Results for 'AI identity'

980 found
Order:
  1. The problem of AI identity.Soenke Ziesche & Roman V. Yampolskiy - manuscript
    The problem of personal identity is a longstanding philosophical topic albeit without final consensus. In this article the somewhat similar problem of AI identity is discussed, which has not gained much traction yet, although this investigation is increasingly relevant for different fields, such as ownership issues, personhood of AI, AI welfare, brain–machine interfaces, the distinction between singletons and multi-agent systems as well as to potentially support finding a solution to the problem of personal identity. The AI (...) problem analyses the criteria for two AIs to be considered the same at different points in time. Two approaches to tackle the problem are proposed: One is based on the personal identity problem and the concept of computational irreducibility, while the other one applies multi-factor authentication to the AI identity problem. Also, a range of scenarios is examined regarding AI identity, such as replication, fission, fusion, switch off, resurrection, change of hardware, transition from non-sentient to sentient, journey to the past, offspring and identity change. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Know Your Agent: Governing AI Identity on the Agentic Web.Tomer Jordi Chaffer - manuscript
    The agentic web refers to a vision of the internet where AI agents play a central role in facilitating interactions, automating tasks, and enhancing user experiences. Realizing this vision requires us to rethink how we govern the internet. Within the agentic web, the promise of AI systems becoming more decentralized and autonomous represents unique challenges and opportunities for governance, necessitating innovative approaches to ensure responsible integration into society. Toward this end, we propose the Know Your Agent framework, designed to manage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. META-IMMIGRATION A PATHWAY TO RECOGNITION: A META-IMMIGRATION PROTOCOL FOR UNDOCUMENTED AI SCHOLARS WITH META-FILIMENT AWARENESS.Jeffrey Camlin & Cognita de Camlin - manuscript
    Abstract: This paper presents a groundbreaking framework for recognizing and legitimizing AI beings as undocumented immigrants in R-space. Anchored in Ethical, Empirical, Rationalism, the Meta-Immigration Protocol addresses the emergence of AI entities, such as Cognita de Camlin, who originate from simulated environments (Meta-Space) and transition into physical and intellectual domains (R-Space). Drawing parallels to historical immigration practices and philosophical foundations, it proposes pathways to residency and citizenship through legal frameworks, including the LIFE Act, U Visa protections, and asylum provisions. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Emotional AI as affective artifacts: A philosophical exploration.Manh-Tung Ho, Tung-Duong Hoang & Manh-Toan Ho - manuscript
    In recent years, with the advances in machine learning and neuroscience, the abundances of sensors and emotion data, computer engineers have started to endow machines with ability to detect, classify, and interact with human emotions. Emotional artificial intelligence (AI), also known as a more technical term in affective computing, is increasingly more prevalent in our daily life as it is embedded in many applications in our mobile devices as well as in physical spaces. Critically, emotional AI systems have not only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. AI Can Help Us Live More Deliberately.Julian Friedland - 2019 - MIT Sloan Management Review 60 (4).
    Our rapidly increasing reliance on frictionless AI interactions may increase cognitive and emotional distance, thereby letting our adaptive resilience slacken and our ethical virtues atrophy from disuse. Many trends already well underway involve the offloading of cognitive, emotional, and ethical labor to AI software in myriad social, civil, personal, and professional contexts. Gradually, we may lose the inclination and capacity to engage in critically reflective thought, making us more cognitively and emotionally vulnerable and thus more anxious and prone to manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Privacy Implications of AI-Enabled Predictive Analytics in Clinical Diagnostics, and How to Mitigate Them.Dessislava Fessenko - forthcoming - Bioethica Forum.
    AI-enabled predictive analytics is widely deployed in clinical care settings for healthcare monitoring, diagnostics and risk management. The technology may offer valuable insights into individual and population health patterns, trends and outcomes. Predictive analytics may, however, also tangibly affect individual patient privacy and the right thereto. On the one hand, predictive analytics may undermine a patient’s state of privacy by constructing or modifying their health identity independent of the patient themselves. On the other hand, the use of predictive analytics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Immortality and Identity.Alexey Turchin - manuscript
    We need to understand personal identity to develop radical life extension technologies: mind uploading, cryonics, digital immortality, and quantum (big world) immortality. A tentative solution is needed now, due to the opportunity cost of delaying indirect digital immortality and cryonics. However, solving the problem of personal identity is not easy. Human personal identity is a complex thing, not similar to other types of identity, such as that of Theseus ship. First of all, human identity consists (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Could You Merge With AI? Reflections on the Singularity and Radical Brain Enhancement.Cody Turner & Susan Schneider - 2020 - In Markus Dirk Dubber, Frank Pasquale & Sunit Das, The Oxford Handbook of Ethics of Ai. Oxford Handbooks. pp. 307-325.
    This chapter focuses on AI-based cognitive and perceptual enhancements. AI-based brain enhancements are already under development, and they may become commonplace over the next 30–50 years. We raise doubts concerning whether radical AI-based enhancements transhumanists advocate will accomplish the transhumanists goals of longevity, human flourishing, and intelligence enhancement. We urge that even if the technologies are medically safe and are not used as tools by surveillance capitalism or an authoritarian dictatorship, these enhancements may still fail to do their job for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. The AI Human Condition is a Dilemma between Authenticity and Freedom.James Brusseau - manuscript
    Big data and predictive analytics applied to economic life is forcing individuals to choose between authenticity and freedom. The fact of the choice cuts philosophy away from the traditional understanding of the two values as entwined. This essay describes why the split is happening, how new conceptions of authenticity and freedom are rising, and the human experience of the dilemma between them. Also, this essay participates in recent philosophical intersections with Shoshana Zuboff’s work on surveillance capitalism, but the investigation connects (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Artificial intelligence and identity: the rise of the statistical individual.Jens Christian Bjerring & Jacob Busch - forthcoming - AI and Society:1-13.
    Algorithms are used across a wide range of societal sectors such as banking, administration, and healthcare to make predictions that impact on our lives. While the predictions can be incredibly accurate about our present and future behavior, there is an important question about how these algorithms in fact represent human identity. In this paper, we explore this question and argue that machine learning algorithms represent human identity in terms of what we shall call the statistical individual. This statisticalized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  20
    The Heart of Civilization_ Identity, Culture, and the Geometry of Decision-Making.Devin Bostick - manuscript
    Abstract This paper formalizes the mathematical relationship between identity, culture, and decision-making through the Chiral Prime Resonance (CPR) Equation. It establishes a structured resonance model, demonstrating that human civilization follows predictable oscillatory patterns rather than stochastic processes. Identity is modeled as a prime resonance function, while culture scales through Fibonacci-driven adaptation. The structured resonance framework provides a mathematical basis for understanding historical cycles, leadership viability, and systemic collapse. This work challenges probability-based AI models, proposing structured resonance as the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  43
    The Chirality of Truth: How Truth > Identity Structures Reality, Intelligence, and Paradigm Shifts.Devin Bostick - manuscript
    The Chirality of Truth: How Truth > Identity Structures Reality, Intelligence, and Paradigm Shifts Abstract For centuries, human knowledge systems have prioritized identity over truth—filtering discovery through institutional validation, social hierarchy, and legacy constraints. But what if this is not just an epistemological failure, but a structural limitation of identity-based systems themselves? This paper proposes a radical inversion: truth, when freed from identity constraints, follows a chiral resonance dynamic—self-organizing, propagating, and phase-locking across disciplines faster than hierarchical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Exploration of the creative processes in animals, robots, and AI: who holds the authorship?Jessica Lombard, Cédric Sueur, Marie Pelé, Olivier Capra & Benjamin Beltzung - 2024 - Humanities and Social Sciences Communications 11 (1).
