintenance and improvement of software systems. The preservation of functionalities and the ability to accommodate changes are main objectives of the software development cycle to guarantee system reliability. Logical theories able to fully model such processes are still insufficient. In this paper we propose a full formalisation of such operations on software systems inspired by the Alchourrón–Gärdenfors–Makinson paradigm for belief revision of human epistemic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Algorithmic Iteration for Computational Intelligence.Giuseppe Primiero - 2017 - Minds and Machines 27 (3):521-543.
    Machine awareness is a disputed research topic, in some circles considered a crucial step in realising Artificial General Intelligence. Understanding what that is, under which conditions such feature could arise and how it can be controlled is still a matter of speculation. A more concrete object of theoretical analysis is algorithmic iteration for computational intelligence, intended as the theoretical and practical ability of algorithms to design other algorithms for actions aimed at solving well-specified tasks. We know this ability is already (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Humanistic interpretation and machine learning.Juho Pääkkönen & Petri Ylikoski - 2021 - Synthese 199:1461–1497.
    This paper investigates how unsupervised machine learning methods might make hermeneutic interpretive text analysis more objective in the social sciences. Through a close examination of the uses of topic modeling—a popular unsupervised approach in the social sciences—it argues that the primary way in which unsupervised learning supports interpretation is by allowing interpreters to discover unanticipated information in larger and more diverse corpora and by improving the transparency of the interpretive process. This view highlights that unsupervised modeling does not eliminate the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Iterated privation and positive predication.Bjørn Jespersen, Massimiliano Carrara & Marie Duží - 2017 - Journal of Applied Logic 25:S48-S71.
    The standard rule of single privative modification replaces privative modifiers by Boolean negation. This rule is valid, for sure, but also simplistic. If an individual a instantiates the privatively modified property (MF) then it is true that a instantiates the property of not being an F, but the rule fails to express the fact that the properties (MF) and F have something in common. We replace Boolean negation by property negation, enabling us to operate on contrary rather than contradictory properties. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • When Logic Meets Engineering: Introduction to Logical Issues in the History and Philosophy of Computer Science.Liesbeth De Mol & Giuseppe Primiero - 2015 - History and Philosophy of Logic 36 (3):195-204.
    The birth, growth, stabilization and subsequent understanding of a new field of practical and theoretical enquiry is always a conceptual process including several typologies of events, phenomena an...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Infringing Software Property Rights: Ontological, Methodological, and Ethical Questions.Nicola Angius & Giuseppe Primiero - 2020 - Philosophy and Technology 33 (2):283-308.
    This paper contributes to the computer ethics debate on software ownership protection by examining the ontological, methodological, and ethical problems related to property right infringement that should come prior to any legal discussion. The ontological problem consists in determining precisely what it is for a computer program to be a copy of another one, a largely neglected problem in computer ethics. The methodological problem is defined as the difficulty of deciding whether a given software system is a copy of another (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • From Coding To Curing. Functions, Implementations, and Correctness in Deep Learning.Nicola Angius & Alessio Plebe - 2023 - Philosophy and Technology 36 (3):1-27.
    This paper sheds light on the shift that is taking place from the practice of ‘coding’, namely developing programs as conventional in the software community, to the practice of ‘curing’, an activity that has emerged in the last few years in Deep Learning (DL) and that amounts to curing the data regime to which a DL model is exposed during training. Initially, the curing paradigm is illustrated by means of a study-case on autonomous vehicles. Subsequently, the shift from coding to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Explaining Engineered Computing Systems’ Behaviour: the Role of Abstraction and Idealization.Nicola Angius & Guglielmo Tamburrini - 2017 - Philosophy and Technology 30 (2):239-258.
    This paper addresses the methodological problem of analysing what it is to explain observed behaviours of engineered computing systems, focusing on the crucial role that abstraction and idealization play in explanations of both correct and incorrect BECS. First, it is argued that an understanding of explanatory requests about observed miscomputations crucially involves reference to the rich background afforded by hierarchies of functional specifications. Second, many explanations concerning incorrect BECS are found to abstract away from descriptions of physical components and processes (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • AI as an Epistemic Technology.Ramón Alvarado - 2023 - Science and Engineering Ethics 29 (5):1-30.
    In this paper I argue that Artificial Intelligence and the many data science methods associated with it, such as machine learning and large language models, are first and foremost epistemic technologies. In order to establish this claim, I first argue that epistemic technologies can be conceptually and practically distinguished from other technologies in virtue of what they are designed for, what they do and how they do it. I then proceed to show that unlike other kinds of technology (_including_ other (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • The philosophy of computer science.Raymond Turner - 2013 - Stanford Encyclopedia of Philosophy.
  • The ethics of algorithms: mapping the debate.Brent Mittelstadt, Patrick Allo, Mariarosaria Taddeo, Sandra Wachter & Luciano Floridi - 2016 - Big Data and Society 3 (2).
    In information societies, operations, decisions and choices previously left to humans are increasingly delegated to algorithms, which may advise, if not decide, about how data should be interpreted and what actions should be taken as a result. More and more often, algorithms mediate social processes, business transactions, governmental decisions, and how we perceive, understand, and interact among ourselves and with the environment. Gaps between the design and operation of algorithms and our understanding of their ethical implications can have severe consequences (...)
    Direct download  
     
    Export citation  
     
    Bookmark   163 citations  
  • Explaining Epistemic Opacity.Ramón Alvarado - unknown
    Conventional accounts of epistemic opacity, particularly those that stem from the definitive work of Paul Humphreys, typically point to limitations on the part of epistemic agents to account for the distinct ways in which systems, such as computational methods and devices, are opaque. They point, for example, to the lack of technical skill on the part of an agent, the failure to meet standards of best practice, or even the nature of an agent as reasons why epistemically relevant elements of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • A logic of efficient and optimal designs.Giuseppe Primiero - 2019 - Journal of Logic and Computation 14:0-22.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations