We're sorry. An error has occurred
Please cancel or retry.
Hacking Digital Ethics
Some error occured while loading the Quick View. Please close the Quick View and try reloading the page.
Couldn't load pickup availability
- Format:
-
23 April 2021

This book is not a critique of digital ethics but rather a hack. It follows the method of hacking by developing an exploit kit on the basis of state-of-the-art social theory, which it uses to breach the insecure legacy system upon which the discourse of digital ethics is running. This legacy system is made up of four interdependent components: the philosophical mythology of humanism, social science critique, media scandalization, and the activities of many civil society organisations lobbying for various forms of regulation. The hack exposes the bugs, the sloppy programming, and the false promises of current digital ethics, and, because it is an ethical hack, redesigns digital ethics so that it can address the problems of the global network society. The main idea of the book is that the social world of meaning is based on information, which, because of its relational nature, must be understood more as a common good than as private property. A digital ethics that relies upon humanistic individualism cannot address the issues arising from the global network society based upon information. This demands a complete revision of the philosophical foundations of current digital ethics by means of a redesign of ethics as a theory of governance by design.
PHILOSOPHY / Ethics & Moral Philosophy, Ethics and moral philosophy, PHILOSOPHY / Political, POLITICAL SCIENCE / Globalization, Social and political philosophy, Globalization
“Hacking Digital Ethics is a groundbreaking critique of what human right and individuality can mean in a digitally connected world where people are dependent on the infrastructure of a community. Belliger and Krieger make the case that individuals are at their best when they identify with a community and that communities are only at their best when they identify all of their individuals.”—James Felton Keith, Inclusion Researcher, Keith Institute, New York, United States
Series Editors’ Introduction; Introduction: Ethical Hacking and Hacking Ethics; Chapter One The Exploit; Chapter Two The Breach; Chapter Three The Redesign; Bibliography; Index.