How to cross boundaries in the information society: vulnerability, responsiveness, and accountability

Acm Sigcas Computers and Society 43 (1):9-21 (2013)
  Copy   BIBTEX

Abstract

The paper examines how the current evolution and growth of ICTs enables a greater number of individuals to communicate and interact with each other on a larger scale: this phenomenon enables people to cross the conventional boundaries set up across modernity. The presence of diverse barriers does not however disappear, and we therefore still experience cultural, political, legal and moral boundaries in the globalised Information Society. The paper suggests that the issue of boundaries is to be understood, primarily, in philosophical terms, in order to explain in what sense the fundamental historicity and situatedness of human beings does not necessarily prevent them from being able to cross the boundaries of their own experiences and to communicate with other human beings. Our line of reasoning is based on the idea that the epistemic and moral subject is neither a pure universal subject always transcending the limits of its experience nor the mere product of the context in which it find itself embedded. By virtue of its continued existence and experience of any given context, the epistemic and moral subject is asked to respond to the constraining affordances of data and to account for the moral calls of the other. This intertwinement of responsiveness and accountability towards what is "over there" confers us an original understanding of what is "here".

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,227

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Anonymity.Kathleen Wallace - 1999 - Ethics and Information Technology 1 (1):21-31.
Software vulnerability due to practical drift.Christian V. Lundestad & Anique Hommels - 2007 - Ethics and Information Technology 9 (2):89-100.
Natural resources and government responsiveness.David Wiens - 2015 - Politics, Philosophy and Economics 14 (1):84-105.
Autonomy and vulnerability entwined.Joel Anderson - 2013 - In Catriona Mackenzie, Wendy Rogers & Susan Dodds (eds.), Vulnerability: New Essays in Ethics and Feminist Philosophy. Oup Usa. pp. 134.

Analytics

Added to PP
2013-12-12

Downloads
16 (#911,065)

6 months
1 (#1,478,781)

Historical graph of downloads
How can I increase my downloads?

References found in this work

Knowledge and the flow of information.F. Dretske - 1989 - Trans/Form/Ação 12:133-139.
On the morality of artificial agents.Luciano Floridi & J. W. Sanders - 2004 - Minds and Machines 14 (3):349-379.
Adieu to Emmanuel Levinas.Jacques Derrida - 1999 - Stanford University Press.
The philosophy of information.Luciano Floridi - 2010 - The Philosophers' Magazine 50:42-43.
The method of levels of abstraction.Luciano Floridi - 2008 - Minds and Machines 18 (3):303–329.

View all 20 references / Add more references