Ethics In Social Media And Technology Essay Questions

Editor’s Note: This is the sixth post in an ongoing series on Codes of Conduct by Jason Lunday. Follow this link to view all of Mr. Lunday’s articles in his Codes of Conduct featured column series.

Online social media applications are quickly gaining the mindshare of company employees and changing just as rapidly.  With all the benefits that social media is bringing to the corporate world, a company faces numerous risks in its use, from misuse of company resources, to conflicts of interest and disparagement of others.

Social media is a challenging topic because it crosses over so many ethics and compliance issues.  But like any other ethics and compliance topic, it can and must be proactively managed for a company to safeguard its reputation and provide its employees with the tools to manage their own personal and business activities.


My colleague Greg Duffy tells of a recent experience while flying from Boston to Los Angeles. Early in the long flight he noticed the fellow in his early twenties in the window seat donning headphones to watch an in-flight movie. Greg then became aware that his seatmate employed the plane’s new in-flight networking technology to carry on a video chat with a friend in another seat.  Added to this, the young man was simultaneously using the plane’s Internet connectivity to engage in somewhere around a dozen “chats” with friends on the ground – all the while sipping tequila – for the entire seven-hour flight.  This is the new ‘wired’ world – and degree that young workers are embracing it.  Always wired, always communicating, always multitasking.

New, emerging and not-even-developed social media applications and other tools not only consume more of our time, they are changing the business world. A recent online social media presentation claims that the medium is now the number one online activity, with its use accounting for 10 percent of all users’ time on the Internet. What’s more, it claims that social media use is growing three times faster than the Internet’s overall growth rate.1 For many companies, these tools can provide new ways of connecting with potential and current customers, employees, suppliers and other stakeholders.  They offer companies the opportunity to speed up the pace of business, better establish the message that a company wants to convey, strengthen a company’s relationships with customers and others and further facilitate a continuous conversation about the business.

But social media when not well managed opens the door to numerous risks – breach of confidentiality, conflicts of interest, misuse of company resources, to name a few of the more obvious ones. Since social media can touch so many aspects of a company’s operations, its leadership needs to address it in context to its overall business operations.  Unlike some risk areas, it cannot be successfully addressed largely as a stand-alone matter.

A company without an initiative to effectively identify, assess and manage its approach to social media and its various tools not only loses out on its many opportunities they offer but faces numerous risks to and improper business practices and activities that may damage the business.  A program to harness these risks does not need to be onerous or intrusive, but it does need to be proportional to the company’s exposure.  Further, a company should expect the social media arena to continue to change both in technologies, their uses, business providers and ways social media impacts the business landscape.

The Social Media Landscape

To begin assessing social media’s potential corporate impact, it is important to understand its various forms and tools. According to one of the most prolific social media sites, Wikipedia, social media’s predominant uses are for:

  • Communication, such as blogs, micro-blogs, social networking and events.
  • Collaboration, like wikis, social news and bookmarking/tagging.
  • Multimedia, including video, photography, music/audio sharing and presentation sharing and livecasting.
  • Entertainment, for example, media platforms, virtual worlds and game sharing. 2

Company management may be familiar with some of the most prevalent applications – Facebook, Twitter, LinkedIn, YouTube, and Myspace – but how many know about Open Diary, Tumblr, BigTent, Wetpaint, Mixx, Vimeo,, ccMixter,, or Forterra? Chances are that a company’s younger employees know about many of these applications and more – and are actively using them. Further, as smartphones become more ubiquitous in the workplace, employees’ access to the Internet and its social media applications will speed up the media’s adoption – and create more difficulty for a company to monitor workplace use.

Companies are early in understanding the application of legal and regulatory standards to social media. Currently, a number of U.S. laws and regulations are being applied to the media’s applications. Regulation FD responds to the communication of company financial or other key operational information outside of the company. Employee privacy is covered by FCPA and HIPAA. Intellectual property laws address how employees may communicate a company’s IP across social media. FINRA, the securities self-regulatory organization, recently adopted a regulatory notice on use of blogs and social networking sites.  But companies should expect the legal and regulatory environment to continue to broaden around social media as its impact on the business world becomes better understood.

Each company needs to consider three ways in which social media can impact it. First, it needs to address how employees use social media for their personal, non-company use.  Second, it should consider how it and its employees use social media for the company’s business objectives. Another issue of social media involves where a company needs to set rights and responsibilities for the non-employees it invites to engage in its social media activities. This article addresses the first two uses of social media.

Companies and their employees have related, though not always complementary, interests in social media. Employees – whether for business or personal use – look to social media to stay in touch with family and friends; for amusement during the day, such as during lunch, or after hours, if they have a laptop computer they bring home; and to build and maintain a professional network and for professional education.  Companies want to learn about the marketplace and needs and desires of potential customers; to stay in front of current and potential customers; to find and establish a positive face for potential employees; and to reinforce the company’s value to current employees.

Risks that Companies Face

A review of numerous companies’ social media policies3 indicates numerous risks that a company may face with employees’ use – whether for their personal or business purposes – of social media.

1. Misuse of Work Time

  • Accessing social media, like Facebook, for personal use while at work.  With the increasing amount of time that employees spend on social media sites, this risk is quickly growing that employees will regularly access social media from work.

2. Misuse of Company Resources

  • Using a company computer, personal digital assistant or Smartphone to access social media, with risks of excessive bandwidth use, equipment ‘wear and tear’ or breakage, or access to improper social media (such as ‘adult’ or ‘hate’ sites).
  • Using without permission the company name, logo, trademarks, copyrighted information or other intellectual property in blogs, discussion boards or other social networking sites that can infringe on the company’s rights to and control over these assets.
  • Using one’s company email address or a username that refers to one’s employment with the company. Some employees do not maintain a personal email account and so rely on the corporate email for personal matters.

3. Risk to Company Computer Systems, Network or Data

  • Using a company computer, network, personal digital assistant or smartphone to access social media, with risks of introducing possible malicious software or other rogue applications, especially for social media that involves accessing or downloading files.

4. Disclosure of Confidential or Other Non-Public Information

  • Disclosing this information a) on discussion boards or in chat rooms, or b) as part of professional social networking activity though, not authorized to disclose it. As businesses turn to the Internet and social media to facilitate business, such inadvertent disclosure becomes a greater risk.
  • Such disclosures can involve:
    -Sensitive information that harms the company’s competitive advantage.
    -Information for which the company is required to ensure fair disclosure.
    -Product or other related information that may conflict with the company’s official communications.

5. Disparagement or Harassment

  • Inappropriately discussing colleagues, customers, suppliers or other stakeholders or competitors with colleagues or individuals outside the company on discussion boards, in chat rooms or through blogs.  Blogs are a principal culprit – such as with Open Diary – where an employee’s personal musings about his or her life turn to frustration about work.  Even an employee’s comments that are poorly worded or misunderstood can cause harm.
  • Developing or compiling and then displaying an audio stream or video – intended to be humorous – but that makes fun of the employee’s industry, profession or company.
  • Posting or discussing others or displaying certain social media at work that can lead to claims of harassment.

6. Conflicts of Interest

Conflicts of interest can take many forms and can cross with other forms of misconduct, from use of company resources, use of one’s work position and other personal interests that conflict with one’s duty to the company.

  • Blogging or maintaining a website favorable to or critical of or posting information about an industry, company or related issues without disclosing one’s employment with an interested company.  This also may be true for family members of someone who works for an interested company, or even former employees.
  • Serving in an outside professional role, such as an expert on a topical discussion board, that conflicts with one’s duty to his or her company.
  • Maintaining a blog that accepts advertising from his or her company’s competition.
  • Making a personal recommendation or endorsement of an individual or company that may suggest the company’s support for the recommendation or endorsement.

7. Advertising and Marketing and Fair Competition

  • Using instant messaging, a chat room, a discussion board or other social media to make recommendations or otherwise market to current or prospective customers, in violation of company policy (whether the message or the channel).
  • Communicating critically about a competitor’s product or service on a discussion board and without disclosing one’s employment with a competing company.

8. Records Maintenance

  • Sending communications over social media that the company is not able to retain for its own records maintenance requirements.

9. Espionage or Fraud

  • ‘Shopping’ a competitor by pretending to be a potential customer and misrepresenting oneself in doing so.
  • Posting a false review about a competitor’s product or service.

10. Privacy

  • Mistakenly or intentionally providing personal information of a colleague, customer or supplier on a discussion board or chat room or through other social media.
  • Disseminating another employee’s postings without that employee’s permission.

11. Personal Reputation Damage

  • Posting personal information or about personal activities that leads one’s company, a recruiting company or others to believe that the individual is acting unprofessionally or otherwise inappropriately.  This situation can hurt the employer where the employee’s personal reputation is tarnished and so affects the individual’s business reputation.

Corporate Use of Social Media

Because of the many ways in which social media can be misused and thus lead to ethics and compliance problems, companies that plan to use this media for business purposes should consider setting standards and other expectations that address:

  • Collecting and using personal and corporate information belonging to individuals who contribute.
  • Creating or maintaining company-sponsored blogs, discussion boards, chat rooms, audios/videos, contests, marketing activities and other social media, and employees specifically authorized to do so.  In certain instances, companies also may want to limit employees authorized to contribute to these channels.
  • Reviewing information to be posted on company social media.
  • Disclosing the company’s sponsorship and ownership of certain posted materials.
  • The company’s rights regarding use, redistribution and retention of others’ contributions to its social media.
  • Disclosing any company conflicts of interest with information posted on its social media.

