|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_on1243743075 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
210330s2021 enk o 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|c YDX
|d JSTOR
|d EBLCP
|d OCLCO
|d N$T
|d OCLCF
|d CAMBR
|d UKAHL
|d OCLCO
|d OL$
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1243743976
|a 1244622259
|
020 |
|
|
|a 9781785277382
|q (electronic bk.)
|
020 |
|
|
|a 1785277383
|q (electronic bk.)
|
020 |
|
|
|a 9781785277399
|q (electronic bk.)
|
020 |
|
|
|a 1785277391
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000068941641
|
029 |
1 |
|
|a AU@
|b 000069136250
|
035 |
|
|
|a (OCoLC)1243743075
|z (OCoLC)1243743976
|z (OCoLC)1244622259
|
037 |
|
|
|a 22573/ctv1jhmzps
|b JSTOR
|
050 |
|
4 |
|a QA76.575
|
082 |
0 |
4 |
|a 175
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Krieger, David J.,
|e author.
|
245 |
1 |
0 |
|a Hacking digital ethics /
|c David J. Krieger.
|
264 |
|
1 |
|a London :
|b Anthem Press,
|c 2021.
|
300 |
|
|
|a 1 online resource.
|
490 |
0 |
|
|a Anthem ethics of personal data collection
|
505 |
0 |
|
|a Cover -- Front Matter -- Half title -- Title page -- Copyright information -- Contents -- Series Editors' Introduction -- Chapter Int-null -- Introduction: Ethical Hacking and Hacking Ethics -- Chapter One The Exploit -- 1.1 We Do What We Are and Not What We Ought to Do -- 1.2 Systems Theory -- 1.2.1 Principles of Systemic Order -- 1.2.2 Communication -- 1.2.3 Consequences of Luhmann's Theory of Communication for Morality and Ethics -- 1.2.4 Cognitive and Normative Expectations and the Problem of Double Contingency -- 1.2.5 Symbolically Generalized Media and Functional Differentiation
|
505 |
8 |
|
|a 1.2.6 Consequences of Functional Differentiation -- 1.2.7 The Function of Morality in Modern Society -- 1.2.8 Can Society as a Whole Be Modeled as a System? -- 1.2.9 What Is the Status of Social Theory? -- 1.3 Actor-Network Theory -- 1.3.1 The Difference a Stone Makes -- 1.3.2 Information -- Chapter Two The Breach -- 2.1 The Philosophical Mythology of Humanism -- 2.1.1 The Philosophy of Information and Information Ethics -- 2.1.2 What Is Information? -- 2.1.3 Information Ethics -- 2.1.4 The Informational Self -- 2.1.5 Privacy -- 2.2 Social Science Critique -- 2.2.1 The Modern Constitution
|
505 |
8 |
|
|a 2.2.2 Critique -- 2.2.3 Platform Society -- 2.2.3.1 Datafication -- 2.2.3.2 Commodification -- 2.2.3.3 Selection -- 2.2.4 Surveillance Capitalism -- 2.3 Media Scandalization -- 2.4 Civil Society Activism -- Chapter Three The Redesign -- 3.1 Network Norms -- 3.1.1 Connectivity -- 3.1.2 Flow -- 3.1.3 Communication -- 3.1.4 Participation -- 3.1.5 Transparency -- 3.1.6 Authenticity -- 3.1.7 Flexibility -- 3.2 Network Governance -- 3.2.1 The Three Disruptions -- 3.2.2 Governance -- 3.3 Design -- 3.3.1 Attribution of Moral Agency and Responsibility
|
505 |
8 |
|
|a 3.3.2 Case Study: Google's Framework for Internal Algorithmic Auditing -- 3.3.3 What Is Design? -- 3.4 Digital Ethics -- End Matter -- Bibliography -- Index
|
520 |
|
|
|a This book is not a critique of digital ethics but rather a hack. It develops an exploit kit on the basis of state-of-the-art social theory and uses it to breach the insecure legacy system upon which the discourse of digital ethics is running. It exposes the bugs, the sloppy programming, and the false promises of current digital ethics, and, because it is an ethical hack, it redesigns digital ethics so that it can address the problems of the global network society.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Digital media
|x Moral and ethical aspects.
|
650 |
|
0 |
|a Internet
|x Moral and ethical aspects.
|
650 |
|
6 |
|a Médias numériques
|x Aspect moral.
|
650 |
|
6 |
|a Internet
|x Aspect moral.
|
650 |
|
7 |
|a Digital media
|x Moral and ethical aspects
|2 fast
|
650 |
|
7 |
|a Internet
|x Moral and ethical aspects
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 9781785277399
|
776 |
0 |
8 |
|i Print version:
|z 1785277375
|z 9781785277375
|w (OCoLC)1223013070
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctv1jhvnjh
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37965460
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37964734
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302019488
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17309232
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6526997
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2899698
|
994 |
|
|
|a 92
|b IZTAP
|