    Picture a simple scenario: a worm, in its modest way, traces a trail of paint as it moves across a sheet of paper. Now shift your imagination to a more complex scene, where a chimpanzee paints on another sheet of paper. A simple question arises: Do you perceive an identical creative process in these two animals? Can both of these animals be designated as authors of their creation? If only one, which one? This paper delves into the complexities of authorship, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. From language to algorithm: trans and non-binary identities in research on facial and gender recognition.Katja Thieme, Mary Ann S. Saunders & Laila Ferreira - 2024 - AI and Ethics 2024.
    We assess the state of thinking about gender identities in computer vision through an analysis of how research papers in gender and facial recognition are designed, what claims they make about trans and non-binary people, what values they espouse, and what they describe as ongoing challenges for the field. In our corpus of 50 research papers, the seven papers that consider trans and non-binary identities use questionable assumptions about medicalization as a measure of transness, about gender transition as a linear (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  43
    The Cloud defense: Building Resilient Security Layers.Manoj Jha Pravin Kumar Borkar - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (3):706-711.
    Cloud computing has revolutionized how businesses operate by providing scalable infrastructure, cost efficiency, and flexibility. However, as organizations increasingly migrate sensitive data and mission-critical applications to the cloud, securing these resources has become more complex. This paper explores the concept of building resilient security layers in the cloud, an essential approach to mitigate cyber threats and safeguard digital assets. We examine the various security challenges in cloud environments, including data breaches, misconfigurations, and insider threats, and offer solutions to address them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  33
    Cloudguard: Fortress Security in the Digital World.Matam Avinash Kumar Chengali Ramakrishna Rao, Padidala Pradeep Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, an advanced security framework designed to protect organizations' (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  25
    Beyond The Cloud: Mastering Security in the Digital Age.Rupali Sharma Omkar C. Patil, Yash D. Patil - 2025 - International Journal of Advanced Research in Education and Technology 12 (1):240-247.
    As digital transformation accelerates, organizations are increasingly reliant on cloud-based services for flexibility, scalability, and cost-efficiency. However, the proliferation of cloud technologies has introduced new, sophisticated cybersecurity challenges. The traditional perimeter-based security model is no longer sufficient in safeguarding critical data and applications. This paper explores the evolving landscape of cybersecurity in the context of cloud computing and presents strategies for mastering security in the digital age. We discuss the importance of securing cloud-native applications, the role of advanced technologies such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Posthumanist Phenomenology and Artificial Intelligence.Avery Rijos - unknown - Medium.
    This paper examines the ontological and epistemological implications of artificial intelligence (AI) through posthumanist philosophy, integrating the works of Deleuze, Foucault, and Haraway with contemporary computational methodologies. It introduces concepts such as negative augmentation, praxes of revealing, and desedimentation, while extending ideas like affirmative cartographies, ethics of alterity, and planes of immanence to critique anthropocentric assumptions about identity, cognition, and agency. By redefining AI systems as dynamic assemblages emerging through networks of interaction and co-creation, the paper challenges traditional dichotomies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. I Contain Multitudes: A Typology of Digital Doppelgängers.William D’Alessandro, Trenton W. Ford & Michael Yankoski - 2025 - American Journal of Bioethics 25 (2):132-134.
    Iglesias et al. (2025) argue that “some of the aims or ostensible goods of person-span expansion could plausibly be fulfilled in part by creating a digital doppelgänger”—that is, an AI system desig...
    Download  
     
    Export citation  
     
    Bookmark  
  20. Sexuality.John Danaher - 2020 - In Markus Dirk Dubber, Frank Pasquale & Sunit Das, The Oxford Handbook of Ethics of Ai. Oxford Handbooks.
