{"title":"Husserl's Missing Multistability","authors":"Robert Rosenberger","doi":"10.5840/TECHNE20168356","DOIUrl":"https://doi.org/10.5840/TECHNE20168356","url":null,"abstract":"","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123866818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ihde’s Missing Sciences: Postphenomenology, Big Data, and the Human Sciences","authors":"Daniel Susser","doi":"10.5840/TECHNE201672754","DOIUrl":"https://doi.org/10.5840/TECHNE201672754","url":null,"abstract":"","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variations Upon Ihde’s Husserl’s Missing Technologies","authors":"Y. V. D. Eede","doi":"10.5840/TECHNE201672752","DOIUrl":"https://doi.org/10.5840/TECHNE201672752","url":null,"abstract":"","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dispose After Expiration Date: On Don Ihde’s Husserl's Missing Technologies","authors":"E. Mendieta","doi":"10.5840/techne201672753","DOIUrl":"https://doi.org/10.5840/techne201672753","url":null,"abstract":"","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"954 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116439854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reply to My Interlocutors","authors":"D. Ihde","doi":"10.5840/TECHNE201672855","DOIUrl":"https://doi.org/10.5840/TECHNE201672855","url":null,"abstract":"","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ihde, Technoscience, and the Resilience of Phenomenology","authors":"Shannon Vallor","doi":"10.5840/techne201672550","DOIUrl":"https://doi.org/10.5840/techne201672550","url":null,"abstract":"","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131725351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beyond Technological Mediation: A Normative Practice Approach","authors":"C. B. Burken","doi":"10.5840/TECHNE201671949","DOIUrl":"https://doi.org/10.5840/TECHNE201671949","url":null,"abstract":"Several philosophers of technology have argued that technology mediates human actions. For example, in the branch of post-phenomenology, authors such as Don Ihde and Peter-Paul Verbeek have described the mediating aspects of technology in terms of morality of technology (more prominent in Verbeek) as well as in the sense that technology changes our perception of ourselves and the world (more prominent in Ihde). In this article, different existing types of mediation are presented, critiqued, and enriched. The four types are illustrated by referring to military high-Tech environments with a focus on visual data and imaging technologies. These technologies can mediate actions (1) by inviting certain behavior, (2) through amplification and reduction, (3) through built-in norms, and (4) through interpretation. The four types of mediation mainly focus on the technology or technological artifact itself. What these approaches fail to grasp, however, is the specific user practices in which most technologies function. In this article, it is argued that to understand the mediating aspects of technology more fully, attention should be paid to the specific user context in which the technology functions. Therefore, an enriched understanding of the four types of mediation of technology is proposed by taking the lens of normative practices and analyzing the different types of mediation through this lens. The Kunduz Airstrike Incident, which took place in 2009 in Afghanistan, is a case in which a visual data sharing device called Rover played a prominent role. This case is used in this article to illustrate how technology mediates human actions in military practice.","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114188697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Privacy and Social Self-Authorship","authors":"Daniel Susser","doi":"10.2139/SSRN.2706669","DOIUrl":"https://doi.org/10.2139/SSRN.2706669","url":null,"abstract":"The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries — boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only one. We conceal information about ourselves and we reveal it. And since the meaning of information is not self-evident, we also work to shape how others contextualize and interpret the information about us that they have. Information privacy is thus about more than controlling information; it involves the constant work of producing and managing public identities, what I call “social self-authorship.” In the second part of the essay, I argue that thinking about information privacy in terms of social self-authorship helps us see ways that information technology threatens privacy, which the control approach misses. Namely, information technology makes social self-authorship invisible and unnecessary, by making it difficult for us to know when others are forming impressions about us, and by providing them with tools for making assumptions about who we are which obviate the need for our involvement in the process.","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114776929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cultural Semiotic Aesthetic Approach for a Virtual Heritage Project: Part A—The Semiotic Foundations of the Approach","authors":"C. Voutounos, A. Lanitis","doi":"10.5840/TECHNE201653147","DOIUrl":"https://doi.org/10.5840/TECHNE201653147","url":null,"abstract":"","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126431880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a Digital Hermeneutics: Virtual Worlds as Philosophical Tools: How to Philosophize with a Digital Hammer, by Stefano Gualeni","authors":"Alberto Romele","doi":"10.5840/TECHNE20162013","DOIUrl":"https://doi.org/10.5840/TECHNE20162013","url":null,"abstract":"Review of Virtual Worlds as Philosophical Tools: How to Philosophize with a Digital Hammer, by Stefano Gualeni (Palgrave Macmillan 2015)","PeriodicalId":123735,"journal":{"name":"Techné: Research in Philosophy and Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}