Establishing Realistic Expectations

Among the more significant errors that companies can make is setting standards and expectations that are impractical and so easily set aside. A company needs to consider practical expectations in use of social media. For instance, a company that bans all employee personal use of social media in the workplace – and even institutes technological lockdowns to prohibit its use on company technology systems – may do more harm than good when employees pull out their personal smartphones and tap into Facebook or Twitter at work.

Other considerations include:

  • Employees’ desire to use social networking sites like LinkedIn or Plaxo that can involve listing one’s company position and duties, and even posting testimonies of current and former employees or suppliers.
  • Employees who access social media while traveling on company business but seek to avoid carrying both a company and personal laptop computer.
  • Employees involved in online activities with friends, such as sports pool, that may require them to take action during the work day to participate.
  • Employees’ desire to use personal lunch time to ‘quickly catch up on what’s happening’ on social media outlets. As more employees forgo the lunch outing for a quick meal at their desks, this activity becomes more common.
  • Employees who identify social media applications that can help them improve their business and professional knowledge. Professional associations’ websites may provide employees with additional knowledge that is helpful for their work.
  • Employees who use social media, such as through Google or Bing searches, to check on prospective or current employees or suppliers when the data sources or data may not be accurate.
  • Employees who are working longer hours and so rely on personal email or other social media, like, to keep up with family and friends because they now have less time to do so after work.
  • Employees involved in charitable or other community activities – and that may in part involve their company position – that use social media like to keep apprised of the activity’s communications.
  • Employees using social media for business research where a certain application’s use requires advanced approval, and the approval process is time consuming.

An issue taxing many company leaders is the degree to allow the younger generation, many of whom are highly adept at Internet technology and are frequently ‘connected’, to ‘stay connected’ during work. On one hand is the argument that the ‘wired’ worker is a smarter, more technologically-savvy worker; on the other hand is the clear risk to work getting done or inappropriate conduct on the job.

An Effective Social Media Ethics and Compliance Initiative

A more robust ethics and compliance initiative is appropriate for those companies where social media is more pertinent to its business environment.  Some considerations for a company determining the depth and breadth of its social media ethics and compliance initiative include:

  • Industry. Companies in an industry that rely on or are heavily involved in social media – such as entertainment, news, sports, broadcasting, marketing and advertising, to name a few – should expect that employees will be accessing online social media.
  • Internet access. Companies where many employees have regular Internet access and more frequently use the Internet in their work.
  • Corporate social media use. Companies that regularly use social media for their own business purposes.
  • Job function. Employees in roles that interact with social media activities more regularly – possibly communications, marketing, sales, investor relations, community affairs – should consider whether function-specific mechanisms are needed.
  • External environment. Companies with operations in locations that are heavily ‘wired’ – like Japan and South Korea – should anticipate employees’ regular use of and expectations to use social media. Companies in locations that have been traditionally ‘underwired’ but are quickly becoming ‘wired’ should anticipate the problems that are likely to arise.

The U.S. Organizational Sentencing Guidelines’ recommendations for an effective compliance and ethics program have served as an important framework for overall corporate programs and can be effectively applied to a social media initiative. This is not to suggest that effective management of social media requires its own stand-alone program as we have seen with privacy, safety, anti-corruption or other key risk areas.  To the contrary, because social media is so much a part of other ethics and compliance topics, it should be well integrated in and part of a company’s overall ethics and compliance program. (That being said, some companies where social media is a significant part of the business – like entertainment or other media companies – may consider assigning a social media compliance officer.)  Still, as with any ethics and compliance risk area, the overall framework should be fit to address social media’s specific characteristics.

Risk Assessment

  • As the social media landscape changes regularly and quickly, understand the current social media technology and how it is being used. Tap into the knowledge of information technology staff and other social media-savvy employees in this effort.  Review current literature on the topic.
  • Identify and assess the most likely risks to your business. All companies face certain risks; other risks may be more specific to your company’s industry or specific activities.
  • Identify what social media your company uses in conducting its business vs. what is simply used by employees for non-business reasons. Ensure you explore what social media employees are using for business purposes, whether or not the company encourages or authorizes it.


  • Let employees know that the company has a vested interest in any ways that their use of social media may impact the company, their duties to the company, or their business responsibilities. Set policies that:
    – Recognize the value of social media to the company and employees’ personal lives and that permit its use to forward the company’s goals while not unduly restricting employees’ outside interests.
    -Realistically have a chance of being followed.
  • Be clear about what is not allowed, what is restricted and what is permitted.
  • Cross reference social media policies with related standards or policies, such as use and protection of business resources and information and conflicts of interest.
  • Because social media is quickly changing, use care not to be overly prescriptive so that policies quickly go out of date. Instead, set broad principles about proper use, such as “Do not communicate company confidential or non-public information through social media devices that reach an external audience without proper approval.”
  • Do not forget use of electronic devices that may have a social component, such as cellular telephone ‘texting’ and smartphones.
  • When the company relies on social media for its own needs, set and communicate policies on its use by employees and external parties.


  • Establish procedures for:
    -Non-business use of social media. For instance, if employees should receive approval before using the company name or their company position on social networking websites, ensure procedures exist for them to obtain approval.
    -Any manager responsible for overseeing or monitoring their employees’ use of social media and for higher-level managers with broader supervisory oversight of use of social media.
    -Employees involved in the company’s business use of social media.
    -Functional employees involved in proper monitoring use of social media, such as information technology staff.
  • Ensure employees have specific resources for more information and guidance as you likely have not identified all ways in which social media uses can thwart good business practices.
  • Include internal procedures to assess any new social media that becomes a real presence. It can be difficult to monitor and set policies for the many different social media tools, so at least seek to respond to those applications that become popular or that otherwise your company’s employees are likely to use because of their field or the company’s location or activities.

Communications and Education

  • While in many cases dissemination of a social media policy may be sufficient, it can be helpful at for work group managers to review the policy with staff, discuss its application to the work group’s business and respond to any questions or concerns.
  • More formal training is helpful for those employees who will use social media for the company’s business and employees involved in monitoring employees’ use of social media (especially to ensure employee privacy) and supervisory employees where risk to employee privacy is great.
  • Help managers understand how they need to help their employees and when they need to seek help themselves.

Monitoring & Auditing

  • Determine social media use that your company’s systems can easily monitor or track to reasonably ensure compliance with related policies and procedures.  Look to advisory and misconduct reporting systems as one monitoring mechanism.
  • As with a risk-based compliance initiative, consider establishing monitoring activities based on the risk that certain social media tools or activities pose. For example, if very few employees have regular computer access during working hours, it seems overwrought to assign someone to review their computer activity for social media access. On the other hand, if your company regularly uses online discussion boards to market its services and expertise, then monitoring employees’ contributions to these discussion boards seems reasonable.
  • If social media risks are significant, consider identifying an outside expert to audit your company’s social media compliance program – even to help identify emerging and future risks.


  • Effective oversight does not mean that a company needs to assign a social media compliance officer.  It means that a company should ensure effective accountability and ongoing management of social media use that befits its risks.  Large companies that rely heavily on social media may appoint someone to this role; many companies likely can get by on ensuring that the compliance function regularly reviews the social media compliance program on its own.  Also, the oversight might involve a committee comprised of individuals with responsibilities related to privacy, communications, information technology and ethics and compliance.

Periodic assessment

  • Because social media is changing so quickly, it is a good idea to periodically review the company’s social media ethics and compliance initiative to ensure that the company is effectively managing in the changing environment.


As many companies are now experiencing, social media’s use in the workplace poses numerous risks because it crosses so many different ethics and compliance topics and because its applications and use are rapidly and constantly changing. But as with all business topics, a company can successfully manage its own and its employees’ personal use of it by employing a common framework applied to most other ethics and compliance topics, albeit with some modifications specific to social media.  The sooner that a company gets its arms around use of social media the better it will fare as the fast rate of change in social media going forward is expected; a delinquent company will have further to catch up the later it responds to the challenge.



Social media was used in preparation of this article.

1 “What the Hell is Social Media? – in 2 Minutes,” compiled and edited by Peter Kerwood, Merlin Entertainments Group., created by Kama Glober & Tim Fogg, ApartmenTwo Creative/4reel Films.

2 “Social Media,” Wikipedia, the free encyclopedia (

3 Including, among others, Cisco Systems, Dell, Entergy, ESPN, Fedex, Ford, Gartner, HP, IBM, Intel and Microsoft.

1. History and Definitions of Social Networking Services

‘Social networking’ is an inherently ambiguous term requiring some clarification. Human beings have been socially ‘networked’ in one manner or another for as long as we have been on the planet, and we have historically availed ourselves of many successive techniques and instruments for facilitating and maintaining such networks. These include structured social affiliations and institutions such as private and public clubs, lodges and churches as well as communications technologies such as postal and courier systems, telegraphs and telephones. When philosophers speak today, however, of ‘Social Networking and Ethics’, they usually refer more narrowly to the ethical impact of an evolving and loosely defined group of information technologies, most based on or inspired by the ‘Web 2.0’ software standards that emerged in the first decade of the 21st century.

