AH
A.H. Henschke
10 records found
1
In recent years, extremists have increasingly turned to online spaces to distribute propaganda and as a recruitment tool. While there is a clear need for governments and social media companies to respond to these efforts, such responses also bring with them a set of ethical chall
...
As liberal democracies grapple with the evolution of online political extremism, in addition to governments, social media and internet infrastructure companies have found themselves making more and more decisions about who gets to use their platforms, and what people say online.
...
This article argues that there is a duty of care held by the State to military veterans who have been technologically enhanced as part of their military service. It suggests that enhancements may be permanent, persistent or protracted and demonstrates how enhancements generate ad
...
Autonomous vehicles, and the larger socio-technical systems that they are a part of are likely to have a deep and lasting impact on our societies. Trust is a key value that will play a role in the development of autonomous driving systems. This paper suggests that trust of autono
...
The Internet of Things
Foundational ethical issues
This paper surveys foundational ethical issues that attach to the Internet of Things (IoT). In Section 1, we provide an overview of the technology, indicating both current and future applications. Subsequent sections consider particular ethical issues, including: informed consent
...
Designing for democracy
Bulk data and authoritarianism
Transparency is important for liberal democracies; however, the value of transparency is difficult to articulate. In this article we articulate transparency as an instrumental value for providing what we call ensurance and assurance to liberal democratic citizens. Ensurance refer
...
Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersyst
...