Results for 'Access control'

1000+ found
Order:
  1. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  79
    Convergence of the source control and actual access accounts of privacy.Haleh Asgarinia - 2023 - AI and Ethics 3 (1).
    In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphorically compared to ‘climbing the same mountain but from different sides’ (as Parfit [1] has argued about normative theories). These two views can equally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Controlling (mental) images and the aesthetic perception of racialized bodies.Adriana Clavel-Vazquez - forthcoming - Ergo.
    Aesthetic evaluations of human bodies have important implications for moral recognition and for individuals’ access to social and material goods. Unfortunately, there is a widespread aesthetic disregard for non-white bodies. Aesthetic evaluations depend on the aesthetic properties we regard objects as having. And it is widely agreed that aesthetic properties are directly accessed in our experience of aesthetic objects. How, then, might we explain aesthetic evaluations that systematically favour features associated with white identity? Critical race philosophers, like Alia Al-Saji, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Attention is Rational-Access Consciousness.Declan Smithies - 2011 - In Christopher Mole, Declan Smithies & Wayne Wu (eds.), Attention: Philosophical and Psychological Essays. Oxford University Press. pp. 247--273.
    This chapter argues that attention is a distinctive mode of consciousness, which plays an essential functional role in making information accessible for use in the rational control of thought and action. The main line of argument can be stated quite simply. Attention is what makes information fully accessible for use in the rational control of thought and action. But what makes information fully accessible for use in the rational control of thought and action is a distinctive mode (...)
    Download  
     
    Export citation  
     
    Bookmark   50 citations  
  5. Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data from Digital Mental Health (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The value of privileged access.Jared Peterson - 2020 - European Journal of Philosophy 29 (2):365-378.
    European Journal of Philosophy, EarlyView.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Gun Control, the Right to Self-Defense, and Reasonable Beneficence to All.Dustin Crummett & Philip Swenson - 2019 - Ergo: An Open Access Journal of Philosophy 6.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet technology. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Open Borders Without Open Access (conference version July 2019).Dan Demetriou - manuscript
    What are libertarian open borders advocates even advocating for? Is it, as the title to Michael Huemer’s influential essay suggests, a prima facie “right to immigrate”? Or is it, as the branding connotes, literal open borders, or a strong prima facie moral right to free movement across borders that entails a right to immigrate? In this paper, I peel apart the view that people have a strong moral right to freely cross international borders, or "open access," from the view (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Halfhearted Action and Control.Shepherd Joshua - 2017 - Ergo: An Open Access Journal of Philosophy 4.
    Some of the things we do intentionally we do halfheartedly. I develop and defend an account of halfheartedness with respect to action on which one is halfhearted with respect to an action A if one’s overall motivation to A is weak. This requires getting clear on what it is to have some level of overall motivation with respect to an action, and on what it means to say one’s overall motivation is weak or strong. After developing this account, I defend (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  14. FINANCIAL DEVELOPMENT AND ACCESS TO FUNDING: THE CASE OF SMALL AND MEDIUM-SIZED ENTERPRISES IN VIETNAM.Joshua Mcveagh-Holness - 2018 - Dissertation, University of Bristol
    Over the past three decades, Vietnam has transitioned from an agrarian-based, centrally planned economy to a mixed economy with emerging market status. Additionally, projections indicate that Vietnam will be one of the world’s largest economies by 2050 if growth is sustained at present rates. The evolution of the financial sector, which began with the Doi Moi reforms in the mid-1980s, has been central to facilitating this growth. As the economy has expanded, Vietnam has maintained a gradualist approach to developing market-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Engineering Social Justice into Traffic Control for Self-Driving Vehicles?Milos N. Mladenovic & Tristram McPherson - 2016 - Science and Engineering Ethics 22 (4):1131-1149.
    The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal (...). Our central focus is on efficiency and equal access as desiderata for traffic control design. We explain the limitations of conventional traffic control in meeting these desiderata, and sketch a preliminary vision for a next-generation traffic control tailored to address better the demands of social justice. One component of this vision is cooperative, hierarchically distributed self-organization among vehicles. Another component of this vision is a priority system enabling selection of priority levels by the user for each vehicle trip in the network, based on the supporting structure of non-monetary credits. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  16. Protein Ontology: A controlled structured network of protein entities.A. Natale Darren, N. Arighi Cecilia, A. Blake Judith, J. Bult Carol, R. Christie Karen, Cowart Julie, D’Eustachio Peter, D. Diehl Alexander, J. Drabkin Harold, Helfer Olivia, Barry Smith & Others - 2013 - Nucleic Acids Research 42 (1):D415-21..
    The Protein Ontology (PRO; http://proconsortium.org) formally defines protein entities and explicitly represents their major forms and interrelations. Protein entities represented in PRO corresponding to single amino acid chains are categorized by level of specificity into family, gene, sequence and modification metaclasses, and there is a separate metaclass for protein complexes. All metaclasses also have organism-specific derivatives. PRO complements established sequence databases such as UniProtKB, and interoperates with other biomedical and biological ontologies such as the Gene Ontology (GO). PRO relates to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Creating a Controlled Vocabulary for the Ethics of Human Research: Towards a biomedical ethics ontology.David Koepsell, Robert Arp, Jennifer Fostel & Barry Smith - 2009 - Journal of Empirical Research on Human Research Ethics 4 (1):43-58.
    Ontologies describe reality in specific domains in ways that can bridge various disciplines and languages. They allow easier access and integration of information that is collected by different groups. Ontologies are currently used in the biomedical sciences, geography, and law. A Biomedical Ethics Ontology would benefit members of ethics committees who deal with protocols and consent forms spanning numerous fields of inquiry. There already exists the Ontology for Biomedical Investigations (OBI); the proposed BMEO would interoperate with OBI, creating a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  53
    Democracy or Power of Control: Insights from Haitians and Other Educators for Leveraging the Democratic Polarities.Calixte-Hallworth Marjorie - 2024 - International Journal of Creative Research Thoughts - Ijcrt 12 (3):632-642.
    The polarities of democracy framework is founded on critical theory ideas that seek to achieve social change by overcoming oppression and violence, which both endanger humanity's survival. Benet expanded the theory by utilizing Johnson’s concept of polarity management as a conceptual framework. Viewing the polarities of democracy model as a unifying paradigm can help in organizing, leading, and evaluating democratic social change activities aimed at creating healthy, sustainable, and just communities. According to the argument, Democracy is seen as a remedy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. How Bioethics Principles Can Aid Design of Electronic Health Records to Accommodate Patient Granular Control.Eric M. Meslin & Peter H. Schwartz - 2014 - Journal of General Internal Medicine 30 (1):3-6.
    Ethics should guide the design of electronic health records (EHR), and recognized principles of bioethics can play an important role. This approach was adopted recently by a team of informaticists designing and testing a system where patients exert granular control over who views their personal health information. While this method of building ethics in from the start of the design process has significant benefits, questions remain about how useful the application of bioethics principles can be in this process, especially (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. The neurobiology of addiction: implications for voluntary control of behavior.Hyman Steven - 2007 - American Journal of Bioethics 7 (1):8-11.
    There continues to be a debate on whether addiction is best understood as a brain disease or a moral condition. This debate, which may influence both the stigma attached to addiction and access to treatment, is often motivated by the question of whether and to what extent we can justly hold addicted individuals responsible for their actions. In fact, there is substantial evidence for a disease model, but the disease model per se does not resolve the question of voluntary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Foreign bank penetration in Vietnam following Vietnam’s accession to the WTO: matching expectations with reality.Pham Thu Huong, Vo Xuan Vinh, Nguyen Thi Hien, Bui Thi Ly & Nguyen Ngoc Toan - 2022 - Journal of International Economics and Management 22 (3):1-22.
    Vietnam continuously liberalizes the financial market as a requirement for its accession to the World Trade Organization in 2007. This paper discusses the foreign investors’ expectation and their experience when penetrating into Vietnam’s market. The role of the foreign entrants is also assessed. By synthesizing and analyzing relevant research and reports, several important insights are discovered. Firstly, the presence of foreign investors and banks improves market competition, efficiency, and stability. Wholly and partly foreign-owned banks provide the spillover effects in management (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  49
    Cognición de la Realidad ante la Ciencia del Control - Problemas de ontología de la fotografía después de la Cibernética (Cognition of Reality before Science o Control – Ontology Problems of Photography after Cybernetics).Leonardo de Rezende C. Fares - 2024 - Fedro - Revista de Estética y Teoría de Las Artes 23:20-39.
    This essay aims to appreciate the evolution of the problems regarding the ontological understanding of the photographic image and its derivative, the film, in the face of the sophistication of the apparatus of its production. The creative freedom in making images through optical machines is inversely proportional to their credibility as documents. Since its appearance in the human landscape, as a cultural object, the technology of recording images with lights has brought with it a complex of aporias about what would (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Healing the Trauma of the Body/Mind Split through Accessing Instinctual Gut Feelings.Silver Love & Martha Love - 2008 - Somatics Magazine-Journal of the Mind/Body Arts and Sciences (4):40-49.
