Results for ' computer technology'

1000+ found
Order:
  1. Using computing technology for philosophical research.Robert Cavalier - 1998 - In Terrell Ward Bynum & James Moor (eds.), The Digital Phoenix: How Computers Are Changing Philosophy. Blackwell. pp. 388.
  2. Using computer technology for teaching philosophy.Ron Barnette - 1998 - In Terrell Ward Bynum & James Moor (eds.), The Digital Phoenix: How Computers Are Changing Philosophy. Blackwell. pp. 393.
  3.  11
    Ubiquitous Computing: Technological Autonomy or Human Autonomy?Zhu Wenxi & Wang Guoyu - 2018 - Philosophy Study 8 (5).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  14
    Integrating computer technology: Blurring the roles of teachers, students, and experts.Dara H. Wexler - 2000 - Educational Studies 31 (1):33-43.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  39
    Computer Technology and Evolution.Klaus Mainzer - 1998 - Techné: Research in Philosophy and Technology 4 (1):63-71.
  6.  14
    Computer Technology and Evolution.Klaus Mainzer - 1998 - Techné: Research in Philosophy and Technology 4 (1):63-71.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  6
    Computer technologies in the contemporary educational process: The ethical aspect.I. V. Tsvyk - 2017 - RUDN Journal of Philosophy 19 (3):379-388.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  32
    Computational Technologies and Images of the Self.Sherry Turkle - 1997 - Social Research: An International Quarterly 64.
  9. Using computing technology for professional cooperation.Lawrence M. Hinman - 1998 - In Terrell Ward Bynum & James Moor (eds.), The Digital Phoenix: How Computers Are Changing Philosophy. Blackwell. pp. 397.
  10.  42
    Cultural consequences of computing technology.Daniel Memmi - 2013 - AI and Society 28 (1):77-85.
    Computing technology is clearly a technical revolution but will most probably bring about a cultural revolution as well. The effects of this technology on human culture will be dramatic and far-reaching. Yet, computers and electronic networks are but the latest development in a long history of cognitive tools, such as writing and printing. We will examine this history, which exhibits long-term trends toward an increasing democratization of culture, before turning to today’s technology. Within this framework, we will (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  45
    Employee Monitoring and Computer Technology.Adam D. Moore - 2000 - Business Ethics Quarterly 10 (3):697-709.
    In this article I address the tension between evaluative surveillance and privacy against the backdrop of the current explosion of information technology. More specifically, and after a brief analysis of privacy rights, I argue that knowledge of the different kinds ofsurveillance used at any given company should be made explicit to the employees. Moreover, there will be certain kinds of evaluativemonitoring that violate privacy rights and should not be used in most cases.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  12.  64
    Employee Monitoring and Computer Technology.Adam D. Moore - 2000 - Business Ethics Quarterly 10 (3):697-709.
    In this article I address the tension between evaluative surveillance and privacy against the backdrop of the current explosion of information technology. More specifically, and after a brief analysis of privacy rights, I argue that knowledge of the different kinds ofsurveillance used at any given company should be made explicit to the employees. Moreover, there will be certain kinds of evaluativemonitoring that violate privacy rights and should not be used in most cases.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  13.  19
    A History of Computing Technology. Michael R. Williams.Larry Owens - 1987 - Isis 78 (4):625-626.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14. Iteration Unleashed. Computer Technology in Science.Johannes Lenhard - 2015 - In Sven Ove Hansson (ed.), The Role of Technology in Science: Philosophical Perspectives. Dordrecht: Springer Verlag.
     
