Results for 'Computational Linguistic, Technology Ethics, National Defense, Privacy and Security, Philosophical Analysis'

956 found
Order:
  1.  25
    Ethical Concerns in Computational Linguistic Field National Defense: A Philosophical Investigation of Language and Security.Mhd Halkis Malkis4 - 2024 - Linguistic and Philosophical Investigations 23 (1):386–396.
    This research examines ethical issues in computational linguistics that can be applied to national defense by analyzing philosophical and security language. The increasing use of language contexts, such as intelligence and communication data analysis, raises ethical and philosophical challenges related to privacy, control, and accuracy. This research aims to identify and analyze ethical issues, especially in the use of computational linguistics in defense applications, as well as their implications for the protection of individual (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  97
    Artificial Intelligence in Intelligence Agencies, Defense and National Security.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book explores the use of artificial intelligence by intelligence services around the world and its critical role in intelligence analysis, defense, and national security. Intelligence services play a crucial role in national security, and the adoption of artificial intelligence technologies has had a significant impact on their operations. It also examines the various applications of artificial intelligence in intelligence services, the implications, challenges and ethical considerations associated with its use. The book emphasizes the need for continued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not restricted to, issues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. (1 other version)What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Old Dominion. pp. 2-8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of data and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Ethics of Driving Automation. Artificial Agency and Human Values.Fabio Fossa - 2023 - Cham: Springer.
    This book offers a systematic and thorough philosophical analysis of the ways in which driving automation crosses path with ethical values. Upon introducing the different forms of driving automation and examining their relation to human autonomy, it provides readers with in-depth reflections on safety, privacy, moral judgment, control, responsibility, sustainability, and other ethical issues. Driving is undoubtedly a moral activity as a human act. Transferring it to artificial agents such as connected and automated vehicles necessarily raises many (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  68
    Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Bibliometric mapping of computer and information ethics.Richard Heersmink, Jeroen van den Hoven, Nees Jan van Eck & Jan van den Berg - 2011 - Ethics and Information Technology 13 (3):241-249.
    This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology concepts on the one hand and ethical concepts on the other hand. To produce the term map, a data set of over (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  12. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. Philosophical foundations of intelligence collection and analysis: a defense of ontological realism.William Mandrick & Barry Smith - 2022 - Intelligence and National Security 38.
    There is a common misconception across the lntelligence Community (IC) to the effect that information trapped within multiple heterogeneous data silos can be semantically integrated by the sorts of meaning-blind statistical methods employed in much of artificial intelligence (Al) and natural language processlng (NLP). This leads to the misconception that incoming data can be analysed coherently by relying exclusively on the use of statistical algorithms and thus without any shared framework for classifying what the data are about. Unfortunately, such approaches (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. (1 other version)Tracing app technology: an ethical review in the COVID-19 era and directions for post-COVID-19.Saleh Afroogh, Amir Esmalian, Ali Mostafavi, Ali Akbari, Kambiz Rasoulkhani, Shahriar Esmaeili & Ehsan Hajiramezanali - 2022 - Ethics and Information Technology 24 (3):1-15.
    We conducted a systematic literature review on the ethical considerations of the use of contact tracing app technology, which was extensively implemented during the COVID-19 pandemic. The rapid and extensive use of this technology during the COVID-19 pandemic, while benefting the public well-being by providing information about people’s mobility and movements to control the spread of the virus, raised several ethical concerns for the post-COVID-19 era. To investigate these concerns for the post-pandemic situation and provide direction for future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Technology and Epistemic Possibility.Isaac Record - 2013 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie (2):1-18.
    My aim in this paper is to give a philosophical analysis of the relationship between contingently available technology and the knowledge that it makes possible. My concern is with what specific subjects can know in practice, given their particular conditions, especially available technology, rather than what can be known “in principle” by a hypothetical entity like Laplace’s Demon. The argument has two parts. In the first, I’ll construct a novel account of epistemic possibility that incorporates two (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  17. Managing the Ethical Dimensions of Brain-Computer Interfaces in eHealth: An SDLC-based Approach.Matthew E. Gladden - 2016 - In Demetris Vrontis, Yaakov Weber & Evangelos Tsoukatos (eds.), Proceedings of the 9th Annual EuroMed Academy of Business Conference: Innovation, Entrepreneurship and Digital Ecosystems (EUROMED 2016). EuroMed Press. pp. 889-902.
