{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T21:05:46Z","timestamp":1772312746729,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001652","name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001652","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>It has been argued that our concepts can be disrupted or challenged by technology or normative concerns, which raises the question of whether we can create, design, engineer, or define more robust concepts that avoid counterexamples and conceptual challenges that can lead to conceptual disruption. In this paper, it is argued that we can. This argument is presented through a case study of a definition in the technological domain.<\/jats:p>","DOI":"10.1007\/s10676-024-09767-5","type":"journal-article","created":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T05:01:51Z","timestamp":1715317311000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Undisruptable or stable concepts: can we design concepts that can avoid conceptual disruption, normative critique, and counterexamples?"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5830-3432","authenticated-orcid":false,"given":"Bj\u00f6rn","family":"Lundgren","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,10]]},"reference":[{"key":"9767_CR1","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF00989671","volume":"72","author":"N Belnap","year":"1993","unstructured":"Belnap, N. (1993). On rigorous definitions. Philosophical Studies, 72, 115\u2013146. https:\/\/doi.org\/10.1007\/BF00989671.","journal-title":"Philosophical Studies"},{"key":"9767_CR2","doi-asserted-by":"crossref","unstructured":"Cappelen, H. (2018). Fixing language: an essay on conceptual engineering. First edition. Oxford, United Kingdom; New York, NY: Oxford University Press.","DOI":"10.1093\/oso\/9780198814719.001.0001"},{"key":"9767_CR3","unstructured":"Carnap, R. (1950). Logical foundations of probability. University of Chicago Press."},{"key":"9767_CR4","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10676-010-9235-5","volume":"12","author":"M Coeckelbergh","year":"2010","unstructured":"Coeckelbergh, M. (2010). Robot rights? Towards a social-relational justification of moral consideration. Ethics and Information Technology, 12, 209\u2013221. https:\/\/doi.org\/10.1007\/s10676-010-9235-5.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9767_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.5325\/jpoststud.3.1.0005","volume":"3","author":"J Danaher","year":"2019","unstructured":"Danaher, J. (2019). The philosophical case for Robot Friendship. Journal of Posthuman Studies, 3(1), 5\u201324. https:\/\/doi.org\/10.5325\/jpoststud.3.1.0005.","journal-title":"Journal of Posthuman Studies"},{"key":"9767_CR6","doi-asserted-by":"crossref","unstructured":"Dummett, M. (1996). The seas of Language. Oxford University Press.","DOI":"10.1093\/0198236212.001.0001"},{"key":"9767_CR7","doi-asserted-by":"crossref","unstructured":"Fodor, J. A. (1987). Psychosemantics: The problem of meaning in the philosophy of mind. MIT Press.","DOI":"10.7551\/mitpress\/5684.001.0001"},{"key":"9767_CR8","unstructured":"Gutwirth, S. (2001). Privacy and the information age. Rowman & Littlefield."},{"key":"9767_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1111\/0029-4624.00201","volume":"34","author":"S Haslanger","year":"2000","unstructured":"Haslanger, S. (2000). Gender and race: (what) are they? (what) do we want them to be? No\u00fbs, 34, 31\u201355. https:\/\/doi.org\/10.1111\/0029-4624.00201.","journal-title":"No\u00fbs"},{"issue":"6","key":"9767_CR10","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1177\/1745691617702496","volume":"12","author":"R Hertwig","year":"2017","unstructured":"Hertwig, R., & Gr\u00fcne-Yanoff, T. (2017). Nudging and boosting: Steering or empowering good decisions. Perspectives on Psychological Science, 12(6), 973\u2013986. https:\/\/doi.org\/10.1177\/1745691617702496.","journal-title":"Perspectives on Psychological Science"},{"key":"9767_CR11","doi-asserted-by":"publisher","first-page":"101750","DOI":"10.1016\/j.techsoc.2021.101750","volume":"67","author":"J Hopster","year":"2021","unstructured":"Hopster, J. (2021). What are socially disruptive technologies? Technology in Society, 67, 101750. https:\/\/doi.org\/10.1016\/j.techsoc.2021.101750.","journal-title":"Technology in Society"},{"key":"9767_CR12","unstructured":"ISO\/IEC 27000 (2016). Information technology\u2013Security techniques\u2013Information security management systems\u2013Overview and vocabulary. https:\/\/www.iso.org\/standard\/66435.html."