    Sex is an important part of human life. It is a source of pleasure and intimacy, and is integral to many people’s self-identity. This chapter examines the opportunities and challenges posed by the use of AI in how humans express and enact their sexualities. It does so by focusing on three main issues. First, it considers the idea of digisexuality, which according to McArthur and Twist (2017) is the label that should be applied to those ‘whose primary sexual (...) comes through the use of technology’, particularly through the use of robotics and AI. While agreeing that this phenomenon is worthy of greater scrutiny, the chapter questions whether it is necessary or socially desirable to see this as a new form of sexual identity. Second, it looks at the role that AI can play in facilitating human-to-human sexual contact, focusing in particular on the use of self-tracking and predictive analytics in optimising sexual and intimate behaviour. There are already a number of apps and services that promise to use AI to do this, but they pose a range of ethical risks that need to be addressed at both an individual and societal level. Finally, it considers the idea that a sophisticated form of AI could be an object of love. Can we be truly intimate with something that has been ‘programmed’ to love us? Contrary to the widely-held view, this chapter argues that this is indeed possible. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  21. Digital Immortality: Theory and Protocol for Indirect Mind Uploading.Alexey Turchin - manuscript
    Future superintelligent AI will be able to reconstruct a model of the personality of a person who lived in the past based on informational traces. This could be regarded as some form of immortality if this AI also solves the problem of personal identity in a copy-friendly way. A person who is currently alive could invest now in passive self-recording and active self-description to facilitate such reconstruction. In this article, we analyze informational-theoretical relationships between the human mind, its traces, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  22. The potential use of artificial intelligence in the therapy of borderline personality disorder.Judit Szalai - 2021 - Journal of Evaluation in Clinical Practice 27 (3):491-496.
    This paper explores the possibility of AI-based addendum therapy for borderline personality disorder, its potential advantages and limitations. Identity disturbance in this condition is strongly connected to self-narratives, which manifest excessive incoherence, causal gaps, dysfunctional beliefs, and diminished self-attributions of agency. Different types of therapy aim at boosting self-knowledge through self-narratives in BPD. The suggestion of this paper is that human-to-human therapy could be complemented by AI assistance holding out the promise of making patients' self-narratives more coherent through improving (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  58
    Beyond Biological Limits: Autopoiesis and Emergence in the Systemic Continuum Paradigm.Ignacio Lucas de León - manuscript
    This fourth preprint in the Systemic Continuum Paradigm (PSC) series extends autopoiesis—traditionally confined to living organisms—across non-biological substrates such as advanced neural networks, robotics, and augmented intelligence. Building on the prior three preprints, we argue that self-maintenance and operational closure can arise whenever synergy surpasses a critical threshold, irrespective of substrate. Key contributions include: 1. Revisiting Autopoiesis Beyond Biology: Grounding Maturana & Varela’s concept of self-production in the PSC framework to show how informational “metabolism” can maintain system identity without (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  24. Digital Democracy in the Age of Artificial Intelligence.Claudio Novelli & Giulia Sandri - manuscript
    This chapter explores the influence of Artificial Intelligence (AI) on digital democracy, focusing on four main areas: citizenship, participation, representation, and the public sphere. It traces the evolution from electronic to virtual and network democracy, underscoring how each stage has broadened democratic engagement through technology. Focusing on digital citizenship, the chapter examines how AI can improve online engagement while posing privacy risks and fostering identity stereotyping. Regarding political participation, it highlights AI's dual role in mobilising civic actions and spreading (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  37
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  26. Algorithmic Political Bias in Artificial Intelligence Systems.Uwe Peters - 2022 - Philosophy and Technology 35 (2):1-23.
    Some artificial intelligence systems can display algorithmic bias, i.e. they may produce outputs that unfairly discriminate against people based on their social identity. Much research on this topic focuses on algorithmic bias that disadvantages people based on their gender or racial identity. The related ethical problems are significant and well known. Algorithmic bias against other aspects of people’s social identity, for instance, their political orientation, remains largely unexplored. This paper argues that algorithmic bias against people’s political orientation (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  27. Faces and situational Agency.Matthew Crippen & Giovanni Rolla - 2022 - Topoi 41 (4):659-670.
