{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:23:31Z","timestamp":1757312611410,"version":"3.37.3"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001230","name":"Macquarie University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001230","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2024,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Debate over the normativity of virtual phenomena is now widespread in the philosophical literature, taking place in roughly two distinct but related camps. The first considers the relevant problems to be within the scope of applied ethics, where the general methodological program is to square the intuitive (im)permissibility of virtual wrongdoings with moral accounts that justify their (im)permissibility. The second camp approaches the normativity of virtual wrongdoings as a metaphysical debate. This is done by disambiguating the \u2018virtual\u2019 character of \u2018virtual wrongdoings\u2019. Doing so is supposed to provide illuminating ontological distinctions that inform ethical aspects of the debate. We argue that each approach faces its own set of issues, and as a result, motivates consideration of an alternative. The alternative we suggest turns inquiry concerning the normativity of virtual wrongdoings into a distinctively conceptual question. Rather than asking whether some action is right or wrong, or whether some virtual phenomenon counts as a particular action at all, we argue that research into the normativity of virtual wrongdoings may be guided by reflecting on whether a concept that originated and developed within a non-virtual context should be exported into a foreign virtual domain. We consider this approach and several objections.<\/jats:p>","DOI":"10.1007\/s10676-023-09740-8","type":"journal-article","created":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T10:02:34Z","timestamp":1705053754000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The conceptual exportation question: conceptual engineering and the normativity of virtual worlds"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2153-7926","authenticated-orcid":false,"given":"Thomas","family":"Montefiore","sequence":"first","affiliation":[]},{"given":"Paul-Mikhail Catapang","family":"Podosky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"9740_CR1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203114261","volume-title":"The Routledge companion to video game studies","year":"2014","unstructured":"Aarseth, E. J., Perron, B., & Wolf, M. (Eds.). (2014). The Routledge companion to video game studies. Routledge. https:\/\/doi.org\/10.4324\/9780203114261"},{"issue":"4","key":"9740_CR2","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10676-015-9381-x","volume":"17","author":"R Ali","year":"2015","unstructured":"Ali, R. (2015). A new solution to the Gamer\u2019s dilemma. Ethics and Information Technology, 17(4), 267\u2013274. https:\/\/doi.org\/10.1007\/s10676-015-9381-x","journal-title":"Ethics and Information Technology"},{"key":"9740_CR3","first-page":"51","volume":"17","author":"A Appiah","year":"1996","unstructured":"Appiah, A. (1996). Race, culture, identity: Misunderstood connections. The Tanner Lectures on Human Values, 17, 51\u2013136.","journal-title":"The Tanner Lectures on Human Values"},{"issue":"3","key":"9740_CR4","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1111\/nous.12279","volume":"54","author":"E Barnes","year":"2020","unstructured":"Barnes, E. (2020). Gender and gender terms. Nous, 54(3), 704\u2013730.","journal-title":"Nous"},{"issue":"1","key":"9740_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10676-011-9280-8","volume":"14","author":"C Bartel","year":"2012","unstructured":"Bartel, C. (2012). Resolving the Gamer\u2019s dilemma. Ethics and Information Technology, 14(1), 11\u201316. https:\/\/doi.org\/10.1007\/s10676-011-9280-8","journal-title":"Ethics and Information Technology"},{"key":"9740_CR6","doi-asserted-by":"publisher","unstructured":"Brey, P. (2014). The physical and social reality of virtual worlds. In The Oxford handbook of virtual reality. Oxford University Press (pp. 42\u201354). https:\/\/doi.org\/10.1093\/oxfordhb\/9780199826162.013.029","DOI":"10.1093\/oxfordhb\/9780199826162.013.029"},{"issue":"1","key":"9740_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010069907461","volume":"1","author":"P Brey","year":"1999","unstructured":"Brey, P. (1999). The ethics of representation and action in virtual reality. Ethics and Information Technology, 1(1), 5\u201314.