    Export citation  
     
    Bookmark  
  15.  41
    On the impact of quantum computing technology on future developments in high-performance scientific computing.Matthias Möller & Cornelis Vuik - 2017 - Ethics and Information Technology 19 (4):253-269.
    Quantum computing technologies have become a hot topic in academia and industry receiving much attention and financial support from all sides. Building a quantum computer that can be used practically is in itself an outstanding challenge that has become the ‘new race to the moon’. Next to researchers and vendors of future computing technologies, national authorities are showing strong interest in maturing this technology due to its known potential to break many of today’s encryption techniques, which would have (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  36
    Human Values and the Design of Computer Technology.Batya Friedman (ed.) - 1997 - Center for the Study of Language and Inf.
    Perhaps this is due to the belief that technology has a value-neutral nature, and that issues of value are better left to philosophers.
    Direct download  
     
    Export citation  
     
    Bookmark   34 citations  
  17.  72
    Human values and the design of computer technology, edited by batya Friedman.John M. Artz - 1999 - Ethics and Information Technology 1 (4):305-306.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  18.  12
    Achieving a Self-Satisfied Intimate Life Through Computer Technologies?Nicola Liberati - 2018 - In Andrea Altobrando, Takuya Niikawa & Richard Stone (eds.), The Realizations of the Self. Cham: Palgrave MacMillan. pp. 233-247.
    This work aims to understand how a subject can be sentimentally and intimately self-realized by having a relationship with other people through computer technologies. We will analyze the relations binding together the subjects when their “presence” and “interactions” are digitally mediated thanks to a phenomenological analysis. In the first part, we will highlight the differences of using digital devices instead of having face-to-face meetings, especially in virtual worlds. In the second part, we will focus on how other digital devices (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Virtual life and perpetualogy (self-preservation of virtual entities in computational technology).L. Andrasik - 1998 - Filozofia 53 (1):15-26.
     
    Export citation  
     
    Bookmark  
  20.  72
    Computer Art, Technology, and the Medium.Christopher Bartel - 2022 - Being and Value in Technology.
    Technological advancements often lead to revolutions in the creation of art; but, what is unclear is whether such advancements always correspond to revolutions regarding the artistic medium. The notion of an artistic medium is central to our thinking about, engagement with, and appreciation of art. Accounts of the interpretation, understanding, and experience of art must at some point grapple with the role of the artistic medium against such endeavors. Moreover, artists do not choose their medium by accident, but presumably do (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  21
    Collingridge and the Control of Educational Computer Technology.Marvin J. Croy - 1996 - Techné: Research in Philosophy and Technology 1 (3-4):107-115.
  22.  10
    The formation of future preschool teachers’ competence required for using computer technology.Racu Igor, Lystopad Oleksii & Mardarova Iryna - 2017 - Science and Education: Academic Journal of Ushynsky University 25 (5):23-26.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  18
    In sweet harmony or in bitter discord? How cultural values and stakeholder requirements shape and users read an urban computing technology.Leena Ventä-Olkkonen, Netta Iivari & Arto Lanamäki - 2019 - AI and Society 34 (3):455-476.
    Culture is, in many ways, implicated in and shapes technology design and use. Inspired by Stuart Hall’s conception of encoding/decoding, we maintain that technological artefacts reflect the cultural values of their creators, while users, in their encounters with the technological artefacts, may decode those artefacts in various ways that are shaped by the users’ cultural values. In this article, we apply this lens to study a decade-long urban computing project that took place in the wild. We focus on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  17
    Managing the Technological Edge: The UNESCO International Computation Centre and the Limits to the Transfer of Computer Technology, 1946-61.David Nofre - 2014 - Annals of Science 71 (3):410-431.
    SummaryThe spread of the modern computer is assumed to have been a smooth process of technology transfer. This view relies on an assessment of the open circulation of knowledge ensured by the US and British governments in the early post-war years. This article presents new historical evidence that question this view. At the centre of the article lies the ill-fated establishment of the UNESCO International Computation Centre. The project was initially conceived in 1946 to provide advanced computation capabilities (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Governmentality in an age of autonomic computing: technology, virtuality and Utopia.Antoinette Rouvroy - 2011 - In Mireille Hildebrandt & Antoinette Rouvroy (eds.), The Philosophy of Law Meets the Philosophy of Technology: Autonomic Computing and Transformations of Human Agency. Routledge.
     
