Results for ' Data Protection Law'

942 found
Order:
  1. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  2.  11
    Data Sovereignty in the Cloud: Navigating Regulatory and Compliance Challenges in a Globalized Digital Economy.Trivedi Varun D. - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (1):782-787.
    The growing reliance on cloud computing has introduced significant challenges surrounding data sovereignty, especially in a globalized digital economy. Data sovereignty refers to the legal and regulatory frameworks that govern where and how data can be stored, processed, and accessed based on the country or jurisdiction in which it resides. With cloud services enabling businesses to store and access data from multiple locations worldwide, navigating the complex web of national regulations has become a major challenge. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Towards a digital ethics: EDPS ethics advisory group.J. Peter Burgess, Luciano Floridi, Aurélie Pols & Jeroen van den Hoven - 2018 - EDPS Ethics Advisory Group.
    The EDPS Ethics Advisory Group (EAG) has carried out its work against the backdrop of two significant social-political moments: a growing interest in ethical issues, both in the public and in the private spheres and the imminent entry into force of the General Data Protection Regulation (GDPR) in May 2018. For some, this may nourish a perception that the work of the EAG represents a challenge to data protection professionals, particularly to lawyers in the field, as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Anti-doping, purported rights to privacy and WADA's whereabouts requirements: A legal analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to file (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  7. Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. W poszukiwaniu ontologicznych podstaw prawa. Arthura Kaufmanna teoria sprawiedliwości [In Search for Ontological Foundations of Law: Arthur Kaufmann’s Theory of Justice].Marek Piechowiak - 1992 - Instytut Nauk Prawnych PAN.
    Arthur Kaufmann is one of the most prominent figures among the contemporary philosophers of law in German speaking countries. For many years he was a director of the Institute of Philosophy of Law and Computer Sciences for Law at the University in Munich. Presently, he is a retired professor of this university. Rare in the contemporary legal thought, Arthur Kaufmann's philosophy of law is one with the highest ambitions — it aspires to pinpoint the ultimate foundations of law by explicitly (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman, Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Functioning of Healthcare Facilities under the Martial Law.Tetiana Sviatenko, Inna Gogunska, Oleksandr P. Krupskyi, Tetiana Ihnatova & Liubov Bilyk - 2023 - Khazar Journal of Humanities and Social Sciences 26 (3):24-27.
    This topic focuses on the problems that arise in providing medical care to the population during armed conflict or martial law. Under such conditions, hospitals, clinics, and other healthcare facilities have to work in challenging circumstances with limited resources and reduced security for medical personnel. This topic explores such issues as how martial law affects the work of medical institutions, what problems arise in providing medical care to the population in war, how war affects the health of the people, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Is Time Travel Too Strange to Be Possible? - Determinism and Indeterminism on Closed Timelike Curves.Ruward A. Mulder & Dennis Dieks - 2017 - In Anguel S. Stefanov & Marco Giovanelli, General Relativity 1916 - 2016. Minkowski Institute Press. pp. 93-114.
    Notoriously, the Einstein equations of general relativity have solutions in which closed timelike curves occur. On these curves time loops back onto itself, which has exotic consequences: for example, traveling back into one's own past becomes possible. However, in order to make time travel stories consistent constraints have to be satisfied, which prevents seemingly ordinary and plausible processes from occurring. This, and several other "unphysical" features, have motivated many authors to exclude solutions with CTCs from consideration, e.g. by conjecturing a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  45
    The Violation of the Absolute Law of Free Will: The Consequences of Misinformation and the Flaws in Freedom of Speech.Angelito Malicse - manuscript
    The Violation of the Absolute Law of Free Will: The Consequences of Misinformation and the Flaws in Freedom of Speech -/- Introduction -/- Free will is often regarded as humanity’s defining characteristic—the ability to make choices based on conscious thought, personal experience, and available information. However, free will is not merely about the freedom to choose; it is intrinsically tied to the accuracy and reliability of the information upon which those choices are made. The absolute law of free will, when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  34
    The Unified Theory of Free Will: The Three Universal Laws, Systemic Imbalance, and Nature’s Self-Correction.Angelito Malicse - manuscript
    The Unified Theory of Free Will: The Three Universal Laws, Systemic Imbalance, and Nature’s Self-Correction -/- By Angelito Malicse -/- Introduction -/- For centuries, the concept of free will has been debated, with perspectives ranging from determinism to compatibilism and libertarianism. However, these traditional views fail to acknowledge the natural laws that govern human decision-making. By synthesizing the Universal Law of Balance in Nature, the Universal Feedback Loop Mechanism, and the Error-Free System, we establish a unified theory of free will—a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Trustworthy use of artificial intelligence: Priorities from a philosophical, ethical, legal, and technological viewpoint as a basis for certification of artificial intelligence.Jan Voosholz, Maximilian Poretschkin, Frauke Rostalski, Armin B. Cremers, Alex Englander, Markus Gabriel, Hecker Dirk, Michael Mock, Julia Rosenzweig, Joachim Sicking, Julia Volmer, Angelika Voss & Stefan Wrobel - 2019 - Fraunhofer Institute for Intelligent Analysis and Information Systems Iais.