    For the full text of this article see "Download Options PhiPapers Archive and click Download from Archive" at the bottom of this page. First 500 words of article: To my surprise last spring, an article titled “Gut Almighty”, which briefly explained the latest emotion theories on how intuition comes from the gut, was featured in Psychology Today (Flora, 2007) at the same time that my article on gut instinctual somatic responses and healthy life choices was published in Somatics Spring 07 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Large Language Models and Biorisk.William D’Alessandro, Harry R. Lloyd & Nathaniel Sharadin - 2023 - American Journal of Bioethics 23 (10):115-118.
    We discuss potential biorisks from large language models (LLMs). AI assistants based on LLMs such as ChatGPT have been shown to significantly reduce barriers to entry for actors wishing to synthesize dangerous, potentially novel pathogens and chemical weapons. The harms from deploying such bioagents could be further magnified by AI-assisted misinformation. We endorse several policy responses to these dangers, including prerelease evaluations of biomedical AIs by subject-matter experts, enhanced surveillance and lab screening procedures, restrictions on AI training data, and (...) controls on biomedical AI. We conclude with a suggestion about future research directions in bioethics. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Epictetus's Encheiridion: A new translation and guide to Stoic ethics.Scott Aikin & William O. Stephens - 2023 - London and New York: Bloomsbury Publishing. Edited by William O. Stephens & Epictetus.
    For anyone approaching the Encheiridion of Epictetus for the first time, this book provides a comprehensive guide to understanding a complex philosophical text. Including a full translation and clear explanatory commentaries, Epictetus's 'Encheiridion' introduces readers to a hugely influential work of Stoic philosophy. Scott Aikin and William O. Stephens unravel the core themes of Stoic ethics found within this ancient handbook. Focusing on the core themes of self-control, seeing things as they are, living according to nature, owning one's roles (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. The role of experience in demonstrative thought.Michael Barkasi - 2019 - Mind and Language 34 (5):648-666.
    Attention plays a role in demonstrative thought: It sets the targets. Visual experience also plays a role. I argue here that it makes visual information available for use in the voluntary control of focal attention. To do so I use both introspection and neurophysiological evidence from projections between areas of attentional control and neural correlates of consciousness. Campbell and Smithies also identify roles for experience, but they further argue that only experience can play those roles. In contrast, I (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Open Data for Crime and Place Research: A Practical Guide in R.Samuel Langton & Reka Solymosi - 2020 - Leeds, UK: University of Leeds.
    Access to data in crime and place research has traditionally been reserved for those who have the means to collect fresh data themselves, pay for access, or obtain data through formal data sharing agreements. Even when access is granted, the usage of these data often comes with conditions that circumscribe how the data can be used through licensing or policy (Kitchin, 2014). Even the public dissemination of findings which emerge from analysis might be subject to restrictions. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Why study movement variability in autism?Maria Brincker & Elizabeth Torres - 2017 - In Torres Elizabeth & Whyatt Caroline (eds.), Autism the movement-sensing approach. CRC Press - Taylor & Francis Group.
    Autism has been defined as a disorder of social cognition, interaction and communication where ritualistic, repetitive behaviors are commonly observed. But how should we understand the behavioral and cognitive differences that have been the main focus of so much autism research? Can high-level cognitive processes and behaviors be identified as the core issues people with autism face, or do these characteristics perhaps often rather reflect individual attempts to cope with underlying physiological issues? Much research presented in this volume will point (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Perpetual Struggle.Kathryn J. Norlock - 2018 - Hypatia 34 (1):6-19.
    Open Access: What if it doesn’t get better? Against more hopeful and optimistic views that it is not just ideal but possible to put an end to what John Rawls calls “the great evils of human history,” I aver that when it comes to evils caused by human beings, the situation is hopeless. We are better off with the heavy knowledge that evils recur than we are with idealizations of progress, perfection, and completeness; an appropriate ethic for living with (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  30. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  31. The digitalization process: what has it led to, and what can we expect in the future?Heydar Aslanov & Shamiya Mirzagayeva - 2022 - Metafizika 5 (4):10-21.
    To date, technology has become so integral to our lives that it is almost impossible to imagine a day without using it. The digitization of society is gaining speed every day, affecting all areas of life: communication with people and the management of entire governments. To one degree or another, the use of digital technologies can be observed in every social institution on which society is built. The process includes social changes associated with introducing modern technologies into society and social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Justice and empowerment through digital health: ethical challenges and opportunities.Philip J. Nickel, Iris Loosman, Lily Frank & Anna Vinnikova - 2023 - Digital Society 2.
