Book contents
- Frontmatter
- Contents
- List of contributors
- Preface
- Acknowledgements
- Part I Introduction and background
- Part II Ethical approaches
- Part III Ethical issues in the information society
- Part IV Ethical issues in artificial contexts
- Part V Metaethics
- Epilogue: The ethics of the information society in a globalized world
- References
- Index
- References
References
Published online by Cambridge University Press: 05 June 2012
Edited by
Book contents
- Frontmatter
- Contents
- List of contributors
- Preface
- Acknowledgements
- Part I Introduction and background
- Part II Ethical approaches
- Part III Ethical issues in the information society
- Part IV Ethical issues in artificial contexts
- Part V Metaethics
- Epilogue: The ethics of the information society in a globalized world
- References
- Index
- References
Summary
A summary is not available for this content so a preview has been provided. Please use the Get access link above for information on how to access this content.

- Type
- Chapter
- Information
- The Cambridge Handbook of Information and Computer Ethics , pp. 284 - 312Publisher: Cambridge University PressPrint publication year: 2010
References
and
1998. Artificial Knowing: Gender and the Thinking Machine. New York and London: Routledge.Google Scholar
2002. ‘Cyberstalking and Internet Pornography’, Ethics and Information Technology 4, 133–142.CrossRefGoogle Scholar
2005. Gender, Ethics and Information Technology. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
2006. ‘Being an it in IT – Gendered Identities in the IT Workplace’, European Journal of Information Systems 15(4), 368–378.CrossRefGoogle Scholar
, , , , and 2006. ‘Enabling or Disabling Technologies? A Critical Approach to Web Accessibility’, Information Technology and People 19(3), 203–218.CrossRefGoogle Scholar
and 1998. The Next World War: Computers Are the Weapons and the Front Line is Everywhere. New York: Simon and Schuster.Google Scholar
2001. Cost-Benefit Analysis: Economic, Philosophical and Legal Perspectives. Chicago: University of Chicago Press.
and (eds.) 1997. ‘Social Choice about Privacy: Intelligent Vehicle-Highway Systems in the United States’, in (ed.), Human Values and the Design of Computer Technology. Cambridge: Cambridge University Press.Google Scholar
and 1992. ‘The Description of Technical Objects’, in and , (eds.), Shaping Technology/Building Society. Cambridge, MA: MIT Press.Google Scholar
2006. The Spychips Threat: Why Christians Should Resist RFID and Electronic Surveillance. Nashville: Nelson Current.Google Scholar
and 2008. ‘Online Social Networking as Participatory Surveillance’, First Monday 13(3), 3 March. www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949
2003. ‘“A Piece of Yourself”: Ethical Issues in Biometric Identification’, Ethics and Information Technology 5(3),139–150.CrossRefGoogle Scholar
, 2006. ‘Computing an Ethical Theory with Multiple Prima Facie Duties’, in Proceeding EthicALife/ALifeX.Google Scholar
and 2007. ‘Machine Ethics: Creating an Ethical Intelligent Agent’, Artificial Intelligence Magazine 28(4), Winter, 15.Google Scholar
and 2008. ‘Ethical Healthcare Agents. Advanced Computational Intelligence Paradigms’, in (ed.), Healthcare-3 pp. 233–257. Berlin: Springer.Google Scholar
and 2007. ‘California Outlaws the Forced Subdermal RFID Tagging of Humans’, http://arstechnica.com/news.ars/post/20070904-california-outlaws-forced-rfid-tagging-of-humans.html
1958. ‘Modern Moral Philosophy’, Philosophy33.CrossRef
1968. ‘Crisis in Culture’, in Between Past and Future: Eight Exercises in Political Thought, pp. 197–227. New York: Meridian.Google Scholar
, On the Motion of Animals, On the Soul, Nicomachean Ethics.
2004. ‘Bombs, Bonding, and Bondage: Human-Robot Interaction and Related Ethical Issues’. Paper presented at the First International Conference on Roboethics, San Remo, Italy, January 2004.Google Scholar
2007. Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture. Technical Report GIT-GVU-07–11, College of Computing, Georgia Institute of Technology.
1997. In Athena's Camp: Preparing for Conflict in the Information Age. Santa Monica, CA: RAND.Google Scholar
and 2003. ‘The Link Between ICT and Economic Growth in the Discourse of Development’, in Korpeal, M., Montealegre, R. and Poulymenakou, A. 2003, Organizational Information Systems in the Context of Globalization, pp. 373–386. Dordrecht: Kluwer.CrossRefGoogle Scholar
2008. ‘Transformed Social Interaction in Mediated Interpersonal Communication’, in , , and (eds.), Mediated Interpersonal Communication. Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
, , and 2006. Managing Nano-bio-info-cogno Innovations: Converging Technologies in Society. Dordrecht: Springer.CrossRef
and (eds.) 2007. ‘Our Designs and the Social Agendas They Carry’, Journal of the Learning Sciences 16, 263–305.CrossRefGoogle Scholar
, , , and 2006. ‘A Face is Exposed for AOL Searcher No. 4417749’, The New York Times, 9 August.
and 1987. ‘Moral Dilemmas and Consistency’, in Gowans (1987), pp. 188–204.
2008. Computer Ethics: A Case-Based Approach. New York: Cambridge University Press.CrossRefGoogle Scholar
1995. ‘Coming into the Country’, in and (eds.), Computers, Ethics and Social Value, pp. 15–18. Upper Saddle River: Prentice Hall.Google Scholar
2006. ‘A Privacy Paradox: Social Networking in the United States’, First Monday 11(9). www.firstmonday.org/issues/issue11_9/barnes/index.html#authorCrossRefGoogle Scholar
and
2003. ‘Information in the Holographic Universe’, Scientific American, August, 58–65.CrossRefGoogle Scholar
2001. ‘Does Global Inequality Matter?’, in , Global Justice, pp. 106–122. Oxford: Blackwell.Google Scholar
1995. ‘Anonymous Speech,’ Wired, October, http://www.wired.com/wired/archive/3.10/cyber.rights.html.
and
2001. ‘The Battle over the Institutional Ecosystem in the Digital Environment’, Communications of the ACM 44(2), 84–90.CrossRefGoogle Scholar
1957. The Hedgehog and the Fox: An Essay on Tolstoy's View of History. New York: Weidenfeld and Nicolson.Google Scholar
1958. Two Concepts of Liberty: An Inaugural Lecture Delivered before the University of Oxford on 31 October 1958. Oxford: Clarendon Press.Google Scholar
1992. Shaping Technology/Building Society. Studies in Sociotechnical Change. Cambridge, MA: MIT Press.
and (eds.) 1990. Black's Law Dictionary: Definitions of the Terms and Phrases of American and English Jurisprudence, Ancient and Modern (6th edn). St Paul, MN: West Publishing.Google Scholar
2003. ‘Don't Expect Any Privacy in the Workplace’, WWWiz.Com. wwwiz.com/issue45/
2004. ‘Fulfilling or Violating Obligations in Normative Multiagent Systems’, IAT 2004, 483–486.
and 1996. Public Deliberation: Pluralism, Complexity and Democracy. Cambridge, MA: MIT Press.Google Scholar
2008. APA Newsletter on Computers and Philosophy, Spring 7(2) and Fall 8(1).
(ed.) 2007. ‘Data Centres Make Big Carbon Footprint’, Siliconrepublic.com, 10 October. www.siliconrepublic.com/news/news.nv?storyid=single9387
2006. ‘Working with Others: Accessibility and User Research’, Accessibility 225, 9 October 09. http://alistapart.com/articles/workingwithothersGoogle Scholar
2002. ‘Existential Risks: Analyzing Human Extinction Scenarios and Related Hazards’, Journal of Evolution and Technology 9, 1–30.Google Scholar
2003. ‘The Transhumanist FAQ, Version 2.1’, www.transhumanism.org/resources/faq.html
1977. Outline of a Theory of Practice. Trans. . Cambridge: Cambridge University Press.CrossRefGoogle Scholar
and
2001. ‘A Politics of Intellectual Property: Environmentalism for the Net?’, in and (eds.), Readings in Cyberethics, pp. 231–251. Sudbury, MA: Jones and Bartlett.Google Scholar
. 2002. ‘Information and Communication Technologies: Perspectives and Their Impact on Society’, AI and Society 16(3), 210–223.CrossRefGoogle Scholar
and 1998. ‘The Politics of Computer Systems and the Ethics of Design’, in (ed.), Computer Ethics: Philosophical Enquiry. Rotterdam: Rotterdam University Press.Google Scholar
1999a. ‘Method in Computer Ethics: Towards a Multi-Level Interdisciplinary Approach’, Ethics and Information Technology 2(3), 1–5.Google Scholar
1999b. ‘The Ethics of Representation and Action in Virtual Reality’, Ethics and Information Technology 1(1), 5–14.CrossRefGoogle Scholar
1999c. ‘Worker Autonomy and the Drama of Digital Networks in Organizations’, Journal of Business Ethics 22(1), 15–25.CrossRefGoogle Scholar
2008. ‘Virtual Reality and Computer Simulation’, in and (eds.), The Handbook of Information and Computer Ethics. Hoboken, NJ: John Wiley & Sons.Google Scholar
2005. ‘Technology: Overview’, in (ed.), Encyclopedia of Science, Technology and Ethics, pp. 908–1912. Detroit: Thomson, Gale.Google Scholar
, and 1999. The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom? New York: Perseus Books.Google Scholar
2007. ‘Ethical Robots: The Future Can Heed Us’, AI and Society (online).