1.1 Online Social Networks and the Emergence of ‘Web 2.0’

Prior to the emergence of Web 2.0 standards, the computer had already served for decades as a medium for various forms of social networking, beginning in the 1970s with social uses of the U.S. military’s ARPANET and evolving to facilitate thousands of Internet newsgroups and electronic mailing lists, BBS (bulletin board systems), MUDs (multi-user dungeons) and chat rooms dedicated to an eclectic range of topics and social identities (Barnes 2001; Turkle 1995). These early computer social networks were systems that grew up organically, typically as ways of exploiting commercial, academic or other institutional software for more broadly social purposes. In contrast, Web 2.0 technologies evolved specifically to facilitate user-generated, collaborative and shared Internet content, and while the initial aims of Web 2.0 software developers were still largely commercial and institutional, the new standards were designed explicitly to harness the already-evident potential of the Internet for social networking. Most notably, Web 2.0 social interfaces have redefined the social topography of the Internet by enabling users to build increasingly seamless connections between their online social presence and their existing social networks offline—a trend that has begun to shift the Internet away from its original function as a haven for largely anonymous or pseudonymous identities forming sui generis social networks (Ess 2011).

Among the first websites to employ the new standards explicitly for general social networking purposes were Orkut, MySpace, LinkedIn, Friendster, Bebo, Habbo and Facebook. More recent and specific trends in online social networking include the rise of sites dedicated to media sharing (YouTube, Flickr, Instagram, Vine), microblogging (Tumblr, Twitter), location-based networking (Foursquare, Loopt, Yelp, YikYak) and interest-sharing (Pinterest).

1.2 Early Scholarly Engagement with Social Networking Services

The study of the ethical implications of SNS can be considered a subpart of Computer and Information Ethics (Bynum 2008). While Computer and Information Ethics certainly accommodates an interdisciplinary approach, the direction and problems of that field have largely been defined by philosophically-trained scholars. Yet this has not been the early pattern for the ethics of social networking. Partly due to the temporal coincidence of the social networking phenomenon with emerging empirical studies of the patterns of use and effects of computer-mediated-communication (CMC), a field now called ‘Internet Studies’ (Consalvo and Ess, 2011), the ethical implications of social networking technologies were initially targeted for inquiry by a loose coalition of sociologists, social psychologists, anthropologists, ethnographers, media scholars and political scientists (see, for example, Giles 2006; Boyd 2007; Ellison et al. 2007; Ito 2009).  Consequently, those philosophers who have turned their attention to social networking and ethics have had to decide whether to pursue their inquiries independently, drawing only from traditional philosophical resources in applied computer ethics and the philosophy of technology, or to develop their views in consultation with the growing body of empirical data and conclusions already being generated by other disciplines. While this entry will primarily confine itself to reviewing existing philosophical research on social networking ethics, links between those researches and studies in other disciplinary contexts continue to be highly significant.

2. Early Philosophical Concerns about Online Social Networks

Among the first philosophers to take an interest in the ethical significance of social uses of the Internet were phenomenological philosophers of technology Albert Borgmann and Hubert Dreyfus. These thinkers were heavily influenced by Heidegger’s (1954/1977) view of technology as a monolithic force with a distinctive vector of influence, one that tends to constrain or impoverish the human experience of reality in specific ways. While Borgmann and Dreyfus were primarily responding to the immediate precursors of Web 2.0 social networks (e.g., chat rooms, newsgroups, online gaming and email), their conclusions, which aim at online sociality broadly construed, are directly relevant to SNS.

2.1 Borgmann’s Critique of Social Hyperreality

Borgmann’s early critique (1984) of modern technology addressed what he called the device paradigm, a technologically-driven tendency to conform our interactions with the world to a model of easy consumption. By 1992’s Crossing the Postmodern Divide, however, Borgmann had become more narrowly focused on the ethical and social impact of information technologies, employing the concept of hyperreality to critique (among other aspects of information technology) the way in which online social networks may subvert or displace organic social realities by allowing people to “offer one another stylized versions of themselves for amorous or convivial entertainment” (1992, 92) rather than allowing the fullness and complexity of their real identities to be engaged. While Borgmann admits that in itself a social hyperreality seems “morally inert” (1992, 94), he insists that the ethical danger of hyperrealities lies in their tendency to leave us “resentful and defeated” when we are forced to return from their “insubstantial and disconnected glamour” to the organic reality which “with all its poverty inescapably asserts its claims on us” by providing “the tasks and blessings that call forth patience and vigor in people.” (1992, 96) This contrast between the “glamour of virtuality” and the “hardness of reality” continues to be a motif in his 1999 book Holding On to Reality, in which he describes online sociality in MUDs (multi-user dungeons) as a “virtual fog” which seeps into and obscures the gravity of real human bonds (1999, 190–91).

There might be an inherent ambiguity in Borgmann’s analysis, however. On the one hand he tells us that it is the competition with our organic and embodied social presence that makes online social environments designed for convenience, pleasure and ease ethically problematic, since the latter will inevitably be judged more satisfying than the ‘real’ social environment. But he goes on to claim that online social environments are themselves ethically deficient:

If everyone is indifferently present regardless of where one is located on the globe, no one is commandingly present. Those who become present via a communication link have a diminished presence, since we can always make them vanish if their presence becomes burdensome. Moreover, we can protect ourselves from unwelcome persons altogether by using screening devices….The extended network of hyperintelligence also disconnects us from the people we would meet incidentally at concerts, plays and political gatherings. As it is, we are always and already linked to the music and entertainment we desire and to sources of political information. This immobile attachment to the web of communication works a twofold deprivation in our lives. It cuts us off from the pleasure of seeing people in the round and from the instruction of being seen and judged by them. It robs us of the social resonance that invigorates our concentration and acumen when we listen to music or watch a play.…Again it seems that by having our hyperintelligent eyes and ears everywhere, we can attain world citizenship of unequaled scope and subtlety. But the world that is hyperintelligently spread out before us has lost its force and resistance. (1992, 105–6)

Critics of Borgmann have seen him as adopting Heidegger’s substantivist, monolithic model of technology as a singular, deterministic force in human affairs (Feenberg 1999; Verbeek 2005). This model, known as technological determinism, represents technology as an independent driver of social and cultural change, shaping human institutions, practices and values in a manner largely beyond our control. Whether or not this is ultimately Borgmann’s view (or Heidegger’s), his critics are likely responding to remarks of the following sort: “[Social hyperreality] has already begun to transform the social fabric…At length it will lead to a disconnected, disembodied, and disoriented sort of life…It is obviously growing and thickening, suffocating reality and rendering humanity less mindful and intelligent.” (Borgmann 1992, 108–9)

Critics assert that the ethical force of Borgmann’s analysis suffers from his lack of attention to the substantive differences between particular social networking technologies and their varied contexts of use, as well as the different motivations and patterns of activity displayed by individual users in those contexts. For example, Borgmann is charged with ignoring the fact that physical reality does not always enable or facilitate connection, nor does it do so equally for all persons. As a consequence, Andrew Feenberg (1999) claims that Borgmann has missed the way in which online social networks might supply sites of democratic resistance for those who are physically or politically disempowered by many ‘real-world’ networks.

2.2 Hubert Dreyfus on Internet Sociality: Anonymity versus Commitment

Philosopher Hubert Dreyfus (2001) joined Borgmann in early critical engagement with the ethical possibilities of the Internet; like Borgmann, Dreyfus’s reflections on the ethical dimension of online sociality evince a general suspicion of such networks as an impoverished substitute for the real thing. Like Borgmann, Dreyfus’s suspicion is also informed by his phenomenological roots, which lead him to focus his critical attention on the Internet’s suspension of fully embodied presence. Yet rather than draw upon Heidegger’s metaphysical framework, Dreyfus (2004) reaches back to Kierkegaard in forming his criticisms of life online. Dreyfus suggests that what online engagements intrinsically lack is exposure to risk, and without risk, Dreyfus tells us, there can be no true meaning or commitment found in the electronic domain. Instead, we are drawn to online social environments precisely because they allow us to play with notions of identity, commitment and meaning, without risking the irrevocable consequences that ground real identities and relationships. As Dreyfus puts it:

…the Net frees people to develop new and exciting selves. The person living in the aesthetic sphere of existence would surely agree, but according to Kierkegaard, “As a result of knowing and being everything possible, one is in contradiction with oneself” (Present Age, 68). When he is speaking from the point of view of the next higher sphere of existence, Kierkegaard tells us that the self requires not “variableness and brilliancy,” but “firmness, balance, and steadiness”  (Dreyfus 2004, 75)

While Dreyfus acknowledges that unconditional commitment and acceptance of risk are not excluded in principle by online sociality, he insists that “anyone using the Net who was led to risk his or her real identity in the real world would have to act against the grain of what attracted him or her to the Net in the first place” (2004, 78).

2.3 Legacy of the Phenomenological Critique of Social Networks

While Borgmann and Dreyfus’s views continue to inform the philosophical conversation about social networking and ethics, both of these early philosophical engagements with the phenomenon manifest certain predictive failures (as is perhaps unavoidable when reflecting on new and rapidly evolving technological systems). Dreyfus did not foresee the way in which popular SNS such as Facebook, LinkedIn and Google+ would shift away from the earlier online norms of anonymity and identity play, instead giving real-world identities an online presence which in some ways is less ephemeral than bodily presence (as those who have struggled to erase online traces of past acts or to delete Facebook profiles of deceased loved ones can attest).

Likewise, Borgmann’s critiques of “immobile attachment” to the online datastream did not anticipate the rise of mobile social networking applications which not only encourage us to physically seek out and join our friends at those same concerts, plays and political events that he envisioned us passively digesting from an electronic feed, but also enable spontaneous physical gatherings in ways never before possible. That said, such predictive failures may not, in the long view, turn out to be fatal to their judgments. It is worth noting that one of the earliest and most accomplished researchers of Internet sociality whose early championing of its liberating social possibilities (Turkle 1995) was directly challenged by Dreyfus (2004, 75) has since articulated a far more pessimistic view of the trajectory of new social technologies (Turkle 2011)—one that now resonates in several respects with Borgmann’s earlier concerns about electronic networks increasingly leading to experiences of alienation in connectedness.

