scispace - formally typeset
Search or ask a question

Showing papers in "Ethics and Information Technology in 2015"


Journal ArticleDOI
TL;DR: It is argued that democracy itself is a contested concept and points to a variety of norms, so designers of diversity enhancing tools must thus be exposed to diverse conceptions of democracy.
Abstract: It has been argued that the Internet and social media increase the number of available viewpoints, perspectives, ideas and opinions available, leading to a very diverse pool of information. However, critics have argued that algorithms used by search engines, social networking platforms and other large online intermediaries actually decrease information diversity by forming so-called "filter bubbles". This may form a serious threat to our democracies. In response to this threat others have developed algorithms and digital tools to combat filter bubbles. This paper first provides examples of different software designs that try to break filter bubbles. Secondly, we show how norms required by two democracy models dominate the tools that are developed to fight the filter bubbles, while norms of other models are completely missing in the tools. The paper in conclusion argues that democracy itself is a contested concept and points to a variety of norms. Designers of diversity enhancing tools must thus be exposed to diverse conceptions of democracy.

219 citations


Journal ArticleDOI
TL;DR: This article identifies several critical problems with the last 30 years of research into hostile communication on the internet and offers suggestions about how scholars might address these problems and better respond to an emergent and increasingly dominant form of online discourse which it is called ‘e-bile’.
Abstract: This article identifies several critical problems with the last 30 years of research into hostile communication on the internet and offers suggestions about how scholars might address these problems and better respond to an emergent and increasingly dominant form of online discourse which I call `e-bile'. Although e-bile is new in terms of its prevalence, rhetorical noxiousness, and stark misogyny, prototypes of this discourse--most commonly referred to as `flaming'--have always circulated on the internet, and, as such, have been discussed by scholars from a range of disciplines. Nevertheless, my review of this vast body of literature reveals that online hostility has historically posed a number of conceptual, methodological, and epistemological challenges due to which scholars have typically underplayed, overlooked, ignored, or otherwise marginalised its prevalence and serious ethical and material ramifications. Fortunately, lessons learned from my analysis suggests promising approaches for future research into this challenging form of new media discourse.

93 citations


Journal ArticleDOI
TL;DR: It is argued that the privacy paradox masks a more important paradox: the self-management model of privacy embedded in notice-and-consent pages on websites and other, analogous practices can be readily shown to underprotect privacy, even in the economic terms favored by its advocates.
Abstract: The "privacy paradox" refers to the discrepancy between the concern individuals express for their privacy and the apparently low value they actually assign to it when they readily trade personal information for low-value goods online. In this paper, I argue that the privacy paradox masks a more important paradox: the self-management model of privacy embedded in notice-and-consent pages on websites and other, analogous practices can be readily shown to underprotect privacy, even in the economic terms favored by its advocates. The real question, then, is why privacy self-management occupies such a prominent position in privacy law and regulation. Borrowing from Foucault's late writings, I argue that this failure to protect privacy is also a success in ethical subject formation, as it actively pushes privacy norms and practices in a neoliberal direction. In other words, privacy self-management isn't about protecting people's privacy; it's about inculcating the idea that privacy is an individual, commodified good that can be traded for other market goods. Along the way, the self-management regime forces privacy into the market, obstructs the functioning of other, more social, understandings of privacy, and occludes the various ways that individuals attempt to resist adopting the market-based view of themselves and their privacy. Throughout, I use the analytics practices of Facebook and social networking sites as a sustained case study of the point.