2007. ‘The Internet: The Missing Link Between the Information Rich and the Information Poor?’, in , and (eds.), Localizing the Internet: Ethical aspects in intercultural perspective, pp. 265–277. Munich: Wilhelm Fink.Google Scholar
2007. ‘Robotkind: On the Battlefield and in the Home’, Lecture to the British Computer Society, June 2007. Video online at http://74.125.95.132/server.php?show=ConWebDoc.10440
2003. Lost Liberties: Ashcroft and the Assault on Personal Freedom. New York: The New Press.Google Scholar
2004. ‘Ethical Considerations for the Information Professions’, in and , (eds.), Readings in Cyberethics (2nd edn), pp. 613–624. Sudbury, MA: Jones and Bartlett.Google Scholar
2005. ‘New Threats to Intellectual Freedom: The Loss of the Information Commons through Law and Technology in the US’, in and (eds.), Intellectual Property Rights in a Networked World: Theory and Practice, pp. 205–242. Hershey, PA: INFOSCI.Google Scholar
and 2006. Ethics of Emerging Technologies: Scientific Facts and Moral Challenges. Hoboken, NJ: Wiley.Google Scholar
and 2001. ‘Copyrightable Functions and Patentable Speech’, Communications of the ACM 44(2), 69–76.CrossRefGoogle Scholar
2007. ‘Privacy and Property in the Global Datasphere’, in and (eds.), Information Technology Ethics: Cultural Perspectives, pp. 94–107. Hershey, PA: IGI Global.CrossRefGoogle Scholar
2007. ‘TopTenREVIEWS Reports Worldwide Pornography Market at Least $97 Billion; Every Second 28,258 Internet Users View Pornography’, bNet Business Network (12 March). http://findarticles.com/p/articles/mi_m0EIN/is_/ai_n27186769
, ,
1985. Editor's Introduction to James Moor, ‘What is Computer Ethics?’, Metaphilosophy 16(4), 263–265.CrossRefGoogle Scholar
1986. ‘Aristotle's Theory of Human Action’, a doctoral dissertation at the Graduate School of the City University of New York. www.southernct.edu/organizations/rccs/
2000a. ‘The Foundation of Computer Ethics’, Computers and Society 30(2), 6–13.CrossRefGoogle Scholar
2000b. ‘A Very Short History of Computer Ethics’, Newsletter of the American Philosophical Association on Philosophy and Computing. www.southernct.edu/organizations/rccs/resources/research/introduction/bynum_shrt_hist.html
2001. ‘Computer Ethics: Basic Concepts and Historical Overview’, Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/entries/ethics-computer/
2004. ‘Ethical Challenges to Citizens of the “Automatic Age”: Norbert Wiener on the Information Society’, Journal of Information, Communication and Ethics in Society 2(2), 65–74.CrossRefGoogle Scholar
2005. ‘Norbert Wiener's Vision: The Impact of the “Automatic Age” on Our Moral Lives’, in Cavalier, R. (ed.), The Impact of the Internet on Our Moral Lives, pp. 11–25. Albany, NY: State University of New YorkPress.Google Scholar
2006b. ‘A Copernican Revolution in Ethics?’, in and (eds.), Computing, Philosophy, and Cognitive Science. Newcastle upon Tyne: Cambridge Scholars Press.Google Scholar
1996, ‘Global Information Ethics: Introduction and Overview’, Science and Engineering Ethics 2(2), 131–136.CrossRefGoogle Scholar
and 1999. ‘Democratic Implications of Internet Protocols,’ The Information Society 15, 249–256.CrossRefGoogle Scholar
2003. ‘First Principles of Copyright for DRM Design’, IEEE Internet Computing 7(3), 59–65.CrossRefGoogle Scholar
2008. ‘The Digital Divide: A Perspective for the Future’, in and (eds.), The Handbook of Information and Computer Ethics, pp. 621–637. Hoboken, NJ: Wiley.CrossRefGoogle Scholar
and 2000. The Information Age: Economy, Society, and Culture. Volume I: The Rise of the Network Society (2nd edn). Oxford: Blackwell.Google Scholar
1999. ‘The Utility of Short Tandem Repeat Loci Beyond Human Identification: Implications for Development of New DNA Typing’, Electrophoresis 20(8), 1682–1696.3.0.CO;2-Z>CrossRefGoogle ScholarPubMed
, , , and 2003. ‘Confucian Attitudes towards Ethical Pluralism’, in and (eds.), The Many and the One: Religions and Secular Perspectives on Ethical Pluralism in the Modern World, pp. 129–153. Princeton: Princeton University Press.Google Scholar
2005. ‘The Scarcity of Intellectual Property’, Journal of Information, Law and Technology, www2.warwick.ac.uk/fac/soc/law/elj/jilt/Google Scholar
2006. ‘To Hell with WCAG2’, Accessibility 217, 23 May 2006. http://alistapart.com/articles/tohellwithwcag2Google Scholar
2001. ‘Informed Consent in Medicine in Comparison with Consent in Other Areas of Human Activity’, Southern Journal of Philosophy 39, 169–187.CrossRefGoogle Scholar
2005. ‘Future Technologies, Dystopic Futures and the Precautionary Principle”, Ethics and Information Technology 7, 121–126.CrossRefGoogle Scholar
2009. ‘New Technologies, Common Sense and the Paradoxical Precautionary Principle’, in and (eds.), Evaluating New Technologies: Methodological Problems for the Assessment of Technological Developments, pp. 159–173. Dordrecht: Springer.CrossRefGoogle Scholar
1989. Anti-Theory in Ethics and Moral Conservatism. Albany, NY: State University of NewYork Press.Google Scholar
and 1980. Teaching Bioethics: Strategies, Problems, and Resources. Hastings Center, Institute for Society, Ethics, and the Life Sciences.Google Scholar
and
2007. ‘Violent Computer Games, Empathy, and Cosmopolitanism’, Ethics and Information Technology 9(3), 219–231.CrossRefGoogle Scholar
2001/2004. ‘Bowling Together: Online Public Engagement in Policy Deliberation, Hansard Society’. Online at bowlingtogether.net
and 1990. Artificial Experts: Social Knowledge and Intelligent Machines. Cambridge, MA/London: MIT Press.Google Scholar
2002. ‘The Internet Doctor and Medical Ethics’, Medicine, Healthcare and Philosophy 5(2), 121–125.CrossRefGoogle ScholarPubMed
2005. ‘A Taxonomy of Technics’, International Philosophical Quarterly 46, 5–24.CrossRefGoogle Scholar
2003. ‘Digital Divide or Discursive Design? On the Emerging Ethics of Information Space’, Ethics and Information Technology 5(2), 89–97.CrossRefGoogle Scholar
1989. More Work for Mother: The Ironies of Household Technology from the Open Hearth to the Microwave. London: Free Association Books.Google Scholar
2006. Critical Readings: Moral Panics and the Media. Maidenhead: Open University Press.Google Scholar
2006. ‘How (Can) Nonusers Engage with Technology: Bringing in the Digitally Excluded’, in Trauth, E. M., Howcroft, D., Butler, T., Fitzgerald, B. and DeGross, J. I., Social Inclusion: Societal and Organizational Implications for Information Systems (IFIP Volume 208), pp. 347–364. New York: Springer.CrossRefGoogle Scholar
and , , , , and , ‘Implementing Cognitive Agents in 3APL’, www.cs.uu.nl/3apl/
2003. ‘New Techniques and Technologies of Surveillance in the Workplace’, www.amicus-itpa.org//juneconf3.shtml
1998. ‘Computers, Ethics, and Business’, Philosophic Exchange 1997–1998, 45–55.