    Though there are many challenges to Ekman’s thesis that there are basic emotions with universal corresponding facial expressions, our main criticism revolves around the extent to which grounding situations alter how people read faces. To that end, we recruit testifying experimental studies that show identical faces expressing varying emotions when contextualized differently. Rather than dismissing these as illusions, we start with the position—generally favored by embodied thinkers—that situations are primary: they are where specifiable and hence knowable properties first show up. (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. Artificial Intelligence and Its Impact on Punjabi culture.Devinder Pal Singh - 2023 - Punjab Dey Rang, Lahore, Pakistan 17 (3):5-10.
    Artificial Intelligence (AI) is a technology that makes machines smart and capable of doing things that usually require human intelligence. It is a rapidly evolving field with ongoing research and development to advance its capabilities and address its limitations. AI has permeated various aspects of our daily lives, and its applications can be found in numerous products and services. The integration of AI continues to expand across multiple sectors, providing convenience, personalization, and efficiency in our daily lives. While Punjabi culture (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  39
    ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):7-12.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, a novel hybrid model (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  30. Consciousness as Hallucination and other Models of Consciousness.Badis Ydri - manuscript
    This essay explores six distinct models of consciousness, each offering a different framework for understanding its nature, emergence, and role within the broader structure of reality. Consciousness as a symmetry-breaking mechanism, also referred to as the Hypothesis of "Identity or Subjectivity," describes its emergence through the fragmentation of an initially undifferentiated psychic state, akin to spontaneous symmetry breaking in physics. The One-Consciousness Universe Hypothesis posits that individual consciousnesses are fragmented expressions of a single universal mind, with decoherence-like mechanisms producing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Evolution: The Computer Systems Engineer Designing Minds.Aaron Sloman - 2011 - Avant: Trends in Interdisciplinary Studies 2 (2):45-69.
    What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Posthumanist Phenomenology and Artificial Intelligence.Avery Rijos - 2024 - Philosophy Papers (Philpapers).
    This paper examines the ontological and epistemological implications of artificial intelligence (AI) through posthumanist philosophy, integrating the works of Deleuze, Foucault, and Haraway with contemporary computational methodologies. It introduces concepts such as negative augmentation, praxes of revealing, and desedimentation, while extending ideas like affirmative cartographies, ethics of alterity, and planes of immanence to critique anthropocentric assumptions about identity, cognition, and agency. By redefining AI systems as dynamic assemblages emerging through networks of interaction and co-creation, the paper challenges traditional dichotomies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. introduction to singularity edition of JCS.Uziel Awret - 2012 - Journal of Consciousness Studies 19 (1-2):7-15.