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9740_CR8","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1111\/1536-7150.t01-1-00011","volume":"62","author":"P Brey","year":"2003","unstructured":"Brey, P. (2003). The social ontology of virtual environments. American Journal of Economics & Sociology, 62(1), 269\u2013282. https:\/\/doi.org\/10.1111\/1536-7150.t01-1-00011","journal-title":"American Journal of Economics & Sociology"},{"key":"9740_CR9","doi-asserted-by":"crossref","unstructured":"Burgess, A., Cappelen, H., & Plunkett, D. (2020). In Burgess, H., Cappelen, A., & Plunkett, D. (Eds.), Conceptual engineering and conceptual ethics. Oxford University Press.","DOI":"10.1093\/oso\/9780198801856.001.0001"},{"issue":"12","key":"9740_CR10","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1111\/phc3.12086","volume":"8","author":"A Burgess","year":"2013","unstructured":"Burgess, A., & Plunkett, D. (2013a). Conceptual ethics I. Philosophy Compass, 8(12), 1091\u20131101.","journal-title":"Philosophy Compass"},{"issue":"12","key":"9740_CR11","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1111\/phc3.12085","volume":"8","author":"A Burgess","year":"2013","unstructured":"Burgess, A., & Plunkett, D. (2013b). Conceptual ethics II. Philosophy Compass, 8(12), 1102\u20131110.","journal-title":"Philosophy Compass"},{"key":"9740_CR12","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198814719.001.0001","volume-title":"Fixing language: An essay on conceptual engineering","author":"H Cappelen","year":"2018","unstructured":"Cappelen, H. (2018). Fixing language: An essay on conceptual engineering. Oxford University Press."},{"key":"9740_CR13","volume-title":"Conceptual engineering and conceptual ethics","author":"H Cappelen","year":"2020","unstructured":"Cappelen, H., & Plunkett, D. (2020). A guided tour of conceptual engineering and conceptual ethics. In A. Burgess, H. Cappelen, & D. Plunkett (Eds.), Conceptual engineering and conceptual ethics. Oxford University Press."},{"key":"9740_CR14","volume-title":"The philosophy of horror: Or paradoxes of the heart","author":"N Carroll","year":"1990","unstructured":"Carroll, N. (1990). The philosophy of horror: Or paradoxes of the heart. Routledge."},{"key":"9740_CR16","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1515\/disp-2017-0009","volume":"9","author":"D Chalmers","year":"2018","unstructured":"Chalmers, D. (2018). The virtual and the real. Disputatio, 9, 309\u2013352. https:\/\/doi.org\/10.1515\/disp-2017-0009","journal-title":"Disputatio"},{"key":"9740_CR17","volume-title":"Reality: Virtual worlds and the problems of philosophy","author":"D Chalmers","year":"2022","unstructured":"Chalmers, D. (2022). Reality: Virtual worlds and the problems of philosophy. WW Norton & Company."},{"issue":"2","key":"9740_CR19","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10676-007-9144-4","volume":"9","author":"A Craft","year":"2007","unstructured":"Craft, A. (2007). Sin in cyber-eden: Understanding the metaphysics and morals of virtual worlds. Ethics & Information Technology, 9(2), 205.","journal-title":"Ethics & Information Technology"},{"key":"9740_CR20","volume-title":"Knowledge and the state of nature: An essay on conceptual synthesis","author":"E Craig","year":"1990","unstructured":"Craig, E. (1990). Knowledge and the state of nature: An essay on conceptual synthesis. Oxford University Press."