1996. ‘When Hal Kills, Who's to Blame?’, in (ed.), Hal's Legacy, pp. 351–365. Cambridge, MA: MIT Press.Google Scholar
1997. ‘Kant's Ethics and Duties to Oneself’, Pacific Philosophical Quarterly 78(4), 321–348.CrossRefGoogle Scholar
2004. ‘Towards a Social Ethics of Technology: A Research Prospect’, Techné: Research in Philosophy and Technology 8(1), 99–115.Google Scholar
2005. ‘The Digital Divide: Current and Future Research Directions’, Journal of the Association for Information Systems 6(12), 298–337.Google Scholar
and 2006. ‘The Disability Divide in Internet Access and Use’, Information, Communication and Society 9(3), 313–334.CrossRefGoogle Scholar
and 1999. Ties that Bind: A Social Contracts Approach to Business Ethics. Boston, MA: Harvard Business School Press.Google Scholar
and 2001. Deliberative Democracy and Beyond: Liberals, Critics, Contestations. Oxford: Oxford University Press.Google Scholar
2007. Information Technology and Indigenous People. Hershey, PA: Information Science Publishing.CrossRef
, and (eds.). 2003. ‘Islam and Ethical Pluralism’, in and (eds.), The Many and the One: Religious and Secular Perspectives on Ethical Pluralism in the Modern World, pp. 161–180. Princeton: Princeton University Press.Google Scholar
2002. ‘Resonanz als Grundmotiv ostasiatischer Ethik’ [Resonance as a Fundamental Motif of East Asian Ethics], in and (eds.), Kamparative Ethik: Das gute Leben Zwischen den Kulturen [Comparative Ethics: The Good Life between Cultures], pp. 131–141. Cologne: Edition Chora.Google Scholar
. www.EFF.org
2005. ‘Deliberative Technology?’ in and (eds.), Technology in a Multicultural and Global Society, pp. 61–77. Trondheim: NTNU, Programme for Applied Ethics, publ. series no. 6.Google Scholar
1996. ‘The Political Computer: Democracy, CMC, and Habermas’ in (ed.), Philosophical Perspectives on Computer-Mediated Communication, pp. 197–230. Albany, NY: State University of New York Press.Google Scholar
2002. ‘Computer-Mediated Colonization, the Renaissance, and Educational Imperatives for an Intercultural Global Village’, Ethics and Information Technology 4(1), 11–22.CrossRefGoogle Scholar
2006a. ‘Ethical Pluralism and Global Information Ethics’, Ethics and Information Technology 8(4), 215–226.CrossRefGoogle Scholar
2006b. ‘From Computer-Mediated Colonization to Culturally-Aware ICT Usage and Design’, in and (eds.), Advances in Universal Web Design and Evaluation: Research, Trends and Opportunities, pp. 178–197. Hershey, PA: Idea Publishing.Google Scholar
2007. ‘Cybernetic Pluralism in an Emerging Global Information and Computing Ethics’, International Review of Information Ethics 7 www.i-r-i-e.net/inhalt/007/11-ess.pdf
2006. ‘Neither Relativism nor Imperialism: Theories and Practices for a Global Information Ethics’, Ethics and Information Technology 8(3), 91–154.CrossRefGoogle Scholar
and 2005. ‘A Tiny Primer on Nano-Scale Technologies and “the Little Bang Theory”’, www.etcgroup.org/documents/TinyPrimer_English.pdf
. 2006. ‘The Appropriateness of Existing Methodologies to Assess the Potential Risks Associated with Engineered and Adventitious Products of Nanotechnologies’, http://ec.europa.eu/health/ph_risk/committees/04_scenihr/docs/scenihr_o_003b.pdf
. 2005. ‘Ethical Aspects of ICT Implants in the Human Body’, http://ec.europa.eu/european_group_ethics/docs/avis20_en.pdf
. 2001. ‘A Moral Approach to Electronic Patient Records’, Medical Informatics and the Internet in Medicine 26(3), 219–234.Google ScholarPubMed
and 2008. ‘The Connection Has Been Reset,’ The Atlantic, www.theatlantic.com/doc/200803/chinese-firewall
1992. ‘Artificial Life: The Coming Evolution”, in , , and (eds.) Artificial Life II: Proceedings of the Workshop on Synthesis and Simulation of Living Systems, Santa Fe, 1990. Redwood City, CA: Addison Wesley.Google Scholar
and 2007. ‘The NEPAD e-Schools Demonstration Project: A Work in Progress. Washington, DC: infoDTheWorld Bank’, www.infodev.org/en/Publication.355.html
, and .
1994. www.seas-at-risk.org/n2_archive.php?page=9
‘Seas at Risk’ Conference. 1994. There's No Such Thing as Free Speech…and it's a Good Thing too. New York: Oxford University Press.Google Scholar
2006. Implementing the Precautionary Principle: Perspectives and Prospects. Cheltenham: Edward Elgar.CrossRefGoogle Scholar
, and 2005. ‘Values at Play: Design Tradeoffs in Socially-Oriented Game Design’, in Proceedings of the CHI 2005 Conference on Human Factors in Computing Systems. CHI 2005, 2–7 April, Portland, Oregon. New York: ACM Press.
, and 2008. ‘Embodying Values in Technology: Theory and Practice’, in and (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press.Google Scholar
, and 2007. ‘Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies’, Library Quarterly 77(4), 409–427.
1995. ‘Internet: Which Future for Organized Knowledge, Frankenstein or Pygmalion?’, International Journal of Human-Computer Studies 43, 261–274.CrossRefGoogle Scholar
1999b. ‘Information Ethics: On the Philosophical Foundations of Computer Ethics’, Ethics and Information Technology 1(1), 37–56.CrossRefGoogle Scholar
2002a. ‘Information Ethics: An Environmental Approach to the Digital Divide’, Philosophy in the Contemporary World 9(1), 39–45.CrossRefGoogle Scholar
2002b. ‘What Is the Philosophy of Information?’, in and (eds.), Cyberphilosophy: The Intersection of Computing and Philosophy, pp. 117–138. Oxford: Blackwell.Google Scholar
2003. ‘On the Intrinsic Value of Information Objects and the Infosphere’, Ethics and Information Technology 4(4), 287–304.CrossRefGoogle Scholar
2004. ‘Open Problems in the Philosophy of Information’, Metaphilosophy 35(4), 554–582.CrossRefGoogle Scholar
2005a. ‘An Interpretation of Informational Privacy and of Its Moral Value’, Proceedings of CEPE 2005 – 6th Computer Ethics: Philosophical Enquiries Conference, Ethics of New Information Technologies, University of Twente, Enschede, the Netherlands.Google Scholar
2005b. ‘Information Ethics: Its Nature and Scope’, Computers and Society 36(3), 21–36.CrossRefGoogle Scholar
2005c. ‘Presence: From Epistemic Failure to Successful Observability’, Presence: Teleoperators and Virtual Environments 14(6), 656–667.CrossRefGoogle Scholar
2005d. ‘The Ontological Interpretation of Informational Privacy,’ Ethics and Information Technology 7(4), 185–200.CrossRefGoogle Scholar
2006a. ‘Four Challenges for a Theory of Informational Privacy’, Ethics and Information Technology 8(3), 109–119.CrossRefGoogle Scholar
2006b. ‘Information Technologies and the Tragedy of the Good Will’, Ethics and Information Technology 8(4), 253–262.CrossRefGoogle Scholar
2006c. ‘Informational Privacy and its Ontological Interpretation’, Computers and Society 36(3), 37–40.CrossRefGoogle Scholar
2007a. ‘A Look into the Future Impact of ICT on Our Lives’, The Information Society 23(1), 59–64.CrossRefGoogle Scholar
2007b. ‘Understanding Information Ethics’, APA Newsletter on Philosophy and Computers 7(1), http://76.12.57.18/publications/newsletters/v07n1_Computers_04.aspx
, 2008a. ‘Artificial Intelligence's New Frontier: Artificial Companions and the Fourth Revolution’, Metaphilosophy 39 (4/5), 651–655.CrossRefGoogle Scholar
2008b. ‘The Method of Levels of Abstraction’, Minds and Machines, 18(3), 303–329.CrossRefGoogle Scholar
2008c. ‘Replies to “Commentaries on Floridi”’, APA Newsletter on Philosophy and Computers, 72.Google Scholar
2008d. ‘Information Ethics, its Nature and Scope’, in and (eds.), Information Technology and Moral Philosophy, pp. 40–65. Cambridge: Cambridge University Press.Google Scholar
2008e. ‘Foundations of Information Ethics’ in and (eds.), The Handbook of Information and Computer Ethics, pp. 3–23. Hoboken, NJ: Wiley.Google Scholar
2008f. ‘A Defence of Informational Structural Realism’, Synthese 161(2), 219–253.CrossRefGoogle Scholar
(forthcoming, a). ‘The Information Society and Its Philosophy’, The Information Society.
(forthcoming, b). Response to S. Hongladarom in special issue of Floridi and his Critics
The Philosophy of Information. Oxford: Oxford University Press.