70 citations


Journal ArticleDOI
Patrick Stokes1
TL;DR: This paper builds on previous work invoking a distinction between persons and selves to argue that SNS offer a particularly significant material instantiation of persons, and argues that this persistence function supplies a nontrivial (if defeasible) obligation not to delete these artefacts.
Abstract: There has been increasing attention in sociology and internet studies to the topic of `digital remains': the artefacts users of social network services (SNS) and other online services leave behind when they die. But these artefacts also pose philosophical questions regarding what impact, if any, these artefacts have on the ontological and ethical status of the dead. One increasingly pertinent question concerns whether these artefacts should be preserved, and whether deletion counts as a harm to the deceased user and therefore provides pro tanto reasons against deletion. In this paper, I build on previous work invoking a distinction between persons and selves to argue that SNS offer a particularly significant material instantiation of persons. The experiential transparency of the SNS medium allows for genuine co-presence of SNS users, and also assists in allowing persons (but not selves) to persist as ethical patients in our lifeworld after biological death. Using Blustein's "rescue from insignificance" argument for duties of remembrance, I argue that this persistence function supplies a nontrivial (if defeasible) obligation not to delete these artefacts. Drawing on Luciano Floridi's account of "constitutive" information, I further argue that the "digital remains" metaphor is surprisingly apt: these artefacts in fact enjoy a claim to moral regard akin to that of corpses.

44 citations


Journal ArticleDOI
TL;DR: A study investigating how 11–14 year olds growing up in England understand cyber-bullying as a moral concern demonstrates the advantages of adopting a character-based moral theory to compliment rules and/or consequence based moral theories as the basis for future research into cyber- Bullying.
Abstract: This article draws on a study investigating how 11---14 year olds growing up in England understand cyber-bullying as a moral concern. Three prominent moral theories: deontology, utilitarianism and virtue ethics, informed the development of a semi-structured interview schedule which enabled young people, in their own words, to describe their experiences of online and offline bullying. Sixty 11---14 year olds from six schools across England were involved with the research. Themes emerging from the interviews included anonymity; the absence of rules, monitoring and guidance and, the challenges associated with determining the consequences of online actions. The findings demonstrate the advantages of adopting a character-based moral theory to compliment rules and/or consequence based moral theories as the basis for future research into cyber-bullying. The findings evoke some wider implications for future research into cyber-bullying that might equally be applied to investigations into other Internet related moral concerns.

43 citations


Journal ArticleDOI
Michele Loi1
TL;DR: The conclusion is that current innovations in the ICT sector are objectionable from a moral point of view, because they disenhance more people than they enhance.
Abstract: This paper discusses the concept of "human disenhancement", i.e. the worsening of human individual abilities and expectations through technology. The goal is provoking ethical reflection on technological innovation outside the biomedical realm, in particular the substitution of human work with computer-driven automation. According to some widely accepted economic theories, automatization and computerization are responsible for the disappearance of many middle-class jobs. I argue that, if that is the case, a technological innovation can be a cause of "human disenhancement", globally, and all things considered, even when the local and immediate effect of that technology is to increase the demand of more sophisticated human skills than the ones they substitute. The conclusion is that current innovations in the ICT sector are objectionable from a moral point of view, because they disenhance more people than they enhance.

38 citations


Journal ArticleDOI
TL;DR: It is argued that automation technologies threaten to make us vulnerable, alienated, and automated masters, and that the main problem the authors face is not that automation might turn us into slaves but, rather, that they remain masters.
Abstract: Responding to long-standing warnings that robots and AI will enslave humans, I argue that the main problem we face is not that automation might turn us into slaves but, rather, that we remain masters First I construct an argument concerning what I call `the tragedy of the master': using the master---slave dialectic, I argue that automation technologies threaten to make us vulnerable, alienated, and automated masters I elaborate the implications for power, knowledge, and experience Then I critically discuss and question this argument but also the very thinking in terms of masters and slaves, which fuels both arguments I question the discourse about slavery and object to the assumptions made about human---technology relations However, I also show that the discussion about masters and slaves attends us to issues with human---human relations, in particular to the social consequences of automation such as power issues and the problem of the relation between automation and (un)employment Finally, I reflect on how we can respond to our predicament, to `the tragedy of the master'

37 citations


Journal ArticleDOI
TL;DR: An alternative, more holistic approach that can be used to guide the development of intelligent environments is proposed and the validity of the framework is demonstrated by its integration into an actual project.
Abstract: Intelligent environments aim to provide context-sensitive services to humans in the physical spaces in which they work and live. While the ethical dimensions of these systems have been considered, this is an aspect which requires further analysis. A literature review shows that these approaches are disconnected from each other, and that they are making little impact on real systems being built. This article provides a solution to both of these problems. It synthesises the ethical issues addressed by previous work and highlights other important concerns which have been overlooked so far. Furthermore, it proposes an alternative, more holistic approach that can be used to guide the development of intelligent environments. The validity of the framework is demonstrated by its integration into an actual project.