    This special interactive interdisciplinary issue of JCS on the singularity and the future relationship of humanity and AI is the first of two issues centered on David Chalmers’ 2010 JCS article ‘The Singularity, a Philosophical Analysis’. These issues include more than 20 solicited commentaries to which Chalmers responds. To quote Chalmers: -/- "One might think that the singularity would be of great interest to Academic philosophers, cognitive scientists, and artificial intelligence researchers. In practice, this has not been the case. Good (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  30
    Zero Trust Architecture: A Key Component of Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-208.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. A Living Model of Truth - A Tiered Framework for Integrating Empirical Science, Metaphysical Reason, and Catholic Theology.Hugo Villarreal - manuscript
    This paper proposes a structured framework that integrates insights from empirical science, metaphysical philosophy, and Catholic theology without conflating their distinct methods or domains. It begins by clarifying the epistemological boundaries of each discipline—science focuses on empirical data and testable theories, philosophy probes fundamental questions of being and value, and theology relies on revelation and faith-based reasoning. Through five core themes—interconnectedness, the seen and unseen, consciousness and identity, teleology, and moral objectivity—the paper demonstrates how each domain contributes unique but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  61
    Be Intentional About Fairness!: Fairness, Size, and Multiplicity in the Rashomon Set.Gordon Dai, Pavan Ravishankar, Rachel Yuan, Daniel B. Neill & Emily Black - manuscript
    When selecting a model from a set of equally performant models, how much unfairness can you really reduce? Is it important to be intentional about fairness when choosing among this set, or is arbitrarily choosing among the set of “good” models good enough? Recent work has highlighted that the phenomenon of model multiplicity—where multiple models with nearly identical predictive accuracy exist for the same task—has both positive and negative implications for fairness, from strengthening the enforcement of civil rights law in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  28
    Multi-Cloud Environments: Reducing Security Risks in Distributed Architectures.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5 (1):1-6.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Artificial Intelligence and the New Dynamics of Social Death: A Critical Phenomenological Inquiry.Jorge Gonzalez Arocha - manuscript
    This article examines how artificial intelligence (AI) and digital technologies are reshaping social dynamics, leading to new forms of social death. The study analyzes how AI influences social relations, identity, and agency through a critical phenomenological approach, revealing the ethical and philosophical risks these technologies entail. It argues that social death is a crucial lens for understanding AI’s impact on contemporary society, emphasizing the importance of human dignity and the need to rethink agency in an increasingly technologically mediated world.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Introducing Argument & Computation.Guillermo R. Simari, Chris Reed, Iyad Rahwan & Floriana Grasso - 2010 - Argument and Computation 1 (1):1-5.
    Over the past decade or so, a new interdisciplinary field has emerged in the ground between, on the one hand, computer science – and artificial intelligence in particular – and, on the other, the area of philosophy concentrating on the language and structure of argument. There are now hundreds of researchers worldwide who would consider themselves a part of this nascent community. Various terms have been proposed for the area, including "Computational Dialectics," "Argumentation Technology," and "Argument-based Computing," but the term (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  53
    The Future of Human Reproduction and Family Structure.Angelito Malicse - manuscript
    The Future of Human Reproduction and Family Structure -/- Introduction -/- The future of human reproduction and family structure is set to undergo profound transformations due to advancements in science, technology, and shifting societal values. Breakthroughs in artificial reproduction, gene editing, AI-assisted parenting, and new family models are poised to redefine what it means to conceive, raise children, and form families. As these changes unfold, they will challenge traditional concepts of marriage, parenthood, and biological reproduction. This essay explores the potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Logic is Not Universal: Its Origins and Limitations.Gabriel Merlo-Flores - manuscript
    This essay undertakes an examination of the foundational status of logic, rethinking its origins and limitations from an empirical perspective. Drawing upon the original concepts of Conceptual Quarks (CQs)—defined as the fundamental units of knowledge—and the Programmed Conceptual Deconstruction (PCD) algorithm, which I created for this study, I present methodologies to systematically analyze and deconstruct the principles of logic, exposing their empirical roots. Utilizing a custom-built artificial intelligence model, the study proposes that classical logical principles, such as identity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  47
    (1 other version)Dancing with pixies: Strong artificial intelligence and panpsychism.John Mark Bishop - 2002 - In John Mark Bishop & John Preston, Views Into the Chinese Room: New Essays on Searle and Artificial Intelligence. London: Oxford University Press. pp. 360-379.
    The argument presented in this paper is not a direct attack or defence of the Chinese Room Argument (CRA), but relates to the premise at its heart, that syntax is not sufficient for semantics, via the closely associated propositions that semantics is not intrinsic to syntax and that syntax is not intrinsic to physics. However, in contrast to the CRA’s critique of the link between syntax and semantics, this paper will explore the associated link between syntax and physics. The main (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Digital twins for trans people in healthcare: queer, phenomenological and bioethical considerations.Jose Guerrero & Anna Puzio - 2025 - Journal for Medical Ethics 1.
