Chapter 3 – Values in Machine Age

Chapter 3 – Values in Machine Age

Univ. Prof. Dr. Sarah Spiekermann; “The Human Use of Machine Beings”, Chatper 3, Taylor and Francis, New York, 2015 Chapter 3 – Values in Machine Age Chapter 3 – Values in Machine Age ...............................................................................................1 An Introduction to Values........................................................................................................2 What is a value?...............................................................................................................................2 Intrinsic versus extrinsic values......................................................................................................3 Intrinsic Values in Philosophy and Psychology..............................................................................3 Nonmoral Values versus Moral Values...........................................................................................4 Values versus Virtues.......................................................................................................................4 Necessary Values for Human Growth.............................................................................................5 Ethical Knowledge in Machine Age................................................................................................7 What is Knowledge?......................................................................................................................7 Structuring ethical challenges in IT driven knowledge creation.....................................................8 Ethical Challenges in Data Collection............................................................................................8 Informed consent.......................................................................................................................................11 User Control in Ubiquitous Computing....................................................................................................12 Ethical Challenges in Information Aggregation and Knowledge Creation...................................13 Data Quality..............................................................................................................................................13 Truth..........................................................................................................................................................15 Transparency.............................................................................................................................................16 Ethical Challenges in the Design of Knowledge Access..............................................................17 Access to Knowledge................................................................................................................................18 Objectivity or Filter Bubbles....................................................................................................................19 Ethical Uses of Information and Knowledge................................................................................21 Contextual Integrity .................................................................................................................................21 Privacy Harms...........................................................................................................................................22 Computer Bias and Fairness.....................................................................................................................22 Summing Up: Ethical Knowledge Management..........................................................................23 Freedom and Liberty in the Machine Age....................................................................................26 Negative Liberty and Machines...................................................................................................26 Positive Liberty and Machines.....................................................................................................27 Technology Paternalism and Controllability................................................................................28 Autonomy vis-à-vis Machines.....................................................................................................30 Attention Sensitive Machines.......................................................................................................33 Attention-sensitive Interruption................................................................................................................33 Summing up: Freedom and Liberty in the Machine Age..............................................................34 Health and Strength in the Machine Age......................................................................................37 Machines’ direct impact on physical health and strength.............................................................37 Machines’ long-term effects on physical health and strength.......................................................37 Machines’ direct effects on mental health and strength................................................................38 Machines’ indirect effect on mental health...................................................................................38 Mental health challenges in response to computer use on the job............................................................39 Machines’ indirect effect on physical health................................................................................40 ........................................................................................................................................................41 On Security and Safety in the Machine Age.................................................................................42 Safety versus Security..................................................................................................................42 Safety, Cyberwar and Cybercrime................................................................................................43 Security Principles in Machine Engineering................................................................................43 Information Security Goals ......................................................................................................................44 Auditability...............................................................................................................................................45 Privacy in terms of Security vs. Security in terms of Privacy..................................................................45 Univ. Prof. Dr. Sarah Spiekermann; “The Human Use of Machine Beings”, Chatper 3, Taylor and Francis, New York, 2015 Accountability...........................................................................................................................................45 Privacy and Surveillance..............................................................................................................47 The issue of surveillance...........................................................................................................................47 The Pros and Cons of Surveillance...........................................................................................................48 Reaching Golden Means in Mass-Surveillance?..........................................................................49 Trust and Confidence in the Machine Age....................................................................................51 What is trust?...............................................................................................................................51 Trust Mechanisms in Machines....................................................................................................52 How computer scientists understand trust................................................................................................53 Reputation Systems...................................................................................................................................53 Belonging and Friendship in the Machine Age............................................................................56 What is Philia (friendship)?.........................................................................................................56 How can machines influence the various dimensions of friendship?...........................................57 Human-to-human friendship in first generation media environments and social networks.....................58 Shared life and learning in virtual worlds.................................................................................................59 Empathy in virtual worlds.........................................................................................................................60 Intimacy and Disinhibition in Online Environments................................................................................63 Intimacy with Artificial Beings.................................................................................................................64 Final thoughts on friendship in the machine age......................................................................................66 Dignity and Respect in the Machine Age .....................................................................................68 Dignity and Respect.....................................................................................................................68

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    180 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us