35 citations


Journal ArticleDOI
TL;DR: This paper argues that it is neither the case that all acts of virtual murder are morally permissible, nor are all Acts of virtual pedophelia impermissible, and that a different route should be pursued.
Abstract: Luck (2009) argues that gamers face a dilemma when it comes to performing certain virtual acts. Most gamers regularly commit acts of virtual murder, and take these acts to be morally permissible. They are permissible because unlike real murder, no one is harmed in performing them; their only victims are computer-controlled characters, and such characters are not moral patients. What Luck points out is that this justification equally applies to virtual pedophelia, but gamers intuitively think that such acts are not morally permissible. The result is a dilemma: either gamers must reject the intuition that virtual pedophelic acts are impermissible and so accept partaking in such acts, or they must reject the intuition that virtual murder acts are permissible, and so abstain from many (if not most) extant games. While the prevailing solution to this dilemma has been to try and find a morally relevant feature to distinguish the two cases, I argue that a different route should be pursued. It is neither the case that all acts of virtual murder are morally permissible, nor are all acts of virtual pedophelia impermissible. Our intuitions falter and produce this dilemma because they are not sensitive to the different contexts in which games present virtual acts.

34 citations


Journal ArticleDOI
TL;DR: It is suggested that videogames represent deterministic worlds in which players lack the ability to freely choose what they do, and yet players can be held morally responsible for some of their actions, specifically those actions that the player wants to do.
Abstract: Can a player be held morally responsible for the choices that she makes within a videogame? Do the moral choices that the player makes reflect in any way on the player's actual moral sensibilities? Many videogames offer players the options to make numerous choices within the game, including moral choices. But the scope of these choices is quite limited. I attempt to analyze these issues by drawing on philosophical debates about the nature of free will. Many philosophers worry that, if our actions are predetermined, then we cannot be held morally responsible for them. However, Harry Frankfurt's compatibilist account of free will suggests that an agent can be held morally responsible for actions that she wills, even if the agent is not free to act otherwise. Using Frankfurt's analysis, I suggest that videogames represent deterministic worlds in which players lack the ability to freely choose what they do, and yet players can be held morally responsible for some of their actions, specifically those actions that the player wants to do. Finally, I offer some speculative comments on how these considerations might impact our understanding of the player's moral psychology as it relates to the ethics of imagined fictional events.

30 citations


Journal ArticleDOI
TL;DR: It is argued that Big Data should be recognized as manifesting multiple and conflicting trajectories that reflect human intentionality and particular patterns of power and authority, and the subtle forms of control in the political ecology of Big Data that undermine its promise as transformational knowledge.
Abstract: The explosion of data grows at a rate of roughly five trillion bits a second, giving rise to greater urgency in conceptualizing the infosphere (Floridi 2011) and understanding its implications for knowledge and public policy. Philosophers of technology and information technologists alike who wrestle with ontological and epistemological questions of digital information tend to emphasize, as Floridi does, information as our new ecosystem and human beings as interconnected informational organisms, inforgs at home in ambient intelligence. But the linguistic and conceptual representations of Big Data--the massive volume of both structured and unstructured data--and the real world practice of data-mining for patterns and meaningful interpretation of evidence reveal tension and ambiguity in the bold promise of data analytics. This paper explores the tacit epistemology of the rhetoric and representation of Big Data and suggests a richer account of its ambiguities and the paradox of its real world materiality. We argue that Big Data should be recognized as manifesting multiple and conflicting trajectories that reflect human intentionality and particular patterns of power and authority. Such patterns require attentive exploration and moral appraisal if we are to resist simplistic informationist ontologies of Big Data, and the subtle forms of control in the political ecology of Big Data that undermine its promise as transformational knowledge.