    Export citation  
     
    Bookmark  
  26.  39
    Chapter 20: Ethics in Engineering and Computing Technology.Deborah G. Johnson - 2006 - Techné: Research in Philosophy and Technology 10 (2):191-201.
  27.  18
    Chapter 20: Ethics in Engineering and Computing Technology.Deborah G. Johnson - 2006 - Techné: Research in Philosophy and Technology 10 (2):191-201.
  28.  34
    Computing and technology ethics: engaging through science fiction.Emanuelle Burton - 2023 - Cambridge, Massachusetts: The MIT Press. Edited by Judith Goldsmith, Nicholas Mattei, Cory Siler & Sara-Jo Swiatek.
    Provides a comprehensive introduction to ethical frameworks and of many of the modern issues arising in technology ethics including computing, privacy, artificial intelligence, and more.
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  95
    Abductive inference: computation, philosophy, technology.John R. Josephson & Susan G. Josephson (eds.) - 1994 - New York: Cambridge University Press.
    In informal terms, abductive reasoning involves inferring the best or most plausible explanation from a given set of facts or data. It is a common occurrence in everyday life and crops up in such diverse places as medical diagnosis, scientific theory formation, accident investigation, language understanding, and jury deliberation. In recent years, it has become a popular and fruitful topic in artificial intelligence research. This volume breaks new ground in the scientific, philosophical, and technological study of abduction. It presents new (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   81 citations  
  30. Computer systems and responsibility: A normative look at technological complexity.Deborah G. Johnson & Thomas M. Powers - 2005 - Ethics and Information Technology 7 (2):99-107.
    In this paper, we focus attention on the role of computer system complexity in ascribing responsibility. We begin by introducing the notion of technological moral action (TMA). TMA is carried out by the combination of a computer system user, a system designer (developers, programmers, and testers), and a computer system (hardware and software). We discuss three sometimes overlapping types of responsibility: causal responsibility, moral responsibility, and role responsibility. Our analysis is informed by the well-known accounts provided by (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  31.  37
    Technology paternalism – wider implications of ubiquitous computing.Sarah Spiekermann & Frank Pallas - 2006 - Poiesis and Praxis 4 (1):6-18.
    Ubiquitous computing technologies will have a wide impact on our daily lives in the future. Currently, most debates about social implications of these technologies concentrate on different aspects of privacy and data security. However, the authors of this paper argue that there is more to consider from a social perspective: In particular, the question is raised how people can maintain control in environments that are supposed to be totally automated. Hinting at the possibility that people may be subdued to machines’ (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  32.  14
    Book Reviews of The Renaissance Computer: Technology in the First Age of Print, Book Marketing and Promotion: A Handbook of Good Practice, Libraries in the ancient world, The Memory of Mankind: The Story of Libraries since the Dawn of History, Jerusalem: City of the Book: 40 Years of the Jerusalem International BookFair. [REVIEW]Richard Abel, Henry Chakava, Michael Gorman, Maurice Line & Herbert Lottman - 2001 - Logos. Anales Del Seminario de Metafísica [Universidad Complutense de Madrid, España] 12 (4):225-232.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  17
    Martin Campbell-Kelly and William Aspray, computer: A history of the information machine. New York: Basic books, 1996. Pp. IX+340. Isbn 0-465-02989-2. No price given. Paul N. Edwards, the closed world: Computers and the politics of discourse in cold war America. Cambridge, ma: Mit press, 1996. Pp. XX+440. Isbn 0-262-05051-X. £33.95. Arthur L. Norberg and Judy E. O'Neill, transforming computer technology: Information processing for the pentagon, 1962–1986. Baltimore: Johns Hopkins university press, 1996. Pp. XIV+360. Isbn 0-8018-5152-1. £41.50. [REVIEW]Jon Agar - 1998 - British Journal for the History of Science 31 (3):361-375.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  58
    Gregory J. E. Rawlins, slaves of the machine: The quickening of computer technology[REVIEW]Stacey L. Edgar - 2000 - Minds and Machines 10 (3):444-448.
  35. Brain–Computer Interfaces Handbook: Technological and Theoretical Advances.Eran Klein & Alan Rubel (eds.) - 2018
    No categories
     