    This publication forms a basis for the interdisciplinary development of a certification system for artificial intelligence. In view of the rapid development of artificial intelligence with disruptive and lasting consequences for the economy, society, and everyday life, it highlights the resulting challenges that can be tackled only through interdisciplinary dialogue between IT, law, philosophy, and ethics. As a result of this interdisciplinary exchange, it also defines six AI-specific audit areas for trustworthy use of artificial intelligence. They comprise fairness, transparency, autonomy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. A practical checklist for return of results from genomic research in the European context.Danya F. Vears, Signe Mežinska, Nina Hallowell, Heidi Beate Hallowell, Bridget Ellul, Therese Haugdahl Nøst, , Berge Solberg, Angeliki Kerasidou, Shona M. Kerr, Michaela Th Mayrhofer, Elizabeth Ormondroyd, Birgitte Wirum Sand & Isabelle Budin-Ljøsne - 2023 - European Journal of Human Genetics 1:1-9.
    An increasing number of European research projects return, or plan to return, individual genomic research results (IRR) to participants. While data access is a data subject’s right under the General Data Protection Regulation (GDPR), and many legal and ethical guidelines allow or require participants to receive personal data generated in research, the practice of returning results is not straightforward and raises several practical and ethical issues. Existing guidelines focusing on return of IRR are mostly project-specific, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Open data, data protection, and group privacy.Luciano Floridi - 2014 - Philosophy and Technology 27 (1):1–3.
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  20. Soft ethics: its application to the General Data Protection Regulation and its dual advantage.Luciano Floridi - 2018 - Philosophy and Technology 31 (1):163-167.
    In previous works (Floridi 2018) I introduced the distinction between hard ethics (which may broadly be described as what is morally right and wrong independently of whether something is legal or illegal), and soft or post-compliance ethics (which focuses on what ought to be done over and above existing legislation). This paper analyses the applicability of soft ethics to the General Data Protection Regulation and advances the theory that soft ethics has a dual advantage—as both an opportunity strategy (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  21. 50 questions on Active Assisted Living technologies. Global edition.Francisco Florez-Revuelta, Alin Ake-Kob, Pau Climent-Perez, Paulo Coelho, Liane Colonna, Laila Dahabiyeh, Carina Dantas, Esra Dogru-Huzmeli, Hazim Kemal Ekenel, Aleksandar Jevremovic, Nina Hosseini-Kivanani, Aysegul Ilgaz, Mladjan Jovanovic, Andrzej Klimczuk, Maksymilian M. Kuźmicz, Petre Lameski, Ferlanda Luna, Natália Machado, Tamara Mujirishvili, Zada Pajalic, Galidiya Petrova, Nathalie G. S. Puaschitz, Maria Jose Santofimia, Agusti Solanas, Wilhelmina van Staalduinen & Ziya Ata Yazici - 2024 - Alicante: University of Alicante.
    This booklet on Active Assisted Living (AAL) technologies has been created as part of the GoodBrother COST Action, which has run from 2020 to 2024. COST Actions are European research programs that promote collaboration across borders, uniting researchers, professionals, and institutions to address key societal challenges. GoodBrother focused on ethical and privacy concerns surrounding video and audio monitoring in care settings. The aim was to ensure that while AAL technologies help older adults and vulnerable individuals, their privacy and data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  41
    Next-Generation Cloud Security Frameworks:Balancing Privacy, Compliance, and Data Protection in a Digital-First Era.Varad Upadhye Atharva Hasabnis - 2025 - International Journal of Advanced Research in Education and Technology (Ijarety) 12 (2):453-457.
