•  7
    The Ethics of Digital Well-Being: A Thematic Review
    Science and Engineering Ethics 1-31. forthcoming.
    This article presents the first thematic review of the literature on the ethical issues concerning digital well-being. The term ‘digital well-being’ is used to refer to the impact of digital technologies on what it means to live a life that is good for a human being. The review explores the existing literature on the ethics of digital well-being, with the goal of mapping the current debate and identifying open questions for future research. The review identifies major issues related to several k…Read more
  •  83
    This article analyses the ethical aspects of multistakeholder recommendation systems (RSs). Following the most common approach in the literature, we assume a consequentialist framework to introduce the main concepts of multistakeholder recommendation. We then consider three research questions: who are the stakeholders in a RS? How are their interests taken into account when formulating a recommendation? And, what is the scientific paradigm underlying RSs? Our main finding is that multistakeholde…Read more
  •  210
    Healthcare systems across the globe are struggling with increasing costs and worsening outcomes. This presents those responsible for overseeing healthcare with a challenge. Increasingly, policymakers, politicians, clinical entrepreneurs and computer and data scientists argue that a key part of the solution will be ‘Artificial Intelligence’ (AI) – particularly Machine Learning (ML). This argument stems not from the belief that all healthcare needs will soon be taken care of by “robot doctors.” In…Read more
  •  500
    Common mental health disorders are rising globally, creating a strain on public healthcare systems. This has led to a renewed interest in the role that digital technologies may have for improving mental health outcomes. One result of this interest is the development and use of artificial intelligence for assessing, diagnosing, and treating mental health issues, which we refer to as ‘digital psychiatry’. This article focuses on the increasing use of digital psychiatry outside of clinical settings…Read more
  •  10
    Is Cybersecurity a Public Good?
    Minds and Machines 29 (3): 349-354. 2019.
  •  704
    The idea of Artificial Intelligence for Social Good (henceforth AI4SG) is gaining traction within information societies in general and the AI community in particular. It has the potential to address social problems effectively through the development of AI-based solutions. Yet, to date, there is only limited understanding of what makes AI socially good in theory, what counts as AI4SG in practice, and how to reproduce its initial successes in terms of policies (Cath et al. 2018). This article add…Read more
  •  591
    This article presents the first thematic review of the literature on the ethical issues concerning digital well-being. The term ‘digital well-being’ is used to refer to the impact of digital technologies on what it means to live a life that is good for a human being, and review the existing literature on the ethics of digital well-being, with the goal of mapping the current debate and identifying open questions for future research. The review identifies key issues related to four key social doma…Read more
  • Nato ccd Coe workshop on ‘ethics and policies for cyber warfare’ – a report
    with Ludovica Glorioso and Corinne Cath
    In Ludovica Glorioso & Mariarosaria Taddeo (eds.), Ethics and Policies for Cyber Operations, Springer Verlag. 2017.
  •  3
    Ethics and Policies for Cyber Operations (edited book)
    with Ludovica Glorioso
    Springer Verlag. 2017.
  •  14
    Deterrence and Norms to Foster Stability in Cyberspace
    Philosophy and Technology 31 (3): 323-329. 2018.
    Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, conceptual, normative, and strategic framework. To be successful, cyber deterrence needs to shift from threatening to prevailing. I argue that by itself, deterrence is insufficient to ensure stability of cyberspace. An international regime of norms regulating state behaviour in cyberspace is necessary to complement cyber deterrence strategies and foster stability. Enforcing this regime requires an a…Read more
  •  1
    Solving Cyber Conflicts
    The Philosophers' Magazine 79 79-82. 2017.
  •  12
  •  18
    The Limits of Deterrence Theory in Cyberspace
    Philosophy and Technology 31 (3): 339-355. 2018.
    In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterre…Read more
  •  53
    Just Information Warfare
    Topoi 35 (1): 213-224. 2016.
    In this article I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold: filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is…Read more
  •  60
    The Case of Online Trust
    with Matteo Turilli and Antonino Vaccaro
    Knowledge, Technology & Policy 23 (3-4): 333-345. 2010.
