Search This Blog

Oct 30, 2016

Books on Social Networking and Ethics

Bibliography

  • Bakardjieva, M. and Feenberg, A., 2000, “Involving the Virtual Subject,” Ethics and Information Technology, 2(4): 233–240.
  • Bakardjieva, M. and Gaden, G., 2012, “Web 2.0 Technologies of the Self,” Philosophy and Technology, 25(3): 399–413.
  • Bar-Tura, A., 2010, “Wall-to-Wall or Face-to-Face,” in Facebook and Philosophy, D.E. Wittkower (ed.), Chicago: Open Court, pp. 231–239.
  • Barnes, S.B., 2001, Online Connections: Internet Interpersonal Relationships, Cresskill, NJ: Hampton Press.
  • Baym, N.K., 2011, “Social Networks 2.0,” in The Handbook of Internet Studies, M. Consalvo and C. Ess (eds.), Oxford: Wiley-Blackwell, pp. 384-405.
  • Bohman, J., 2008, “The Transformation of the Public Sphere: Political Authority, Communicative Freedom and Internet Publics,” in Information Technology and Moral Philosophy, J. van den Hoven and J. Weckert (eds.), Cambridge UK: Cambridge University Press, pp. 66–92.
  • Borgmann, A., 1984, Technology and the Character of Contemporary Life, Chicago: University of Chicago Press.
  • –––, 1992, Crossing the Postmodern Divide, Chicago: University of Chicago Press.
  • –––, 1999, Holding On to Reality: The Nature of Information at the Turn of the Millenium, Chicago: University of Chicago Press.
  • Boyd, D., 2007, “Why Youth (Heart) Social Networking Sites: The Role of Networked Publics in Teenage Social Life,” in Youth, Identity and Social Media, D. Buckingham (Ed.), Cambridge MA: MIT Press, pp. 119–142.
  • Boyd, D. and Hargittai, E., 2010, “Facebook Privacy Settings: Who Cares?” First Monday, 15(8): 13–20.
  • Brey, P., 2000, “Disclosive Computer Ethics,” Computers and Society, 30(4): 10–16.
  • Briggle, A., 2008, “Real Friends: How the Internet can Foster Friendship,” Ethics and Information Technology, 10(1): 71–79.
  • Buchanan, E.A. and Zimmer, M., 2012, “Internet Research Ethics,” The Stanford Encyclopedia of Philosophy (Spring 2015 Edition), Edward N. Zalta (ed.), URL=<http://plato.stanford.edu/archives/spr2015/entries/ethics-internet-research/>
  • Bynum, T., 2011, “Computer and Information Ethics,” The Stanford Encyclopedia of Philosophy (Spring 2011 Edition), Edward N. Zalta (ed.), URL=<http://plato.stanford.edu/archives/spr2011/entries/ethics-computer/>
  • Capurro, R., 2005, “Privacy. An Intercultural Perspective,” Ethics and Information Technology, 7(1): 37–47.
  • –––, 2008, “Intercultural Information Ethics,” in Handbook of Information and Computer Ethics, K.E. Himma and H.T. Tavani (eds.), Hoboken, NJ: Wiley and Sons, pp. 639–665.
  • Carr, N., 2010, The Shallows: What the Internet is Doing to Our Brains, New York: Norton and Co.
  • –––, 2011, “Never Enter Your Real Data,” International Review of Information Ethics, 16: 74–78.
  • Cocking, D., 2008, “Plural Selves and Relational Identity,” in Information Technology and Moral Philosophy, J. van den Hoven and J. Weckert (eds.), Cambridge UK: Cambridge University Press, pp. 123–141.
  • Cocking, D. and Matthews, S., 2000, “Unreal Friends,” Ethics and Information Technology, 2(4): 223–231.
  • Consalvo, M. and Ess, C., 2011, The Handbook of Internet Studies, Oxford: Wiley-Blackwell.
  • Dahlberg, L., 2001, “The Internet and Democratic Discourse: Exploring the Prospects of Online Deliberative Forums Extending the Public Sphere,” Information, Communication and Society, 4(4): 615–633.
  • de Laat, P. 2006, “Trusting Virtual Trust,” Ethics and Information Technology, 7(3): 167–180.
  • Dreyfus, H., 2001, On the Internet, New York: Routledge.
  • –––, 2004, “Nihilism on the Information Highway: Anonymity versus Commitment in the Present Age,” in Community in the Digital AgePhilosophy and Practice, A. Feenberg and D. Barney (eds.), Lanham, MD: Rowman & Littlefield, pp. 69–81.
  • Elder, A., 2014, “Excellent Online Friendships: An Aristotelian Defense of Social Media,” Ethics and Information Technology, 16(4): 287–297.
  • Elgesem, D., 1996, “Privacy, Respect for Persons, and Risk,” in Philosophical Perspectives on Computer-Mediated Communication, C. Ess (ed.), Albany, NY: SUNY Press, pp. 45–66.