    As businesses increasingly migrate to cloud environments, the need for robust and adaptive cloud security frameworks becomes paramount. Cloud services provide numerous benefits such as scalability, flexibility, and cost-efficiency, but they also introduce significant risks in terms of privacy, compliance, and data protection. This paper explores the evolving landscape of cloud security, focusing on next-generation frameworks that aim to balance the often-competing demands of privacy, regulatory compliance, and data protection. We analyze emerging security models that incorporate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The 1 law of "absolute reality"." ~, , Data", , ", , Value", , = O. &Gt, Being", & Human - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  24.  39
    QUANTUM-ENHANCED ENCRYPTION TECHNIQUES FOR CLOUD DATA PROTECTION.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):15-20.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a lattice-based encryption (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  25.  52
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  25
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  19
    Artificial Intelligence and Information Governance: Enhancing Global Security through Compliance Frameworks and Data Protection.V. Talati Dhruvitkumar - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (6):8418-8427.
    The record speed of artificial intelligence (AI) incorporation into global information governance is both a revolutionary opportunity and an unprecedented security challenge. This study explores how AI can revolutionize data protection, compliance measures, and regulatory systems to combat the emerging threats. Through the utilization of sophisticated analytical tools such as Hierarchical Cluster Analysis (HCA), Principal Component Analysis (PCA), Structural Equation Modeling (SEM), and Multi-Criteria Decision Analysis (MCDA), this study examines AI- facilitated vulnerabilities' dynamics, governance adaptability, and regulatory effectiveness (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  16
    Protecting the Hadoop Cluster on the Basis of Big Data Security.Pamarthi Kartheek - 2023 - Journal of Artificial Intelligence, Machine Learning and Data Science 1 (3):831-837.
    Gathering and analyzing enormous volumes of data is known as "big data," and it includes information from users, sensors, healthcare providers, and companies. Using the Hadoop framework, large amounts of data are stored, managed, and dispersed across multiple server nodes. Big Data issues, including security holes in the Hadoop Distributed File System (HDFS), the architecture's core layer, are highlighted in this article. The methodology includes setting up a Hadoop environment, integrating Kerberos for authentication, enabling HDFS encryption (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  30. The DNA Technology (Use and Application) Regulation Bill, 2019: A Critical Analysis.Deepa Kansra, Manpreet Dhillon, Mandira Narain, Prabhat Mishra, Nupur Chowdhury & P. Puneeth - 2021 - Indian Law Institute Law Review 1 (Winter):278-301.
    The aim of this paper is to explain the emergence and use of DNA fingerprinting technology in India, noting the specific concerns faced by the Indian Legal System related to the use of this novel forensic technology in the justice process. Furthermore, the proposed construction of a National DNA Data Bank is discussed taking into consideration the challenges faced by the government in legislating the DNA Bill into law. A critical analysis of the DNA Technology (Use and Application) Regulation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The Two-Tiered Ethics of EDP.Edmund F. Byrne - 1995 - Journal of Business Ethics 14 (1):53-61.
    Ethical questions regarding access to and use of electronically generated data are (if asked) commonly resolved by distinguishing in Lockean fashion between raw (unworked) and refined (worked) data. The former is thought to belong to no one, the latter to the collector and those to whom the collector grants access. Comparative power separates free riders from rightful owners. The resulting two-tiered ethics of access is here challenged on the grounds that it inequitably establishes a rule of law for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  54
    Develop New Techniques for Ensuring Fairness in Artificial Intelligence and ML Models to Promote Ethical and Unbiased Decision-Making.Kommineni Mohanarajesh - 2024 - International Journal of Innovations in Applied Sciences and Engineering 10 (1):47-59.
