
- 250 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Hacking Digital Ethics
About this book
This book is not a critique of digital ethics but rather a hack. It follows the method of hacking by developing an exploit kit on the basis of state-of-the-art social theory, which it uses to breach the insecure legacy system upon which the discourse of digital ethics is running. This legacy system is made up of four interdependent components: the philosophical mythology of humanism, social science critique, media scandalization, and the activities of many civil society organisations lobbying for various forms of regulation. The hack exposes the bugs, the sloppy programming, and the false promises of current digital ethics, and, because it is an ethical hack, redesigns digital ethics so that it can address the problems of the global network society. The main idea of the book is that the social world of meaning is based on information, which, because of its relational nature, must be understood more as a common good than as private property. A digital ethics that relies upon humanistic individualism cannot address the issues arising from the global network society based upon information. This demands a complete revision of the philosophical foundations of current digital ethics by means of a redesign of ethics as a theory of governance by design.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Contents
- Series Editors’ Introduction
- Introduction: Ethical Hacking and Hacking Ethics
- Chapter One The Exploit
- Chapter Two The Breach
- Chapter Three The Redesign
- Bibliography
- Index