    A growing range of brain-computer interface (BCI) technologies is being employed for purposes of therapy and human augmentation. While much thought has been given to the ethical implications of such technologies at the ‘macro’ level of social policy and ‘micro’ level of individual users, little attention has been given to the unique ethical issues that arise during the process of incorporating BCIs into eHealth ecosystems. In this text a conceptual framework is developed that enables the operators of eHealth ecosystems to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry 4.0. This research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Technology Ethics: A Philosophical Introduction and Readings.Gregory Robson & Jonathan Y. Tsou (eds.) - 2023 - New York, NY, USA: Routledge.
    The first of its kind, this anthology in the burgeoning field of technology ethics offers students and other interested readers 32 chapters, each written in an accessible and lively manner specifically for this volume. The chapters are conveniently organized into five sections: I. Perspectives on Technology and its Value II. Technology and the Good Life III. Computer and Information Technology IV. Technology and Business V. Biotechnologies and Enhancement A hallmark of the volume is multidisciplinary contributions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Towards Pedagogy supporting Ethics in Analysis.Marie Oldfield - 2022 - Journal of Humanistic Mathematics 12 (2).
    Over the past few years we have seen an increasing number of legal proceedings related to inappropriately implemented technology. At the same time career paths have diverged from the foundation of statistics out to Data Scientist, Machine Learning and AI. All of these new branches being fundamentally branches of statistics and mathematics. This has meant that formal training has struggled to keep up with what is required in the plethora of new roles. Mathematics as a taught subject is still (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Epistemological and phenomenological issues in the use of brain-computer interfaces.Richard Heersmink - 2011 - In C. Ess & R. Hagengruber (eds.), Proceedings of the International Association for Computing and Philosophy 2011 (pp. 98-102). MV-Wissenschaft.
    Brain-computer interfaces (BCIs) are an emerging and converging technology that translates the brain activity of its user into command signals for external devices, ranging from motorized wheelchairs, robotic hands, environmental control systems, and computer applications. In this paper I functionally decompose BCI systems and categorize BCI applications with similar functional properties into three categories, those with (1) motor, (2) virtual, and (3) linguistic applications. I then analyse the relationship between these distinct BCI applications and their users from an epistemological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  66
    ‘We may still not be ready for newer healthcare technologies’: An ethical perspective of privacy concerns.David Appiah & Duut Jamal-Deen Majeed - manuscript
    As healthcare technologies rapidly progress, a paramount concern arises: are individuals adequately prepared for the current challenges accompanying these advancements? Despite regulatory measures in place, the persistent issue of privacy demands heightened attention and prioritization. This essay aims to consistently underscore the significance of privacy in the evolving landscape of healthcare technologies, fostering a future where the advantages of these innovations are managed with responsibility. We present an ethical analysis addressing privacy apprehensions in emerging healthcare technologies, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Ghost in the Machine: A Philosophical Analysis of the Relationship Between Brain-Computer Interface Applications and their Users.Richard Heersmink - 2009 - Dissertation, University of Twente.
    This Master’s thesis explores the relationship between Brain-Computer Interfaces (BCIs) and their human users from a functional, epistemological and phenomenological perspective. The analysis has four steps. I start out with a technical description of BCI systems in which I conceptually analyze different types of BCI applications. This results in the development of a taxonomy of applications which is the point of departure for further philosophical analysis. Thereafter, I explore the functional relationship between BCI applications and their users. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Toward a Collectivist National Defense.Jeremy Davis - 2020 - Philosophia 48 (4):1333-1354.
    Most philosophers writing on the ethics of war endorse “reductivist individualism,” a view that holds both that killing in war is subject to the very same principles of ordinary morality ; and that morality concerns individuals and their rights, and does not treat collectives as having any special status. I argue that this commitment to individualism poses problems for this view in the case of national defense. More specifically, I argue that the main strategies for defending individualist approaches to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. An introduction to the ethical and social problems of bodybuilding: a philosophical analysis from Science, Technology and Society studies (STS).Santiago Cobo Martínez - manuscript
    since the 20th century bodybuilding has been an object of study that interests and challenges researchers in the sociology of sport (see Conquet, 2014 - Tajrobehkar, 2016 - Wellman, 2020) and, recently, in the philosophy of sport (see Aranyosi, 2017 - Madej, 2021 - Worthen, 2016). However, many of its problems are little known in the orthodox philosophical literature. Therefore, the aim of this paper is to contribute from STS studies to the posing and discussion of the central ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  30. Action and Agency in Artificial Intelligence: A Philosophical Critique.Justin Nnaemeka Onyeukaziri - 2023 - Philosophia: International Journal of Philosophy (Philippine e-journal) 24 (1):73-90.