},{"key":"9740_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-020-09558-8","author":"R Davnall","year":"2020","unstructured":"Davnall, R. (2020). What does the gamer do? Ethics and Information Technology. https:\/\/doi.org\/10.1007\/s10676-020-09558-8","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9740_CR22","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10676-012-9298-6","volume":"14","author":"J Dunn","year":"2012","unstructured":"Dunn, J. (2012). Virtual worlds and moral evaluation. Ethics and Information Technology, 14(4), 255\u2013265. https:\/\/doi.org\/10.1007\/s10676-012-9298-6","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9740_CR23","first-page":"95","volume":"20","author":"S Feagin","year":"1983","unstructured":"Feagin, S. (1983). The pleasures of tragedy. American Philosophical Quarterly, 20(1), 95\u2013104.","journal-title":"American Philosophical Quarterly"},{"key":"9740_CR24","doi-asserted-by":"publisher","DOI":"10.4324\/9780203278796","volume-title":"Madness and civilization","author":"M Foucault","year":"1961","unstructured":"Foucault, M. (1961). Madness and civilization. Routledge."},{"key":"9740_CR25","doi-asserted-by":"crossref","unstructured":"Friend, S. (2008). Imagining fact and fiction. In New waves in aesthetics (pp. 150\u2013169).","DOI":"10.1057\/9780230227453_8"},{"key":"9740_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511553813","volume-title":"Literary education: A revaluation","author":"J Gribble","year":"1983","unstructured":"Gribble, J. (1983). Literary education: A revaluation. Cambridge University Press."},{"key":"9740_CR27","volume-title":"Conceptual engineering and conceptual ethics","author":"S Haslanger","year":"2000","unstructured":"Haslanger, S. (2000a). Going on, now in the same way. In A. Burgess, H. Cappelen, & D. Plunkett (Eds.), Conceptual engineering and conceptual ethics. Oxford University Press."},{"issue":"1","key":"9740_CR28","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1111\/0029-4624.00201","volume":"34","author":"S Haslanger","year":"2000","unstructured":"Haslanger, S. (2000b). Gender and race: (What) Are they? (what) do we want them to be? Nous, 34(1), 31\u201355.","journal-title":"Nous"},{"key":"9740_CR211","doi-asserted-by":"publisher","unstructured":"Haslanger, S. (2020). Going On, Not in the Same Way. In A. Burgess, H. Cappelen, & D. Plunkett (Eds.), Conceptual Engineering and Conceptual Ethics (p. 0). Oxford University Press. https:\/\/doi.org\/10.1093\/oso\/9780198801856.003.0012.","DOI":"10.1093\/oso\/9780198801856.003.0012"},{"issue":"3","key":"9740_CR29","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10676-020-09574-8","volume":"23","author":"J Heinrichs","year":"2020","unstructured":"Heinrichs, J. (2020). Virtual action. Ethics and Information Technology, 23(3), 317\u2013330. https:\/\/doi.org\/10.1007\/s10676-020-09574-8","journal-title":"Ethics and Information Technology"},{"key":"9740_CR30","first-page":"61","volume":"4","author":"A Hochman","year":"2017","unstructured":"Hochman, A. (2017). Replacing race: Interactive constructivism about racialized groups. Ergo, 4, 61\u201392.","journal-title":"Ergo"},{"issue":"4","key":"9740_CR31","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1111\/j.1467-9833.2008.00443.x","volume":"39","author":"L Howe","year":"2008","unstructured":"Howe, L. (2008). Self and pretence: Playing with identity. Journal of Social Philosophy, 39(4), 564\u2013582. https:\/\/doi.org\/10.1111\/j.1467-9833.2008.00443.x","journal-title":"Journal of Social Philosophy"},{"key":"9740_CR32","volume-title":"Homo Ludens : A study of the play-element in culture","author":"J Huizinga","year":"1944","unstructured":"Huizinga, J. (1944). Homo Ludens\u202f: A study of the play-element in culture. Angelico Press."