    Export citation  
     
    Bookmark  
  36.  24
    From Computer Science to ‘Hermeneutic Web’: Towards a Contributory Design for Digital Technologies.Anne Alombert - 2022 - Theory, Culture and Society 39 (7-8):35-48.
    This paper aims to connect Stiegler’s reflections on theoretical computer science with his practical propositions for the design of digital technologies. Indeed, Stiegler’s theory of exosomatization implies a new conception of artificial intelligence, which is not based on an analogical paradigm (which compares organisms and machines, as in cybernetics, or which compares thought and computing, as in cognitivism) but on an organological paradigm, which studies the co-evolution of living organisms (individuals), artificial organs (tools), and social organizations (institutions). Such a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  71
    Gregory J. E. Rawlins, moths to the flame: The seductions of computer technology[REVIEW]Brian Harvey - 1999 - Minds and Machines 9 (2):267-270.
  38.  80
    Brain-computer interfaces and personhood: interdisciplinary deliberations on neural technology.Matthew Sample, Marjorie Aunos, Stefanie Blain-Moraes, Christoph Bublitz, Jennifer Chandler, Tiago H. Falk, Orsolya Friedrich, Deanna Groetzinger, Ralf J. Jox & Johannes Koegel - 2019 - Journal of Neural Engineering 16 (6).
    Scientists, engineers, and healthcare professionals are currently developing a variety of new devices under the category of brain-computer interfaces (BCIs). Current and future applications are both medical/assistive (e.g., for communication) and non-medical (e.g., for gaming). This array of possibilities comes with ethical challenges for all stakeholders. As a result, BCIs have been an object of both hope and concern in various media. We argue that these conflicting sentiments can be productively understood in terms of personhood, specifically the impact of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  88
    Computing and Technology Ethics: Engaging through Science Fiction, by Emanuelle Burton, Judy Goldsmith, Nicholas Mattei, Corey Siler and Sara-Jo Swiatek.Russell W. Askren - 2023 - Teaching Philosophy 46 (3):401-405.
  40.  8
    Ethics and the Management of Computer Technology[REVIEW]Diana Woodward - 1985 - Business and Professional Ethics Journal 4 (2):57-60.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41. Technological prerequisites for indistinguishability of a person and his/her computer replica.Albert Efimov - 2019 - Artificial Societies 4.
    Some people wrongly believe that A. Turing’s works that underlie all modern computer science never discussed “physical” robots. This is not so, since Turing did speak about such machines, though making a reservation that this discussion was still premature. In particular, in his 1948 report [8], he suggested that a physical intelligent machine equipped with motors, cameras and loudspeakers, when wandering through the fields of England, would present “the danger to the ordinary citizen would be serious.” [8, ]. Due (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  22
    Ethics and the Management of Computer Technology[REVIEW]John W. Snapper - 1985 - Business and Professional Ethics Journal 4 (2):53-56.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  24
    Virtual Machines, Virtual Infrastructures: The New Historiography of Information TechnologyComputer: A History of the Information MachineMartin Campbell-Kelly William AsprayInformation Technology as Business History: Issues in the History and Management of ComputersJames W. CortadaTransforming Computer Technology: Information Processing for the Pentagon, 1962-1986Arthur L. Norberg Judy E. O'NeillWhere Wizards Stay up Late: The Origins of the InternetKatie Hafner Matthew LyonTrapped in the Net: The Unanticipated Consequences of ComputerizationGene I. RochlinThe Trouble with Computers: Usefulness, Usability, and ProductivityThomas K. Landauer. [REVIEW]Paul N. Edwards - 1998 - Isis 89 (1):93-99.
  44.  54
    Technological Metaphors and Moral Education: The Hacker Ethic and the Computational Experience.Bryan R. Warnick - 2004 - Studies in Philosophy and Education 23 (4):265-281.
    This essay is an attempt to understand how technological metaphors, particularly computer metaphors, are relevant to moral education. After discussing various types of technological metaphors, it is argued that technological metaphors enter moral thought through their functional descriptions. The computer metaphor is then explored by turning to the hacker ethic. Analysis of this ethic reveals parallels between the experience of computer programming and the moral standards of those who are enmeshed in computer technology. This parallel (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  8
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity.Marcello Ienca & Pim Haselager - 2016 - Ethics and Information Technology 18 (2):117-129.
    Brain–computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are potentially vulnerable to cybercriminality. This opens the prospect of “neurocrime”: extending the range of computer-crime to neural devices. This paper explores a type of neurocrime that we call brain-hacking as it aims at the illicit access to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  47. Technology, virtuality and Utopia : governmentality in an age of autonomic computing.Antoinette Rouvroy - 2011 - In Mireille Hildebrandt & Antoinette Rouvroy (eds.), Law, human agency, and autonomic computing: the philosophy of law meets the philosophy of technology. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark   10 citations  
  48.  93
    The Epistemic Importance of Technology in Computer Simulation and Machine Learning.Michael Resch & Andreas Kaminski - 2019 - Minds and Machines 29 (1):1-9.
    Scientificity is essentially methodology. The use of information technology as methodological instruments in science has been increasing for decades, this raises the question: Does this transform science? This question is the subject of the Special Issue in Minds and Machines “The epistemological significance of methods in computer simulation and machine learning”. We show that there is a technological change in this area that has three methodological and epistemic consequences: methodological opacity, reproducibility issues, and altered forms of justification.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  67
    Technology as empowerment: A capability approach to computer ethics. [REVIEW]Justine Johnstone - 2007 - Ethics and Information Technology 9 (1):73-87.
    Standard agent and action-based approaches in computer ethics tend to have difficulty dealing with complex systems-level issues such as the digital divide and globalisation. This paper argues for a value-based agenda to complement traditional approaches in computer ethics, and that one value-based approach well-suited to technological domains can be found in capability theory. Capability approaches have recently become influential in a number of fields with an ethical or policy dimension, but have not so far been applied in (...) ethics. The paper introduces two major versions of the theory – those advanced by Amartya Sen and Martha Nussbaum – and argues that they offer potentially valuable conceptual tools for computer ethics. By developing a theory of value based on core human functionings and the capabilities (powers, freedoms) required to realise them, capability theory is shown to have a number of potential benefits that complement standard ethical theory, opening up new approaches to analysis and providing a framework that incorporates a justice as well as an ethics dimension. The underlying functionalism of capability theory is seen to be particularly appropriate to technology ethics, enabling the integration of normative and descriptive analysis of technology in terms of human needs and values. The paper concludes by considering some criticisms of the theory and directions for further development. (shrink)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  50.  19
    Human–Computer Interaction Research Needs a Theory of Social Structure: The Dark Side of Digital Technology Systems Hidden in User Experience.Ryan Gunderson - 2022 - Human Studies 45 (3):529-550.
    A sociological revision of Aron Gurwitsch provides a helpful layered theory of conscious experience as a four-domain structure: _the theme_, _the thematic field_, _the halo_, and _the social horizon_. The social horizon—the totality of the social world that is unknown, vaguely known, taken for granted, or ignored by the subject despite objectively influencing the thoughts and actions of the subject—, helps conceptualize how everyday human–computer interaction (HCI) can obscure social structures. Two examples illustrate the usefulness of this framework: (1) (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000