Journal ArticleDOI
TL;DR: Ethical and practical issues associated with the networking of genomics are discussed by comparing how the European Union and North America understand and practice notions of privacy and consent in research.
Abstract: Scientists and clinicians are starting to translate genomic discoveries from research labs to the clinical setting. In the process, big data genomic technologies are both a risk to individual privacy and a benefit to personalized medicine. There is an opportunity to address the social and ethical demands of various stakeholders and shape the adoption of diagnostic genome technologies. We discuss ethical and practical issues associated with the networking of genomics by comparing how the European Union (EU) and North America understand and practice notions of privacy and consent in research. An overview of international policy suggests the embedding of genomics within digital networks and the Internet creates conditions that challenge the management of privacy and consent in the age of big data. The risks of re-identification, informational harms, and data security vulnerabilities are issues that need to be better addressed in the clinical setting to reconcile the unpredictable pathway of research and practice in the networked information society.

Journal ArticleDOI
TL;DR: It is argued that many of the declared benefits of this technology are rather unattainable and this new market device has to separate and individually address sufficiently issues of privacy, confidentiality and security before it can claim a place in the digital healthcare ecosystem.
Abstract: The development of electronic personal health records by independent vendors and national health systems is understood to empower patients and create a new kind of consumerism in healthcare. With more personal health information (PHI) at hand, active participation in the management of health and rational purchasing of healthcare services will be possible. Healthcare systems will also be able to contain costs and achieve sustainability. Based on a careful examination of the literature, we argue that many of the declared benefits of this technology are rather unattainable. As the boundaries between the public and private healthcare sectors become blurred and as employers struggle to reduce health insurance expenses, this proclaimed `consumer empowerment in healthcare' is an attempt to introduce a technology and a business model for centralising all relevant PHI to render them economic. We reflect on the consequences for the `empowered' user and we suggest that this new market device has to separate and individually address sufficiently issues of privacy, confidentiality and security before it can claim a place in the digital healthcare ecosystem.

Journal ArticleDOI
TL;DR: This paper develops the heuristic implications of Habermas’s principle of universalization and proposes a modification that yields a scalar measure of “dialogically robust” judgments that are responsive to the actual state of discussion.
Abstract: Attempts to employ discourse ethics for assessing communication and information technologies have tended to focus on managerial and policy-oriented contexts. These initiatives presuppose institutional resources for organizing sophisticated consultation processes that elicit stakeholder input. Drawing on Jurgen Habermas's discourse ethics, this paper supplements those initiatives by developing a more widely usable framework for moral inquiry and reflection on problematic cyberpractices. Given the highly idealized character of discourse ethics, a usable framework must answer two questions: (1) How should those who lack organizational power (e.g., concerned citizens, students) conduct their moral inquiry under non-ideal conditions of discourse? (2) How ought they to understand the moral force of the judgments they reach under such conditions? In response, I develop the heuristic implications of Habermas's principle of universalization. To render that principle usable for non-ideal discourse, I propose a modification that yields a scalar measure of "dialogically robust" judgments that are responsive to the actual state of discussion. To illustrate the use of these principles, I sketch two case studies, which examine the moral acceptability of violent video gaming and government cyber-surveillance.

Journal ArticleDOI
TL;DR: This work analyses the modification yielded by augmented reality technology from a perceptual point of view using the analysis of the horizons of the object made by Husserl using the data from phenomenological and post-phenomenological points of view.
Abstract: This work focuses on augmented reality glasses and its aim is to analyse the knock-on effects on our everyday world and ourselves yielded by this kind of technology. Augmented reality is going to be the most diffused technology in our everyday life in the near future, especially augmented reality mounted on glasses. This near future is not only possible, but it seems inevitable following the vertiginous development of AR. There are numerous kinds of different prototypes that are going to come out next year (2016). Therefore, a study on how these modifications yield knock-on effects on the constitution of the object and subject is mandatory. This work tackles the topic starting from a phenomenological and post-phenomenological point of view and it analyses the modification yielded by such technology from a perceptual point of view using the analysis of the horizons of the object made by Husserl. We need this analysis because it is not only the hypothetical future that may never come, but it is the likely future very close to us that is putting pressure on us.