},{"issue":"2","key":"9740_CR33","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1017\/S1352325200000434","volume":"2","author":"H Hurd","year":"1996","unstructured":"Hurd, H. (1996). The moral magic of consent. Legal Theory, 2(2), 121\u2013146. https:\/\/doi.org\/10.1017\/S1352325200000434","journal-title":"Legal Theory"},{"issue":"2","key":"9740_CR34","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1086\/683535","volume":"126","author":"K Jenkins","year":"2016","unstructured":"Jenkins, K. (2016). Amelioration and inclusion: Gender identity and the concept of woman. Ethics, 126(2), 394\u2013421.","journal-title":"Ethics"},{"issue":"1","key":"9740_CR35","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10676-009-9182-1","volume":"11","author":"M Johansson","year":"2009","unstructured":"Johansson, M. (2009). Why unreal punishments in response to unreal crimes might actually be a really good thing. Ethics and Information Technology, 11(1), 71\u201379. https:\/\/doi.org\/10.1007\/s10676-009-9182-1","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9740_CR36","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/s11229-022-03548-7","volume":"200","author":"S Jorem","year":"2020","unstructured":"Jorem, S. (2020). The good, the bad, and the insignificant\u2014assessing concept functions for conceptual engineering. Synthese, 200(2), 106.","journal-title":"Synthese"},{"key":"9740_CR37","volume-title":"Half-real: Video games between real rules and fictional worlds","author":"J Juul","year":"2005","unstructured":"Juul, J. (2005). Half-real: Video games between real rules and fictional worlds. MIT press."},{"key":"9740_CR38","first-page":"056","volume-title":"The magic circle and the puzzle piece","author":"J Juul","year":"2008","unstructured":"Juul, J. (2008). The magic circle and the puzzle piece (pp. 056\u2013057). University Press."},{"issue":"4","key":"9740_CR39","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1023\/A:1021372601566","volume":"4","author":"N Levy","year":"2002","unstructured":"Levy, N. (2002). Virtual child pornography: The eroticization of inequality. Ethics and Information Technology, 4(4), 319\u2013323. https:\/\/doi.org\/10.1023\/A:1021372601566","journal-title":"Ethics and Information Technology"},{"key":"9740_CR40","doi-asserted-by":"publisher","DOI":"10.1080\/0020174X.2020.1712227","author":"D Lorenzini","year":"2020","unstructured":"Lorenzini, D. (2020). On possibilising genealogy. Inquiry. https:\/\/doi.org\/10.1080\/0020174X.2020.1712227","journal-title":"Inquiry"},{"issue":"1","key":"9740_CR41","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10676-008-9168-4","volume":"11","author":"M Luck","year":"2009","unstructured":"Luck, M. (2009a). The Gamer\u2019s dilemma: An analysis of the arguments for the moral distinction between virtual murder and virtual paedophilia. Ethics and Information Technology, 11(1), 31\u201336.","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9740_CR42","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1108\/14779960911004516","volume":"7","author":"M Luck","year":"2009","unstructured":"Luck, M. (2009b). Crashing a virtual funeral: Morality in Mmorpgs. Journal of Information, Communication and Ethics in Society, 7(4), 280\u2013285. https:\/\/doi.org\/10.1108\/14779960911004516","journal-title":"Journal of Information, Communication and Ethics in Society"},{"issue":"3","key":"9740_CR43","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10676-018-9455-7","volume":"20","author":"M Luck","year":"2018","unstructured":"Luck, M. (2018). Has Ali dissolved the Gamer\u2019s dilemma? Ethics and Information Technology, 20(3), 157\u2013162. https:\/\/doi.org\/10.1007\/s10676-018-9455-7","journal-title":"Ethics and Information Technology"},{"key":"9740_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/s11406-021-00455-y","author":"M Luck","year":"2022","unstructured":"Luck, M. (2022). The grave resolution to the Gamer\u2019s dilemma: An argument for a moral distinction between virtual murder and virtual child molestation. Philosophia. https:\/\/doi.org\/10.1007\/s11406-021-00455-y","journal-title":"Philosophia"},{"key":"9740_CR46","doi-asserted-by":"crossref","unstructured":"Marques, T. (2020). Amelioration