Doing social network ethics: a critical, interdisciplinary approach
暂无分享,去创建一个
[1] H. Tavani,et al. Ethics and technology : controversies, questions, and strategies for ethical computing , 2010 .
[2] Guy Pujolle,et al. A Survey on Identity Management for the Future Network , 2013, IEEE Communications Surveys & Tutorials.
[3] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[4] Bernd Carsten Stahl,et al. From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics-related research in information systems , 2014, Inf. Manag..
[5] Alan Borning,et al. Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.
[6] Ben Light,et al. Ethics and social networking sites: a disclosive analysis of Facebook , 2010, Inf. Technol. People.
[7] Ira S. Rubinstein,et al. Big Data: The End of Privacy or a New Beginning? , 2013 .
[8] Geert Lovink,et al. Networks Without a Cause: A Critique of Social Media , 2012 .
[9] Zizi Papacharissi. A Networked Self : Identity, Community, and Culture on Social Network Sites , 2010 .
[10] J. Suler. The Online Disinhibition Effect , 2004, Cyberpsychology, Behavior, and Social Networking.
[11] Chris Peters,et al. The daily you: How the new advertising industry is defining your identity and your worth , 2012, New Media Soc..
[12] Maeve Duggan,et al. Social Media Update 2016 , 2016 .
[13] Gordon Hull,et al. Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data , 2015, Ethics and Information Technology.
[14] Robert W. Gehl,et al. Reverse Engineering Social Media: Software, Culture, and Political Economy in New Media Capitalism , 2014 .
[15] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[16] R. Thaler,et al. Choice Architecture , 2010 .
[17] Sara Baase. A Gift of Fire, Social, Legal, and Ethical Issues in Computing , 2008 .
[18] D. Lyon. Surveillance Studies: An Overview , 2007 .
[19] James H. Moor,et al. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[20] J. Habermas. Moral Consciousness and Communicative Action , 1990 .
[21] Stuart Hall,et al. The rediscovery of ‘ideology’: return of the repressed in media studies , 2005 .
[22] Mark Andrejevic,et al. iSpy: Surveillance and Power in the Interactive Era , 2007 .
[23] R. McChesney. Be Realistic, Demand the Impossible: Three Radically Democratic Internet Policies , 2014 .
[24] Brandt Dainow,et al. Digital alienation as the foundation of online privacy concerns , 2016, SIGCAS Comput. Soc..
[25] Catherine Tucker,et al. Government Surveillance and Internet Search Behavior , 2017 .
[26] Bernd Carsten Stahl,et al. Information Systems: Critical Perspectives , 2008 .
[27] Matthew Fuller,et al. Software Studies: a lexicon , 2008 .
[28] Volker Eisenlauer. A Critical Hypertext Analysis of Social Media: The True Colours of Facebook , 2013 .
[29] Ian Hutchby,et al. Technologies, Texts and Affordances , 2001 .
[30] J. Dijck. The Culture of Connectivity: A Critical History of Social Media , 2013 .
[31] A. Zwitter. Big Data ethics , 2014, Big Data Soc..
[32] George Reynolds. Ethics in Information Technology , 2002 .
[33] David R. Brake. Sharing Our Lives Online , 2014 .
[34] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[35] Simon Yuill,et al. Capital experimentation with person/a formation: how Facebook's monetization refigures the relationship between property, personhood and protest , 2016 .
[36] J. Burkell,et al. Facebook: public space, or private space? , 2014 .
[37] Mark Andrejevic. Social network exploitation , 2010 .
[38] Gregory J. Conti,et al. Malicious interface design: exploiting the user , 2010, WWW '10.
[39] C. Fuchs. What Is Social Media , 2014 .
[40] Neil Kenneth McBride,et al. ACTIVE ethics: an information systems ethics for the internet age , 2014, J. Inf. Commun. Ethics Soc..
[41] Celine Latulipe,et al. Contextual gaps: privacy issues on Facebook , 2009, Ethics and Information Technology.
[42] Mikko Tapani Karaiste. Delete: The virtue of forgetting in the digital age , 2010 .
[43] Burke T. Ward,et al. Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons , 2011 .
[44] Martin H. Levinson. Alone Together: Why We Expect More from Technology and Less from Each Other , 2011 .
[45] Sherry Turkle,et al. Alone Together: Why We Expect More from Technology and Less from Each Other , 2011 .
[46] Herman T. Tavani. Ethics and Technology , 2003 .
[47] C. Fuchs. Social Media: A Critical Introduction , 2013 .
[48] Philip A.E. Brey,et al. Values in Technology and Disclosive Computer Ethics. , 2010 .
[49] Simon Jones,et al. Doing the right thing: computer ethics pedagogy revisited , 2016, J. Inf. Commun. Ethics Soc..
[50] M. J. Quinn. Ethics for the Information Age , 2004 .
[51] Soraya Mehdizadeh,et al. Self-Presentation 2.0: Narcissism and Self-Esteem on Facebook , 2010, Cyberpsychology Behav. Soc. Netw..