Results for 'ethical hacking'

963 found
Order:
  1. Rewriting the Soul: Multiple Personality and the Sciences of Memory.Ian Hacking - 1995 - Princeton University Press.
    Here the distinguished philosopher Ian Hacking uses the MPD epidemic and its links with the contemporary concept of child abuse to scrutinize today's moral...
  2.  81
    Philosophy and Animal Life.Stanley Cavell, Cora Diamond, John McDowell, Ian Hacking & Cary Wolfe - 2008 - Columbia University Press.
    _Philosophy and Animal Life_ offers a new way of thinking about animal rights, our obligation to animals, and the nature of philosophy itself. Cora Diamond begins with "The Difficulty of Reality and the Difficulty of Philosophy," in which she accuses analytical philosophy of evading, or deflecting, the responsibility of human beings toward nonhuman animals. Diamond then explores the animal question as it is bound up with the more general problem of philosophical skepticism. Focusing specifically on J. M. Coetzee's _The Lives (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  3.  9
    Can new corruption legislation drive guanxi out of business Western and Chinese multinational managers perceptions.Mahfuzur Rahman, Dieu Hack Polay & Lyubov Berweger - 2020 - International Journal of Business Governance and Ethics 1 (1):1.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Isaac Levi.Comments on‘Linguistically Invariant & Inductive Logic’by Ian Hacking - 1970 - In Paul Weingartner & Gerhard Zecha (eds.), Induction, physics, and ethics. Dordrecht,: Reidel.
     