vs. perversion. In Shifting concepts: The philosophy and psychology of conceptual variability. Oxford University Press.","DOI":"10.1093\/oso\/9780198803331.001.0001"},{"issue":"4","key":"9740_CR47","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1023\/A:1013802119431","volume":"3","author":"M McCormick","year":"2001","unstructured":"McCormick, M. (2001). Is it wrong to play violent video games? Ethics and Information Technology, 3(4), 277\u2013287. https:\/\/doi.org\/10.1023\/A:1013802119431","journal-title":"Ethics and Information Technology"},{"issue":"55","key":"9740_CR48","doi-asserted-by":"publisher","first-page":"371","DOI":"10.2478\/disp-2019-0004","volume":"11","author":"N McDonnell","year":"2019","unstructured":"McDonnell, N., & Wildman, N. (2019). Virtual reality: Digital or fictional? Disputatio, 11(55), 371\u2013397. https:\/\/doi.org\/10.2478\/disp-2019-0004","journal-title":"Disputatio"},{"issue":"1","key":"9740_CR49","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s11098-016-0676-5","volume":"174","author":"C Mildenberger","year":"2017","unstructured":"Mildenberger, C. (2017). Virtual killing. Philosophical Studies: An International Journal for Philosophy in the Analytic Tradition, 174(1), 185\u2013203.","journal-title":"Philosophical Studies: An International Journal for Philosophy in the Analytic Tradition"},{"issue":"3","key":"9740_CR50","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10676-022-09655-w","volume":"24","author":"T Montefiore","year":"2022","unstructured":"Montefiore, T., & Formosa, P. (2022). Resisting the Gamer\u2019s dilemma. Ethics and Information Technology, 24(3), 31. https:\/\/doi.org\/10.1007\/s10676-022-09655-w","journal-title":"Ethics and Information Technology"},{"key":"9740_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-020-09532-4","author":"K Nader","year":"2020","unstructured":"Nader, K. (2020). Virtual competitions and the Gamer\u2019s dilemma. Ethics and Information Technology. https:\/\/doi.org\/10.1007\/s10676-020-09532-4","journal-title":"Ethics and Information Technology"},{"key":"9740_CR52","unstructured":"Nietzsche, F. 2006. (1887). On the genealogy of morality. Cambridge University Press."},{"key":"9740_CR53","doi-asserted-by":"publisher","DOI":"10.1080\/0020174X.2020.1860122","author":"CD Novaes","year":"2020","unstructured":"Novaes, C. D. (2020). Carnap meets Foucault: Conceptual engineering and genealogical investigations. Inquiry. https:\/\/doi.org\/10.1080\/0020174X.2020.1860122","journal-title":"Inquiry"},{"key":"9740_CR210","doi-asserted-by":"publisher","unstructured":"\u00d6hman, C. (2020). Introducing the pervert\u2019s dilemma: A contribution to the critique of Deepfake Pornography. Ethics and Information Technology, 22(2). https:\/\/doi.org\/10.1007\/s10676-019-09522-1","DOI":"10.1007\/s10676-019-09522-1"},{"issue":"2","key":"9740_CR54","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10676-017-9420-x","volume":"19","author":"S Ostritsch","year":"2017","unstructured":"Ostritsch, S. (2017). The amoralist challenge to gaming and the Gamer\u2019s moral obligation. Ethics and Information Technology, 19(2), 117\u2013128. https:\/\/doi.org\/10.1007\/s10676-017-9420-x","journal-title":"Ethics and Information Technology"},{"key":"9740_CR55","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10676-010-9250-6","volume":"13","author":"S Patridge","year":"2011","unstructured":"Patridge, S. (2011). The incorrigible social meaning of video game imagery. Ethics and Information Technology., 13, 303\u2013312.","journal-title":"Ethics and Information Technology."},{"key":"9740_CR56","first-page":"27","volume":"3","author":"D Plunkett","year":"2016","unstructured":"Plunkett, D. (2016). Conceptual history, conceptual ethics, and the aims of inquiry: A framework for thinking about the relevance of history\/genealogy of concepts to normative inquiry. Ergo, 3, 27\u201364.","journal-title":"Ergo"},{"issue":"2","key":"9740_CR57","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/s11229-022-03469-5","volume":"200","author":"PM-C Podosky","year":"2022","unstructured":"Podosky, P.M.