  • Ellison, N.B., Steinfeld, C. and Lampe, C., 2007, “The Benefits of Facebook “Friends”: Social Capital and College Students’ Use of Online Social Network Sites,” Journal of Computer-Mediated Communication, 12(4): article 1.
  • Ess, C., 1996, “The Political Computer: Democracy, CMC and Habermas,” in Philosophical Perspectives on Computer-Mediated Communication, (C. Ess, ed.), Albany, NY: SUNY Press, pp. 197–230.
  • –––, 2005a, “Lost in Translation? Intercultural Dialogues on Privacy and Information Ethics,” Ethics and Information Technology, 7(1): 1–6.
  • –––, 2005b, “Moral Imperatives for Life in an Intercultural Global Village,” in The Impact of the Internet on our Moral Lives, R.J. Cavalier (ed.), Albany NY: SUNY Press, pp. 161–193.
  • –––, 2006, “Ethical Pluralism and Global Information Ethics,” Ethics and Information Technology, 8(4): 215–226.
  • –––, 2010, “The Embodied Self in a Digital Age: Possibilities, Risks and Prospects for a Pluralistic (democratic/liberal) Future?” Nordicom Information, 32(2): 105–118.
  • –––, 2011, “Self, Community and Ethics in Digital Mediatized Worlds,” in Trust and Virtual WorldsContemporary Perspectives, C. Ess and M. Thorseth (eds.), Oxford: Peter Lang, pp. vii-xxix.
  • Feenberg, A., 1999, Questioning Technology, New York: Routledge.
  • Floridi, L., 2011, “The Informational Nature of Personal Identity,” Minds and Machines, 21(4): 549–566.
  • –––, 2015, “Free Online Services: Enabling, Disenfranchising, Disempowering,” Philosophy and Technology, 28: 163–166.
  • Frick, M. and Oberprantacher, A., 2011, “Shared is Not Yet Sharing, Or: What Makes Social Networking Services Public?” International Review of Information Ethics, 15: 18–23.
  • Friedersdorf, C., 2015, “How Dangerous is End-to-End Encryption?,” The Atlantic, July 14, 2015,available online.
  • Froding, B. and Peterson, M., 2012, “Why Virtual Friendship is No Genuine Friendship,” Ethics and Information Technology, 14(3): 201–207.
  • Giles, D., 2006, “Constructing Identities in Cyberspace: The Case of Eating Disorders,” British Journal of Social Psychology, 45: 463–477.
  • Goel, V., 2014, “Facebook Tinkers with Users’ Emotions in News Feed Experiment, Stirring Outcry,” The New York Times, June 29, 2014, available online.
  • Grodzinsky, F.S. and Tavani, H.T., 2010, “Applying the ‘Contextual Integrity’ Model of Privacy to Personal Blogs in the Blogosphere,” International Journal of Internet Research Ethics, 3(1): 38–47.
  • Habermas, J., 1992/1998, Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy, Cambridge, MA: MIT Press.
  • Hamington, M., 2010, “Care Ethics, Friendship and Facebook,” in Facebook and Philosophy, D.E. Wittkower (ed.), Chicago: Open Court, pp. 135–145.
  • Hampton, K., Rainie, L., Lu, W., Dwyer, M., Shin, I. and Purcell, K., 2014, “Social Media and the ‘Spiral of Silence’,” Pew Research Center, Published August 26, 2014, available online.
  • Heidegger, M., 1954/1977, The Question Concerning Technology and Other Essays, New York: Harper and Row.
  • Honglaradom, S., 2007, “Analysis and Justification of Privacy from a Buddhist Perspective,” in S. Hongladarom and C. Ess (eds.), Information Technology Ethics: Cultural Perspectives, Hershey, PA: Idea Group, pp. 108–122.
  • –––, 2011, “Personal Identity and the Self in the Online and Offline World,” Minds and Machines, 21(4): 533–548.
  • Hongladarom, S. and Britz, J., 2010, “Intercultural Information Ethics,” International Review of Information Ethics, 13: 2–5.
  • Hull, G., 2015, “Successful Failure: What Foucault Can Teach Us about Privacy Self-Management in a World of Facebook and Big Data,” Ethics and Information Technology, online. doi:10.1007/s10676-015-9363-z
  • Hull, G., Lipford H.R. and Latulipe, C., 2011, “Contextual Gaps: Privacy Issues on Facebook,” Ethics and Information Technology, 13(4): 289–302.
  • Introna, L., 2011, “Phenomenological Approaches to Ethics and Information Technology,” The Stanford Encyclopedia of Philosophy (Summer 2011 Edition), Edward N. Zalta (ed.), URL=<http://plato.stanford.edu/archives/sum2011/entries/ethics-it-phenomenology/>