    Export citation  
     
    Bookmark  
  5.  71
    Exercises in analysis: essays by students of Casimir Lewy.Ian Hacking & Casimir Lewy (eds.) - 1985 - New York: Cambridge University Press.
    This is a volume of specially commissioned essays of analytical philosophy, on topics of current interest in ethics and the philosophy of logic and language. Among the topics discussed are the making of wicked promises, G. E. Moore's early ethical views, as well as indexicals, tense, indeterminism, conventionalism in mathematics, and identity and necessity. The essays are all by former students of Casimir Lewy, until recently Reader in Philosophy at the University of Cambridge and an exponent of a particularly (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  4
    Exercises in Analysis: Essays by Students of Casimir Lewy.Ian Hacking (ed.) - 1985 - New York: Cambridge University Press.
    This is a volume of specially commissioned essays of analytical philosophy, on topics of current interest in ethics and the philosophy of logic and language. Among the topics discussed are the making of wicked promises, G. E. Moore's early ethical views, as well as indexicals, tense, indeterminism, conventionalism in mathematics, and identity and necessity. The essays are all by former students of Casimir Lewy, until recently Reader in Philosophy at the University of Cambridge and an exponent of a particularly (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  32
    Forming Physicians: Evaluating the Opportunities and Benefits of Structured Integration of Humanities and Ethics into Medical Education.Cassie Eno, Nicole Piemonte, Barret Michalec, Charise Alexander Adams, Thomas Budesheim, Kaitlyn Felix, Jess Hack, Gail Jensen, Tracy Leavelle & James Smith - 2023 - Journal of Medical Humanities 44 (4):503-531.
    This paper offers a novel, qualitative approach to evaluating the outcomes of integrating humanities and ethics into a newly revised pre-clerkship medical education curriculum. The authors set out to evaluate medical students’ perceptions, learning outcomes, and growth in identity development. Led by a team of interdisciplinary scholars, this qualitative project examines multiple sources of student experience and perception data, including student essays, end-of-year surveys, and semi-structured interviews with students. Data were analyzed using deductive and inductive processes to identify key categories (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  10
    Hacking Digital Ethics.Andrea Belliger & David J. Krieger - 2021 - London/New York: Anthem Press.
    This book is not a critique of digital ethics but rather a hack. It follows the method of hacking by developing an exploit kit on the basis of state-of-the-art social theory, which it uses to breach the insecure legacy system upon which the discourse of digital ethics is running. This legacy system is made up of four interdependent components: the philosophical mythology of humanism, social science critique, media scandalization, and the activities of many civil society organisations lobbying for various (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity.Marcello Ienca & Pim Haselager - 2016 - Ethics and Information Technology 18 (2):117-129.
    Brain–computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are potentially vulnerable to cybercriminality. This opens the prospect of “neurocrime”: extending the range of computer-crime to neural devices. This paper explores a type of neurocrime that we call brain-hacking as it aims at the illicit access to and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  10.  43
    An Ethical Framework for Hacking Operations.Ross W. Bellaby - 2021 - Ethical Theory and Moral Practice 24 (1):231-255.
    In recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  11
    Coding Freedom: The Ethics and Aesthetics of Hacking.E. Gabriella Coleman - 2012 - Princeton University Press.
    Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software movement in the United States and Europe, Coding Freedom details the ethics behind hackers' devotion to F/OSS, the social codes that guide its production, and the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  12.  38
    Hacking genomes. The ethics of open and rebel biology.Alessandro Delfanti - 2011 - International Review of Information Ethics 15 (9):52-57.
    A new open science culture is emerging within the current system of the life sciences. This culture mixes an ethic of sharing with features such as anti-bureaucracy rebellion, hedonism, search for profit. It is a recombination of an old culture, the Mertonian ethos of modern open science, and a new one: the hacker ethic. This new culture has an important role in the evolving relationship between science and society. And it maintains a political ambivalence. Biohackers are rebel scientists and open (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  29
    The ethics of hacking. Ross W. Bellaby.Cécile Fabre - 2023 - Ethics and Information Technology 25 (3):1-4.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  10
    Hacking ‘the Natural’: Seduction Skills, Self-Help, and the Ethics of Crafting Heterosexual Masculine Embodiment in ‘Seduction Communities’.Anders Wallace - 2016 - Etyka 52:77-95.
    Close relationships between men and women have been theorized from feminist, psychoanalytic, and political economic perspectives. In seduction communities, dating coaches and pickup artists act as expert mediums in scripting norms of heterosexual courtship between men and women. Based on an ethnographic analysis of intimate labor between coaches and male clients in seduction communities based in New York City, this article suggests three things. First, that apprenticing in techniques of heterosexual seduction is about masculine self-fashioning; second, that men experience culturally-based (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  27
    Advocate, Hack or Flack: Ethics Questioned for an Environmental Journalist/Blogger and a Coal Public Relations Exec.Ginny Whitehouse & Nicholas Wade - 2014 - Journal of Mass Media Ethics 29 (2):126-128.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16. Review Symposium on Ian Hacking : The Ethics of Indeterminacy.Thomas Osborne - 1995 - History of the Human Sciences 8 (4):113-117.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17. Explanation Hacking: The perils of algorithmic recourse.E. Sullivan & Atoosa Kasirzadeh - forthcoming - In Juan Manuel Durán & Giorgia Pozzi (eds.), Philosophy of science for machine learning: Core issues and new perspectives. Springer.
    We argue that the trend toward providing users with feasible and actionable explanations of AI decisions—known as recourse explanations—comes with ethical downsides. Specifically, we argue that recourse explanations face several conceptual pitfalls and can lead to problematic explanation hacking, which undermines their ethical status. As an alternative, we advocate that explanations of AI decisions should aim at understanding.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  60
    P-Hacking: A Wake-Up Call for the Scientific Community.A. Thirumal Raj, Shankargouda Patil, Sachin Sarode & Ziad Salameh - 2018 - Science and Engineering Ethics 24 (6):1813-1814.
    P-hacking or data dredging involves manipulation of the research data in order to obtain a statistically significant result. The reasons behind P-hacking and the consequences of the same are discussed in the present manuscript.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Hacking into the Church Mainframe: A Theological Engagement of the Post-Informational World.Henry S. Kuo - 2010 - Princeton Theological Review 17 (43):81-90.
    Is Web 2.0 and its related communications technology ethically neutral? With the exception of obvious ills, do they indeed have very few, if any, ethical drawbacks? Even before the internet underwent its evolutionary ascension, computer engineers and philosophers have given some thought to these questions. Few have taken such insights and applied them to the life of the church. How does the church make use of such technologies? How has the church abused it? And, most importantly, what is the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  10
    Pyow-Hack: Ordered Compositions in Lewis-Skyrms Signaling Games.Nathan Gabriel - forthcoming - Erkenntnis:1-20.
    This paper presents a Lewis-Skyrms signaling game that can exhibit a type of compositionality novel to the signaling game literature. The structure of the signaling game is motivated by an analogy to the alarm calls of putty-nosed monkeys (Cercopithecus nictitans). Putty-nosed monkeys display a compositional system of alarm calls with a semantics that is sensitive to the ordering of terms. This sensitivity to the ordering of terms has not been previously modeled with a Lewis-Skyrms signaling game literature. Signaling games are (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. What is data ethics?Luciano Floridi & Mariarosaria Taddeo - 2016 - Philosophical Transactions of the Royal Society A 374 (2083):20160360.
    This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including AI, artificial agents, machine learning, and robots), and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data Ethics builds on the foundation provided by Computer and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   50 citations  
  22. Historical ontology.Ian Hacking - 2002 - Cambridge, Mass.: Harvard University Press.
    The focus of this volume, which collects both recent and now-classic essays, is the historical emergence of concepts and objects, through new uses of words and ...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   221 citations  
  23.  70
    Computer Ethics and Professional Responsibility.Terrell Ward Bynum & Simon Rogerson (eds.) - 1998 - Wiley-Blackwell.
    This clear and accessible textbook and its associated website offer a state of the art introduction to the burgeoning field of computer ethics and professional responsibility. Includes discussion of hot topics such as the history of computing; the social context of computing; methods of ethical analysis; professional responsibility and codes of ethics; computer security, risks and liabilities; computer crime, viruses and hacking; data protection and privacy; intellectual property and the “open source” movement; global ethics and the internet Introduces (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  24.  10
    Flack and hacks: Transparency and trust in the UK.Lee Anne Peck - 2007 - Journal of Mass Media Ethics 22 (2-3):231 – 235.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25. The Equifax Hack.Leonard Kahn - 2020 - In J. D. Allhoff & Alexander Sager (eds.), Business Cases in Ethical Focus. Calgary, Canada: Broadview Press. pp. 270-279.
     