},{"key":"9767_CR13","doi-asserted-by":"publisher","unstructured":"Kitsik, E. (2022). Epistemic paternalism via conceptual Engineering. Journal of the American Philosophical Association, 1\u201320. https:\/\/doi.org\/10.1017\/apa.2022.22.","DOI":"10.1017\/apa.2022.22"},{"key":"9767_CR16","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1007\/s10677-022-10321-9","volume":"25","author":"G L\u00f6hr","year":"2022","unstructured":"L\u00f6hr, G. (2022). Linguistic interventions and the Ethics of conceptual disruption. Ethical Theory and Moral Practice, 25, 835\u2013849. https:\/\/doi.org\/10.1007\/s10677-022-10321-9.","journal-title":"Ethical Theory and Moral Practice"},{"key":"9767_CR17","doi-asserted-by":"publisher","first-page":"102160","DOI":"10.1016\/j.techsoc.2022.102160","volume":"72","author":"G L\u00f6hr","year":"2023","unstructured":"L\u00f6hr, G. (2023). Do socially disruptive technologies really change our concepts or just our conceptions? Technology in Society, 72, 102160. https:\/\/doi.org\/10.1016\/j.techsoc.2022.102160.","journal-title":"Technology in Society"},{"key":"9767_CR14","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s10892-019-09316-z","volume":"24","author":"B Lundgren","year":"2020","unstructured":"Lundgren, B. (2020). A dilemma for privacy as control. Journal of Ethics, 24, 165\u2013175. https:\/\/doi.org\/10.1007\/s10892-019-09316-z.","journal-title":"Journal of Ethics"},{"key":"9767_CR15","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s11948-017-9992-1","volume":"25","author":"B Lundgren","year":"2019","unstructured":"Lundgren, B., & M\u00f6ller, N. (2019). Defining Information Security. Science & Engineering Ethics, 25, 419\u2013441. https:\/\/doi.org\/10.1007\/s11948-017-9992-1.","journal-title":"Science & Engineering Ethics"},{"issue":"3","key":"9767_CR18","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11158-021-09521-4","volume":"27","author":"J Mainz","year":"2021","unstructured":"Mainz, J. (2021). An indirect argument for the Access theory of privacy. Res Publica, 27(3), 309\u2013328. https:\/\/doi.org\/10.1007\/s11158-021-09521-4.","journal-title":"Res Publica"},{"key":"9767_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s10676-024-09749-7","volume":"26","author":"S Marchiori","year":"2024","unstructured":"Marchiori, S., & Scharp, K. (2024). What is conceptual disruption? Ethics and Information Technology, 26, 18. https:\/\/doi.org\/10.1007\/s10676-024-09749-7.","journal-title":"Ethics and Information Technology"},{"key":"9767_CR20","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1111\/j.1468-0068.2007.00663.x","volume":"41","author":"E Margolis","year":"2007","unstructured":"Margolis, E. (2007). S. Laurence (Ed.), The Ontology of concepts\u2014Abstract objects or Mental representations? No\u00fbs 41 561\u2013593 https:\/\/doi.org\/10.1111\/j.1468-0068.2007.00663.x.","journal-title":"No\u00fbs"},{"key":"9767_CR21","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s10892-020-09351-1","volume":"25","author":"LA Menges","year":"2021","unstructured":"Menges, L. A. (2021). Defense of privacy as control. Journal of Ethics, 25, 385\u2013402. https:\/\/doi.org\/10.1007\/s10892-020-09351-1.","journal-title":"Journal of Ethics"},{"key":"9767_CR22","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H. F. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford.","DOI":"10.1515\/9780804772891"},{"key":"9767_CR23","doi-asserted-by":"publisher","first-page":"2169","DOI":"10.1007\/s11948-019-00172-6","volume":"26","author":"S Nyholm","year":"2020","unstructured":"Nyholm, S., & Smids, J. (2020). Can a Robot be a good colleague? Science and Engineering Ethics, 26, 2169\u20132188. https:\/\/doi.org\/10.1007\/s11948-019-00172-6.","journal-title":"Science and Engineering Ethics"},{"key":"9767_CR24","unstructured":"Orwell, G. (1949). Nineteen eighty-four. Secker & Warburg."},{"key":"9767_CR25","doi-asserted-by":"crossref","unstructured":"Peacocke, C. (1992). A study of concepts. MIT Press.","DOI":"10.7551\/mitpress\/6537.001.0001"},{"key":"9767_CR26","doi-asserted-by":"publisher","DOI":"10.1080\/0020174X.2018.1562374","author":"P-M. C Podosky","year":"2018","unstructured":"Podosky, P. P-M. C. (2018). Ideology and normativity: Constraints on conceptual engineering. Inquiry : A Journal of Medical Care Organization, Provision and Financing. https:\/\/doi.org\/10.1080\/0020174X.2018.1562374.","journal-title":"Inquiry : A Journal of Medical Care Organization, Provision and Financing"},{"key":"9767_CR27","doi-asserted-by":"publisher","unstructured":"Rainey, S. Friends, robots, & citizens? (2016). SIGCAS Comput. Soc. 45, 3 (September 2015), 225\u2013233. https:\/\/doi.org\/10.1145\/2874239.2874271.","DOI":"10.1145\/2874239.2874271"},{"key":"9767_CR28","unstructured":"Solove, D. J. (2008). Understanding privacy. Harvard University Press."},{"key":"9767_CR29","unstructured":"Thaler, R. H., & Sunstein, C. R. (2021). Nudge: the final edition (Updated edition). New York: Penguin Books."},{"key":"9767_CR30","doi-asserted-by":"publisher","unstructured":"Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review IV, (5), 193\u2013220. https:\/\/doi.org\/10.2307\/1321160.","DOI":"10.2307\/1321160"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-024-09767-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-024-09767-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-024-09767-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T14:46:45Z","timestamp":1731941205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-024-09767-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,10]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["9767"],"URL":"https:\/\/doi.org\/10.1007\/s10676-024-09767-5","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,10]]},"assertion":[{"value":"10 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publish"}},{"value":"I have no competing interests to declare.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"33"}}