•  45
    The Information Liar Paradox: A Problem for Floridi’s RSDI Definition
    Philosophy and Technology 28 (2): 323-327. 2015.
    In this commentary, I discuss the effects of the liar paradox on Floridi’s definition on semantic information. In particular, I show that there is at least one sentence that creates a contradictory result for Floridi’s definition of semantic information that does not affect the standard definition
  •  36
    Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues
    Dissertation, KTH Royal Institute of Technology. 2018.
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning infor…Read more
  •  31
    Does semantic information need to be truthful?
    Synthese 196 (7): 2885-2906. 2019.
    The concept of information has well-known difficulties. Among the many issues that have been discussed is the alethic nature of a semantic conception of information. Floridi :197–222, 2004; Philos Phenomenol Res 70:351–370, 2005; EUJAP 3:31–41, 2007; The philosophy of information, Oxford University Press, Oxford, 2011) argued that semantic information must be truthful. In this article, arguments will be presented in favor of an alethically neutral conception of semantic information and it will b…Read more
  •  31
    Defining Information Security
    with Lundgren Björn and Möller Niklas
    Science and Engineering Ethics 25 (2): 419-441. 2019.
    This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purpose…Read more
  •  30
    In this reply I defend Kripke’s creationist thesis for mythical objects against Jeffrey Goodman’s counter-argument to the thesis, 35–40, 2014). I argue that Goodman has mistaken the basis for when mythical abstracta are created. Contrary to Goodman I show that, as well as how, Kripke’s theory consistently retains the analogy between creation of mythical objects and creation of fictional objects, while also explaining in what way they differ.
  •  4
    Against the de minimis principle
    Risk Analysis. forthcoming.
    According to the class of de minimis decision principles, risks can be ignored (or at least treated very differently from other risks) if the risk is sufficiently small. In this article, we argue that a de minimis threshold has no place in a normative theory of decision making, because the application of the principle will either recommend ignoring risks that should not be ignored (e.g., the sure death of a person) or it cannot be used by ordinary bounded and information-constrained agents.
  •  4
    This licentiate thesis consist of two separate research papers which concern two tangential topics – that of semantic information and that of information security. Both topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I – concerning the concept of information, and a semantic conception thereof – the conceptual, and definitional, issues focus on one property, that of truthfulness. It is argued – against the veridicality thesis – that…Read more