    This paper contributes to the debate on online trust addressing the problem of whether an online environment satisfies the necessary conditions for the emergence of trust. The paper defends the thesis that online environments can foster trust, and it does so in three steps. Firstly, the arguments proposed by the detractors of online trust are presented and analysed. Secondly, it is argued that trust can emerge in uncertain and risky environments and that it is possible to trust online identities…Read more
  •  2
    During the past decade, ethicists as well as policy-makers, political and social scientists, and experts in military studies have been concerned with the topic of cyber-conflicts and in particular the political and social ramifications for contemporary society. This book offers a clear and accessible introduction to the ethical analysis of cyber-conflicts, covering such topics as cyber-crime, cyber-terrorism, and cyber-warfare and cyber-activism. A useful introduction for students The Ethics of …Read more
  •  57
    Defining Trust and E-trust: Old Theories and New Problems
    International Journal of Technology and Human Interaction (IJTHI) Official Publication of the Information Resources Management Association 5 (2): 23-35. 2009.
    The paper provides a selective analysis of the main theories of trust and e-trust (that is, trust in digital environments) provided in the last twenty years, with the goal of preparing the ground for a new philosophical approach to solve the problems facing them. It is divided into two parts. The first part is functional toward the analysis of e-trust: it focuses on trust and its definition and foundation and describes the general background on which the …Read more
  • Warfare. Fourth International Conference of Cyber Conflict
    NATO CCD COE and IEEE Publication. forthcoming.
  •  122
    This paper provides a new analysis of e - trust , trust occurring in digital contexts, among the artificial agents of a distributed artificial system. The analysis endorses a non-psychological approach and rests on a Kantian regulative ideal of a rational agent, able to choose the best option for itself, given a specific scenario and a goal to achieve. The paper first introduces e-trust describing its relevance for the contemporary society and then presents a new theoretical analysis of this phe…Read more
  •  57
    An Information-based Solution for the Puzzle of Testimony and Trust
    Social Epistemology 24 (4): 285-299. 2010.
    In this paper, I offer a contribution to the debate on testimony that rests on three elements: the definition of semantic information, the analysis of trust as a second?order property of first?order relations, and Floridi?s Network Theory of Account (NTA). I argue that testimony transmits semantic information and it is neither grounded on trust nor justified by it. Instead, I show that testimony is an occurrence of a first?order relation of communication affected by the second?order property of …Read more
  •  31
    Trust in Technology: A Distinctive and a Problematic Relation (review)
    Knowledge, Technology & Policy 23 (3): 283-286. 2010.
    The use of tools and artefacts is a distinctive and problematic phenomenon in the history of humanity, and as such it has been a topic of discussion since the beginning of Western culture, from the myths of the Ancient Greek through Humanism and Romanticism to Heidegger. Several questionable aspects have been brought to the fore: the relation between technology and arts, the effects of the use of technology both on the world and on the user and the nature of the trust that users place in technol…Read more
  •  12
    Information Societies, Ethical Enquiries
    with Elizabeth Buchanan
    Philosophy and Technology 28 (1): 5-10. 2015.
    The special issue collects a selection of papers presented during the Computer Ethics: Philosophical Enquiries 2013 conference. This is a series of conferences organized by the International Association for Ethics and Information Technology , a professional organization formed in 2001 and which gathers experts in information and computer ethics prompting interdisciplinary research and discussions on ethical problems related to design and deployment of information and communication technologies .…Read more
  •  64
    Internet Neutrality: Ethical Issues in the Internet Environment
    with Matteo Turilli and Antonino Vaccaro
    Philosophy and Technology 25 (2): 133-151. 2012.
    This paper investigates the ethical issues surrounding the concept of Internet neutrality focusing specifically on the correlation between neutrality and fairness. Moving from an analysis of the many available definitions of Internet neutrality and the heterogeneity of the Internet infrastructure, the common assumption that a neutral Internet is also a fair Internet is challenged. It is argued that a properly neutral Internet supports undesirable situations in which few users can exhaust the maj…Read more
  •  62
    Cyber Security and Individual Rights, Striking the Right Balance
    Philosophy and Technology 26 (4): 353-356. 2013.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state power can pu…Read more