3. Contemporary Ethical Concerns about Social Networking Services

While scholarship in the social and natural sciences has tended to focus on the impact of SNS on psychosocial markers of happiness/well-being, psychosocial adjustment, social capital, or feelings of life satisfaction, philosophical concerns about social networking and ethics have generally centered on topics less amenable to empirical measurement (e.g., privacy, identity, friendship, the good life and democratic freedom). More so than ‘social capital’ or feelings of ‘life satisfaction,’ these topics are closely tied to traditional concerns of ethical theory (e.g., virtues, rights, duties, motivations and consequences). These topics are also tightly linked to the novel features and distinctive functionalities of SNS, more so than some other issues of interest in computer and information ethics that relate to more general Internet functionalities (for example, issues of copyright and intellectual property).

3.1 Social Networking Services and Privacy

Social networking technologies have added a new sense of urgency and new layers of complexity to the existing debates among philosophers about computers and informational privacy. For example, standing philosophical debates about whether privacy should be defined in terms of control over information (Elgesem 1996), restricting access to information (Tavani 2007) or contextual integrity (Nissenbaum 2004) must now be re-examined in the light of the privacy practices of Facebook, Twitter and other SNS. This has become a locus of much critical attention.

Some fundamental practices of concern include: the potential availability of users’ data to third parties for the purposes of commercial marketing, data mining, research, surveillance or law enforcement; the capacity of facial-recognition software to automatically identify persons in uploaded photos; the ability of third-party applications to collect and publish user data without their permission or awareness; the frequent use by SNS of automatic ‘opt-in’ privacy controls; the use of ‘cookies’ to track online user activities after they have left a SNS; the potential use of location-based social networking for stalking or other illicit monitoring of users’ physical movements; the sharing of user information or patterns of activity with government entities; and, last but not least, the potential of SNS to encourage users to adopt voluntary but imprudent, ill-informed or unethical information sharing practices, either with respect to sharing their own personal data or sharing data related to other persons and entities. Facebook has been a particular lightning-rod for criticism of its privacy practices (Spinello 2011), but it is just the most visible member of a far broader and more complex network of SNS actors with access to unprecedented quantities of sensitive personal data.

These new actors in the information environment create particular problems with respect to privacy norms. For example, since it is the ability to access information freely shared by others that makes SNS uniquely attractive and useful, and given that users often minimize or fail to fully understand the implications of sharing information on SNS, we may find that contrary to traditional views of information privacy, giving users greater control over their information-sharing practices may actually lead to decreased privacy for themselves or others. Moreover, in the shift from (early Web 2.0) user-created and maintained sites and networks to (late Web 2.0) proprietary social networks, many users have yet to fully process the potential for conflict between their personal motivations for using SNS and the profit-driven motivations of the corporations that possess their data (Baym 2011). Jared Lanier frames the point cynically when he states that: “The only hope for social networking sites from a business point of view is for a magic formula to appear in which some method of violating privacy and dignity becomes acceptable” (Lanier 2010).

Scholars also note the way in which SNS architectures are often insensitive to the granularity of human sociality (Hull, Lipford & Latulipe 2011). That is, such architectures tend to treat human relations as if they are all of a kind, ignoring the profound differences among types of social relation (familial, professional, collegial, commercial, civic, etc.). As a consequence, the privacy controls of such architectures often fail to account for the variability of privacy norms within different but overlapping social spheres. Among philosophical accounts of privacy, Nissenbaum’s (2010) view of contextual integrity has seemed to many to be particularly well suited to explaining the diversity and complexity of privacy expectations generated by new social media (see for example Grodzinsky and Tavani 2010; Capurro 2011). Contextual integrity demands that our information practices respect context-sensitive privacy norms, where‘context’ refers not to the overly coarse distinction between ‘private’ and ‘public,’ but to a far richer array of social settings characterized by distinctive roles, norms and values. For example, the same piece of information made ‘public’ in the context of a status update to family and friends on Facebook may nevertheless be considered by the same discloser to be ‘private’ in other contexts; that is, she may not expect that same information to be provided to strangers Googling her name, or to bank employees examining her credit.

On the design side, such complexity means that attempts to produce more ‘user-friendly’ privacy controls face an uphill challenge—they must balance the need for simplicity and ease of use with the need to better represent the rich and complex structures of our social universes. A key design question, then, is how SNS privacy interfaces can be made more accessible and more socially intuitive for users.

Hull et al. (2011) also take note of the apparent plasticity of user attitudes about privacy in SNS contexts, as evidenced by the pattern of widespread outrage over changed or newly disclosed privacy practices of SNS providers being followed by a period of accommodation to and acceptance of the new practices (Boyd and Hargittai 2010). A related concern is the “privacy paradox,” in which users’ voluntary actions online seem to belie their own stated values concerning privacy. These phenomena raise many ethical concerns, the most general of which may be this: how can static normative conceptions of the value of privacy be used to evaluate the SNS practices that are destabilizing those very conceptions? More recently, working from the late writings of Foucault, Hull (2015) has explored the way in which the ‘self-management’ model of online privacy protection embodied in standard ‘notice and consent’ practices only reinforces a narrow neoliberal conception of privacy, and of ourselves, as commodities for sale and exchange.

In an early study of online communities, Bakardjieva and Feenberg (2000) suggested that the rise of communities predicated on the open exchange of information may in fact require us to relocate our focus in information ethics from privacy concerns to concerns about alienation; that is, the exploitation of information for purposes not intended by the relevant community. Heightened concerns about data mining and other third-party uses of information shared on SNS would seem to give further weight to Bakardjieva and Feenberg’s argument. Such considerations give rise to the possibility of users deploying “guerrilla tactics” of misinformation, for example, by providing SNS hosts with false names, addresses, birthdates, hometowns or employment information. Such tactics would aim to subvert the emergence of a new “digital totalitarianism” that uses the power of information rather than physical force as a political control (Capurro 2011).

Finally, privacy issues with SNS highlight a broader philosophical problem involving the intercultural dimensions of information ethics; Rafael Capurro (2005) has noted the way in which narrowly Western conceptions of privacy occlude other legitimate ethical concerns regarding new media practices. For example, he notes that in addition to Western worries about protecting the private domain from public exposure, we must also take care to protect the public sphere from the excessive intrusion of the private. Though he illustrates the point with a comment about intrusive uses of cell phones in public spaces (2005, 47), the rise of mobile social networking has amplified this concern by several factors. When one must compete with Facebook or Twitter for the attention of not only one’s dinner companions and family members, but also one’s fellow drivers, pedestrians, students, moviegoers, patients and audience members, the integrity of the public sphere comes to look as fragile as that of the private.

3.2 The Ethics of Identity and Community on Social Networking Services

Social networking technologies open up a new type of ethical space in which personal identities and communities, both ‘real’ and virtual, are constructed, presented, negotiated, managed and performed. Accordingly, philosophers have analyzed SNS both in terms of their uses as Foucaultian “technologies of the self” (Bakardjieva and Gaden 2012) that facilitate the construction and performance of personal identity, and in terms of the distinctive kinds of communal norms and moral practices generated by SNS (Parsell 2008).

The ethical and metaphysical issues generated by the formation of virtual identities and communities have attracted much philosophical interest (see Introna 2011 and Rodogno 2012). Yet as noted by Patrick Stokes (2012), unlike earlier forms of online community in which anonymity and the construction of alter-egos were typical, SNS such as Facebook increasingly anchor member identities and connections to real, embodied selves and offline ‘real-world’ networks. Yet SNS still enable users to manage their self-presentation and their social networks in ways that offline social spaces at home, school or work often do not permit. The result, then, is an identity grounded in the person’s material reality and embodiment but more explicitly “reflective and aspirational” (Stokes 2012, 365) in its presentation. This raises a number of ethical questions: first, from what source of normative guidance or value does the aspirational content of an SNS user’s identity primarily derive? Do identity performances on SNS generally represent the same aspirations and reflect the same value profiles as users’ offline identity performances? Do they display any notable differences from the aspirational identities of non-SNS users? Are the values and aspirations made explicit in SNS contexts more or less heteronomous in origin than those expressed in non-SNS contexts? Do the more explicitly aspirational identity performances on SNS encourage users to take steps to actually embody those aspirations offline, or do they tend to weaken the motivation to do so?

A further SNS phenomenon of relevance here is the persistence and communal memorialization of Facebook profiles after the user’s death; not only does this reinvigorate a number of classical ethical questions about our ethical duties to honor and remember the dead, it also renews questions about whether our moral identities can persist after our embodied identities expire, and whether the dead have ongoing interests in their social presence or reputation (Stokes 2012).

Mitch Parsell (2008) has raised concerns about the unique temptations of ‘narrowcast’ social networking communities that are “composed of those just like yourself, whatever your opinion, personality or prejudices.” (41) He worries that among the affordances of Web 2.0 tools is a tendency to constrict our identities to a closed set of communal norms that perpetuate increased polarization, prejudice and insularity. He admits that in theory the many-to-many or one-to-many relations enabled by SNS allow for exposure to a greater variety of opinions and attitudes, but in practice Parsell worries that they often have the opposite effect. Building from de Laat (2006), who suggests that members of virtual communities embrace a distinctly hyperactive style of communication to compensate for diminished informational cues, Parsell claims that in the absence of the full range of personal identifiers evident through face-to-face contact, SNS may also promote the deindividuation of personal identity by exaggerating and reinforcing the significance of singular shared traits (liberal, conservative, gay, Catholic, etc.) that lead us to see ourselves and our SNS contacts more as representatives of a group than as unique persons (2008, 46).

Parsell also notes the existence of inherently pernicious identities and communities that may be enabled or enhanced by some Web 2.0 tools—he cites the example of apotemnophiliacs, or would-be amputees, who use such resources to create mutually supportive networks in which their self-destructive desires receive validation (2008, 48). Related concerns have been raised about “Pro-ANA” sites that provide mutually supportive networks for anorexics seeking information and tools to allow them to perpetuate and police disordered identities (Giles 2006; Manders-Huits 2010). While Parsell believes that certain Web 2.0 affordances enable corrupt and destructive varieties of personal freedom, he claims that other Web 2.0 tools offer corresponding solutions; for example, he describes Facebook’s reliance on long-lived profiles linked to real-world identities as a way of combating deindividuation and promoting responsible contribution to the community (2008, 54).

Such tools, however, come at some cost to user autonomy—a value that in other circumstances is critical to respecting the ethical demands of identity, as noted by Noemi Manders-Huits (2010). Manders-Huits explores the tension between the way in which SNS treat users as profiled and forensically reidentifiable “objects of (algorithmic) computation” (2010, 52) while at the same time offering those users an attractive space for ongoing identity construction. She argues that SNS developers have a duty to protect and promote the interests of their users in autonomously constructing and managing their own moral and practical identities.

The ethical concern about SNS constraints on user autonomy is also voiced by Bakardjieva and Gaden (2012) who note that whether they wish their identities to be formed and used in this manner or not, the online selves of SNS users are constituted by the categories established by SNS developers, and ranked and evaluated according to the currency which primarily drives the narrow “moral economy” of SNS communities: popularity (2012, 410). They note, however, that users are not rendered wholly powerless by this schema; users retain, and many exercise, “the liberty to make informed choices and negotiate the terms of their self constitution and interaction with others,” (2012, 411) whether by employing means to resist the “commercial imperatives” of SNS sites (ibid.) or by deliberately restricting the scope and extent of their personal SNS practices.

SNS such as Facebook can also be viewed as enabling authenticity in important ways. While the ‘Timeline’ feature (which displays my entire online personal history for all my friends to see) can prompt me to ‘edit’ my past, it can also prompt me to face up to and assimilate into my self-conception thoughts and actions that might otherwise be conveniently forgotten. The messy collision of my family, friends and coworkers on Facebook can be managed with various tools offered by the site, allowing me to direct posts only to specific sub-networks that I define. But the far simpler and less time-consuming strategy is to come to terms with the collision—allowing each network member to get a glimpse of who I am to others, while at the same time asking myself whether these expanded presentations project a person that is more multidimensional and interesting, or one that is manifestly insincere. As Tamara Wandel and Anthony Beavers put it:

I am thus no longer radically free to engage in creating a completely fictive self, I must become someone real, not who I really am pregiven from the start, but who I am allowed to be and what I am able to negotiate in the careful dynamic between who I want to be and who my friends from these multiple constituencies perceive me, allow me, and need me to be. (2011, 93)

Even so, Dean Cocking (2008) argues that many online social environments, by amplifying active aspects of self-presentation under our direct control, compromise the important function of passive modes of embodied self-presentation beyond our conscious control, such as body language, facial expression, and spontaneous displays of emotion (130). He regards these as important indicators of character that play a critical role in how others see us, and by extension, how we come to understand ourselves through others’ perceptions and reactions. If Cocking’s view is correct, then as long as SNS continue to privilege text-based and asynchronous communications, our ability to use them to cultivate and express authentic identities may be significantly hampered.

Ethical preoccupations with the impact of SNS on our authentic self-constitution and representation may also be regarded as assuming a false dichotomy between online and offline identities; the informational theory of personal identity offered by Luciano Floridi (2011) problematizes this distinction. Soraj Hongladarom (2011) employs such an informational metaphysic to deny that any clear boundary can be drawn between our offline selves and our selves as cultivated through SNS. Instead, our personal identities online and off are taken as externally constituted by our informational relations to other selves, events and objects.

Likewise, Charles Ess makes a link between relational models of the self found in Aristotle, Confucius and many contemporary feminist thinkers and emerging notions of the networked individual as a “smeared-out self” (2010, 111) constituted by a shifting web of embodied and informational relations. Ess points out that by undermining the atomic and dualistic model of the self upon which Western liberal democracies are founded, this new conception of the self forces us to reassess traditional philosophical approaches to ethical concerns about privacy and autonomy—and may even promote the emergence of a much-needed “global information ethics” (2010, 112). Yet he worries that our ‘smeared-out selves’ may lose coherence as the relations that constitute us are increasingly multiplied and scattered among a vast and expanding web of networked channels. Can such selves retain the capacities of critical rationality required for the exercise of liberal democracy, or will our networked selves increasingly be characterized by political and intellectual passivity, hampered in self-governance by “shorter attention spans and less capacity to engage with critical argument” (2010, 114)? Ess suggests that we hope for, and work to enable the emergence of, ‘hybrid selves’ that cultivate the individual moral and practical virtues needed to flourish within our networked and embodied relations (2010, 116).

3.3 Friendship, Virtue and the Good Life on Social Networking Services

SNS can facilitate many types of relational connections: LinkedIn encourages social relations organized around our professional lives, Twitter is useful for creating lines of communication between ordinary individuals and figures of public interest, MySpace was for a time a popular way for musicians to promote themselves and communicate with their fans, and Facebook, which began as a way to link university cohorts and now connects people across the globe, has seen a surge in business profiles aimed at establishing links to existing and future customers. Yet the overarching relational concept in the SNS universe has been, and continues to be, the ‘friend,’ as underscored by the now-common use of this term as a verb to refer to acts of instigating or confirming relationships on SNS.

This appropriation and expansion of the concept ‘friend’ by SNS has provoked a great deal of scholarly interest from philosophers and social scientists, more so than any other ethical concern except perhaps privacy. Early concerns about SNS friendship centered on the expectation that such sites would be used primarily to build ‘virtual’ friendships between physically separated individuals lacking a ‘real-world’ or ‘face-to-face’ connection. This perception was an understandable extrapolation from earlier patterns of Internet sociality, patterns that had prompted philosophical worries about whether online friendships could ever be ‘as good as the real thing’ or were doomed to be pale substitutes for embodied ‘face to face’ connections (Cocking and Matthews 2000). This view is robustly opposed by Adam Briggle (2008), who notes that online friendships might enjoy certain unique advantages. For example, Briggle asserts that friendships formed online might be more candid than offline ones, thanks to the sense of security provided by physical distance (2008, 75). He also notes the way in which asynchronous written communications can promote more deliberate and thoughtful exchanges (2008, 77).

These sorts of questions about how online friendships measure up to offline ones, along with questions about whether or to what extent online friendships encroach upon users’ commitments to embodied, ‘real-world’ relations with friends, family members and communities, defined the ethical problem-space of online friendship as SNS began to emerge. But it did not take long for empirical studies of actual SNS usage trends to force a profound rethinking of this problem-space. Within five years of Facebook’s launch, it was evident that a significant majority of SNS users were relying on these sites primarily to maintain and enhance relationships with those with whom they also had a strong offline connection—including close family members, high-school and college friends and co-workers (Ellison, Steinfeld and Lampe 2007; Ito et al. 2009; Smith 2011). Nor are SNS used to facilitate purely online exchanges—many SNS users today rely on the sites’ functionalities to organize everything from cocktail parties to movie nights, outings to athletic or cultural events, family reunions and community meetings. Mobile SNS applications such as Foursquare, Loopt and Google Latitude amplify this type of functionality further, by enabling friends to locate one another in their community in real-time, enabling spontaneous meetings at restaurants, bars and shops that would otherwise happen only by coincidence.

Yet lingering ethical concerns remain about the way in which SNS can distract users from the needs of those in their immediate physical surroundings (consider the widely lamented trend of users obsessively checking their social media feeds during family dinners, business meetings, romantic dates and symphony performances). Such phenomena, which scholars like Sherry Turkle (2011) worry are indicative of a growing cultural tolerance for being ‘alone together,’ bring a new complexity to earlier philosophical concerns about the emergence of a zero-sum game between offline relationships and their virtual SNS competitors. They have also prompted a shift of ethical focus away from the question of whether online relationships are “real” friendships (Cocking and Matthews 2000), to how well the real friendships we bring to SNS are being served there (Vallor 2012). The debate over the value and quality of online friendships continues (Sharp 2012; Froding and Peterson 2012; Elder 2014); in large part because the typical pattern of those friendships, like most social networking phenomena, continues to evolve.

Such concerns intersect with broader philosophical questions about whether and how the classical ethical ideal of ‘the good life’ can be engaged in the 21st century. Pak-Hang Wong claims that this question requires us to broaden the standard approach to information ethics from a narrow focus on the “right/the just” (2010, 29) that defines ethical action negatively (e.g., in terms of violations of privacy, copyright, etc.) to a framework that conceives of a positive ethical trajectory for our technological choices. Edward Spence (2011) further suggests that to adequately address the significance of SNS and related information and communication technologies for the good life, we must also expand the scope of philosophical inquiry beyond its present concern with narrowly interpersonal ethics to the more universal ethical question of prudential wisdom. Do SNS and related technologies help us to cultivate the broader intellectual virtue of knowing what it is to live well, and how to best pursue it? Or do they tend to impede its development?

This concern about prudential wisdom and the good life is part of a growing philosophical interest in using the resources of classical virtue ethics to evaluate the impact of SNS and related technologies, whether these resources are broadly Aristotelian (Vallor 2010), Confucian (Wong 2012) or both (Ess 2008). This program of research promotes inquiry into the impact of SNS not merely on the cultivation of prudential virtue, but on the development of a host of other moral and communicative virtues, such as honesty, patience, justice, loyalty, benevolence and empathy.

3.4 Democracy, Freedom and Social Networking Services in the Public Sphere

As is the case with privacy, identity, community and friendship on SNS, ethical debates about the impact of SNS on civil discourse, freedom and democracy in the public sphere must be seen as extensions of a broader discussion about the political implications of the Internet, one that predates Web 2.0 standards. Much of the literature on this subject focuses on the question of whether the Internet encourages or hampers the free exercise of deliberative public reason, in a manner informed by Jürgen Habermas’s (1992/1998) account of discourse ethics and deliberative democracy in the public sphere (Ess 1996 and 2005b; Dahlberg 2001; Bohman 2008). A related topic of concern is the potential of the Internet to fragment the public sphere by encouraging the formation of a plurality of ‘echo chambers’ and ‘filter bubbles’: informational silos for like-minded individuals who deliberately shield themselves from exposure to alternative views. The worry is that such insularity will promote extremism and the reinforcement of ill-founded opinions, while also preventing citizens of a democracy from recognizing their shared interests and experiences (Sunstein 2008). Finally, there is the question of the extent to which SNS can facilitate political activism, civil disobedience and popular revolutions resulting in the overthrow of authoritarian regimes. Commonly referenced examples include the 2011 North African revolutions in Egypt and Tunisia, with which Facebook and Twitter were respectively associated (Marturano 2011; Frick and Oberprantacher 2011).

When SNS in particular are considered in light of these questions, some distinctive considerations arise. First, sites like Facebook and Twitter (as opposed to narrower SNS utilities such as LinkedIn) facilitate the sharing of, and exposure to, an extremely diverse range of types of discourse. On any given day on Facebook a user may encounter in her NewsFeed a link to an article in a respected political magazine followed by a video of a cat in a silly costume, followed by a link to a new scientific study, followed by a lengthy status update someone has posted about their lunch, followed by a photo of a popular political figure overlaid with a clever and subversive caption. Vacation photos are mixed in with political rants, invitations to cultural events, birthday reminders and data-driven graphs created to undermine common political, moral or economic beliefs. Thus while a user has a tremendous amount of liberty to choose which forms of discourse to pay closer attention to, and tools with which to hide or prioritize the posts of certain members of her network, she cannot easily shield herself from at least a superficial acquaintance with a diversity of private and public concerns of her fellows. This has the potential to offer at least some measure of protection against the extreme insularity and fragmentation of discourse that is incompatible with the public sphere.

Second, while users can often ‘defriend’ or systematically hide the posts of those with whom they tend to disagree, the high visibility and perceived value of social connections on these sites makes this option less attractive as a consistent strategy. Philosophers of technology often speak of the affordances or gradients of particular technologies in given contexts (Vallor 2010) insofar as they make certain patterns of use more attractive or convenient for users (while not rendering alternative patterns impossible). In this respect, social networks like those on Facebook, in which users must take actions somewhat contrary to the site’s purpose in order to effectively shield themselves from unwelcome or contrary opinions, may be viewed as having a modestly democratic gradient in comparison to networks deliberately constructed around a particular political cause or identity. However, this gradient may be undermined by Facebook’s own algorithms, which curate users’ News Feed in ways that are opaque to them, and which almost certainly prioritize the appeal of the ‘user experience’ over civic benefit or the integrity of the public sphere.

Third, one must ask whether SNS can skirt the dangers of a plebiscite model of democratic discourse, in which minority voices are inevitably dispersed and drowned out by the many. Certainly, compared to the ‘one-to-many’ channels of communication favored by traditional media, SNS facilitate a ‘many-to-many’ model of communication that appears to lower the barriers to participation in civic discourse for everyone, including the marginalized. However, if one’s ‘Facebook friends’ or people you ‘follow’ are sufficiently numerous, then minority opinions may still be heard as lone voices in the wilderness, perhaps valued for providing some ‘spice’ and novelty to the broader conversation but failing to receive serious public consideration of their merits. Existing SNS lack the institutional structures necessary to ensure that minority voices enjoy not only free, but qualitatively equal access to the deliberative function of the public sphere.

Fourth, one must also consider the quality of informational exchanges on SNS and the extent to which they promote a genuinely dialogical public sphere marked by the exercise of critical rationality. While we have noted above that exposure to well-informed opinions and reliable evidential sources is facilitated by many of the most popular SNS, exposure does not guarantee attention or consumption. For example, the number of contacts in the average Facebook user’s network is sufficiently large to make it virtually impossible for a typical user to see every relevant post even among those which Facebook’s algorithm selects for their News Feed, and only a very small number of those may be closely attended or responded to. Many scholars worry that in SNS environments, substantive contributions to civic discourse increasingly function as flotsam on a virtual sea of trivially amusing or shallow content, weakening the civic habits and practices of critical rationality that we need in order to function as well-informed and responsible democratic citizens (Carr 2010; Ess 2010). Furthermore, while the most popular SNS do promote norms of responsive practice, these norms tend to privilege brevity and immediate impact over substance and depth in communication; Vallor (2012) suggests that this bodes poorly for the cultivation of those communicative virtues essential to a flourishing public sphere. This worry is only reinforced by empirical data suggesting that SNS perpetuate the ‘Spiral of Silence’ phenomenon that results in the passive suppression of divergent views on matters of important political or civic concern (Hampton et. al. 2014). In a related critique, Frick and Oberprantacher (2011) claim that the ability of SNS to facilitate public ‘sharing’ can obscure the deep ambiguity between sharing as “a promising, active participatory process” and “interpassive, disjointed acts of having trivia shared.” (2011, 22)

A fifth issue for online democracy relates to the contentious debate emerging on social media platforms about the extent to which controversial or unpopular speech ought to be tolerated or punished by private actors, especially when the consequences manifest in traditional offline contexts and spaces such as the university. For example, the norms of academic freedom in the U.S. have been greatly destabilized by the ‘Salaita Affair’ and several other cases in which academics were censured or otherwise punished by their institutions as a result of their controversial social media posts. It remains to be seen what equilibrium can be found between civility and free expression in communities increasingly mediated by SNS communications.

There is also the question of whether SNS will necessarily preserve a democratic ethos as they come to reflect increasingly pluralistic and international social networks. The current split between networks such as Facebook and Twitter dominant in Western liberal society and dedicated SNS in countries such as China (RenRen) and Russia (VKontakte) with more communitarian and/or authoritarian regimes may not endure; if SNS become increasingly multinational or global in scale, will that development tend to disseminate and enhance democratic values and practices, dilute and weaken them, or perhaps precipitate the recontextualization of liberal democratic values in a new ‘global ethics’ (Ess 2010)?

An even more pressing question is whether civic discourse and activism on SNS will be compromised or manipulated by the commercial interests that currently own and manage the technical infrastructure. This concern is driven by the growing economic power and political influence of companies in the technology sector, and the potentially disenfranchising and disempowering effects of an economic model in which users play a fundamentally passive role (Floridi 2015). Indeed, the relationship between social media users and service providers has become increasingly contentious, as users struggle to demand more privacy, better data security and more effective protections from online harassment in an economic context where they have little or no direct bargaining power. This imbalance was powerfully illustrated by the revelation in 2014 that Facebook researchers had quietly conducted psychological experiments on users without their knowledge, manipulating their moods by altering the balance of positive or negative items in their News Feeds (Goel 2014). The study adds yet another dimension to growing concerns about the ethics and validity of social science research that relies on SNS-generated data (Buchanan and Zimmer 2012).

Ironically, in the power struggle between users and SNS providers, social networking platforms themselves have become the primary battlefield, where users vent their collective outrage in an attempt to force service providers into responding to their demands. The results are sometimes positive, as when Twitter users, after years of complaining, finally shamed the company in 2015 into providing better reporting tools for online harassment. Yet by its nature the process is chaotic and often controversial, as when later that year, Reddit users successfully demanded the ouster of CEO Ellen Pao, under whose leadership Reddit had banned some of its more repugnant ‘subreddit’ forums (such as “Fat People Hate,” devoted to the shaming and harassment of overweight persons.)

The only clear consensus emerging from the considerations outlined here is that if SNS are going to facilitate any enhancement of a Habermasian public sphere, or the civic virtues and praxes of reasoned discourse that any functioning public sphere must presuppose, then users will have to actively mobilize themselves to exploit such an opportunity (Frick and Oberprantacher 2011). Such mobilization may depend upon resisting the “false sense of activity and accomplishment” (Bar-Tura, 2010, 239) that may come from merely clicking ‘Like’ in response to acts of meaningful political speech, forwarding calls to sign petitions that one never gets around to signing oneself, or simply ‘following’ an outspoken social critic on Twitter whose ‘tweeted’ calls to action are drowned in a tide of corporate announcements, celebrity product endorsements and personal commentaries. Some argue that it will also require the cultivation of new norms and virtues of online civic-mindedness, without which online ‘democracies’ will continue to be subject to the self-destructive and irrational tyrannies of mob behavior (Ess 2010).

3.5 Social Networking Services and Cybercrime

SNS are hosts for a broad spectrum of ‘cybercrimes’ and related offenses, including but not limited to: cyberbullying/cyberharassment, cyberstalking, child exploitation, cyberextortion, cyberfraud, illegal surveillance, identity theft, intellectual property/copyright violations, cyberespionage, cybersabotage and cyberterrorism. Each of these forms of criminal or antisocial behavior has a history that well pre-dates Web 2.0 standards, and perhaps as a consequence, philosophers have tended to leave the specific correlations between cybercrime and SNS as an empirical matter for social scientists, law enforcement and Internet security firms to investigate. Nevertheless, cybercrime is an enduring topic of philosophical interest for the broader field of computer ethics, and the migration to and evolution of such crime on SNS platforms raises new and distinctive ethical issues.

Among those of great ethical importance is the question of how SNS providers ought to respond to government demands for user data for investigative or counterterrorism purposes. SNS providers are caught between the public interest in crime prevention and their need to preserve the trust and loyalty of their users, many of whom view governments as overreaching in their attempts to secure records of online activity. Many companies have opted to favor user security by employing end-to-end encryption of SNS exchanges, much to the chagrin of government agencies who insist upon ‘backdoor’ access to user data in the interests of public safety and national security (Friedersdorf 2015).

Another emerging ethical concern is the increasingly political character of cyberharassment and cyberstalking. In the U.S., women who speak out about the lack of diversity in the tech and videogame industries have been particular targets, in some cases forcing them to cancel speaking appearances or leave their homes due to physical threats after their addresses and other personal info were posted online (a practice known as ‘doxxing’). A new political vernacular has emerged among online contingents such as ‘MRAs’ (men’s rights activists), who perceive themselves as locked in a fierce ideological battle against those they derisively label as ‘SJWs’ (‘social justice warriors’): persons who advocate for equality, security and diversity in and through online mediums. For victims of doxxing and associated cyberthreats of physical violence, traditional law enforcement bodies offer scant protection, as these agencies are often ill-equipped or unmotivated to police the blurry boundary between virtual and physical harms.

4. Social Networking Services and Metaethical Issues

A host of metaethical questions are raised by the rapid emergence of SNS as a dominant medium of interpersonal connection. For example, SNS lend new data to the existing philosophical debate (Tavani 2005; Moor 2008) about whether classical ethical traditions such as utilitarianism, Kantian ethics or virtue ethics possess sufficient resources for illuminating the ethical implications of emerging information technologies, or whether we require a new ethical framework to handle such phenomena. One novel approach commonly employed to analyze SNS (Light, McGrath and Gribble 2008; Skog 2011) is Philip Brey’s (2000) disclosiveethics. This interdisciplinary ethical framework aims to analyze how particular moral values are embedded in specific technologies, allowing for the disclosure of otherwise opaque tendencies of a technology to shape moral practice. Ess (2006) has suggested that a new, pluralistic “global information ethics” may be the appropriate context from which to view emerging information technologies. Other scholars have suggested that technologies such as SNS invite renewed attention to existing ethical approaches such as pragmatism (van den Eede 2010), virtue ethics (Vallor 2010) feminist or care ethics (Hamington 2010; Puotinen 2011) that have often been neglected by applied ethicists in favor of conventional utilitarian and deontological resources.

A related metaethical project relevant to SNS is the development of an explicitly intercultural information ethics (Ess 2005a; Capurro 2008; Honglaradom and Britz 2010). SNS and other emerging information technologies do not reliably confine themselves to national or cultural boundaries, and this creates a particular challenge for applied ethicists. For example, SNS practices in different countries must be analyzed against a conceptual background that recognizes and accommodates complex differences in moral norms and practices concerning, for example, privacy (Capurro 2005; Hongladarom 2007). Other SNS phenomena that one might expect to benefit from intercultural analysis and that are relevant to the ethical considerations outlined in Section 3 include: varied cultural patterns and preference/tolerance for affective display, argument and debate, personal exposure, expressions of political, interfamilial or cultural criticism, religious expression and sharing of intellectual property. Alternatively, the very possibility of a coherent information ethics may come under challenge, for example, from a constructivist view that emerging socio-technological practices like SNS continually redefine ethical norms—such that our analyses of SNS and related technologies are not only doomed to operate from shifting ground, but from ground that is being shifted by the intended object of our ethical analysis.

Finally, there are pressing practical concerns about whether and how philosophers can actually have an impact on the ethical profile of emerging technologies such as SNS. If philosophers direct their ethical analyses only to other philosophers, then such analyses may function simply as ethical postmortems of human-technology relations, with no opportunity to actually pre-empt, reform or redirect unethical technological practices. But to whom else can, or should, these ethical concerns be directed: SNS users? Regulatory bodies and political institutions? SNS software developers? How can the theoretical content and practical import of these analyses be made accessible to these varied audiences? What motivating force are they likely to have? The profound urgency of such questions becomes apparent once we recognize that unlike those ‘life or death’ ethical dilemmas with which applied ethicists are understandably often preoccupied (e.g., abortion, euthanasia and capital punishment), emerging information technologies such as SNS have in a very short time worked themselves into the daily moral fabric of virtually all of our lives, transforming the social landscape and the moral habits and practices with which we navigate it. The ethical concerns illuminated here are, in a very real sense, anything but ‘academic,’ and neither philosophers nor the broader human community can afford the luxury of treating them as such.