(forthcoming, c). 1999. ‘Entropy as Evil in Information Ethics’, Etica & Politica, special issue on Computer Ethics 1(2).Google Scholar
, and 2001. ‘Artificial Evil and the Foundation of Computer Ethics’, Ethics and Information Technology 3, 55–66.CrossRefGoogle Scholar
and 2002. ‘Mapping the Foundationalist Debate in Computer Ethics,’ Ethics and Information Technology 4(1), 1–9. A revised version is printed in and (eds.), Readings in Cyberethics (2nd edn), pp. 84–95. Sudbury, MA: Jones and Bartlett.CrossRefGoogle Scholar
and 2004. ‘On the Morality of Artificial Agents’. Minds and Machines 14(3), 349–379.CrossRefGoogle Scholar
and 2005. ‘Internet Ethics: The Constructionist Values of Homo Poieticus’, in (ed.), The Impact of the Internet on Our Moral Lives, pp. 195–214. Albany, NY: SUNY Press.Google Scholar
and 1967. ‘The Problem of Abortion and the Doctrine of the Double Effect’, Oxford Review 5, 5–15.Google Scholar
Ethical Implications of Implantable Radiofrequency Identification Tags in Humans’, American Journal of Bioethics.
and (forthcoming). ‘1917. ‘A Difficulty in the Path of Psycho-Analysis’, The Standard Edition of the Complete Psychological Works of Sigmund Freud, XVII(1917–1919), pp. 135–144.Google Scholar
1997. Human Values and the Design of Computer Technology. Cambridge: Cambridge University Press.
(ed.) 2005. ‘Value Sensitive Design’, in , and (eds.), Theories of Information Behavior: A Researcher's Guide. Medford, NJ: Information Today.Google Scholar
and 2002. ‘Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design’, in Proceedings of the Thirty-Fifth Annual Hawai'i International Conference on System Sciences. Abstract, p. 247; CD-ROM of full-paper, OSPE101. Los Alamitos, CA: IEEE Computer Society.Google Scholar
, and 2003. ‘Human Values, Ethics, and Design’, in and (eds.), The Human-Computer Interaction Handbook. Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
and 2006. ‘Value Sensitive Design and Information Systems’ in and (eds.), Human-Computer Interaction in Management Information Systems. Foundations, New York: M. E. Sharpe.Google Scholar
, and 2008. ‘Value Sensitive Design and Information System’, in and (eds.), The Handbook of Information and Computer Ethics, pp. 69–102. Hoboken, NJ: John Wiley & Sons.CrossRefGoogle Scholar
, . and 2005. ‘Informed Consent by Design’, in and (eds.), Designing Secure Systems that People Can Use. O'Reilly.Google Scholar
, and 1996. ‘Bias in Computer Systems’, ACM Transactions on Computer Systems 14(3), 330–347.Google Scholar
and 2005. ‘It's a Flat World, After All’, New York Times, 3 April. www.nytimes.com/2005/04/03/magazine/03DOMINANCE.htmlGoogle Scholar
2001. ‘The Collision of Trademarks, Domain Names, and Due Process in Cyberspace’, Communications of the ACM 44(2), 91–97.CrossRefGoogle Scholar
Michael. and
1956. ‘Essentially Contested Concepts’, Proceedings of the Aristotelian Society 56, 167–198.CrossRefGoogle Scholar
2006. ‘A Core Precautionary Principle’, Journal of Political Philosophy 14(1), 33–60.CrossRefGoogle Scholar
2002 ‘MyLifeBits: Fulfilling the Memex Vision’, ACM Multimedia '02, 1–6 December 2002, Juan-les-Pins, France, pp. 235–238. Retrieved January 2008 from http://research.microsoft.com/apps/pubs/default.aspx?id=64165CrossRefGoogle Scholar
, , , and 2006. ‘Copyright Management Systems: Accessing the Power Balance’, in , and (eds.), The Information Society: Emerging Landscapes (IFIP WG 9.2 Proceedings), pp. 211–222. New York: Springer.CrossRefGoogle Scholar
1999. ‘Common Morality and Computing’, Ethics and Information Technology 1(1), 57–64.CrossRefGoogle Scholar
. 2007. ‘Why the World Isn't Flat’, Foreign Policy 159 (March/April), 54–60.
, www.globalforumhealth.org/
2000. ‘An End to Disabling Policies? Toward Enlightened Universal Service’, The Information Society 16, 127–133.Google Scholar
and 2006. ‘Disability, Identity, and Interdependence: ICTs and New Social Forms’, Information, Communication and Society 9(3), 309–311.CrossRefGoogle Scholar
and 2007. Totally Wired: What Teens and Tweens are Really Doing Online. St Martin's: Griffin.Google Scholar
2004. ‘Book Reviews: The Virtual Community’, Westminster Papers in Communication and Culture 1(1), 103–109.CrossRefGoogle Scholar
1996. ‘The Computer Revolution and the Problem of Global Ethics’, Global Information Ethics (a special issue of Science and Engineering Ethics) 2(2), 177–190.Google Scholar
1995. ‘Computer Ethics: Responsibility Regained’, in and (eds.), Computers, Ethics and Social Values, pp. 18–24. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
2004. ‘The Tragedy of the Digital Commons’, Ethics and Information Technology 6(2), 73–82.CrossRefGoogle Scholar
and 2006. ‘Haven or Hell? Telework, Flexibility and Family in the E-Society: A Marxist Analysis’, European Journal of Information Systems 15(3), 379–388.CrossRefGoogle Scholar
and 1993. “How We Do Ethics Now', in (ed.), Ethics. Cambridge: Cambridge University Press.Google Scholar
1996. Value Judgement: Improving Our Ethical Beliefs. Oxford: Oxford University Press.Google Scholar
2008. ‘Social Networking and Digital Gaming Media Convergence: Consequences for Appropriation in Habbo Hotel’, Under the Mask: Perspectives on the Gamer Conference, the Research Institute for Media, Art and Design, University of Bedfordshire.Google Scholar
and 2008. ‘The Ethics of Designing Artificial Agents’, Ethics and Information Technology 10, 115–121.CrossRefGoogle Scholar
, and and
1993. ‘Remarks on Discourse Ethics’, in Justification and Application, pp. 19–113. Cambridge, MA: MIT Press.Google Scholar
2003. ‘Ethical Gaps in Studies of the Digital Divide’, Ethics and Information Technology 5(2), 99–115.CrossRefGoogle Scholar
and 2006. ‘Defining the Spectrum of Genome Policy’, Nature Reviews Genetics 7(12), 966–972.CrossRefGoogle ScholarPubMed
and 2003. ‘Natural Law and Ethical Pluralism’, in and (eds.), The Many and the One: Religious and Secular Perspectives on Ethical Pluralism in the Modern World, pp. 89–114. Princeton: Princeton University Press.
1989. Plato, The Collected Dialogues. Princeton: Princeton University Press.
and (eds.). 1984. ‘Supervenience’. Paper read at Aristotelian Society Supplementary Volume 56.
2001. ‘Globalization’ in (ed.), Oxford Companion to Politics of the World. Oxford and New York: Oxford University Press. Also available online at www.polity.co.uk/global/globocp.htm.Google Scholar
and 1999. Global Transformations: Politics, Economics and Culture. Cambridge: Polity Press.Google Scholar
, , and 1993. ‘Establishing Gender Perspectives on Information Technology: Problems Issues and Opportunities’, in , and (eds.), Gendered by Design? Information Technology and Office Systems, pp. 31–49. London: Taylor and Francis.Google Scholar
1984. ‘Wonder’ and Other Essays: Eight Studies in Aesthetics and Neighbouring Fields. Edinburgh: Edinburgh University Press.Google Scholar
2005. ‘A Buddhist Model for the Informational Person’, Proceedings of the Second Asia Pacific Computing and Philosophy Conference, 7–9 January, Bangkok, Thailand.Google Scholar
1996. ‘Posting in a Different Voice: Gender and Ethics in CMC’, in (ed.), Philosophical Perspectives on Computer-Mediated Communication, pp. 115–145. Albany NY: State University of New York Press.CrossRefGoogle Scholar
2001. The Hacker Ethic and the Spirit of the Information Age. London: Secker & Warburg.Google Scholar
2003. ‘The Relationship between the Uniqueness of Computer Ethics and Its Independence as a Discipline in Applied Ethics’, Ethics and Information Technology 5(4), 225–237.CrossRefGoogle Scholar
2004. ‘There's Something About Mary: The Moral Value of Things Qua Information Objects’, Ethics and Information Technology 6(3), 145–159.CrossRefGoogle Scholar
2007a. ‘Foundational Issues in Information Ethics’, Library Hi Tech 25(1), 79–94.CrossRefGoogle Scholar
2007b. ‘Artificial Agency, Consciousness, and the Criteria for Moral Agency: What Properties Must an Artificial Agent Have to be a Moral Agent?’, SSRN: http://ssrn.com/abstract=983503
and (eds.)
2002. ‘The Impact of the Internet on Our Moral Lives in Academia’, Ethics and Information Technology 4(1), 31–35.CrossRefGoogle Scholar
2004. ‘Virtual Virtues: Reflections on Academic Integrity in the Age of the Internet’, in (ed.), The Internet and Our Moral Lives, pp. 49–68. Albany, NY: SUNY Press.Google Scholar
2008. Ethics: A Pluralistic Approach to Moral Theory (4th edn). Belmont, CA: Thomson-Wadsworth.Google Scholar
1998. ‘Ethical Guidelines for a Networked World under Construction’, Journal of Business Ethics 17(9–10), 1057–1071.CrossRefGoogle Scholar
, and 1975. Adaptation in Natural and Artificial Systems. Ann Arbor: University of Michigan Press.Google Scholar
2004. ‘Making Information Transparent as a Means to Close the Global Digital Divide’, Minds and Machines 14(1), 85–99.CrossRefGoogle Scholar
2007. ‘Analysis and Justification of Privacy from a Buddhist Perspective’, in and (eds.), Information Technology Ethics: Cultural Perspectives, pp. 108–122. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
2008. ‘Floridi and Spinoza on Global Information Ethics’, Ethics and Information Technology 10(2–3), 175–187.CrossRefGoogle Scholar
2004. ‘Equal Opportunities Policy and Practice in Britain: Evaluating the “empty shell” hypothesis’, Work, Employment and Society 18(3), 418–505.CrossRefGoogle Scholar
and , and
1998. Homo Ludens: A Study of the Play-Element in Culture. Abingdon: Routledge. First published in 1938 with the title Homo Ludens : Proeve Eener Bepaling Van Het Spel-Element Der Cultuur. Haarlem: H. D. Tjeenk Willink.Google Scholar
1990, Technology and the Lifeworld. Bloomington/Minneapolis: Indiana University Press.Google Scholar
2000. ‘Mobile phones and health’, www.iegmp.org.uk/
. 2008. ‘Heathrow Begins Requiring Iris scans, Fingerprints from Some Passengers’, the Associated Press. 1 February. www.iht.com/articles/ap/2008/02/01/europe/EU-GEN-Britain-Heathrow-Biometric-Data.php
. 2008. World Internet Users: March 2008. www.internetworldstats.com/stats.htm
. 2005. ‘Disclosive Ethics and Information Technology: Disclosing Facial Recognition Systems’, Ethics and Information Technology 7(2), 75–86.CrossRefGoogle Scholar
2007. ‘Maintaining the Reversibility of Foldings: Making the Ethics (Politics) of Information Technology Visible’, Ethics and Information Technology 9(1), 11–25.CrossRefGoogle Scholar
2008. ‘Phenomenological Approaches to Ethics and Information Technology’, in (ed.), The Stanford Encyclopedia of Philosophy (Fall 2008 edition).
2000. ‘Shaping the Web: Why the Politics of Search Engines Matters’, The Information Society 16(3), 1–17.Google Scholar
and 2006. ‘Technologies of the Self: Virtual Work and the Inner Panopticon’, Information Technology and People 19(3), 219–243.CrossRefGoogle Scholar
, and 2003. ‘A Case Study of How Technology and Trust Enable the Projectized Team-Based Organization’, in (ed.), IT-Based Management: Challenges and Solutions, pp. 111–129. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
and 1985. Computer Ethics. Englewood Cliffs, NJ: Prentice Hall. (2nd edn, 1994; 3rd edn, 2001.)Google Scholar
1997. ‘Is the Global Information Infrastructure a Democratic Technology?’, Computers and Society 27, 20–26.CrossRefGoogle Scholar
2000. ‘Should Computer Programs be Owned?’, in , and (eds.), Cyberethics – Social and Moral Issues in the Computer Age, pp. 222–235. New York: Prometheus Books.Google Scholar
2006. ‘Computer Systems: Moral Entities but Not Moral Agents’, Ethics and Information Technology 8(4), 195–204.CrossRefGoogle Scholar
2008. ‘Un-making Artificial Moral Agents’, Ethics and Information Technology 10, 123–133.CrossRefGoogle Scholar
and 2007. ‘Technology as Empowerment: A Capability Approach to Computer Ethics’, Ethics and Information Technology 9(1), 73–87.CrossRefGoogle Scholar
1984. The Imperative of Responsibility: In Search of an Ethics for the Technological Age. Chicago, IL: University of Chicago Press.Google Scholar
2007. ‘Debating Nanotechnologies’, in , , and (eds.) Nanoethics: The Ethical and Social Implications of Nanotechnology, pp. 71–79. Hoboken, NJ: Wiley Interscience.Google Scholar
and
2003. ‘Ageless Bodies, Happy Souls: Biotechnology and the Pursuit of Perfection’, The New Atlantis, Spring, 9–28.Google Scholar
2005. . www.splcenter.org/intel/intelreport/article.jsp?aid=551
2008. ‘China's All-Seeing Eye’, Rolling Stone Magazine (29 May). www.rollingstone.com/politics/story/20797485/chinas_allseeing_eyeGoogle Scholar
. 1982. ‘The Ethics of Consent’, in and (eds.), New Essays in Ethics and Public Policy. Guelph, Ontario: Canadian Association for Publishing in Philosophy.Google Scholar
2003. ‘The Dependence of Value on Humanity’, in , The Practice of Value, pp. 63–86. (ed.) . Oxford: Clarendon Press.Google Scholar
2006. ‘Failing the Disabled Community?: The Continuing Problem of Web Accessibility’, in and (eds.), Human Computer Interaction Research in Web Design and Evaluation. Hershey, PA: Idea Group Publishing.Google Scholar
and The Moral Significance of Technical Artefacts.
(forthcoming). 2006. ‘The Dual Nature of Technical Artefacts’, Studies in History and Philosophy 37, 1–4.CrossRefGoogle Scholar
and 2000. ‘Ethics and the Computer World – A New Challenge for Philosophers’, in , and (eds.), Cyberethics – Social and Moral Issues in the Computer Age, pp. 44–55. New York: Prometheus Books.Google Scholar
1992, ‘Where are the Missing Masses? – The Sociology of a Few Mundane Artefacts’, in and (eds.), Shaping Technology/Building Society, pp. 225–258. Cambridge, MA: MIT Press.Google Scholar
2002. ‘Morality and Technology: The End of the Means’, Theory, Culture and Society 19(5–6), 247–260.CrossRefGoogle Scholar
and
and
2006. ‘Brain Machine Interfaces: Past, Present, and Future’, Trends in Neurosciences 29(9), 536–546.CrossRefGoogle Scholar
and 2004. The War on Our Freedoms: Civil Liberties in an Age of Terrorism. New York: Public Affairs Press.Google Scholar
and 2004. ‘How Much is Stronger DRM Worth?’, in and (eds.), Economics of Information Security, pp. 53–57. Dordrecht: Kluwer.CrossRefGoogle Scholar
2007. Conquest in Cyberspace: National Security and Information Warfare. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
2007. ‘Outdoor Recognition at a Distance by Fusing Gait and Face’, Image and Vision Computing 25(6), 817–832.CrossRefGoogle Scholar
and 2006. ‘Evolvable Hardware: Using Evolutionary Computation to Design and Optimize Hardware Systems’, IEEE Computational Intelligence Magazine 1, 19–27.CrossRefGoogle Scholar
and 2005. ‘Privacy and Data Privacy Issues in Contemporary China’, Ethics and Information Technology 7(1), 7–15.Google Scholar
1996. High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Boston: MIT Press.Google Scholar
2007. The Second Life Herald: The Virtual Tabloid that Witnessed the Dawn of the Metaverse. Boston: MIT Press.Google Scholar
and 2003. ‘How Much Information?’, www.sims.berkeley.edu/research/projects/how-much-info-2003/execsum.htm#summary
and 2008. ‘Asia's Fight for Web Rights’, Far Eastern Economic Review, April. www.feer.com/essays/2008/april/asias-fight-for-web-rights
1980. Starter Kit in Computer Ethics. Hyde Park, NY: Helvetia Press and the National Information and Resource Center for Teaching Philosophy. (Originally self-published in 1978.)