-C. (2022). Can conceptual engineering actually promote social justice? Synthese, 200(2), 160.","journal-title":"Synthese"},{"key":"9740_CR58","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1093\/monist\/onac010","volume":"105","author":"M Queloz","year":"2022","unstructured":"Queloz, M. (2022). Genealogy, evaluation, and engineering. The Monist, 105, 435\u2013451.","journal-title":"The Monist"},{"key":"9740_CR59","doi-asserted-by":"publisher","unstructured":"Queloz, M. (Forthcoming). Nietzsche\u2019s conceptual ethics. https:\/\/doi.org\/10.1080\/0020174X.2022.2164049","DOI":"10.1080\/0020174X.2022.2164049"},{"key":"9740_CR60","doi-asserted-by":"publisher","DOI":"10.1007\/s10677-019-10049-z","author":"E Ramirez","year":"2020","unstructured":"Ramirez, E. (2020). How to (dis)solve the Gamer\u2019s dilemma. Ethical Theory and Moral Practice. https:\/\/doi.org\/10.1007\/s10677-019-10049-z","journal-title":"Ethical Theory and Moral Practice"},{"key":"9740_CR61","doi-asserted-by":"publisher","first-page":"11555","DOI":"10.1007\/s11229-021-03302-5","volume":"199","author":"J Riggs","year":"2022","unstructured":"Riggs, J. (2022). Deflating the functional turn in conceptual engineering. Synthese, 199, 11555\u201311586.","journal-title":"Synthese"},{"key":"9740_CR62","unstructured":"Rockstar Games. (2008). Grand Theft Auto IV (PC version) [Video Game]."},{"key":"9740_CR63","volume-title":"Pr\u00f3l de Frank Lantz","author":"K Salen","year":"2003","unstructured":"Salen, K., & Zimmerman, E. (2003). Rules of play\u202f: game design fundamentals. In K. Salen & E. Zimmerman (Eds.), Pr\u00f3l de Frank Lantz. MIT Press."},{"key":"9740_CR206","unstructured":"Searle, J. R. (1995). The construction of social reality (Nachdr.). Free Press."},{"key":"9740_CR205","doi-asserted-by":"publisher","unstructured":"Seddon, R. F. J. (2012). Getting \u2018virtual\u2019 wrongs right. Ethics and Information Technology, 15(1). https:\/\/doi.org\/10.1007\/s10676-012-9304-z.","DOI":"10.1007\/s10676-012-9304-z"},{"issue":"1","key":"9740_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10676-012-9304-z","volume":"15","author":"R Seddon","year":"2013","unstructured":"Seddon, R. (2013). Getting \u2018virtual\u2019 wrongs right. Ethics and Information Technology, 15(1), 1\u201311. https:\/\/doi.org\/10.1007\/s10676-012-9304-z","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9740_CR65","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1111\/nous.12302","volume":"54","author":"M Simion","year":"2019","unstructured":"Simion, M., & Kelp, C. (2019). Conceptual innovation, function first. Nous, 54(4), 985\u20131002.","journal-title":"Nous"},{"key":"9740_CR200","doi-asserted-by":"publisher","unstructured":"Stenros, J. (2012). In defence of a magic circle: The social, mental and cultural boundaries of play. Transactions of the Digital Games Research Association, 1(2). https:\/\/doi.org\/10.26503\/todigra.v1i2.10.","DOI":"10.26503\/todigra.v1i2.10"},{"key":"9740_CR66","volume-title":"Conceptual engineering and conceptual ethics","author":"A Thomasson","year":"2020","unstructured":"Thomasson, A. (2020). A pragmatic method for normative conceptual work. In A. Burgess, H. Cappelen, & D. Plunkett (Eds.), Conceptual engineering and conceptual ethics. Oxford University Press."},{"issue":"3","key":"9740_CR67","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10676-018-9463-7","volume":"20","author":"J Tillson","year":"2018","unstructured":"Tillson, J. (2018). Is it distinctively wrong to simulate doing wrong? Ethics and Information Technology, 20(3), 205\u2013217. https:\/\/doi.org\/10.1007\/s10676-018-9463-7","journal-title":"Ethics and Information Technology"},{"key":"9740_CR68","unstructured":"Walton, K. (1990). Mimesis as make-believe."