Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication Technology and New Media (6)
- Arts and Humanities (5)
- Computer Sciences (5)
- Philosophy (5)
- Physical Sciences and Mathematics (5)
-
- Science and Technology Studies (5)
- Critical and Cultural Studies (4)
- Digital Humanities (4)
- Information Security (4)
- Applied Ethics (3)
- Engineering (3)
- Ethics and Political Philosophy (3)
- Computer Engineering (2)
- Gender, Race, Sexuality, and Ethnicity in Communication (2)
- Information Literacy (2)
- Library and Information Science (2)
- Other Philosophy (2)
- Race, Ethnicity and Post-Colonial Studies (2)
- Risk Analysis (2)
- Theory and Algorithms (2)
- Applied Behavior Analysis (1)
- Business (1)
- Computational Engineering (1)
- Continental Philosophy (1)
- Disability Studies (1)
- Education (1)
- Feminist, Gender, and Sexuality Studies (1)
- Keyword
-
- GDPR (2)
- Pragmatism (2)
- Privacy (2)
- Social media (2)
- Affect (1)
-
- Algorithm (1)
- Algorithmic bias (1)
- Algorithms (1)
- Art. 22 (1)
- Assistive systems (1)
- Authenticity (1)
- Automatization (1)
- Big data (1)
- Content mining (1)
- Culture (1)
- Cultured technology (1)
- Cyberbullying (1)
- Cybersecurity (1)
- Data (1)
- Data breaches (1)
- Digital communities (1)
- Ethics (1)
- Freedom (1)
- Gen-Z (1)
- Hegel (1)
- Human connection (1)
- Human intervention (1)
- Identity (1)
- Information privacy (1)
- Interactive systems (1)
Articles 1 - 9 of 9
Full-Text Articles in Social Media
Tinder Research And The Social Sphere Of Online Dating, Bryanna Bylies-Binger
Tinder Research And The Social Sphere Of Online Dating, Bryanna Bylies-Binger
OUR Journal: ODU Undergraduate Research Journal
With the emergence of new technology, communication is now easier than ever. With popular dating apps such as the infamous social interactive platform, Tinder, forming romantic relationships online now offers individuals a new way to personalize their dating experiences beyond measures ever imagined. In October 2019, Tinder released their debut “Swipe Night” series which gave users fully functional interactive video episodes that allowed them to create and choose their own “apocalyptic adventure.” While there have been many findings on how these platforms have impacted society on a larger scale, there have been very few addressing the implications of interactive technology …
The Affective Politics Of Twitter, Johnathan C. Flowers
The Affective Politics Of Twitter, Johnathan C. Flowers
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Given the increasing encroachment of Twitter into offline experience, it has become necessary to look beyond the formation of identity in online spaces to the ways in which identities surface through the formation of affective communities organized through the use of technocultural assemblages, or the platforms, algorithms, and digital networks through which affect circulates in an online space. This essay focuses on the microblogging website Twitter as one such technocultural assemblage whose hashtag functionality allows for the circulation of affect among bodies which “surface” within the affective communities organized on Twitter through their alignment with and orientation by hashtags which …
Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider
Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.
Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers
Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In 2017, Amazon discontinued an attempt at developing a hiring algorithm which would enable the company to streamline its hiring processes due to apparent gender discrimination. Specifically, the algorithm, trained on over a decade’s worth of resumes submitted to Amazon, learned to penalize applications that contained references to women, that indicated graduation from all women’s colleges, or otherwise indicated that an applicant was not male. Amazon’s algorithm took up the history of Amazon’s applicant pool and integrated it into its present “problematic situation,” for the purposes of future action. Consequently, Amazon declared the project a failure: even after attempting to …
What To Do When Privacy Is Gone, James Brusseau
What To Do When Privacy Is Gone, James Brusseau
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction. It considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, transient existence responds to privacy’s loss by ceaselessly generating new personal identities, which translates into constantly producing temporarily unviolated private information. The …
Information Privacy: Not Just Gdpr, Danilo Bruschi
Information Privacy: Not Just Gdpr, Danilo Bruschi
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The "information rush" which is characterizing the current phase of the information age calls for actions aimed at enforcing the citizens' right to privacy. Since the entire information life-cycle (collection, manipulation, storing) is now carried out by digital technologies, most of such actions consists of the adoption of severe measures (both organizational and technological) aimed at improving the security of computer systems, as in the case of the EU General Data Protection Regulation. Usually, data processors which comply with these requirements are exempted by any other duty. Unfortunately recent trends in the computer attack field show that even the adoption …
A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche
A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The article introduces a concept of cultured technology, i.e. intelligent systems capable of interacting with humans and showing (or simulating) manners, of following customs and of socio-sensitive considerations. Such technologies might, when deployed on a large scale, influence and change the realm of human customs, traditions, standards of acceptable behavior, etc. This realm is known as the "objective spirit" (Hegel), which usually is thought of as being historically changing but not subject to deliberate human design. The article investigates the question of whether the purposeful design of interactive technologies (as cultured technologies) could enable us to shape modes of …
The Right To Human Intervention: Law, Ethics And Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki
The Right To Human Intervention: Law, Ethics And Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The paper analyses the new right of human intervention in use of information technology, automatization processes and advanced algorithms in individual decision-making activities. Art. 22 of the new General Data Protection Regulation (GDPR) provides that the data subject has the right not to be subject to a fully automated decision on matters of legal importance to her interests, hence the data subject has a right to human intervention in this kind of decisions.
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Virginia Journal of Science
The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …