Skip to main content
Information Technology and Moral Philosophy
  • Get access
    Check if you have access via personal or institutional login
  • Cited by 1
  • Cited by
    This book has been cited by the following publications. This list is generated based on data provided by CrossRef.

    Dekker, S. W. A. and Nyce, J. M. 2012. Cognitive engineering and the moral theology and witchcraft of cause. Cognition, Technology & Work, Vol. 14, Issue. 3, p. 207.

  • Export citation
  • Recommend to librarian
  • Recommend this book

    Email your librarian or administrator to recommend adding this book to your organisation's collection.

    Information Technology and Moral Philosophy
    • Online ISBN: 9780511498725
    • Book DOI:
    Please enter your name
    Please enter a valid email address
    Who would you like to send this to? *
  • Buy the print book

Book description

Information technology is an integral part of the practices and institutions of post-industrial society. It is also a source of hard moral questions and thus is both a probing and relevant area for moral theory. In this volume, an international team of philosophers sheds light on many of the ethical issues arising from information technology, including informational privacy, digital divide and equal access, e-trust and tele-democracy. Collectively, these essays demonstrate how accounts of equality and justice, property and privacy benefit from taking into account how information technology has shaped our social and epistemic practices and our moral experiences. Information technology changes the way that we look at the world and deal with one another. It calls, therefore, for a re-examination of notions such as friendship, care, commitment and trust.


'This collection of 18 essays is rich in ideas on the implications of information technology and morality. Variety is the collection's strong point, though there are certainly some common themes, including the nature of identity and agency … This work will appeal to scholars in several disciplines, including communication, political science, computer science, and philosophy. Summing up: recommended.'

S. E. Forschler Source: Choice

    • Aa
    • Aa
Refine List
Actions for selected content:
Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Send to Kindle
  • Send to Dropbox
  • Send to Google Drive
  • Send content to

    To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to .

    To send content to your Kindle, first ensure is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

    Note you can select to send to either the or variations. ‘’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

    Find out more about the Kindle Personal Document Service.

    Please be advised that item(s) you selected are not available.
    You are about to send:

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.

This list contains references from the content that can be linked to their source. For a full set of references and notes please see the PDF or HTML where available.

P.Brey, 2000. Disclosive computer ethics. Computers and Society, 30, 4, 10–16.

T. W.Bynum, 2000. The foundation of computer ethics. Computers and Society, 30, 2, 6–13.

T. W.Bynum, 2004. Ethical challenges to citizens of ‘The Automatic Age’: Norbert Wiener on the information society'. Journal of Information, Communication and Ethics in Society, 2, 2, 65–74.

D. G.Johnson, 1997. Is the global information infrastructure a democratic technology? Computers and Society, 27, 3, 20–26.

J. H.Moor, 2001. The Future of Computer Ethics: You Ain't Seen Nothin' Yet! Ethics and Information Technology, 3, 2, 89–91.

J. H.Moor, 1985. What Is Computer Ethics? Metaphilosophy, 16, 4, 266–275.

L.Floridi, 1995. Internet: Which future for organized knowledge, Frankenstein or Pygmalion? International Journal of Human-Computer Studies, 43, 261–274.

L.Floridi, 2002. Information ethics: An environmental approach to the digital divide, Philosophy in the Contemporary World, 9, 1, 39–45. Text of the keynote speech delivered at the UNESCO World Commission on the Ethics of Scientific Knowledge and Technology (COMEST), First Meeting of the Sub-Commission on the Ethics of the Information Society (UNESCO, Paris, June 18–19, 2001).

Floridi, L. 2004. Information, in L Floridi (Ed.), The Blackwell guide to the philosophy of computing and information. Oxford: Blackwell, pp. 40–61.

L.Floridi, 2005b. The philosophy of presence: From epistemic failure to successful observation, Presence: Teleoperators and Virtual Environments, 14, 6, 656–667.

L.Floridi, , and J. W.Sanders, 2001. Artificial evil and the foundation of computer ethics, Ethics and Information Technology, 3, 1, 55–66.