Journal ArticleDOI
TL;DR: It is argued that modern machines do not only have morality in the sense of mediating the actions of humans, but that, by making their own decisions within their relations with humans, mediate morality itself.
Abstract: In the past decades, computers have become more and more involved in society by the rise of ubiquitous systems, increasing the number of interactions between humans and IT systems. At the same time, the technology itself is getting more complex, enabling devices to act in a way that previously only humans could, based on developments in the fields of both robotics and artificial intelligence. This results in a situation in which many autonomous, intelligent and context-aware systems are involved in decisions that affect their environment. These relations between people, machines, and decisions can take many different forms, but thus far, a systematic account of machine-assisted moral decisions is lacking. This paper investigates the concept of machine-assisted moral decisions from the perspective of technological mediation. It is argued that modern machines do not only have morality in the sense of mediating the actions of humans, but that, by making their own decisions within their relations with humans, mediate morality itself. A classification is proposed to differentiate between four different types of moral relations. The moral aspects within the decisions these systems make are combined into three dimensions that describe the distinct characteristics of different types of moral mediation by machines. Based on this classification, specific guidelines for moral behavior can be provided for these systems.

Journal ArticleDOI
TL;DR: This research ‘discloses’ the moral issues that emerge from the combined patrolling by humans and bots and argues that this secrecy impedes a much needed discussion to unfold; a discussion that should focus on a ‘rebalancing’ of the anti-vandalism system and the development of more ethical information practices towards contributors.
Abstract: English-language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the `coactivity' in use between humans and bots, this research `discloses' the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new hierarchical layer. Further, surveillance exhibits several troubling features: questionable profiling practices (concerning anonymous users in particular), the use of the controversial measure of reputation (under consideration), `oversurveillance' where quantity trumps quality, and a prospective loss of the required moral skills whenever bots take over from humans. The most troubling aspect, though, is that Wikipedia has become a Janus-faced institution. One face is the basic platform of MediaWiki software, transparent to all. Its other face is the anti-vandalism system, which, in contrast, is opaque to the average user, in particular as a result of the algorithms and neural networks in use. Finally it is argued that this secrecy impedes a much needed discussion to unfold; a discussion that should focus on a `rebalancing' of the anti-vandalism system and the development of more ethical information practices towards contributors.

Journal ArticleDOI
TL;DR: It is shown that smoking-cessation apps contribute to a stigmatization of smokers and culpabilization of relapses, and the potential to support user autonomy through diverse meaningful voices and personalized communication remains yet unused.
Abstract: We study smoking-cessation apps in order to formulate a framework for ethical evaluation, analyzing apps as `medium', `market', and `genre'. We center on the value of user autonomy through truthfulness and self-understanding. Smoking-cessation apps usually communicate in an anonymous `app voice', with little presence of professional or other identified voices. Because of the fast-and-frugal communication, truthfulness is problematic. Messages in the `quantification' modules may be read as deceitfully accurate. The app voice frames smoking as a useless, damaging habit indicative of weakness of will, in a `cold-turkey' frame of individual mind-over-body heroism. Thus apps contribute to a stigmatization of smokers and culpabilization of relapses. The potential to support user autonomy through diverse meaningful voices and personalized communication remains yet unused.

Journal ArticleDOI
TL;DR: The ways articles in IEEE Security and Privacyrelate ethics to information technology can influence the development of law, policy and the future of information technology ethics are examined, which suggest avenues for future work in critical areas.
Abstract: The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological dimensions of privacy and security is structured as a bibliometric analysis. Our dataset covers all articles published in IEEE Security and Privacy since its inception in 2003 to February 06, 2014 . This venue was chosen not only because of its target readership, but also because a preliminary search of keywords related to ethics, privacy, and security topics in the ISI Web of Knowledge and IEEE Xplore indicated that IEEE Security and Privacy has published a preponderance of articles matching those topics. In fact, our search returned two-fold more articles for IEEE Security and Privacy than the next most prolific venue. These reasons, coupled with the fact that both academia and industry are well-represented in the authorship of articles makes IEEE Security and Privacy an excellent candidate for bibliometric analysis. Our analysis examines the ways articles in IEEE Security and Privacy relate ethics to information technology. Such articles can influence the development of law, policy and the future of information technology ethics. We employed thematic and JK-biplot analyses of content relating privacy and ethics and found eight dominant themes as well as the inter-theme relationships. Authors and institutional affiliations were examined to discern whether centers of research activity and/or authors dominated the overall field or thematic areas. Results suggest avenues for future work in critical areas, especially for closing present gaps in the coverage of ethics and information technology privacy and security themes particularly in the areas of ethics and privacy awareness.