    Export citation  
     
    Bookmark  
  26.  9
    Geraldine Brooks Leaves Much to be Desired.Ally Abdel-Hack - 2004 - Muslim World Journal of Human Rights 1 (1).
    In her book, Geraldine Brooks fails to distinguish between what Islam says and what Muslims do.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. The identity of indiscernibles.Ian Hacking - 1975 - Journal of Philosophy 72 (9):249-256.
  28.  56
    Jacques bernoulli's art of conjecturing.Ian Hacking - 1971 - British Journal for the Philosophy of Science 22 (3):209-229.
  29. 19 Language, Truth and Reason Ian Hacking.Ian Hacking - 1998 - In Linda Alcoff (ed.), Epistemology: the big questions. Malden, Mass.: Blackwell. pp. 322.
     
    Export citation  
     
    Bookmark  
  30. Immagini radicalmente construzionaliste del progresso matematico.Ian Hacking - 1995 - In Alessandro Pagnini (ed.), Realismo/antirealismo: aspetti del dibattito epistemologico contemporaneo. Scandicci (Firenze): La nuova Italia.
     
    Export citation  
     
    Bookmark  
  31. What makes mathematics mathematics?Ian Hacking - 2010 - In T. J. Smiley, Jonathan Lear & Alex Oliver (eds.), The Force of Argument: Essays in Honor of Timothy Smiley. Routledge.
  32. Leibniz: Critical and Interpretive Essays.Ian Hacking (ed.) - 1982 - University of Minnesota Press.
     
    Export citation  
     
    Bookmark  
  33.  84
    Review of H ow Experiments End.Ian Hacking - 1990 - Journal of Philosophy 87 (2):103-106.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   183 citations  
  34. THREE / Biopower and the Avalanche of Printed Numbers.Ian Hacking - 2015 - In Vernon W. Cisney & Nicolae Morar (eds.), Biopower: Foucault and Beyond. London: University of Chicago Press. pp. 65-81.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  19
    Binary Bullets: The Ethics of Cyberwarfare.Fritz Allhoff, Adam Henschke & Bradley Jay Strawser (eds.) - 2016 - New York, US: Oxford University Press USA.
    Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  88
    Michel Foucault: Beyond Structuralism and Hermeneutics by Hubert L. Dreyfus and Paul Rabinow. [REVIEW]Ian Hacking - 1985 - Journal of Philosophy 82 (5):273-277.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   217 citations  
  37. A Leibnizian Theory of Truth.Ian Hacking - 1982 - In Leibniz: Critical and Interpretive Essays. University of Minnesota Press. pp. 185–95.
  38.  95
    Ethical Issues in Cyborg Technology: Diversity and Inclusion.Enno Park - 2014 - NanoEthics 8 (3):303-306.
    Progress has reached the point where cyborg technology is leaving the sphere of mere science fiction. Whereas society as a whole formed a symbiosis with technology long ago, individuals are now starting to merge with technology as well. The effects can already be studied by looking at the examples of smartphones, computers and the Internet. The idea of ‘repairing’ humans, medical implants more sensitive than our natural, human faculties and even non-medical implants raise a lot of ethical questions, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  4
    Research ethics in applied economics: a practical guide.Anna Josephson - 2023 - New York: Routledge Taylor & Francis Group. Edited by Jeffrey D. Michler.
    Research Ethics in Applied Economics Emphasizing the new challenges posed by the data science revolution, digital media, and changing standards, Research Ethics in Applied Economics examines the ethical issues faced by the applied economics researcher at each stage of the research process. The first section of the book considers project development, including issues of project management, selection bias in asking research questions, and political incentives in the development and funding of research ideas. The second section addresses data collection and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. Making Up People.Ian Hacking - 1986 - In . pp. 222-236.
    No categories
     