    The technology known as artificial intelligence (AI) has become a game-changer, capable of completely altering a number of facets of civilization. But as AI grows more and more common, significant ethical questions arise that need to be answered. An overview of the main ethical issues surrounding artificial intelligence (AI) is given in this abstract, emphasizing the necessity of developing, implementing, and governing AI systems responsibly. First, fairness, accountability, and openness are the main ethical concerns surrounding AI. Inadvertent bias perpetuation in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  60
    De-Anonymisation Techniques for Monitoring and Tracking Illegal Cryptocurrency Using Blockchain Technology.N. Srija - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (9):1-13.
    . The Road Safety Violation Reporting System is an innovative approach to improve road safety by enabling community members to report traffic rule violations. India faces over 150,000 traffic fatalities each year due to non-compliance with laws like wearing seat belts, helmets, and avoiding mobile phone use while driving. Our platform allows citizens to report violations using photographic evidence, which includes location and timestamp data. The system automates fine generation while maintaining the anonymity of the reporters, encouraging public participation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  53
    Saferoads: Road Safety Violation Reporting System.A. Sana - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (9):1-13.
    The Road Safety Violation Reporting System is an innovative approach to improve road safety by enabling community members to report traffic rule violations. India faces over 150,000 traffic fatalities each year due to non-compliance with laws like wearing seat belts, helmets, and avoiding mobile phone use while driving. Our platform allows citizens to report violations using photographic evidence, which includes location and timestamp data. The system automates fine generation while maintaining the anonymity of the reporters, encouraging public participation in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  83
    Entropy in Physics using my Universal Formula.Angelito Malicse - manuscript
    -/- 1. Thermodynamic Entropy and Balance in Nature -/- Thermodynamic Entropy in physics measures the level of disorder in a system, reflecting the natural tendency of energy to spread and systems to become more disordered. -/- Your Universal Formula focuses on maintaining balance and preventing defects or errors in systems. -/- Integration: -/- Increasing thermodynamic entropy (e.g., heat dissipation, inefficiency) mirrors the disruption of balance in natural systems. -/- Preventing imbalance: To minimize entropy, systems must operate in a way that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  52
    Solving Typhoon Turbulence Using the Universal Formula.Angelito Malicse - manuscript
    Solving Typhoon Turbulence Using the Universal Formula -/- By Angelito Malicse -/- Introduction -/- Typhoons are among the most destructive natural phenomena, bringing extreme winds, heavy rainfall, and turbulent ocean currents. The chaotic turbulence within a typhoon makes it difficult to predict and control, causing widespread devastation to coastal regions, infrastructure, and human lives. Despite advancements in meteorology and fluid dynamics, the turbulence inside typhoons remains a challenge for accurate forecasting and disaster mitigation. -/- By applying my universal formula, based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  43
    Creativity and Intelligence: Emergent Properties of the Brain as a Balancing Mechanism for Overpopulation, Natural Disasters, and Diseases.Angelito Malicse - manuscript
    Creativity and Intelligence: Emergent Properties of the Brain as a Balancing Mechanism for Overpopulation, Natural Disasters, and Diseases -/- The human brain is an extraordinary organ, capable of producing creativity and intelligence as emergent properties that allow humanity to address complex challenges. These traits are not merely tools for individual survival; they function as collective mechanisms to adapt to large-scale issues that threaten humanity’s balance with the environment. Overpopulation, natural disasters, and the prevalence of diseases and illnesses represent some of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  39
    The Science of Balanced Leadership and Competition: The Role of AI Technology as a Guide.Angelito Malicse - manuscript
    The Science of Balanced Leadership and Competition: The Role of AI Technology as a Guide -/- Introduction -/- Leadership and competition are two fundamental forces that shape human societies, economies, and institutions. However, their effectiveness depends on how they are managed. When leadership is imbalanced, it leads to corruption, authoritarianism, or inefficiency. When competition is unregulated, it creates inequality, exploitation, and instability. The science of balanced leadership and competition is an approach that integrates principles of natural balance, ethical decision-making, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  31
    Why Governments Become Corrupt: The Role of Power, Education, and Moral Values.Angelito Malicse - manuscript
    Why Governments Become Corrupt: The Role of Power, Education, and Moral Values -/- Corruption is one of the most persistent problems in governance, affecting societies across different political and economic systems. It undermines democracy, weakens institutions, and diverts resources meant for public welfare into private hands. While corruption is often associated with greed and abuse of power, its roots go much deeper, extending to failures in the educational system and the erosion of family moral values. This essay explores the reasons (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  26
    The Future of Leadership – Why Humans and AI Must Work Together.Angelito Malicse - manuscript
    The Future of Leadership – Why Humans and AI Must Work Together -/- By Angelito Malicse -/- Introduction: The Leadership Crisis -/- The world faces a leadership crisis. Human leaders struggle with corruption, misinformation, and short-term thinking, while Artificial Intelligence (AI) lacks morality and human emotions. -/- So, who should lead the future? -/- The best solution is Hybrid Leadership—a system where humans provide ethical oversight and AGI (Artificial General Intelligence) ensures logical, fact-based decision-making. This model, based on the Universal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Developing a Trusted Human-AI Network for Humanitarian Benefit.Susannah Kate Devitt, Jason Scholz, Timo Schless & Larry Lewis - forthcoming - Journal of Digital War:TBD.