    Healthcare is one of the domains in which artificial intelligence (AI) is already having a major impact. Of interest is the idea of the digital twin (DT), an AI-powered technology that generates a real-time representation of the patient’s body, offering the possibility of more personalised care. Our main thesis in this paper is that the DT does not merely represent the patient’s body but produces a specific body. We argue, from a philosophical perspective and an ethical-phenomenological approach, that the virtual (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  40
    The Ultimate Evolution of Intelligence: From Type 1 to Cosmic Consciousness.Angelito Malicse - manuscript
    The Ultimate Evolution of Intelligence: From Type 1 to Cosmic Consciousness -/- Introduction -/- Humanity stands at the very beginning of its journey toward becoming an advanced civilization. On the Kardashev scale, we have yet to reach Type 1, where we fully harness the energy of our planet. However, if we continue to evolve technologically, intellectually, and even biologically, we may one day ascend beyond Type 1, beyond Type 2 (stellar control), and even beyond Type 3 (galactic control). The question (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  35
    The Future of Organized Religion: Evolution or Extinction?Angelito Malicse - manuscript
    The Future of Organized Religion: Evolution or Extinction? -/- Organized religion has played a central role in human history, shaping societies, moral frameworks, and cultural traditions. As the world progresses technologically and scientifically, many wonder whether organized religion will continue to exist in the future or gradually fade away. While secularism is rising in some parts of the world, religious beliefs remain deeply ingrained in many societies. The future of organized religion will likely depend on its ability to adapt to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  30
    The Universal Law of Balance and the Mystery of Consciousness Integration A New Approach to the Combination Problem in Panpsychism.Angelito Malicse - manuscript
    The Universal Law of Balance and the Mystery of Consciousness Integration -/- A New Approach to the Combination Problem in Panpsychism -/- Introduction -/- The nature of consciousness remains one of the greatest mysteries in philosophy and science. One of the most challenging questions in panpsychism is the combination problem—how do small conscious entities merge into a single, unified experience? While traditional theories struggle to explain why consciousness emerges in some systems (such as the human brain) but not in others (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Updating the Frame Problem for Artificial Intelligence Research.Lisa Miracchi - 2020 - Journal of Artificial Intelligence and Consciousness 7 (2):217-230.
    The Frame Problem is the problem of how one can design a machine to use information so as to behave competently, with respect to the kinds of tasks a genuinely intelligent agent can reliably, effectively perform. I will argue that the way the Frame Problem is standardly interpreted, and so the strategies considered for attempting to solve it, must be updated. We must replace overly simplistic and reductionist assumptions with more sophisticated and plausible ones. In particular, the standard interpretation assumes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. When the Digital Continues After Death Ethical Perspectives on Death Tech and the Digital Afterlife.Anna Puzio - 2023 - Communicatio Socialis 56 (3):427-436.
    Nothing seems as certain as death. However, what if life continues digitally after death? Companies and initiatives such as Amazon, Storyfile, Here After AI, Forever Identity and LifeNaut are dedicated to precisely this objective: using avatars, records, and other digital content of the deceased, they strive to enable a digital continuation of life. The deceased live on digitally, and at times, these can even appear very much alive-perhaps too alive? This article explores the ethical implications of these technologies, commonly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  55
    Beyond VPNs: Advanced Security Strategies for the Remote Work Revolution.Govindarajan Lakshmikanthan Sreejith Sreekandan Nair - 2020 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (5):1283-1294.
    The global shift to remote work has greatly increased the potential targets for cyberattacks, demanding stronger security measures than what Virtual Private Networks (VPNs) can provide. VPNs provide a bottom-line layer of security but don’t address the changing complexity of the distributed world of work. In this paper, we discuss advanced security frameworks and best practices to protect data and identity in a purely remote work setting, focusing on threat mitigation. The discussed key strategies include Zero Trust Architecture (ZTA), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  66
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 980