1996, ‘Unique Ethical Problems in Information Technology’, Global Information Ethics (a special issue of Science and Engineering Ethics) 2(2), 137–154.Google Scholar
2004. ‘Unique Ethical Problems in Information Technology’, in and (eds.), Computer Ethics and Professional Responsibilty, pp. 39–59. Oxford: Blackwell Publishing.Google Scholar
1997. ‘Wearable Computing: A First Step Toward Personal Imaging’, Computer 30(2), 25–31.CrossRefGoogle Scholar
2001. ‘Wearable Computing: Toward Humanistic Intelligence’, IEEE Intelligent Systems 16(3), 10–15.CrossRefGoogle Scholar
2002. ‘Formulating the Precautionary Principle’, Environmental Ethics 24, 263–274.CrossRefGoogle Scholar
2007. ‘Rethinking Informed Consent’, in Bioethics. Cambridge: Cambridge University Press.Google Scholar
and 2005. ‘Globalization and Its Contents’, World Policy Journal, Winter 2004/2005, 29–37.Google Scholar
2005. What the Dormouse Said: How the 60s Counterculture Shaped the Personal Computer. New York: Viking Adult.Google Scholar
2002. ‘Do Older Adults Underestimate Their Actual Computer Knowledge?’, Behaviour and Information Technology 24(4), 273–280.CrossRefGoogle Scholar
, and 2000. ‘Intellectual Property and Open Systems’, in Proceedings of the 33rd Hawaii International Conference on System Sciences.
2005. ‘Object Oriented Goodness: A Response to Mathiesen's “What Is Information Ethics?”’, Computers and Society 34(4).Google Scholar
2004. ‘What Is Information Ethics?’, Computers and Society, 32(8), www.computersandsociety.org/sigcas_ofthefuture2/sigcas/subpage/sub_page.cfm?article=909&page_number_nb=901
2003. ‘What Can We Do for Corporate Nomads? IT and Facilities Management’, in (ed.), IT-Based Management: Challenges and Solutions, pp. 130–142. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
2001. ‘Is It Wrong to Play Violent Video Games?’ Ethics and Information Technology 3(4), 277–287.CrossRefGoogle Scholar
2001. ‘Intellectual Property, Information, and the Common Good’, in and (eds.) Readings in Cyberethics, pp. 252–262. Sudbury, MA: Jones and Bartlett.Google Scholar
1999. The Social Shaping of Technology. Milton Keynes: Open University Press.
and (eds.) and 2005. ‘Supervenience’, Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/entries/supervenience/
2003. ‘The Secular Salvation Story of the Digital Divide’, Ethics and Information Technology 5(2), 75–87.CrossRefGoogle Scholar
2004. ‘Google's Storage Strategy’, TechWorld (6 April).
2001. ‘The Moral Value of Informational Privacy in Cyberspace’, Ethics and Information Technology 3(2), 129–135.CrossRefGoogle Scholar
2005. ‘The Towards 2020 Science’.
1996. ‘Trying Out One's New Sword’, in (ed.), Morality and Moral Controversies (4th edn), pp. 116–119. Upper Saddle River, NJ: Simon and Schuster.Google Scholar
. 1985. ‘Persons and Non-Persons’, in (ed.), Defence of Animals, pp. 52–62. Oxford: BasilBlackwell.Google Scholar
2000. ‘Privacy, the Workplace and the Internet’, Journal of Business Ethics 28, 255–265.CrossRefGoogle Scholar
and H.
1998. ‘Reason, Relativity and Responsibility in Computer Ethics’, Computers and Society 28(1), 14–21.CrossRefGoogle Scholar
1999. ‘Just Consequentialism and Computing’, Ethics and Information Technology 1(1), 65–69.Google Scholar
2001. ‘Just Consequentialism and Computing’, in and (eds.), Readings in Cyberethics, pp. 98–105. Sudbury, MA: Jones and Bartlett.Google Scholar
2006. ‘The Nature, Importance, and Difficulty of Machine Ethics’, IEEE Intelligent Systems 21, 18–21.CrossRefGoogle Scholar
2006. ‘Ethical Decision Making in Software Privacy: Initial Development and Test of a Four-Component Model’, MIS Quarterly 30(1), 167–180.CrossRefGoogle Scholar
and 2008. ‘ . www.iht.com/articles/2008/03/18/arts/gossip.php
2006. ‘Disability and the Promises of Technology: Technology, Subjectivity and Embodiment within an Order of the Normal’, Information, Communication and Society 9(3), 373–395.CrossRefGoogle Scholar
2002. ‘Power and the Digital Divide’, Ethics and Information Technology 4(2), 159–165.CrossRefGoogle Scholar
1973. ‘The Shallow and the Deep, Long-Range Ecology Movement’, Inquiry 16, 95–100.CrossRefGoogle Scholar
1987. ‘The Fragmentation of Value’, in Gowans, C. W. Moral Dilemmas, pp. 174–187. New York: Oxford University Press.Google Scholar
2005. ‘Japanese Conceptions of Privacy: An Intercultural Perspective’, Ethics and Information Technology 7(1), 27–36.CrossRefGoogle Scholar
and http://ohsr.od.nih.gov/guidelines/index.html.]
2006, ‘2020 – Future of Computing’, 440.
. 2003. Beyond Good and Evil: Prelude to a Philosophy of the Future. (ed.); Judith Norman (trans). Cambridge: Cambridge University Press.Google Scholar
1998. ‘Values in the Design of Computer Systems’, Computers and Society, March 1998, 38–39.CrossRefGoogle Scholar
.
2008. ‘The Communications Market 2008’, www.ofcom.org.uk/research/cm/cmr08/
2004. ‘Modern Moral Philosophy and the Problem of Relevant Descriptions’, in Modern Moral Philosophy, pp. 301–316. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
2005. ‘What Is Web 2.0 – Design Patterns and Business Models for the Next Generation of Software’, www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html
1961. ‘Man the Technician’, in (trans.), History as a System: And Other Essays Toward a Philosophy of History, pp. 87–161. New York: W. W. Norton & Company.Google Scholar
2006. ‘About Face: Forensic Genetic Testing for Race and Visible Traits’, Journal of Law, Medicine and Ethics 34(2), 277–292.CrossRefGoogle ScholarPubMed
1968. ‘Rules of Ethics in Information Processing’, Communications of the ACM 11, 198–201.CrossRefGoogle Scholar
1979. Ethical Conflicts in Computer Science and Technology. Arlington, VA: AFIPS Press.Google Scholar
1990. Ethical Conflicts in Information and Computer Science, Technology and Business. Wellesley, MA: QED Information Sciences.Google Scholar
et al. 2007. ‘We Cannot Eat Data: The Need for Computer Ethics to Address the Cultural and Ecological Impacts of Computing’, in and (eds.), Information Technology Ethics: Cultural Perspectives, pp. 153–168. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
1988. ‘Tissues in the Profession: Can Bad Men Make Good Brains Do Bad Things?’, Proceedings and Addresses of the American Philosophical Association, 61(3).CrossRefGoogle Scholar
PBS Online. 1998. ‘Nerds 2.0.1: Wiring the World’, www.pbs.org/opb/nerds2.0.1/wiring_world/
2007. ‘Tackling Disability Discrimination in the United Kingdom: The British Disability Discrimination Act’, Journal of Law and Policy 23: 95–120. http://law.wustl.edu/Journal.index.asp?ID=5697
and 1998. ‘Innovations as Precursors of Organizational Performance’, in and (eds.), Information Technology and Organizational Transformation: Innovation for the 21st Century, pp. 153–178. Chichester: John Wiley & Sons.Google Scholar
2001. Introduction to Intellectual Property Law (4th edn). London: Butterworths LexisNexis.Google Scholar
and 1993. Symposium, Robin Waterfield (ed. and trans.). Oxford/New York: Oxford University Press.Google Scholar
. 1997, ‘Problematics of Moral and Legal Theory’, The Harvard Law Review 111, 1637–1637.CrossRefGoogle Scholar
2006. ‘Closing the Loop: Stimulation Feedback Systems for Embodied MEA Cultures’, in and (eds.), Advances in Network Electrophysiology Using Multi-Electrode Arrays, pp. 215–242. New York: Springer.CrossRefGoogle Scholar
, and 2001. Bowling Alone: The Collapse and Revival of American Community. New York: Simon & Schuster.Google Scholar
2000. ‘Resolving Conflicting International Data Privacy Rules in Cyberspace’, Stanford Law Review 52, 1315–1376.CrossRefGoogle Scholar
2000. The Virtual Community: Homesteading on the Electronic Frontier (2nd edn). Cambridge, MA and London: MIT Press.Google Scholar
2004. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York: Random House.Google Scholar
2000. Dennett's Philosophy. Cambridge, MA: MIT Press.
et al. (eds.) 2004. ‘Nanoscience and Nanotechnologies: Opportunities and Uncertainties’, www.nanotec.org.uk/finalReport.htm
. 2006. The Lifebox, the Seashell, and the Soul: What Gnarly Computation Taught Me About Ultimate Reality, the Meaning of Life, and How to Be Happy. New York: Basic Books.Google Scholar
2005. ‘The Beam in Your Eye: If Steroids are Cheating Why isn't LASIK?’, Slate, 18 April. www.slate.com/id/2116858/
2002. ‘The Law and Economics of Reverse Engineering’, The Yale Law Journal 111(7), 1575–1673.CrossRefGoogle Scholar
and 2007. ‘Cognitive Enhancement: A Review of Technology’, www.enhanceproject.org/documents/Cognitive%20Enhancement%20Tech%20Review.pdf
and 2007. The Case Against Perfection: Ethics in the Age of Genetic Engineering. Cambridge, MA: Harvard University Press.Google Scholar
2007. ‘Common Sense Precaution and Varieties of the Precautionary Principle’, in (ed.), Risk: Philosophical Perspectives, pp. 99–112. London: Routledge.Google Scholar