    The proposition that digital innovations can put people in charge of their health has been accompanied by prolific talk of empowerment. In this paper we consider ethical challenges and opportunities of trying to achieve justice and empowerment using digital health initiatives. The language of empowerment can misleadingly suggest that by using technology, people can control their health and take responsibility for health outcomes to a greater degree than is realistic or fair. Also, digital health empowerment often primarily reaches people (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. A psychologically based taxonomy of magicians’ forcing techniques: How magicians influence our choices, and how to use this to study psychological mechanisms.Alice Pailhès, Ronald A. Rensink & Gustav Kuhn - 2020 - Consciousness and Cognition 86 (C):103038.
    “Pick a card, any card. This has to be a completely free choice.” the magician tells you. But is it really? Although we like to think that we are using our free will to make our decisions, research in psychology has shown that many of our behaviours are automatic and unconsciously influenced by external stimuli (Ariely, 2008; Bargh & Chartrand, 1999; Newell & Shanks, 2014; Nisbett & Wilson, 1977), and that we are often oblivious to the cognitive mechanisms that underpin (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Continuous Glucose Monitoring as a Matter of Justice.Steven R. Kraaijeveld - 2020 - HEC Forum 33 (4):345-370.
    Type 1 diabetes (T1D) is a chronic illness that requires intensive lifelong management of blood glucose concentrations by means of external insulin administration. There have been substantial developments in the ways of measuring glucose levels, which is crucial to T1D self-management. Recently, continuous glucose monitoring (CGM) has allowed people with T1D to keep track of their blood glucose levels in near real-time. These devices have alarms that warn users about potentially dangerous blood glucose trends, which can often be shared with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Public Policy Experiments without Equipoise: When is Randomization Fair?Douglas MacKay & Emma Cohn - 2023 - Ethics and Human Research 45 (1):15-28.
    Government agencies and nonprofit organizations have increasingly turned to randomized controlled trials (RCTs) to evaluate public policy interventions. Random assignment is widely understood to be fair when there is equipoise; however, some scholars and practitioners argue that random assignment is also permissible when an intervention is reasonably expected to be superior to other trial arms. For example, some argue that random assignment to such an intervention is fair when the intervention is scarce, for it is sometimes fair to use a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Failing to Self-Ascribe Thought and Motion: Towards a Three-Factor Account of Passivity Symptoms in Schizophrenia.David Miguel Gray - 2014 - Schizophrenia Research 152 (1):28-32.
    There has recently been emphasis put on providing two-factor accounts of monothematic delusions. Such accounts would explain (1) whether a delusional hypothesis (e.g. someone else is inserting thoughts into my mind) can be understood as a prima facie reasonable response to an experience and (2) why such a delusional hypothesis is believed and maintained given its implausibility and evidence against it. I argue that if we are to avoid obfuscating the cognitive mechanisms involved in monothematic delusion formation we should split (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  38. Extended knowledge, the recognition heuristic, and epistemic injustice.Mark Alfano & Joshua August Skorburg - 2018 - In Duncan Pritchard, Jesper Kallestrup, Orestis Palermos & Adam Carter (eds.), Extended Knowledge. Oxford University Press. pp. 239-256.
    We argue that the interaction of biased media coverage and widespread employment of the recognition heuristic can produce epistemic injustices. First, we explain the recognition heuristic as studied by Gerd Gigerenzer and colleagues, highlighting how some of its components are largely external to, and outside the control of, the cognitive agent. We then connect the recognition heuristic with recent work on the hypotheses of embedded, extended, and scaffolded cognition, arguing that the recognition heuristic is best understood as an instance (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  39. Defense with dignity: how the dignity of violent resistance informs the Gun Rights Debate.Dan Demetriou - 2022 - Philosophical Studies 179 (12):3653-3670.
    Perhaps the biggest disconnect between philosophers and non-philosophers on the question of gun rights is over the relevance of arms to our dignitary interests. This essay attempts to address this gap by arguing that we have a strong prima facie moral right to resist with dignity and that violence is sometimes our most or only dignified method of resistance. Thus, we have a strong prima facie right to guns when they are necessary often enough for effective dignified resistance. This approach (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Carbon pricing ethics.Kian Mintz-Woo - 2022 - Philosophy Compass 17 (1):e12803.