    Export citation  
     
    Bookmark   2 citations  
  41.  24
    Chance, Cause, Reason. An Inquiry into the Nature of Scientific Evidence.Ian Hacking - 1980 - Journal of Symbolic Logic 45 (2):373-373.
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  6
    La philosophie de Kelsen: épistémologie de la Théorie pure du droit.Pierre Hack - 2003 - Genève: Helbing & Lichtenhahn.
    L'objet de l'ouvrage est de déterminer les conceptions épistémologiques qui sous-tendent la "Théorie pure du droit". La pensée de Kelsen peut-être rattachée à la philosophie analytique et au positivisme logique du Cercle de Vienne; pour arriver à cette thèse, on a notamment procédé à une comparaison des concepts de science chez Kelsen, Russell, Schlick et Carnap.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  32
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical moral code for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  48
    The Future of Transportation: Ethical, Legal, Social and Economic Impacts of Self-driving Vehicles in the Year 2025.Mark Ryan - 2020 - Science and Engineering Ethics 26 (3):1185-1208.
    Self-driving vehicles offer great potential to improve efficiency on roads, reduce traffic accidents, increase productivity, and minimise our environmental impact in the process. However, they have also seen resistance from different groups claiming that they are unsafe, pose a risk of being hacked, will threaten jobs, and increase environmental pollution from increased driving as a result of their convenience. In order to reap the benefits of SDVs, while avoiding some of the many pitfalls, it is important to effectively determine what (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  45.  74
    Review of Ian Hacking: Rewriting the Soul: Multiple Personality and the Sciences of Memory[REVIEW]George Graham - 1996 - Ethics 106 (4):845-848.
  46. Representing and Intervening: Introductory Topics in the Philosophy of Natural Science.Ian Hacking - 1983 - New York: Cambridge University Press.
    This 1983 book is a lively and clearly written introduction to the philosophy of natural science, organized around the central theme of scientific realism. It has two parts. 'Representing' deals with the different philosophical accounts of scientific objectivity and the reality of scientific entities. The views of Kuhn, Feyerabend, Lakatos, Putnam, van Fraassen, and others, are all considered. 'Intervening' presents the first sustained treatment of experimental science for many years and uses it to give a new direction to debates about (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   751 citations  
  47. The social construction of what?Ian Hacking - 1999 - Cambridge, Mass: Harvard University Press.
  48.  19
    Computer Ethics – Basic Problems and the Question of Its Foundation.Slobodan Sadžakov - 2023 - Filozofska Istrazivanja 43 (1):147-169.
    In this paper we have looked at some of the fundamental issues in computer ethics and the characteristics and specific problems of its constitution as a discipline. One of the important issues we have analysed is the problem of access (methods) to a number of new phenomena that have emerged as a result of the wider application of computer technology. Among other things, we pointed out the need to respect the ethical heritage and approach – as a basis for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  12
    Induction, Acceptance and Rational belief.Ian Hacking - 1970 - Journal of Symbolic Logic 39 (1):166-168.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  50. Does gender matter in computer ethics?Alison Adam & Jacqueline Ofori-Amanfo - 2000 - Ethics and Information Technology 2 (1):37-47.
    Computer ethics is a relatively young discipline,hence it needs time both for reflection and forexploring alternative ethical standpoints in buildingup its own theoretical framework. Feminist ethics isoffered as one such alternative particularly to informissues of equality and power. We argue that feministethics is not narrowly confined to ‘women's issues’ but is an approach with wider egalitarianapplications. The rise of feminist ethics in relationto feminist theory in general is described and withinthat the work of Gilligan and others on an ‘ethic (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 963