L.Floridi, , and J. W.Sanders, 2002. Computer ethics: Mapping the foundationalist debate, Ethics and Information Technology, 4, 1, 1–9.

L.Floridi, , and J. W.Sanders, 2004b. On the morality of artificial agents. Minds and Machines, 14, 3, 349–379.

G. M.Greco, , and L.Floridi, 2004. The tragedy of the digital commons, Ethics and Information Technology, 6, 2, 73–82.

K. E.Himma, 2005. There's something about Mary: The moral value of things qua information objects, Ethics and Information Technology, 6, 3, 145–159.

K.Mather, 2004. Object oriented goodness: A response to Mathiesen's What is information ethics? Computers and Society, 34, 3.

K.Mathiesen, 2004. What is information ethics? Computers and Society, 34, 1.

M.Rowlands, 2000. The environmental crisis: Understanding the value of nature. Basingstoke: Macmillan.

L. J.White, 1967. The historical roots of our ecological crisis, Science, 155, 1203–1207.

J.Bohman, 1996. Democracy as inquiry, inquiry as democratic. American Journal of Political Science, 43, 590–607.

M.Dorf, , and C.Sabel, 1996. The constitution of democratic experimentalism. Columbia Law Review, 98, 2, 267–473.

M.Froomkin, 2003. Towards a critical theory of Cyberspace. Harvard Law Review, 116, 3, 751–873.

A.Moravcsik, 1995. Explaining international human rights regimes: Liberal theory and Western Europe. European Journal of International Relations, 1, 2, 157–189.

G.O'Donnell, 1994. Delegative democracy. Journal of Democracy, 5, 55–69.

S.Shapiro, 1987. The social control of impersonal trust. American Journal of Sociology, 93, 3, 623–658.

S.Bikhchandani, , D.Hirshleifer, , and I.Welch, 1998. Learning from the behavior of others: Conformity, fads, and informational cascades. Journal of Economic Perspectives, 12, 3, 151–170.

A.Goldman, 2002, What is social epistemology?: A smorgasbord of projects, in A. Goldman, Pathways to knowledge, private and public. New York: Oxford University Press, pp. 182–204.

Goldman, A. 2005. Legal evidence, in M. P. Golding and W. A. Edmundson (Eds.), The Blackwell guide to the philosophy of law and legal theory. Malden, MA: Blackwell, pp. 163–175.

B.Grofman, , and S.Feld, 1988. Rousseau's general will: A Condorcetian perspective. American Political Science Review, 82, 567–576.

C.List, , and R.Goodin, 2001. Epistemic democracy: Generalizing the Condorcet jury theorem. Journal of Political Philosophy, 9, 277–306.

D.Cocking, , and J.Kennett, 2000. Friendship and moral danger. Journal of Philosophy, 97, 5, 278–296.

A.Ben-Ze'ev, 2004. Love online. Cambridge, UK: Cambridge University Press.

O.Black, 2003. Ethics, identity and the boundaries of the person. Philosophical Explorations, 6, 139–156.

D.Cocking, , and S.Matthews, 2000. Unreal friends. Ethics and Information Technology, 2, 223–231.

H.Frankfurt, 1988. The importance of what we care about. Cambridge, UK: Cambridge University Press.

J.Kennett, , and S.Matthews, 2003. The unity and disunity of agency. Philosophy, Psychiatry and Psychology, 10, 302–312.

C.Korsgaard, 1999. Self-constitution in the ethics of Plato and Kant. Journal of Ethics, 3, 1–29.

S.Matthews, 2006. On-line professionals. Ethics and Information Technology, 8, 1, 61–71.

J. J. C.Smart, , and B. A. O.Williams, 1973. Utilitarianism: For and against. Cambridge, UK: Cambridge University Press.

L. C.Tidwell, , and J. B.Walther, 2002. Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time. Human Communication Research, 28, 317–348.

J. D.Velleman, 2005. Self to self. New York: Cambridge University Press, chapter 8: The self as narrator.

G.Brennan, , and P.Pettit, 2004b. Esteem, identifiability, and the Internet. Analyse & Kritik, 26, 1, 139–157.

R.Hardin, 1992. The street-level epistemology of trust, Politics and Society, 21, 4, 505–529.

R.Holton, 1994. Deciding to trust, coming to believe, Australasian Journal of Philosophy, 72, 63–76.

V.McGeer, 2004a. Developing trust on the Internet, Analyse & Kritik, 26, 1, 91–107.

P.Pettit, 1995. The cunning of trust. Philosophy and Public Affairs, 24, 202–225.

P.Pettit, 2004. Hope and its place in mind. Annals of the American Academy of Political and Social Science, 592, 1, 152–165.

J.Elster, 1983. Sour grapes: Studies in the subversion of rationality. Cambridge, UK: Cambridge University Press.

B.Becker, 2000. Cyborg, agents and transhumanists. Leonardo, 33, 5, 361–365.

Bizer, J. 2003. Grundrechte im Netz: Von der freien Meinungsäußerung bis zum Recht auf Eigentum [Basic rights on the net: from the free expression of opinion to property right], in C. Schulzki-Haddouti (Ed.), Bürgerrechte im Netz [Civil rights online], Bonn: Bundeszentrale für politische Bildung, pp. 21–29. Available at,0,B%fcrgerrechte_im_Netz.html.

A.Borgmann, 1999. Holding onto reality: The nature of information at the turn of the Millennium. Chicago: University of Chicago Press.

J.Burkhardt, , P. B.Thompson, , and T. R.Peterson, 2002. The first European Congress on Agricultural and Food Ethics and follow-up Workshop on Ethics and Food Biotechnology: A US perspective, Agriculture and Human Values, 17, 4, 327–332.

O.Döring, 2003. China's struggle for practical regulations in medical ethics. Nature Reviews Genetics, 4, 3, 233–239.

C.Ess, , and F.Sudweeks, 2005. Culture and computer-mediated communication: Toward new understandings. Journal of Computer-Mediated Communication, 11, 1. Available at:

A.Halavais, 2000. National borders on the World Wide Web. New Media and Society, 2, 1, 7–28.

K.Hayles, 1999. How we became posthuman: Virtual bodies in cybernetics, literature and informatics. Chicago: University of Chicago Press.

G.Hofstede, , and M. H.Bond, 1988. The Confucius connection: From cultural roots to economic growth. Organisational Dynamics, 16, 4–21.

I.Jacoby, 1985 The Consensus Development Program of the National Institutes of Health. International Journal of Technology Assessment in Health Care, 1, 420–432.

J.Keulartz, , M.Korthals, , M.Schermer, , and T.Swierstra, (Eds) (2002). Pragmatist ethics for a technological culture. Dordrecht: Kluwer.

C.Li, 2002. Revisiting Confucian Jen ethics and feminist care ethics: A reply. Hypatia: A Journal of Feminist Philosophy, 17, 1, 130–140.

D.Michelfelder, 2001. The moral value of informational privacy in cyberspace. Ethics and information technology, 3, 2, 129–135.

J. R.Reidenberg, 2000. Resolving conflicting international data privacy rules in cyberspace. Stanford Law Review, 52, 1315–1376.

B.Skorupinski, , and K.Ott, 2002. Technology assessment and ethics, Poiesis and Praxis: International Journal of Technology Assessment and Ethics of Science, 1, 2, 95–122.

M.S⊘ndergaard, 1994. Hofstede's Consequences: A study of reviews, citations and replications. Organization Studies, 15, 3, 447–456.

B. C.Stahl, 2004. Responsible management of information systems. Hershey, PA: Idea Group.

R.Bentley, , W.Appelt, , U.Busbach, , E.Hinrichs, , D.Kerr, , K.Sikkel, , J.Trevor, , and G.Woetzel, 1997. Basic Support for Cooperative Work on the World Wide Web. International Journal of Human-Computer Studies, 46, 6, 827–846.

K.Cass, 1996. Expert systems as general-use advisory tools: An examination of moral responsibility. Business and Professional Ethics Journal, 15, 4, 61–85.

J.Heal, 1978. Common knowledge. Philosophical Quarterly, 28, 116–131.

S.Miller, 2001. Social action: A teleological account. Cambridge, UK: Cambridge University Press.

S.Miller, , and P.Makela, 2005. The collectivist approach to collective moral responsibility. Metaphilosophy, 36, 5, 634.

W. J.Gordon, 1989. An inquiry into the merits of copyright: The challenges of consistency, consent and encouragement theory. Stanford Law Review, 41, 1343–1469.

W. J.Gordon, 1993. A property right in self-expression. Yale Law Journal, 102, 1533–1609.

G.Lunney, 2001. The death of copyright: digital technology, private copying, and the Digital Millennium Copyright Act. Virginia Law Review, 87, 813–920.

F.Michelman, 1967. Property, utility, and fairness: Comments on the ethical foundations of ‘just compensation’ law. Harvard Law Review, 80, 1165–1258.

M.Otsuka, 2003. Libertarianism without inequality. Oxford: Oxford University Press.

J. J.Thomson, 1976. Property acquisition. Journal of Philosophy, 73, 664–666.

T.Wu, 2005. The copyright paradox. Supreme Court Review, 2005, 229–255.

S.Benn, 1988. A Theory of Freedom. Cambridge, UK: Cambridge University Press, pp. 277, 288 (resp).

K.Donellan, 1966. Reference and definite descriptions. Philosophical Review, 75, 281–304

RGavison, . 1980. Privacy and the limits of law. Yale Law Journal, 89, 421–471. Reprinted in F.Schoeman, (Ed.). 1984. Philosophical Dimensions of Privacy. Cambridge, UK: Cambridge University Press, pp. 346–402.

M. J.Sandel, 1989. Moral argument and liberal toleration: Abortion and homosexuality. California Law Review, 77, 521–538.

F.Schoeman, (Ed.). 1984. Philosophical Dimensions of Privacy. Cambridge, UK: Cambridge University Press, pp. 346–402.

D. J.Solove, 2002. Conceptualizing privacy. California Law Review, 90, 4, 1087–1155.

M. J.Hovenvanden, 2006. Nanotechnology and privacy: the instructive case of RFID. International Journal of Applied Philosophy, 20, 2.

J. D.Velleman, 1996. Self to self. Philosophical Review, 105, 1, 39–76.

J. D.Velleman, 2001. The genesis of shame. Philosophy and Public Affairs, 30, 27–52.

S.Warren, , and L. D. Brandeis 1890. The right to privacy. Harvard Law Review, 4, 193–220.

V.Wiegel, , M. J.Hovenvanden, , and G. J. C.Lokhorst, 2005. Privacy, deontic epistemic action logic and software agents: An executable approach to modeling moral constraints in complex informational relationships. Ethics and Information Technology, 7, 4, 251–264.

B.Williams, 1973. Problems of the Self. Cambridge, UK: Cambridge University Press.

S.Catsambis, 1994. The path to math: Gender and racial-ethnic differences in mathematics participation from middle to high school. Sociology of Education, 67, 3, 199–215.

M.Chaika, 1995. Ethical considerations in gender-oriented entertainment technology. Crossroads of the ACM, 2, 2, 11–13. Available at–2/gender.html.

G.Eysenbach, , and C.Kohler, 2002. How do consumers search for and appraise health information on the World Wide Web? British Medical Journal, 324, 7337, p. 9.

B.Friedman, 1996. Value-sensitive design. Interactions, 3, 6, 17–23.

B.Friedman, , and H.Nissenbaum, 1996. Bias in computer systems. ACM Transactions on Information Systems, 14, 3, 330–347.

C.Gorriz, , and C.Medina, 2000. Engaging girls with computers through software games. Communications of the ACM, 43, 1, 42–49.

R.Kline, , and T.Pinch, 1996. Users as agents of technological change: The social construction of the automobile in the rural United States. Technology and Culture, 37, 4, 763–795.

J. H.Moor, 1999. Just consequentialism and computing. Ethics and Information Technology, 1, 1, 65–69.

M. J.Muller, , and S.Kuhn, 1993. Communications of the ACM, 36, 6. Special issue on participatory design.

H.Nissenbaum, 1998. Values in the design of computer systems. Computers in Society, March, 38–39.

A.Pearl, , M.Pollock, , E.Riskin, , B.Thomas, , E.Wolf, , and A.Wu, 1990. Becoming a computer scientist. Communications of the ACM, 33, 11, 47–57.

B.Pfaffenberger, 1992. Technological dramas. Science, Technology, and Human Values, 17, 3, 282–312.

M.Rettig, 1994. Prototyping for tiny fingers. Communications of the ACM, 37, 4, 21–27.

H. S.Richardson, 1994. Practical reasoning about final ends. Cambridge, UK: Cambridge University Press.

B.Shneiderman, 2000. Universal usability. Communications of the ACM, 43, 3, 84–91.

C.PrummerVon, 1994. Women-friendly perspectives in distance education. Open Learning, 9, 1, 3–12.

C.Whitbeck, 1996. Ethics as design: Doing justice to moral problems. Hastings Center Report, 26, 3, 9–16.

S.Woolgar, 1991. The turn to technology in social studies of science. Science, Technology, and Human Values, 16, 1, 20–50.

M. A.Boden, 1987. Artificial intelligence: Cannibal or missionary? AI and Society, 1, 1, 17–23.

R.Jeffrey, 1956. Valuation and acceptance of scientific hypotheses. Philosophy of Science, 23, 3, 237–246.

P.Kitcher, 2001. Science, truth, and democracy. Oxford: Oxford University Press.

I.Niiniluoto, 1993. The aim and structure of applied research. Erkenntnis, 38, 1–21.

O.O'Neill, 1996. Towards justice and virtue. Cambridge, UK: Cambridge University Press.

R.Rudner, 1953. The scientist qua scientist makes value judgments. Philosophy of Science, 20, 1, 1–6.

Scanlon, T. 1990. Content regulation revisited, in J. Lichtenberg (Ed.), Democracy and mass media. Cambridge, UK: Cambridge University Press, pp. 331–354.

M.Buckland, 1991. Information as thing. Journal of the American Society of Information Science, 42, 5, pp. 351–360.

K.Dowding, 1992. Choice: Its increase and its value. British Journal of Political Science, 22, pp. 301–314.

B.Loader, (Ed.). 1998. Cyberspace divide. London: Routledge.

Rawls, J. 1982b. Social unity and primary goods, in A. Sen and B. Williams (Eds.), Utilitarianism and beyond. Cambridge, UK: Cambridge University Press, pp. 159–185.

W. L.Sessions, 1981. Rawls's concept and conception of primary good. Social Theory and Practice, 7, 3, 303–324.

E. F.Thomsen, 1992. Prices and knowledge: A market-process perspective. London: Routledge.

M. J.Hovenvanden, 2000. Privacy and health information: The need for a fine-grained account. International Journal for Quality in Health Care, 12, 1, 5–6.

G.Brennan, , and P.Pettit, 2004. The economy of esteem: An essay on civil and political society. Oxford: Oxford University Press.

D.Cocking, , and J.Kennett, 1998. Friendship and the self. Ethics, 108, 3, 502–527.

L.Floridi, 1999. Information ethics: On the theoretical foundations of computer ethics, Ethics and Information Technology, 1, 1, 37–56.

A.Goldman, 1999. Knowledge in a social world. Oxford: Oxford University Press.

A.Kuflik, 1999. Computers in control: Rational transfer of authority or irresponsible abdication of autonomy? Ethics and Information Technology, 1, 3, 173–184.

Kymlicka, W. 1999. Citizenship in an era of globalization, in I. Shapiro and C. Hacker-Cordón (Eds.), Democracy's edges. New York: Cambridge University Press.

T.Nagel, 1998. Concealment and exposure. Philosophy and Public Affairs, 27, 1, 3–30.

A.Naess, 1973. The shallow and the deep, long-range ecology movement. Inquiry, 16, 95–100.