Journal ArticleDOI
TL;DR: It is argued that a broad interpretation is required for a moral objection to be justified and that understanding the meaning of moral utterances is important to an understanding of why there is a lack of moral consensus when it comes to the content of violent video games.
Abstract: This paper considers what it is about violent video games that leads one reasonably minded person to declare "That is immoral" while another denies it. Three interpretations of video game content are discussed: reductionist, narrow, and broad. It is argued that a broad interpretation is required for a moral objection to be justified. It is further argued that understanding the meaning of moral utterances--like "x is immoral"--is important to an understanding of why there is a lack of moral consensus when it comes to the content of violent video games. Constructive ecumenical expressivism is presented as a means of explaining what it is that we are doing when we make moral pronouncements and why, when it comes to video game content, differing moral attitudes abound. Constructive ecumenical expressivism is also presented as a means of illuminating what would be required for moral consensus to be achieved.

Journal ArticleDOI
TL;DR: If some of the stages of moral development are applicable to music piracy behavior, people are more likely to pirate than to engage in other more morally intense behaviors.
Abstract: Prior research has not found a meaningful relationship between digital piracy and moral development, possibly because students do not recognize digital piracy as a moral issue. Rather than measure moral development as an individual characteristic, this study tests which components of moral development are seen as relevant to digital piracy. If some of the stages of moral development are applicable to music piracy behavior, people are more likely to pirate than to engage in other more morally intense behaviors. Some of the stages of moral development are found to be associated with moral development. Proximity to the victim reduces the acceptability of music piracy.

Journal ArticleDOI
TL;DR: It is argued that, contrary to the trend within current discussions of interaction online, this cannot be unproblematically assumed, and that in none of these senses can users and avatars be identified.
Abstract: This paper examines the prevalent assumption that when people interact online via proxies--avatars--they encounter each other. Through an exploration of the ontology of users and their avatars we argue that, contrary to the trend within current discussions of interaction online, this cannot be unproblematically assumed. If users could be considered in some sense identical to their avatars, then it would be clear how an encounter with an avatar could ground an encounter with another user. We therefore engage in a systematic investigation of several conceptions of identity, concluding that in none of these senses can users and avatars be identified. We go on to explore how current accounts of identity-as-selfhood online might resolve this problem by appealing to narrativity or authorship, ultimately concluding that as these accounts stand they are unable to provide grounds for the claim that users encounter each other online and so supplementary work is required.

Journal ArticleDOI
TL;DR: The social justice issues raised by Internet regulation be exposed and examined by using a methodology adapted from that described by John Rawls in A Theory of Justice by introducing an abstract description of information technology to those deliberating about justice from within the original position.
Abstract: I suggest that the social justice issues raised by Internet regulation be exposed and examined by using a methodology adapted from that described by John Rawls in A Theory of Justice. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the `original position' as a method of removing bias in decision-making about justice. The original position imposes a `veil of ignorance' that hides the particular circumstances of individuals from them so that they will not be influenced by self-interest. I adapt Rawls' methodology by introducing an abstract description of information technology to those deliberating about justice from within the original position. This abstract description focuses on information devices that users can use to access information (and which may record information about them as well) and information networks that information devices use to communicate. The abstractness of this description prevents the particular characteristics of the Internet and the computing devices in use from influencing the decisions about the just use and regulation of information technology and networks. From this abstract position, the principles of justice that the participants accept for the rest of society will also apply to the computing devices people use to communicate, and to Internet regulation.

