Switch to: References

Add citations

You must login to add citations.
  1. From what to how: an initial review of publicly available AI ethics tools, methods and research to translate principles into practices.Jessica Morley, Luciano Floridi, Libby Kinsey & Anat Elhalal - 2020 - Science and Engineering Ethics 26 (4):2141-2168.
    The debate about the ethical implications of Artificial Intelligence dates from the 1960s :741–742, 1960; Wiener in Cybernetics: or control and communication in the animal and the machine, MIT Press, New York, 1961). However, in recent years symbolic AI has been complemented and sometimes replaced by Neural Networks and Machine Learning techniques. This has vastly increased its potential utility and impact on society, with the consequence that the ethical debate has gone mainstream. Such a debate has primarily focused on principles—the (...)
    Download  
     
    Export citation  
     
    Bookmark   87 citations  
  • A Virtue-Based Framework to Support Putting AI Ethics into Practice.Thilo Hagendorff - 2022 - Philosophy and Technology 35 (3):1-24.
    Many ethics initiatives have stipulated sets of principles and standards for good technology development in the AI sector. However, several AI ethics researchers have pointed out a lack of practical realization of these principles. Following that, AI ethics underwent a practical turn, but without deviating from the principled approach. This paper proposes a complementary to the principled approach that is based on virtue ethics. It defines four “basic AI virtues”, namely justice, honesty, responsibility and care, all of which represent specific (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Data Hazards as An Ethical Toolkit for Neuroscience.Susana Román García, Ceilidh Welsh, Nina H. Di Cara, David C. Sterratt, Nicola Romanò & Melanie I. Stefan - 2025 - Neuroethics 18 (1):1-21.
    The Data Hazards framework (Zelenka, Di Cara, & Contributors, 2024) is intended to encourage thinking about the ethical implications of data science projects. It takes the form of community-designed data hazard labels, similar to warning labels on chemicals, that can encourage reflection and discussion on what ethical risks are associated with a project and how they can be mitigated. In this article, we explain how the Data Hazards framework can apply to neuroscience. We demonstrate how the hazard labels can be (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
    Due to the technology of machine learning, new breakthroughs are currently being achieved with constant regularity. By using machine learning techniques, computer applications can be developed and used to solve tasks that have hitherto been assumed not to be solvable by computers. If these achievements consider applications that collect and process personal data, this is typically perceived as a threat to information privacy. This paper aims to discuss applications from both fields of personality and image analysis. These applications are often (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P., Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by Design (MHbD) model. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Ethics of Humanitarian Innovation: Mapping Values Statements and Engaging with Value-Sensitive Design.Lilia Brahimi, Gautham Krishnaraj, John Pringle, Lisa Schwartz, Dónal O’Mathúna & Matthew Hunt - 2023 - Canadian Journal of Bioethics / Revue canadienne de bioéthique 6 (2):1-10.
    The humanitarian sector continually faces organizational and operational challenges to respond to the needs of populations affected by war, disaster, displacement, and health emergencies. With the goal of improving the effectiveness and efficiency of response efforts, humanitarian innovation initiatives seek to develop, test, and scale a variety of novel and adapted practices, products, and systems. The innovation process raises important ethical considerations, such as appropriately engaging crisis-affected populations in defining problems and identifying potential solutions, mitigating risks, ensuring accountability, sharing benefits (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Semantic Web Regulatory Models: Why Ethics Matter.Pompeu Casanovas - 2015 - Philosophy and Technology 28 (1):33-55.
    The notion of validity fulfils a crucial role in legal theory. In the emerging Web 3.0, Semantic Web languages, legal ontologies, and normative multi-agent systems are designed to cover new regulatory needs. Conceptual models for complex regulatory systems shape the characteristic features of rules, norms, and principles in different ways. This article outlines one of such multilayered governance models, designed for the CAPER platform, and offers a definition of Semantic Web Regulatory Models . It distinguishes between normative-SWRM and institutional-SWRM. It (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information (...)
    Download  
     
    Export citation  
     
    Bookmark