2007. Special issue on ‘Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing’, USENIX Association.
, , , and (eds.) 2008. ‘Turns Out Porn Isn't Recession-Proof’, Wired Blog Network, http://blog.wired.com/business/2008/07/turns-out-por-1.html
1999. Trust in Cyberspace. Washington, DC:National Academic Press.
(ed.) 1944. What is Life? The Physical Aspect of the Living Cell. Cambridge: Cambridge University Press.Google Scholar
2006. Decoding the Universe: How the New Science of Information is Explaining Everything in the Cosmos, from Our Brains to Black Holes. New York: Viking, the Penguin Group.Google Scholar
2002. Bridging the Digital Divide: Technology, Community, and Public Policy. Malden, MA: Blackwell.CrossRefGoogle Scholar
1997. The Principles of Information Ethics. New York: Armonk and London: M. E. Sharpe.Google Scholar
2007. ‘Promoting Older Adults’ Well-being through Internet Training and Use'. Aging and Mental Health, 11(5), 477–484.CrossRefGoogle Scholar
, and 1997. Technology and Values. New York: Rowman & Littlefield.
and (eds.) 2005. ‘On the Foundations of Evil in Computer Game Cheating’, Proceedings of the Digital Games Research Association's 2nd International Conference – Changing Views: Worlds in Play, June 16–20, Vancouver, British Columbia, Canada.Google Scholar
and
2004. ‘A Pragmatic Evaluation of the Theory of Information Ethics’, Ethics and Information Technology 6(4), 279–290.CrossRefGoogle Scholar
2002. ‘Teaching End-User Ethics: Issues and a Solution Based on Universalizability’, Communications of the Association for Information Systems 8, 422–443.Google Scholar
and 2007. ‘Theft in a Wireless World’, Ethics and Information Technology 9, 179–186.CrossRefGoogle Scholar
. 2004. ‘Tailored Medicine: Whom Will it Fit? The Ethics of Patient and Disease Stratification’, Bioethics 18(4), 322–343.CrossRefGoogle ScholarPubMed
, and 1987. Utilitarianism: For and Against. Cambridge: Cambridge University Press. (First published 1973, reprinted with corrections and supplementary bibliography.)Google Scholar
and 1996. ‘Information Ethics: An Hermeneutical Analysis of an Emerging Area in Applied Ethics’, PhD thesis, The University of North Carolina at Chapel Hill, Chapel Hill, D.C.
2002, ‘Global Information Ethics: A Mandate for Professional Education’, Proceedings of the 68th IFLA Council and General Conference, Glasgow. Also available online at www.ifla.org/IV/ifla68/papers/056-093e.pdf.
2004. ‘The Precautionary Principle in the Information Society’, Human and Ecological Risk Assessment 10, 787–799.CrossRefGoogle Scholar
, and 2008. ‘Footprints Faked, Admit Organizers’, The Age, www.theage.com.au/news/latest-news/footprints-faked-admit-organisers/2008/08/11/1218306780009.html
2003. ‘The Future of Intellectual Property’, Ethics and Information Technology 5(1), 1–16.CrossRefGoogle Scholar
2005. ‘Intellectual Property Rights: From Theory to Practical Implementation’, in and (eds.), Intellectual Property Rights in a Networked World: Theory and Practice, pp. 1–65. Hershey, PA: INFOSCI.CrossRefGoogle Scholar
and 2005. ‘The Impact of Open Source Development on the Social Construction of Intellectual Property’, in (ed.) Free/Open Source Software Development, pp. 259–272. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
2007. ‘Social Justice and Market Metaphysics: A Critical Discussion of Philosophical Approaches to Digital Divides’, in and (eds.) Information Technology and Social Justice, pp. 148–170. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
2008a. ‘Empowerment through ICT: A Critical Discourse Analysis of the Egyptian ICT Policy’, in Proceedings of the Human Choice and Computers 8 Conference, 25–27 September 2008, Pretoria, South Africa.Google Scholar
2008c. ‘The Ethical Nature of Critical Research in Information Systems’, Information Systems Journal 18(2), special issue on ‘Exploring the Critical Agenda in IS Research’, Brooke, C., Cecez-Kecmanovic, D. and Klein, H. K. (eds.), 137–163.CrossRefGoogle Scholar
1995. ‘Why Software Should Be Free’, in and (eds.), Computers, Ethics and Social Values, pp. 190–200. Upper Saddle River: Prentice Hall.Google Scholar
2002, ‘The Impact of Electronic Monitoring on Quality and Quantity of Performance’, Computers in Human Behavior 18(1), 85–101.CrossRefGoogle Scholar
and 2006. ‘The Critical Space between: Access, Inclusion and Standards in Information Technologies’, Information, Communication and Society 9(6), 335–354.CrossRefGoogle Scholar
2008. ‘From Agency to Apperception: Through Kinaesthesia to Cognition and Creation’. (Special issue on Kant and Information Ethics), Ethics and Information Technology.
2006a. ‘Ethics and Artificial Life: From Modeling to Moral Agents’. Ethics and Information Technology 7(3), 139–148.CrossRefGoogle Scholar
2006b. ‘When Is a Robot a Moral Agent?’, International Review of Information Ethics 6, 23–30.Google Scholar
2007. ‘Friends by Design: A Design Philosophy for Personal Robotics Technology’, in , , and (eds.), Philosophy and Design: From Engineering to Architecture. Dordrecht: Springer.Google Scholar
2008. ‘The Role of Artificial Moral Agency in Technoethics’, in Handbook of Research on Technoethics, New York: Idea Group Inc.Google Scholar
2008. ‘Digital Challenge’, www.sunderland.gov.uk/wherepeoplematter/
2005. Laws of Fear: Beyond the Precautionary Principle. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
1999. ‘Informational Privacy, Data Mining, and the Internet’, Ethics and Information Technology 1(2), 137–145.CrossRefGoogle Scholar
2002. ‘The Uniqueness Debate in Computer Ethics: What Exactly Is at Issue, and Why Does it Matter?’, Ethics and Information Technology 4(1), 37–54.CrossRefGoogle Scholar
2005. ‘The Impact of the Internet on Our Moral Condition: Do We Need a New Framework of Ethics’, in (ed.), The Impact of the Internet on Our Moral Lives, pp. 215–238. Albany, NY: SUNY Press.Google Scholar
2007. Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology (2nd edn). Hoboken, NJ: John Wiley & Sons.Google Scholar
2008. ‘Floridi's Ontological Theory of Informational Privacy: Some Implications and Challenges’, Ethics and Information Technology 10(2–3), 155–156.CrossRefGoogle Scholar
2010. Ethics and Technology: Controversies: Questions and Strategies for Ethical Computing. (3rd edn) Hoboken, NJ: John Wiley & Sons.Google Scholar
2002. ‘Democracy, Inclusive and Exclusive’, in , , and (eds.), Meaning and Modernity: Religion, Polity, and Self, pp. 181–194. Berkeley: University of California Press.Google Scholar
2007. ‘Digestible RFID Tag: An Alternative for Your Internal Body Monitoring’, RFID Community in Asia: www.rfid-asia.info/2007/02/digestible-rfid-tag-alternative-for.htm
2008. Nudge: Improving Decisions about Health, Wealth, and Happiness. New Haven: Yale University Press.Google Scholar
and , 1997, ‘1897 and 1997 – the Century the Earth Stood Still’.