    The three main types of policies for addressing climate change are command and control regulation, carbon taxes (or price instruments), and cap and trade (or quantity instruments). The first question in the ethics of carbon pricing is whether the latter two (price and quantity instruments) are preferable to command and control regulation. The second question is, if so, how should we evaluate the relative merits of price and quantity instruments. I canvass relevant arguments to explain different ways of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  41. Can Machines Read our Minds?Christopher Burr & Nello Cristianini - 2019 - Minds and Machines 29 (3):461-494.
    We explore the question of whether machines can infer information about our psychological traits or mental states by observing samples of our behaviour gathered from our online activities. Ongoing technical advances across a range of research communities indicate that machines are now able to access this information, but the extent to which this is possible and the consequent implications have not been well explored. We begin by highlighting the urgency of asking this question, and then explore its conceptual underpinnings, (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  42. The Two-Tiered Ethics of EDP.Edmund F. Byrne - 1995 - Journal of Business Ethics 14 (1):53-61.
    Ethical questions regarding access to and use of electronically generated data are (if asked) commonly resolved by distinguishing in Lockean fashion between raw (unworked) and refined (worked) data. The former is thought to belong to no one, the latter to the collector and those to whom the collector grants access. Comparative power separates free riders from rightful owners. The resulting two-tiered ethics of access is here challenged on the grounds that it inequitably establishes a rule of law (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Hacking the social life of Big Data.Tobias Blanke, Mark Coté & Jennifer Pybus - 2015 - Big Data and Society 2 (2).
    This paper builds off the Our Data Ourselves research project, which examined ways of understanding and reclaiming the data that young people produce on smartphone devices. Here we explore the growing usage and centrality of mobiles in the lives of young people, questioning what data-making possibilities exist if users can either uncover and/or capture what data controllers such as Facebook monetize and share about themselves with third-parties. We outline the MobileMiner, an app we created to consider how gaining access (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  44. Gendering Caste: Through a Feminist Lens.Uma Chakravarti - 2019 - SAGE Publications Pvt..
    The continuous demand for Gendering Caste: Through a Feminist Lens led to this revised edition which analyses the recent socio-economic and political changes that have taken place. Caste-based marriage and control over women's sexuality have been crucial for the continuation of the caste system in India. Thus, caste and gender are linked. Brutal reprisals have followed when dalits and women have tried to challenge caste-based marriage and inequality which allots strict rules of conduct for women and all dalits. Maithreyi (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  46. Capacity for simulation and mitigation drives hedonic and non-hedonic time biases.Preston Greene, Andrew J. Latham, Kristie Miller & James Norton - 2022 - Philosophical Psychology 35 (2):226-252.
    Until recently, philosophers debating the rationality of time-biases have supposed that people exhibit a first-person hedonic bias toward the future, but that their non-hedonic and third-person preferences are time-neutral. Recent empirical work, however, suggests that our preferences are more nuanced. First, there is evidence that our third-person preferences exhibit time-neutrality only when the individual with respect to whom we have preferences—the preference target—is a random stranger about whom we know nothing; given access to some information about the preference target, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. The modularity of the motor system.Myrto Mylopoulos - 2021 - Philosophical Explorations 24 (3):376-393.
    In this paper, I make a case for the modularity of the motor system. I start where many do in discussions of modularity, by considering the extent to which the motor system is cognitively penetrable, i.e., the extent to which its processing and outputs are causally influenced, in a semantically coherent way, by states of central cognition. I present some empirical findings from a range of sensorimotor adaptation studies that strongly suggest that there are limits to such influence under certain (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  48. Memory as Skill.Seth Goldwasser - 2022 - Review of Philosophy and Psychology 14 (3):833-856.
    The temporal structure for motivating, monitoring, and making sense of agency depends on encoding, maintaining, and accessing the right contents at the right times. These functions are facilitated by memory. Moreover, in informing action, memory is itself often active. That remembering is essential to and an expression of agency and is often active suggests that it is a type of action. Despite this, Galen Strawson (Proceedings of the Aristotelian Society, 103, 227–257, 2003) and Alfred Mele (2009) deny that remembering is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - even if you do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Strong internalism, doxastic involuntarism, and the costs of compatibilism.Timothy Perrine - 2020 - Synthese 197 (7):3171-3191.
    Epistemic deontology maintains that our beliefs and degrees of belief are open to deontic evaluations—evaluations of what we ought to believe or may not believe. Some philosophers endorse strong internalist versions of epistemic deontology on which agents can always access what determines the deontic status of their beliefs and degrees of belief. This paper articulates a new challenge for strong internalist versions of epistemic deontology. Any version of epistemic deontology must face William Alston’s argument. Alston combined a broadly voluntarist (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 1000