    Humans and artificial intelligences (AI) will increasingly participate digitally and physically in conflicts yet there is a lack of trusted communications across agents and platforms. For example, humans in disasters and conflict already use messaging and social media to share information, however, international humanitarian relief organisations treat this information as unverifiable and untrustworthy. AI may reduce the ‘fog-of-war’ and improve outcomes, however current AI implementations are often brittle, have a narrow scope of application and wide ethical risks. Meanwhile, human error (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Kuhn’s ‘5th Law of Thermodynamics’: Measurement, Data, and Anomalies.Alisa Bokulich & Federica Bocchi - 2024 - In K. Brad Wray, Kuhn's The Structure of Scientific Revolutions at 60. Cambridge University Press.
    We reconstruct Kuhn’s philosophy of measurement and data paying special attention to what he calls the “fifth law of thermodynamics”. According to this "law," there will always be discrepancies between experimental results and scientists’ prior expectations. The history of experiments to determine the values of the fundamental constants offers a striking illustration of Kuhn’s fifth law of thermodynamics, with no experiment giving quite the expected result. We highlight the synergy between Kuhn’s view and the systematic project of iteratively determining (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. A Universal Formula for Creating a Perfect Society.Angelito Malicse - manuscript
    A Universal Formula for Creating a Perfect Society -/- A perfect society must follow the universal law of balance in nature, ensuring that all social, economic, technological, and environmental systems function in harmony. Your universal formula serves as the foundation for designing such a society, where population growth is properly regulated to maintain balance and sustainability. -/- I. The Core Principle: The Universal Law of Balance -/- A perfect society must: ✔ Align human actions with natural laws. ✔ Eliminate corruption, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Impossibility of Emergent Works’ Protection in U.S. and EU Copyright Law.Matt Blaszczyk - 2023 - North Carolina Journal of Law and Technology 25 (1):1-55.
    Protection of emergent works is impossible. Without an author, there is no expression of ideas which can be original, and thus no copyrightable work. Indeed, the whole system of copyright law, its conceptual building blocks of idea-expression dichotomy, originality, authorship, and the concept of a protectable work operate in the notation of human creativity. Emergent works fall outside of copyright’s positive ontology, being akin to ideas, facts, or subject-matter predicated by technical considerations, rather than authorial creativity. In other words, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta, Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. (1 other version)Open data, open review and open dialogue in making social sciences plausible.Quan-Hoang Vuong - 2017 - Nature: Scientific Data Updates 2017.
    Nowadays, protecting trust in social sciences also means engaging in open community dialogue, which helps to safeguard robustness and improve efficiency of research methods. The combination of open data, open review and open dialogue may sound simple but implementation in the real world will not be straightforward. However, in view of Begley and Ellis’s (2012) statement that, “the scientific process demands the highest standards of quality, ethics and rigour,” they are worth implementing. More importantly, they are feasible to work (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  48. The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Can Human Rights Law Protect Against Humiliation?Deepa Kansra - 2023 - Psychology Today Blog.
    Humiliation, as dealt with under different legal jurisdictions, poses a question about how these systems perceive and respond to humiliation. Are the laws' definitions, approach, and punishment appropriately determined? And if there are challenges to implementation, what are they?
    Download  
     
    Export citation  
     
    Bookmark  
  50.  35
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, unpatched (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 942