Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Arts and Humanities (7)
- Philosophy (7)
- Risk Analysis (7)
- Applied Ethics (6)
- Computer Sciences (6)
-
- Physical Sciences and Mathematics (6)
- Information Security (5)
- Digital Humanities (4)
- Computer Engineering (3)
- Social and Behavioral Sciences (3)
- Artificial Intelligence and Robotics (2)
- Communication (2)
- Communication Technology and New Media (2)
- Critical and Cultural Studies (2)
- Ethics and Political Philosophy (2)
- Library and Information Science (2)
- Robotics (2)
- Science and Technology Studies (2)
- Social Media (2)
- Applied Behavior Analysis (1)
- Archival Science (1)
- Business (1)
- Categorical Data Analysis (1)
- Comparative Philosophy (1)
- Computational Engineering (1)
- Continental Philosophy (1)
- Disability Studies (1)
- Education (1)
- Epistemology (1)
- Keyword
-
- Accuracy (1)
- Anonimity (1)
- Anonymized personal data (1)
- Applied ethics (1)
- Artificial agents (1)
-
- Artificial moral agents (1)
- Assistive systems (1)
- Big data analytics (1)
- Channel Theory (1)
- Comparative studies (1)
- Computing ethics (1)
- Confidence (1)
- Confucian ethics (1)
- Consensus protocol (1)
- Contextual integrity (1)
- Culture (1)
- Cultured technology (1)
- Downstream responsibility (1)
- Dynamic ethics (1)
- Ethical responsibility (1)
- Ethics (1)
- GAFA (1)
- Hegel (1)
- Interactive systems (1)
- Kant (1)
- Libraries and archives (1)
- Manners (1)
- Metacognition (1)
- Objective spirit (1)
- Phenomenology (1)
Articles 1 - 8 of 8
Full-Text Articles in Engineering
Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen
Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In the literature of artificial moral agents (AMAs), most work is influenced by either deontological or utilitarian frameworks. It has also been widely acknowledged that these Western “rule-based” ethical theories have encountered both philosophical and computing challenges. To tackle these challenges, this paper explores a non-Western, role-based, Confucian approach to robot ethics. In this paper, we start by providing a short introduction to some theoretical fundamentals of Confucian ethics. Then, we discuss some very preliminary ideas for constructing a Confucian approach to robot ethics. Lastly, we briefly share a couple of empirical studies our research group has recently conducted that …
A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche
A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The article introduces a concept of cultured technology, i.e. intelligent systems capable of interacting with humans and showing (or simulating) manners, of following customs and of socio-sensitive considerations. Such technologies might, when deployed on a large scale, influence and change the realm of human customs, traditions, standards of acceptable behavior, etc. This realm is known as the "objective spirit" (Hegel), which usually is thought of as being historically changing but not subject to deliberate human design. The article investigates the question of whether the purposeful design of interactive technologies (as cultured technologies) could enable us to shape modes of …
A Metacognitive Approach To Trust And A Case Study: Artificial Agency, Ioan Muntean
A Metacognitive Approach To Trust And A Case Study: Artificial Agency, Ioan Muntean
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Trust is defined as a belief of a human H (`the trustor') about the ability of an agent A (the `trustee') to perform future action(s). We adopt here dispositionalism and internalism about trust: H trusts A iff A has some internal dispositions as competences. The dispositional competences of A are high-level metacognitive requirements, in the line of a naturalized virtue epistemology. (Sosa, Carter) We advance a Bayesian model of two (i) confidence in the decision and (ii) model uncertainty. To trust A, H demands A to be self-assertive about confidence and able to self-correct its own models. In the Bayesian …
Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky
Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In this paper, we examine a cluster of ethical controversies generated by the re-identification of anonymized personal data in the context of big data analytics, with particular attention to the implications for personal privacy. Our paper is organized into two main parts. Part One examines some ethical problems involving re-identification of personally identifiable information (PII) in large data sets. Part Two begins with a brief description of Moor and Weckert’s Dynamic Ethics (DE) and Nissenbaum’s Contextual Integrity (CI) Frameworks. We then investigate whether these frameworks, used together, can provide us with a more robust scheme for analyzing privacy concerns that …
Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider
Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.
Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie
Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.
This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such …
On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky
On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software’s …
Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou
Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Web harvesting and archiving pertains to the processes of collecting from the web and archiving of works that reside on the Web. Web harvesting and archiving is one of the most attractive applications for libraries which plan ahead for their future operation. When works retrieved from the Web are turned into archived and documented material to be found in a library, the amount of works that can be found in said library can be far greater than the number of works harvested from the Web. The proposed participation in the 2019 CEPE Conference aims at presenting certain issues related to …