Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Abstract: Stephen Weinberg posited in 1977 that as the universe becomes more comprehensible, it appears more meaningless due to a strict division between facts and values. He seemingly overlooked the consideration of the purposes and values of intelligent life in examining its ability to influence the universe’s development. The scientific revolution, initiated by Copernicus' heliocentric hypothesis and furthered by Darwin's theory, shifted humanity's perceived place in the cosmos, removing the sacred. However, developments in astrobiology and discoveries related to the Fermi Paradox and the Rare Earth Hypothesis are hinting at humanity's significant role in the universe, suggesting we might be the only intelligent species. This paper argues that advancing scientific knowledge reinforces the hypothesis of human exclusivity and importance in the cosmos, making the potential sixth mass extinction cosmically significant and underscoring the imperative of human persistence in the cosmos. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 15, Issue: 1 (2024) Pages: 0-0 PubDate: 2024-01-01T05:00:00Z DOI: 10.4018/IJT.349735 Issue No:Vol. 15, No. 1 (2024)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Medina; Lana Pages: 1 - 19 Abstract: Social media platforms have become a threat to democracy and human flourishing. Critics have previously expressed alarm that our ever-increasing technological habits are negatively influencing human values and virtues. This research explores how the engagement design of social media sites is a morally questionable metric for social media ‘success'. Using a virtue ethics framework in relation to technology ethics research, as well as drawing from the work of Ellul (1962) and technology philosophers, this paper emphasizes the need for perspective and civility in engagement and argues for solutions that withdraw from an engagement design built on efficiency and financial gain. Proposed solutions include global change in the form of 1) altered weights for algorithmic prioritization (e.g., promoting diverse topics and reducing tribalist engagement), 2) returning autonomy to users (compared to corporate control), and 3) global legislation (i.e., the European Union's DSA). Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 15, Issue: 1 (2024) Pages: 1-19 PubDate: 2024-01-01T05:00:00Z DOI: 10.4018/IJT.344025 Issue No:Vol. 15, No. 1 (2024)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Milford; Stephen R., Elger, Bernice S., Shaw, David M. Pages: 1 - 12 Abstract: In 2022 the UK government introduced extensive updates to the Highway Code. This includes making specific reference to autonomous vehicles (AVs) on UK roads as a present reality, as well as providing a clear ‘hierarchy of road users.' This order of road users is based on the code's understanding of their relative vulnerability and, therefore, their need for protection. In the context of AVs and crash scenarios, the subject of relative value among road users has arisen – often in the form of trolleyology. Considering the new code offers a simple approach to this question, with a clear hierarchy of users, it may be argued that the code goes some way to address the public's concern. This article explores the new code, its approach of using vulnerability to create a hierarchy of road users, and its implications for programming AVs in crash scenarios. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 15, Issue: 1 (2024) Pages: 1-12 PubDate: 2024-01-01T05:00:00Z DOI: 10.4018/IJT.342604 Issue No:Vol. 15, No. 1 (2024)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Keefer; Robert, Zohar, Nadav, Douglas, Lisa J. Pages: 1 - 13 Abstract: Unintended consequences of technology are ubiquitous and often negative. Certain communities, the Amish for example, have minimized these consequences by understanding and agreeing upon the social values they seek to preserve, and by making technology choices based on these values. Although similar strategies are not widely implemented in Western society, technology developers should be intentional and responsible about the impact of their work. Existing design strategies that deal with values (e.g., contextual design) focus on adapting to business culture rather than preserving social values. This article proposes a new process model that focuses on articulating social values during the design phase as a method by which to evaluate the attributes of the system being developed, and discusses a planned experimental design intended to measure the effectiveness of this approach. By considering the relationship between design decisions and social values, this model may result in a design strategy that is both intentional and responsible. Keywords: IT Security and Ethics; Security & Forensics; Information Ethics Citation: International Journal of Technoethics (IJT), Volume: 15, Issue: 1 (2024) Pages: 1-13 PubDate: 2024-01-01T05:00:00Z DOI: 10.4018/IJT.338391 Issue No:Vol. 15, No. 1 (2024)