  • Ito, M. et al., 2009, Hanging Out, Messing Around, Geeking Out: Living and Learning with New Media, Cambridge, MA: MIT Press.
  • Lanier, J. 2010, You Are Not a Gadget: A Manifesto, New York: Knopf.
  • Light, B., McGrath, K. and Griffiths, M., 2008, “More Than Just Friends? Facebook, Disclosive Ethics and the Morality of Technology,” ICIS 2008 Proceedings, Paper 193, available online.
  • Manders-Huits, N., 2010, “Practical versus Moral Identities in Identity Management,” Ethics and Information Technology, 12(1): 43–55.
  • Marturano, A., 2011, “The Ethics of Online Social Networks—An Introduction,” International Review of Information Ethics, 16: 3–5.
  • Moor, J., 2008, “Why We Need Better Ethics for Emerging Technologies,” in Information Technology and Moral Philosophy, J. van den Hoven and J. Weckert (eds.), Cambridge: UK: Cambridge University Press, pp. 26–39.
  • Nissenbaum, M., 2004, “Privacy as Contextual Integrity,” Washington Law Review, 79(1): 119–157.
  • –––, 2010, Privacy in Context: Technology, Policy, and the Integrity of Social Life, Palo Alto, CA: Stanford University Press.
  • Parsell, M., 2008, “Pernicious Virtual Communities: Identity, Polarisation and the Web 2.0,” Ethics and Information Technology 10(1): 41–56.
  • Puotinen, S., 2011, “Twitter Cares? Using Twitter to Care About, Care for and Care With Women Who Have Had Abortions,” International Review of Information Ethics, 16: 79–84.
  • Rodogno, R., 2012, “Personal Identity Online,” Philosophy and Technology, 25(3): 309–328.
  • Sharp, R., 2012, “The Obstacles Against Reaching the Highest Level of Aristotelian Friendship Online,” Ethics and Information Technology, 14(3): 231–239.
  • Skog, D., 2011, “Ethical Aspects of Managing A Social Network Site: A Disclosive Analysis,” International Review of Information Ethics, 16: 27–32.
  • Smith, A., 2011, “Why Americans Use Social Media,” Pew Internet and American Life Project,available online.
  • Spinello, R.A., 2011, “Privacy and Social Networking Technology,” International Review of Information Ethics, 16: 41–46.
  • Stokes, P., 2012, “Ghosts in the Machine: Do the Dead Live on in Facebook?,” Philosophy and Technology, 25(3): 363–379.
  • Sunstein, C., 2008, “Democracy and the Internet,” in Information Technology and Moral Philosophy, J. van den Hoven and J. Weckert (eds.), Cambridge UK: Cambridge University Press, pp. 93–110.
  • Tavani, H.T., 2005, “The Impact of the Internet on our Moral Condition: Do we Need a New Framework of Ethics?” in The Impact of the Internet on our Moral Lives, R.J. Cavalier (ed.), Albany, NY: SUNY Press, pp. 215–237.
  • –––, 2007, “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy,” Metaphilosophy, 38(1): 1–22.
  • Turkle, S., 1995, Life on the Screen: Identity in the Age of the Internet, New York: Simon and Schuster.
  • –––, 2011, Alone Together: Why we Expect More from Technology and Less from Each Other, New York: Basic Books.
  • Vallor, S., 2010, “Social Networking Technology and the Virtues,” Ethics and Information Technology, 12 (2): 157–170.
  • –––, 2012, “Flourishing on Facebook: Virtue Friendship and New Social Media,” Ethics and Information Technology, 14(3): 185–199.
  • van den Eede, Y., 2010, “‘Conversation of Mankind’ or ‘Idle Talk’?: A Pragmatist Approach to Social Networking Sites,” Ethics and Information Technology, 12(2): 195–206.
  • Verbeek, P., 2005, What Things Do: Philosophical Reflections on Technology, Agency and Design, University Park, PA: Pennsylvania State University Press.
  • Wandel, T. and Beavers, A., 2011, “Playing Around with Identity,” in Facebook and Philosophy, D.E. Wittkower (ed.), Chicago: Open Court, pp. 89–96.
  • Wong, P.H., 2010, “The Good Life in Intercultural Information Ethics: A New Agenda, ” International Review of Information Ethics 13: 26–32.
  • –––, 2012, “Dao, Harmony and Personhood: Towards a Confucian Ethics of Technology,” Philosophy and Technology, 25(1): 67–86.

Other Internet Resources

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.