, 18 December 2002] HCA 56; 210 CLR 575; 194 ALR 433; 77 ALJR 255 (10 December 2002), www.austlii.edu.au/au/cases/cth/HCA/2002/56.html
[2004. ‘Cyberpoaching behind the keyboard: Uncoupling the ethics of “virtual infidelity”’, in (ed.), net.seXXX: Readings on Sex, Pornography, and the Internet, pp. 149–77. New York: Peter Lang.Google Scholar
1997. ‘The Threat of Information Operations: A Russian Perspective’, in and (eds.), War in the Information Age. London: Brassey's.Google Scholar
2003. ‘Realism and Human Kinds’, in Philosophy and Phenomenological Research, LXVII (3), 580–609.CrossRefGoogle Scholar
1996. Hardware Evolution: Automatic Design of Electronic Circuits in Reconfigurable Hardware by Artificial Evolution. London: Springer-Verlag.Google Scholar
2006. ‘Worldwide Deliberation and Public Use of Reason Online’, Ethics and Information Technology 8(4), 243–252.CrossRefGoogle Scholar
2007. ‘Ethical Pluralism’, in (ed.), Perspectives on Applied Ethics (Studies in Applied Ethics 10), pp. 41–55. Linköping: Centre for Applied Ethics, Linköping University.Google Scholar
2008. ‘Reflective Judgment and Enlarged Thinking Online’, Ethics and Information Technology 10(4), 221–231.CrossRefGoogle Scholar
2005. Holyoak and Torremans Intellectual Property Law (4th edn). Oxford: Oxford University Press.Google Scholar
2008. ‘Ethics and the Practice of Software Design’, in and (eds.), Current Issues in Computing and Philosophy, pp. 171–183. IOS Press.Google Scholar
2005. ‘Relational Artifacts/Children/Elders: The Complexities of Cybercompanions’. In ‘Toward Social Mechanisms of Android Science. A CogSci-2005 Workshop’, Cognitive Science Society62–73. www.androidscience.com/proceedings2005/TurkleCogSci2005AS.pdfGoogle Scholar
2006. ‘Relational Artifacts with Children and Elders: The Complexities of Cybercompanionship’, Connection Science 18, 347–361.CrossRefGoogle Scholar
, , and 1998. ‘The Case for Responsibility of the Computing Industry to Promote Equal Presentation of Women and Men in Advertising Campaigns’, ETHICOMP98, Rotterdam.Google Scholar
1999. ‘Gender and Ethnicity of Computing, Perceptions of the Future Generation’, ETHICOMP99, Rome.Google Scholar
1948. ‘Universal Declaration of Human Rights’, www.un.org/Overview/rights.html
. 1992. ‘Rio Declaration on Environment and Development 1992’, www.unep.org/Documents.Multilingual/Default.asp?ArticleID=1163&DocumentID=78&l=en
. 2007. ‘United States Patent Application 20070300174’ Kind Code, A1, Macbeth; Steven, W. et al., (http://patft.uspto.gov) re US Patent Application 20070300174.
. 2008, ‘The Interpretation of Artefacts’, Simon Stevin series in the Philosophy of Technology, Delft.Google Scholar
2003. ‘Intellectual Property Law and the Idea of Progress’, Intellectual Property Quarterly 3, 237–256.Google Scholar
2004. ‘Tailormade Pharmacotherapy: Future Developments and Ethical Challenges in the Field of Pharmacogenomics’, Bioethics 18(4), 303–321.CrossRefGoogle Scholar
, , , and 1995. ‘Equal Access and Social Justice: Information as a Primary Good’, ETHICOMP9, Leicester: De Montfort University.Google Scholar
2005. ‘E-democracy, E-contestation and the Monitorial Citizen’, Ethics and Information Technology 7(2), 51–59.CrossRefGoogle Scholar
2008. ‘Moral Methodology and Information Technology’ in and (eds.), 2008. The Handbook of Information and Computer Ethics, pp. 49–69.
2010, forthcoming). The Design Turn in Applied Ethics. Cambridge: Cambridge University Press.Google Scholar
, and (2008. ‘Distributive Justice and the Value of Information: A (Broadly) Rawlsian Approach’, in and (eds.) Information Technology and Moral Philosophy, pp. 376–397. Cambridge: Cambridge University Press.Google Scholar
and 2007. ‘Nano-technology and Privacy: On Continuous Surveillance outside the Panopticon’, Journal of Medicine and Philosophy 32(3), 283–297.CrossRefGoogle ScholarPubMed
and 2008. Information Technology and Moral Philosophy. Cambridge: Cambridge University Press.
and (eds.) 2005. What Things Do: Philosophical Reflections on Technology, Agency, and Design. PA: Penn State Press.Google Scholar
W3C. 2004. ‘HTML and XHTML Frequently Answered Questions’. Available at www.w3.org/MarkUp/2004/xhtml-faq
2007. ‘Locating the Wrongness in Ultra-violent Video Games’, Ethics and Information Technology 9(2), 121–128.CrossRefGoogle Scholar
2008. Moral Machines: Teaching Robots Right from Wrong. New York: Oxford University Press.Google Scholar
and 1995. ‘Interpretive Case Studies in IS Research: Nature and Method’, European Journal of Information Systems 4(2), 74–81.CrossRefGoogle Scholar
2003. ‘Dissecting the “Digital Divide”: A Case Study in Egypt’, The Information Society 19, 297–304.CrossRefGoogle Scholar
. 2001. ‘Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in the United States’, in and (eds.), Readings in Cyberethics, pp. 263–279. Sudbury, MA: Jones and Bartlett.Google Scholar
2006. ‘US Group Implants Electronic Tags in Workers’, Financial Times, 12 February, www.commondreams.org/headlines06/0213-07.htm
1998. Informed Consent: Patient Autonomy and Physician Beneficence within Healthcare (2nd edn). Dordrecht: Kluwer.Google Scholar
2001. ‘Computer Ethics: Future Directions’, Ethics and Information Technology 3(2), 93–96.CrossRefGoogle Scholar
2002. Trust, Corruption, and Surveillance in the Electronic Workplace', in and (eds.), Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society, 17th IFIP World Computer Congress, Montreal, pp. 109–120. Boston: Kluwer.CrossRefGoogle Scholar
2005. ‘On-line Trust’, in (ed.), The Impact of the Internet on Our Moral Lives, pp. 95–117. Albany, NJ: SUNY Press.Google Scholar
2005. Electronic Monitoring in the Workplace: Controversies and Solutions. Hershey, PA: Idea Group Publishing.CrossRef
(ed.) 2007. ‘Computer Ethics’ The International Library of Essays in Public and Professional Ethics. Aldershot: Ashgate.Google Scholar
2006. ‘The Precautionary Principle in Nanotechnology’, International Journal of Applied Philosophy 20(2), 191–204.CrossRefGoogle Scholar
and 2006. Terror on the Internet. Washington, DC: The United States Institute of Peace Press.Google Scholar
2009. Copernicus, Darwin, and Freud: Revolutions in the History and Philosophy of Science. Oxford: Blackwell.Google Scholar
1965. ‘Eliza – a Computer Program for the Study of Natural Language Communication between Man and Machine’, Communications of the Association for Computing Machinery 9, 36–45.Google Scholar
2006. ‘Gender Sensitivity and the Drive for IT: Lessons from the NetCorps Jordan Project’, Ethics and Information Technology 8(3), 131–142.CrossRefGoogle Scholar
1990. Information, Physics, Quantum: The Search for Links. Boulder, CO: Westview Press.Google Scholar
2002. ‘A Randomized Controlled Trial of the Psychosocial Impact of Providing Internet Training and Access to Older Adults’, Aging and Mental Health 6(3), 213–221.CrossRefGoogle ScholarPubMed
, , , , , and 1967. ‘The Historical Roots of Our Ecological Crisis’, Science 155, 1203–1207.CrossRefGoogle Scholar
2005. ‘Privacy, Deontic Epistemic Action Logic and Software Agents’, Ethics and Information Technology 7(4), 251–264.CrossRefGoogle Scholar
et al. 2006, ‘Building Blocks for Artificial Moral Agents’, in Proceeding EthicALife/ALifeX.
2007, Sopholab, Volker Stevin Series in Philosophy of Technology. Delft: Delft University of Technology.Google Scholar
1948. Cybernetics: or Control and Communication in the Animal and the Machine. Cambridge, MA: MIT Press.Google Scholar
1964. God & Golem, Inc.: A Comment on Certain Points Where Cybernetics Impinges on Religion. Cambridge, MA: MIT Press.Google Scholar
1986. The Whale and the Reactor: A Search for Limits in an Age of High Technology. Chicago: University of Chicago Press.Google Scholar
1997. ‘Cyberlibertarian Myths and the Prospect for Community’, ACM Computers and Society 27(3), 14–19.CrossRefGoogle Scholar
1999. ‘Do Artefacts Have Politics?’, in and (eds.) The Social Shaping of Technology, pp. 2–40. Buckingham: Open University Press.Google Scholar
and
2008. ‘A Humean Approach to Assessing the Moral Significance of Ultra-violent Video Games’, Ethics and Information Technology 10(1), 1–10.CrossRefGoogle Scholar
,
2005. ‘Respect for the World: Universal Ethics and the Morality of Terraforming’, PhD Thesis, the University of Queensland.
2008. ‘Artificial Intelligence as a Positive and Negative Factor in Global Risk’, in and (eds.) Global Catastrophic Risks, pp. 308–345. Oxford: Oxford University Press.Google Scholar
2007. ‘Facebook Users Open to Cyberattacks, ID Theft?’, ZDNet, http://news.zdnet.com/2100-1009_22-157855.html
.