Journal ArticleDOI
TL;DR: It is argued that ACTA would have caused three ethical problems: an excessive and misplaced kind of responsibility, a radical decrease in freedom of expression, and a severe reduction in information privacy, and three lessons that can help in shaping a potential ACTA 2.0.
Abstract: The anti-counterfeiting trade agreement (ACTA) was originally meant to harmonise and enforce intellectual property rights (IPR) provisions in existing trade agreements within a wider group of countries. This was commendable in itself, so ACTA's failure was all the more disappointing. In this article, I wish to contribute to the post-ACTA debate by proposing a specific analysis of the ethical reasons why ACTA failed, and what we can learn from them. I argue that five kinds of objections--namely, secret negotiations, lack of consultation, vagueness of formulation, negotiations outside any international body, and the creation of a new governing body outside already existing forums--had only indirect ethical implications. This takes nothing away from their seriousness but it does make them less compelling, because agreements should be evaluated, ethically, for what they are, rather than for the alleged reasons why they are being proposed. I then argue that ACTA would have caused three ethical problems: an excessive and misplaced kind of responsibility, a radical decrease in freedom of expression, and a severe reduction in information privacy. I conclude by indicating three lessons that can help us in shaping a potential ACTA 2.0. First, we should acknowledge the increasingly vital importance of the framework of implicit expectations, attitudes, and practices that can facilitate and promote morally good decisions and actions. ACTA failed to perceive that it would have undermined the very framework that it was supposed to foster, namely one promoting some of the best and most successful aspects of our information society. Second, we should realise that, in advanced information societies, any regulation affecting how people deal with information is now bound to influence the whole `onlife' habitat within which they live. So enforcing IPR becomes an environmental problem. Third, since legal documents, such as ACTA, emerge from within the infosphere that they affect, we should apply to the process itself, which one day may lead to a post-ACTA treaty, the very framework and ethical values that we would like to see promoted by it.

Journal ArticleDOI
TL;DR: The paper defends the possibilities of an ethical, authentic and sheltering personalization, where human beings and information technology responsibly engage, and applies the Heideggerian modes of being on the process of personalization new forms of digital ethics appear.
Abstract: The paper examines the personalization of information technology from the p.c. onwards to the 3-D printing and mobile technologies in order to show that the current process of technological evolution puts the human personality in the centre of its functionality. This new centre opens the discussion about authenticity and in-authenticity of human Dasein, since the common element of these new technologies is that they employ faciality and personalization in a new condition of ready-to-hand and present-at-hand mode. By applying the Heideggerian modes of being on the process of personalization new forms of digital ethics appear. I suggest that the above take place in the navigation memory of the net, in the creativity of the self through the 3-D printer, and in the localization of the "psyche" in the hard drive disk. The paper defends the possibilities of an ethical, authentic and sheltering personalization, where human beings and information technology responsibly engage.

Journal ArticleDOI
TL;DR: The underdeveloped nature of the theory of distancing, the absence of established theories of money and the sometimes uncritical comparison of different theories applied to analyse financial technologies mean that the book convincingly manages to open up a novel branch of research in the field philosophy and ethics of technology.
Abstract: This book review critically analyzes Mark Coecelbergh's newest work: "Money Machines". In his book, Coeckelbergh discusses the epistemic, social and moral distances that are created by modern financial technologies. It consists of a historical analysis of financial technologies from cowrie shells to digital money, a theoretical analysis of the distancing effects of financial technologies which revolves around the theories of Simmel and McLuhan and a discussion of the empirical instances of modern money machines within the framework of distancing. Two problems and one missed opportunity of the book are discussed in this review: the underdeveloped nature of the theory of distancing which leaves the reader with multiple open questions, the absence of established theories of money and the sometimes uncritical comparison of different theories applied to analyse financial technologies. Nevertheless, the book convincingly manages to open up a novel branch of research in the field philosophy and ethics of technology. Its highly original discussion of financial technologies and embracement of Simmel as a philosopher of technology provide for interesting prospects for future work.