Switch to: References

Add citations

You must login to add citations.
  1. Questioning Two Assumptions in the Metaphysics of Technological Objects.Sadjad Soltanzadeh - 2016 - Philosophy and Technology 29 (2):127-135.
    There are at least two assumptions which, except for very few occasions, have not been discussed by philosophers who have written on the metaphysics of technological objects. The first assumption is that to be a technology is an absolute matter and that all technological objects are equally technological. The second assumption is that the property of being technological is abstracted from existing things which happen to have this property in common. I appeal to the definition of technological objects as problem-solving (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Customizable Ethics Settings for Building Resilience and Narrowing the Responsibility Gap: Case Studies in the Socio-Ethical Engineering of Autonomous Systems.Sadjad Soltanzadeh, Jai Galliott & Natalia Jevglevskaja - 2020 - Science and Engineering Ethics 26 (5):2693-2708.
    Ethics settings allow for morally significant decisions made by humans to be programmed into autonomous machines, such as autonomous vehicles or autonomous weapons. Customizable ethics settings are a type of ethics setting in which the users of autonomous machines make such decisions. Here two arguments are provided in defence of customizable ethics settings. Firstly, by approaching ethics settings in the context of failure management, it is argued that customizable ethics settings are instrumentally and inherently valuable for building resilience into the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Perceptions of Beauty in Security Ceremonies.Giampaolo Bella, Jacques Ophoff, Karen Renaud, Diego Sempreboni & Luca Viganò - 2022 - Philosophy and Technology 35 (3):1-34.
    When we use secure computer systems, we engage with carefully orchestrated and ordered interactions called “security ceremonies”, all of which exist to assure security. A great deal of attention has been paid to improving the usability of these ceremonies over the last two decades, to make them easier for end-users to engage with. Yet, usability improvements do not seem to have endeared end users to ceremonies. As a consequence, human actors might subvert the ceremony’s processes or avoid engaging with it. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark