A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

  Subjects -> PHILOSOPHY (Total: 762 journals)
The end of the list has been reached or no journals were found for your choice.
Similar Journals
Journal Cover
International Journal of Technoethics
Journal Prestige (SJR): 0.132
Number of Followers: 2  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 1947-3451 - ISSN (Online) 1947-346X
Published by IGI Global Homepage  [147 journals]
  • Zooming Through a Crisis

    • Free pre-print version: Loading...

      Abstract: The coronavirus pandemic has led the world, not to shut down, but to move from the physical to the virtual. Various technologies have been used to maintain a sense of normalcy during the pandemic, as we can now work online, shop online, and socialize online. The perceived success of this technological resiliency in the face of a global health crisis has given rise to questions about whether the move from the physical to the virtual should be maintained even after the pandemic. Given the possibility that this “new normal” could soon become simply what is considered as “normal,” this paper will investigate what it means that we have indeed been able to use technologies to maintain order in a time of global disorder. To answer this question, this paper will focus on the technology that has become most synonymous with the pandemic—Zoom—and use postphenomenology, critical theory of technology, and Arendt’s political philosophy in order to investigate its use during the pandemic.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 0-0
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.309097
      Issue No: Vol. 13, No. 1 (2022)
       
  • Reviewing the Ethics & Philosophy behind Social Media’s
           Crowdsourced Panopticon

    • Free pre-print version: Loading...

      Abstract: Philosopher Jeremy Weissman theorizes a new approach to social media surveillance by utilizing a familiar theoretical model: the Panopticon. In effect, Weissman argues that social media has transformed ordinary people into prison guards within the Panopticon’s public watchtower and endowed ordinary individuals with the power to track, survey, and discipline elite officials, once shielded from public scrutiny. This new power, however, comes with a catch. Social media subsumes individuals within an anonymous, de-individualized public which erases individual difference while simultaneously and paradoxically promising to amplify that very difference. This review critically examines this paradoxical tension and the ethical concerns and challenges raised by social media’s propensity to elicit anonymity.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 0-0
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.302627
      Issue No: Vol. 13, No. 1 (2022)
       
  • Technology Assessments and Effective Risk Management

    • Free pre-print version: Loading...

      Authors: Hoffmann; Christian Hugo
      Pages: 1 - 10
      Abstract: It is a common misconception in risk management, from classical purely quantitative risk assessments as being coined in banking to qualitative approaches to evaluating new technologies such as AI, and hybrids like scenario techniques in the middle, that a certain toolkit and a specific set of methods serve as a panacea for all challenges risk managers may face. Given the lurking pitfalls in this area of risk management, the call for an avoidance strategy cannot be ignored. In this article, we outline six guidelines that should be followed on the way to more decision-making competency in risk management.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-10
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.306639
      Issue No: Vol. 13, No. 1 (2022)
       
  • Improving the Ethical Dimension in the Innovation Process

    • Free pre-print version: Loading...

      Authors: Lecomte; Robin, Jean, Camille
      Pages: 1 - 18
      Abstract: Large companies' engineering design process rarely considers the ethical and moral dimensions of innovation projects. This need for ethics is increasingly felt, particularly with the advent of digital technologies. Our research mainly focuses on product designers in large companies during the innovation/creativity phase. We propose and evaluate the efficiency of a method allowing them to consider ethics from this first stage of product development. A specific database incorporating ethical categories and problems from the early stages of idea generation supports this study. This database is inspired by a research project funded by the European Commission called ETICA. We evaluate our proposal with a detailed case study in a large automotive company. This case study highlights the contribution of our extended ethical design method from an ethical point of view and a financial one for the company. We believe that our proposal will boost creativity by addressing innovative product designers' usual fixations.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-18
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.302628
      Issue No: Vol. 13, No. 1 (2022)
       
  • The Cultural Influence of Control Sharing in Autonomous Driving

    • Free pre-print version: Loading...

      Authors: Wan; Yun, Akpan, Emem, Guo, Hongyu
      Pages: 1 - 13
      Abstract: This research investigated the cross-cultural perspectives on control-sharing in ethical decision-making when both human and AI-enabled auto-driven vehicles to involve. We reviewed the current practices. We then illustrated a survey we conducted related to this topic on a total of 771 subjects from three nations, the U.S., India, and Nigeria. We found participants from individualistic culture tend to emphasize personal choice and human control. We also found though most subjects prefer human drivers to take full control, India's subjects were more ambivalent in their attitude due to lower uncertainty avoidance. Also, subjects with higher incomes were more likely to cede control. There was consistent proportional distribution across nations in the control sharing configuration, with 2/3 chose full customization, and 1/3 chose limited customization. Car owners are more likely to have more control and full customization. Our findings shed important insights on both research in this domain and industry practitioners.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-13
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.302629
      Issue No: Vol. 13, No. 1 (2022)
       
  • Bullying, Cyberbullying, and Hate Speech

    • Free pre-print version: Loading...

      Authors: Cohen-Almagor; Raphael
      Pages: 1 - 17
      Abstract: The Internet's design and raison d'être are complete freedom, but complete freedom might lead to anarchy and to harmful and anti-social activities. In this paper I address the concepts of moral and social responsibility, applying them to the Internet realm in considering the most troubling phenomenon of cyberbullying that results in loss of life. Specifically, I probe the moral and social responsibilities of Internet users (agents), of parents and of the education system in fighting cyberbullying. Balance needs to be struck between two most important principles: freedom of expression and social responsibility. Illustrative examples in which this disturbing and harmful phenomenon of cyberbullying had cost young life are mentioned. It is argued that all relevant stakeholders need to think of the consequences of their conduct, that Internet abusers should be accountable for their wrongdoing and be penalized, and that people who have the ability to stop or at least reduce the risk of cyberbullying should take proactive steps, exhibiting zero tolerance to cyberbullying.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-17
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.291552
      Issue No: Vol. 13, No. 1 (2022)
       
  • Operationalizing the Ethics of Connected and Automated Vehicles

    • Free pre-print version: Loading...

      Authors: Fossa; Fabio, Arrigoni, Stefano, Caruso, Giandomenico, Cholakkal, Hafeez Husain, Dahal, Pragyan, Matteucci, Matteo, Cheli, Federico
      Pages: 1 - 20
      Abstract: In response to the many social impacts of automated mobility, in September 2020 the European Commission published Ethics of Connected and Automated Vehicles, a report in which recommendations on road safety, privacy, fairness, explainability, and responsibility are drawn from a set of eight overarching principles. This paper presents the results of an interdisciplinary research where philosophers and engineers joined efforts to operationalize the guidelines advanced in the report. To this aim, we endorse a function-based working approach to support the implementation of values and recommendations into the design of automated vehicle technologies. Based on this, we develop methodological tools to tackle issues related to personal autonomy, explainability, and privacy as domains that most urgently require fine-grained guidance due to the associated ethical risks. Even though each tool still requires further inquiry, we believe that our work might already prove the productivity of the function-based approach and foster its adoption in the CAV scientific community.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-20
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.291553
      Issue No: Vol. 13, No. 1 (2022)
       
  • Analysis of Production Line Project Based on Value Sensitive Design

    • Free pre-print version: Loading...

      Authors: Kong; Lu, Li, Jihua
      Pages: 1 - 11
      Abstract: Value sensitive design is a new method to embed moral value into the design process and possesses broad research prospects. However, there is a gap between the industrial application and the practical application of VSD since its practical application focuses on human-computer interaction and medical ethics. In this paper, the conceptual, empirical, and technical investigation of VSD are analyzed, and the feasibility of VSD for production line design is demonstrated. It was applied to the production line design process in Shenyang, Liaoning Province, China. Then, specific design issues such as environmental sustainability and safety are solved by analyzing the value demands of stakeholders and balancing the value tension. Thus, the human value of the production line becomes more sensitive, and the value conflict between natural and technical artifact is alleviated. In this process, we reflect on the design problems to be solved and obtain valuable opinions, enabling VSD to better adapt to the industrial production line design.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-11
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.291550
      Issue No: Vol. 13, No. 1 (2022)
       
  • Epistemic Democracy and Technopolitics

    • Free pre-print version: Loading...

      Authors: Marrone; Pierpaolo
      Pages: 1 - 14
      Abstract: In this article I examine the structure of four deliberative models: epistemic democracy, epistocracy, dystopic algocracy, and utopian algocracy. Epistocracy and algocracy (which in its two versions is an extremization of epistocracy) represent a challenge to the alleged epistemic superiority of democracy: epistocracy for its emphasis on the role of experts; algocracy for its emphasis on technique as a cognitively and ethically superior tool. In the concluding remarks I will advance the thesis that these challenges can only be answered by emphasizing the value of citizens’ political participation, which can also represent both an increase in their cognitive abilities and a value for public ethics.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-14
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.291551
      Issue No: Vol. 13, No. 1 (2022)
       
  • The Fairness Impact Assessment

    • Free pre-print version: Loading...

      Authors: Shelley; Cameron, Shelley, Cameron
      Pages: 1 - 16
      Abstract: As modern life becomes ever more mediated by technology, technology assessment becomes ever more important. Tools that help to anticipate and evaluate social impacts of technological designs are crucial to understanding this relationship. This paper presents an assessment tool called the Fairness Impact Assessment (FIA). For present purposes, fairness refers to conflicts of interest between social groups that result from the configuration of technological designs. In these situations, designs operate in a way such that advantages they provide to one social group impose disadvantages on another. The FIA helps to make clear the nature of these conflicts and possibilities for their resolution. As a broad, qualitative framework, the FIA can be applied more generally than specifically quantitative frameworks currently being explored in the field of machine learning. Though not a formula for solving difficult social issues, the FIA provides a systematic means for the investigation of fairness problems in technology design that are otherwise not always well understood or addressed.
      Keywords: IT Security and Ethics; Security & Forensics; Information Ethics
      Citation: International Journal of Technoethics (IJT), Volume: 13, Issue: 1 (2022) Pages: 1-16
      PubDate: 2022-01-01T05:00:00Z
      DOI: 10.4018/IJT.291554
      Issue No: Vol. 13, No. 1 (2022)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 44.200.175.255
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-