},{"key":"9740_CR69","first-page":"9","volume-title":"Fictionalism to realism: Fictional and other social entities","author":"K Walton","year":"2013","unstructured":"Walton, K. (2013). Fictionality and imagination reconsidered. In M. Ferraris, A. Voltolini, & C. Babero (Eds.), Fictionalism to realism: Fictional and other social entities (pp. 9\u201326). Cambridge Scholars Publishing."},{"key":"9740_CR70","volume-title":"Ethics and the limits of philosophy","author":"B Williams","year":"1985","unstructured":"Williams, B. (1985). Ethics and the limits of philosophy. Harvard University Press."},{"issue":"2","key":"9740_CR71","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10676-006-9125-z","volume":"9","author":"J Wolfendale","year":"2007","unstructured":"Wolfendale, J. (2007). My avatar, my self: Virtual harm and attachment. Ethics and Information Technology, 9(2), 111\u2013119. https:\/\/doi.org\/10.1007\/s10676-006-9125-z","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9740_CR72","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10677-012-9338-7","volume":"16","author":"S Woodcock","year":"2013","unstructured":"Woodcock, S. (2013). Horror films and the argument from reactive attitudes. Ethical Theory and Moral Practice, 16(2), 309\u2013324. https:\/\/doi.org\/10.1007\/s10677-012-9338-7","journal-title":"Ethical Theory and Moral Practice"},{"issue":"1","key":"9740_CR73","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s10676-012-9306-x","volume":"15","author":"G Young","year":"2013","unstructured":"Young, G. (2013). Enacting taboos as a means to an end; but what end? On the morality of motivations for child murder and paedophilia within gamespace. Ethics and Information Technology, 15(1), 13\u201323. https:\/\/doi.org\/10.1007\/s10676-012-9306-x","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9740_CR74","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10676-017-9437-1","volume":"19","author":"G Young","year":"2017","unstructured":"Young, G. (2017a). Objections to Ostritsch\u2019s argument in \u2018The Amoralist challenge to gaming and the Gamer\u2019s moral obligation.\u2019 Ethics and Information Technology, 19(3), 209\u2013219. https:\/\/doi.org\/10.1007\/s10676-017-9437-1","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9740_CR75","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s40869-017-0044-5","volume":"6","author":"G Young","year":"2017","unstructured":"Young, G. (2017b). Integrating poor taste into the ongoing debate on the morality of violent video games. The Computer Games Journal, 6(4), 227\u2013237. https:\/\/doi.org\/10.1007\/s40869-017-0044-5","journal-title":"The Computer Games Journal"},{"issue":"2","key":"9740_CR76","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s10677-019-09998-2","volume":"22","author":"G Young","year":"2019","unstructured":"Young, G. (2019). An expressivist account of the difference between poor taste and immorality. Ethical Theory and Moral Practice, 22(2), 465\u2013482. https:\/\/doi.org\/10.1007\/s10677-019-09998-2","journal-title":"Ethical Theory and Moral Practice"},{"key":"9740_CR77","volume-title":"Race and mixed race","author":"N Zack","year":"1993","unstructured":"Zack, N. (1993). Race and mixed race. Temple University Press."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-023-09740-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-023-09740-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-023-09740-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T02:28:51Z","timestamp":1711160931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-023-09740-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,12]]},"references-count":79,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["9740"],"URL":"https:\/\/doi.org\/10.1007\/s10676-023-09740-8","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2024,1,12]]},"assertion":[{"value":"8 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"5"}}