  • Bakardjieva, M. and Feenberg, A., 2000, “Involving the Virtual Subject,” Ethics and Information Technology, 2(4): 233–240.
  • Bakardjieva, M. and Gaden, G., 2012, “Web 2.0 Technologies of the Self,” Philosophy and Technology, 25(3): 399–413.
  • Bar-Tura, A., 2010, “Wall-to-Wall or Face-to-Face,” in Facebookand Philosophy, D.E. Wittkower (ed.), Chicago: Open Court, pp. 231–239.
  • Barnes, S.B., 2001, Online Connections: Internet Interpersonal Relationships, Cresskill, NJ: Hampton Press.
  • Baym, N.K., 2011, “Social Networks 2.0,” in The Handbook of Internet Studies, M. Consalvo and C. Ess (eds.), Oxford: Wiley-Blackwell, pp. 384-405.
  • Bohman, J., 2008, “The Transformation of the Public Sphere: Political Authority, Communicative Freedom and Internet Publics,” in Information Technology and Moral Philosophy, J. van den Hoven and J. Weckert (eds.), Cambridge UK: Cambridge University Press, pp. 66–92.
  • Borgmann, A., 1984, Technology and the Character of Contemporary Life, Chicago: University of Chicago Press.
  • –––, 1992, Crossing the Postmodern Divide, Chicago: University of Chicago Press.
  • –––, 1999, Holding On to Reality: The Nature of Information at the Turn of the Millenium, Chicago: University of Chicago Press.
  • Boyd, D., 2007, “Why Youth (Heart) Social Networking Sites: The Role of Networked Publics in Teenage Social Life,” in Youth, Identity and Social Media, D. Buckingham (Ed.), Cambridge MA: MIT Press, pp. 119–142.
  • Boyd, D. and Hargittai, E., 2010, “Facebook Privacy Settings: Who Cares?” First Monday, 15(8): 13–20.
  • Brey, P., 2000, “Disclosive Computer Ethics,” Computers and Society, 30(4): 10–16.
  • Briggle, A., 2008, “Real Friends: How the Internet can Foster Friendship,” Ethics and Information Technology, 10(1): 71–79.
  • Buchanan, E.A. and Zimmer, M., 2012, “Internet Research Ethics,” The Stanford Encyclopedia of Philosophy (Spring 2015 Edition), Edward N. Zalta (ed.), URL=<>
  • Bynum, T., 2011, “Computer and Information Ethics,” The Stanford Encyclopedia of Philosophy (Spring 2011 Edition), Edward N. Zalta (ed.), URL=<>
  • Capurro, R., 2005, “Privacy. An Intercultural Perspective,” Ethics and Information Technology, 7(1): 37–47.
  • –––, 2008, “Intercultural Information Ethics,” in Handbook of Information and Computer Ethics, K.E. Himma and H.T. Tavani (eds.), Hoboken, NJ: Wiley and Sons, pp. 639–665.
  • Carr, N., 2010, The Shallows: What the Internet is Doing to Our Brains, New York: Norton and Co.
  • –––, 2011, “Never Enter Your Real Data,” International Review of Information Ethics, 16: 74–78.
  • Cocking, D., 2008, “Plural Selves and Relational Identity,” in Information Technology and Moral Philosophy, J. van den Hoven and J. Weckert (eds.), Cambridge UK: Cambridge University Press, pp. 123–141.
  • Cocking, D. and Matthews, S., 2000, “Unreal Friends,” Ethics and Information Technology, 2(4): 223–231.
  • Consalvo, M. and Ess, C., 2011, The Handbook of Internet Studies, Oxford: Wiley-Blackwell.
  • Dahlberg, L., 2001, “The Internet and Democratic Discourse: Exploring the Prospects of Online Deliberative Forums Extending the Public Sphere,” Information, Communication and Society, 4(4): 615–633.
  • de Laat, P. 2006, “Trusting Virtual Trust,” Ethics and Information Technology, 7(3): 167–180.
  • Dreyfus, H., 2001, On the Internet, New York: Routledge.
  • –––, 2004, “Nihilism on the Information Highway: Anonymity versus Commitment in the Present Age,” in Community in the Digital Age: Philosophy and Practice, A. Feenberg and D. Barney (eds.), Lanham, MD: Rowman & Littlefield, pp. 69–81.
  • Elder, A., 2014, “Excellent Online Friendships: An Aristotelian Defense of Social Media,” Ethics and Information Technology, 16(4): 287–297.
  • Elgesem, D., 1996, “Privacy, Respect for Persons, and Risk,” in Philosophical Perspectives on Computer-Mediated Communication, C. Ess (ed.), Albany, NY: SUNY Press, pp. 45–66.
  • Ellison, N.B., Steinfeld, C. and Lampe, C., 2007, “The Benefits of Facebook “Friends”: Social Capital and College Students’ Use of Online Social Network Sites,” Journal of Computer-Mediated Communication, 12(4): article 1.
  • Ess, C., 1996, “The Political Computer: Democracy, CMC and Habermas,” in Philosophical Perspectives on Computer-Mediated Communication, (C. Ess, ed.), Albany, NY: SUNY Press, pp. 197–230.
  • –––, 2005a, “Lost in Translation? Intercultural Dialogues on Privacy and Information Ethics,” Ethics and Information Technology, 7(1): 1–6.
  • –––, 2005b, “Moral Imperatives for Life in an Intercultural Global Village,” in The Impact of the Internet on our Moral Lives, R.J. Cavalier (ed.), Albany NY: SUNY Press, pp. 161–193.
  • –––, 2006, “Ethical Pluralism and Global Information Ethics,” Ethics and Information Technology, 8(4): 215–226.
  • –––, 2010, “The Embodied Self in a Digital Age: Possibilities, Risks and Prospects for a Pluralistic (democratic/liberal) Future?” NordicomInformation, 32(2): 105–118.
  • –––, 2011, “Self, Community and Ethics in Digital Mediatized Worlds,” in Trust and Virtual Worlds: Contemporary Perspectives, C. Ess and M. Thorseth (eds.), Oxford: Peter Lang, pp. vii-xxix.
  • Feenberg, A., 1999, Questioning Technology, New York: Routledge.
  • Floridi, L., 2011, “The Informational Nature of Personal Identity,” Minds and Machines, 21(4): 549–566.
  • –––, 2015, “Free Online Services: Enabling, Disenfranchising, Disempowering,” Philosophy and Technology, 28: 163–166.
  • Frick, M. and Oberprantacher, A., 2011, “Shared is Not Yet Sharing, Or: What Makes Social Networking Services Public?” International Review of Information Ethics, 15: 18–23.
  • Friedersdorf, C., 2015, “How Dangerous is End-to-End Encryption?,” The Atlantic, July 14, 2015, available online.
  • Froding, B. and Peterson, M., 2012, “Why Virtual Friendship is No Genuine Friendship,” Ethics and Information Technology, 14(3): 201–207.
  • Giles, D., 2006, “Constructing Identities in Cyberspace: The Case of Eating Disorders,” British Journal of Social Psychology, 45: 463–477.
  • Goel, V., 2014, “Facebook Tinkers with Users’ Emotions in News Feed Experiment, Stirring Outcry,” The New York Times, June 29, 2014, available online.
  • Grodzinsky, F.S. and Tavani, H.T., 2010, “Applying the ‘Contextual Integrity’ Model of Privacy to Personal Blogs in the Blogosphere,” International Journal of Internet Research Ethics, 3(1): 38–47.
  • Habermas, J., 1992/1998, Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy, Cambridge, MA: MIT Press.
  • Hamington, M., 2010, “Care Ethics, Friendship and Facebook,” in Facebookand Philosophy, D.E. Wittkower (ed.), Chicago: Open Court, pp. 135–145.
  • Hampton, K., Rainie, L., Lu, W., Dwyer, M., Shin, I. and Purcell, K., 2014, “Social Media and the ‘Spiral of Silence’,” Pew Research Center, Published August 26, 2014, available online.
  • Heidegger, M., 1954/1977, The Question Concerning Technology and Other Essays, New York: Harper and Row.
  • Honglaradom, S., 2007, “Analysis and Justification of Privacy from a Buddhist Perspective,” in S. Hongladarom and C. Ess (eds.), Information Technology Ethics: Cultural Perspectives, Hershey, PA: Idea Group, pp. 108–122.
  • –––, 2011, “Personal Identity and the Self in the Online and Offline World,” Minds and Machines, 21(4): 533–548.
  • Hongladarom, S. and Britz, J., 2010, “Intercultural Information Ethics,” International Review of Information Ethics, 13: 2–5.
  • Hull, G., 2015, “Successful Failure: What Foucault Can Teach Us about Privacy Self-Management in a World of Facebook and Big Data,” Ethics and Information Technology, online. doi:10.1007/s10676-015-9363-z
  • Hull, G., Lipford H.R. and Latulipe, C., 2011, “Contextual Gaps: Privacy Issues on Facebook,” Ethics and Information Technology, 13(4): 289–302.
  • Introna, L., 2011, “Phenomenological Approaches to Ethics and Information Technology,” The Stanford Encyclopedia of Philosophy (Summer 2011 Edition), Edward N. Zalta (ed.), URL=<>
  • Ito, M. et al., 2009, Hanging Out, Messing Around, Geeking Out: Living and Learning with New Media, Cambridge, MA: MIT Press.
  • Lanier, J. 2010, You Are Not a Gadget: A Manifesto, New York: Knopf.
  • Light, B., McGrath, K. and Griffiths, M., 2008, “More Than Just Friends? Facebook, Disclosive Ethics and the Morality of Technology,” ICIS 2008 Proceedings, Paper 193, available online.
  • Manders-Huits, N., 2010, “Practical versus Moral Identities in Identity Management,” Ethics and Information Technology, 12(1): 43–55.
  • Marturano, A., 2011, “The Ethics of Online Social Networks—An Introduction,” International Review of Information Ethics, 16: 3–5.
  • Moor, J., 2008, “Why We Need Better Ethics for Emerging Technologies,” in Information Technology and Moral Philosophy, J. van den Hoven and J. Weckert (eds.), Cambridge: UK: Cambridge University Press, pp. 26–39.
  • Nissenbaum, M., 2004, “Privacy as Contextual Integrity,” Washington Law Review, 79(1): 119–157.
  • –––, 2010, Privacy in Context: Technology, Policy, and the Integrity of Social Life, Palo Alto, CA: Stanford University Press.
  • Parsell, M., 2008, “Pernicious Virtual Communities: Identity, Polarisation and the Web 2.0,” Ethics and Information Technology 10(1): 41–56.
  • Puotinen, S., 2011, “Twitter Cares? Using Twitter to Care About, Care for and Care With Women Who Have Had Abortions,” International Review of Information Ethics, 16: 79–84.
  • Rodogno, R., 2012, “Personal Identity Online,” Philosophy and Technology, 25(3): 309–328.
  • Sharp, R., 2012, “The Obstacles Against Reaching the Highest Level of Aristotelian Friendship Online,” Ethics and Information Technology, 14(3): 231–239.
  • Skog, D., 2011, “Ethical Aspects of Managing A Social Network Site: A Disclosive Analysis,” International Review of Information Ethics, 16: 27–32.
  • Smith, A., 2011, “Why Americans Use Social Media,” Pew Internet and American Life Project, available online.
  • Spinello, R.A., 2011, “Privacy and Social Networking Technology,” International Review of Information Ethics, 16: 41–46.
  • Stokes, P., 2012, “Ghosts in the Machine: Do the Dead Live on in Facebook?,” Philosophy and Technology, 25(3): 363–379.
  • Sunstein, C., 2008, “Democracy and the Internet,” in Information Technology and Moral Philosophy, J. van den Hoven and J. Weckert (eds.), Cambridge UK: Cambridge University Press, pp. 93–110.
  • Tavani, H.T., 2005, “The Impact of the Internet on our Moral Condition: Do we Need a New Framework of Ethics?” in The Impact of the Internet on our Moral Lives, R.J. Cavalier (ed.), Albany, NY: SUNY Press, pp. 215–237.
  • –––, 2007, “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy,” Metaphilosophy, 38(1): 1–22.
  • Turkle, S., 1995, Life on the Screen: Identity in the Age of the Internet, New York: Simon and Schuster.
  • –––, 2011, Alone Together: Why we Expect More from Technology and Less from Each Other, New York: Basic Books.
  • Vallor, S., 2010, “Social Networking Technology and the Virtues,” Ethics and Information Technology, 12 (2): 157–170.
  • –––, 2012, “Flourishing on Facebook: Virtue Friendship and New Social Media,” Ethics and Information Technology, 14(3): 185–199.
  • van den Eede, Y., 2010, “‘Conversation of Mankind’ or ‘Idle Talk’?: A Pragmatist Approach to Social Networking Sites,” Ethics and Information Technology, 12(2): 195–206.
  • Verbeek, P., 2005, What Things Do: Philosophical Reflections on Technology, Agency and Design, University Park, PA: Pennsylvania State University Press.
  • Wandel, T. and Beavers, A., 2011, “Playing Around with Identity,” in Facebookand Philosophy, D.E. Wittkower (ed.), Chicago: Open Court, pp. 89–96.
  • Wong, P.H., 2010, “The Good Life in Intercultural Information Ethics: A New Agenda, ” International Review of Information Ethics 13: 26–32.
  • –––, 2012, “Dao, Harmony and Personhood: Towards a Confucian Ethics of Technology,” Philosophy and Technology, 25(1): 67–86.

0 thoughts on “Ethics In Social Media And Technology Essay Questions

Leave a Reply

Your email address will not be published. Required fields are marked *