    The objective of this work is to explore the notion of “action” and “agency” in artificial intelligence (AI). It employs a metaphysical notion of action and agency as an epistemological tool in the critique of the notion of “action” and “agency” in artificial intelligence. Hence, both a metaphysical and cognitive analysis is employed in the investigation of the quiddity and nature of action and agency per se, and how they are, by extension employed in the language and science of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  29
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  32. On the computational complexity of ethics: moral tractability for minds and machines.Jakob Stenseke - 2024 - Artificial Intelligence Review 57 (105):90.
    Why should moral philosophers, moral psychologists, and machine ethicists care about computational complexity? Debates on whether artificial intelligence (AI) can or should be used to solve problems in ethical domains have mainly been driven by what AI can or cannot do in terms of human capacities. In this paper, we tackle the problem from the other end by exploring what kind of moral machines are possible based on what computational systems can or cannot do. To do so, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  46
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Investigation into Ethical Issues of Intelligent Systems.Marziyah Davoodabadi & Zahra Khazaei - 2008 - Journal of Philosophical Theological Research 10 (37):95-120.
    Despite of the undeniable advantages and surprising applications of them in training and industry as well as cultures of different countries, there have been many ethical issues concerning intelligent and computer systems. Presenting a definition of artificial intelligence and intelligent systems, the research paper deals with the shared ethical issues of intelligent systems, computer systems as well as the global network; and then it concentrates on the most important ethical issues of two types of intelligent systems, i.e. data-analysis system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  81
    CONTEMPORARY DEVOPS STRATEGIES FOR AUGMENTING SCALABLE AND RESILIENT APPLICATION DEPLOYMENT ACROSS MULTI-CLOUD ENVIRONMENTS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):54-60.
    Containerization in a multi-cloud environment facilitates workload portability and optimized resource uti-lization. Containerization in multi-cloud environments has received significant attention in recent years both from academic research and industrial development perspectives. However, there exists no effort to systematically investigate the state of research on this topic. The aim of this research is to systematically identify and categorize the multiple aspects of containerization in multi-cloud environment. We conducted the Systematic Mapping Study (SMS) on the literature published between January 2013 and March (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, resource management complexities in optimizing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. (1 other version)Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is (...)
    Download  
     
    Export citation  
     
    Bookmark   118 citations  
  40. Informational privacy and its ontological interpretation.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (3):1.
    The article provides an outline of the ontological interpretation of informational privacy based on information ethics. It is part of a larger project of research, in which I have developed the foundations of ideas presented here and their consequences. As an outline, it is meant to be self-sufficient and to provide enough information to enable the reader to assess how the approach fares with respect to other alternatives. However, those interested in a more detailed analysis, and especially in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. (1 other version)Talking Monkeys: Philosophy, Psychology, Science, Religion and Politics on a Doomed Planet - Articles and Reviews 2006-2017.Michael Starks - 2017 - Las Vegas, NV USA: Reality Press.
    This collection of articles was written over the last 10 years and edited to bring them up to date (2017). The copyright page has the date of the edition and new editions will be noted there as I edit old articles or add new ones. All the articles are about human behavior (as are all articles by anyone about anything), and so about the limitations of having a recent monkey ancestry (8 million years or much less depending on viewpoint) and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Wearable Technologies for Healthy Ageing: Prospects, Challenges, and Ethical Considerations.Stefano Canali, Agara Ferretti, Viola Schiaffonati & Alessandro Blasimme - 2024 - Journal of Frailty and Aging 2024:1-8.
    Digital technologies hold promise to modernize healthcare. Such opportunity should be leveraged also to address the needs of rapidly ageing populations. Against this backdrop, this paper examines the use of wearable devices for promoting healthy ageing. Previous work has assessed the prospects of digital technologies for health promotion and disease prevention in older adults. However, to our knowledge, ours is one of the first attempts to specifically address the use of wearables for healthy ageing, and to offer ethical insights for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Review of “Science and Other Cultures: Issues in Philosophies of Science and Technology”. [REVIEW]Christine A. James - 2004 - Essays in Philosophy 5 (1):182-189.
    Dialogue between feminist and mainstream philosophy of science has been limited in recent years, although feminist and mainstream traditions each have engaged in rich debates about key concepts and their efficacy. Noteworthy criticisms of concepts like objectivity, consensus, justification, and discovery can be found in the work of philosophers of science including Philip Kitcher, Helen Longino, Peter Galison, Alison Wylie, Lorraine Daston, and Sandra Harding. As a graduate student in philosophy of science who worked in both literatures, I was often (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. In Conversation with Artificial Intelligence: Aligning language Models with Human Values.Atoosa Kasirzadeh - 2023 - Philosophy and Technology 36 (2):1-24.
    Large-scale language technologies are increasingly used in various forms of communication with humans across different contexts. One particular use case for these technologies is conversational agents, which output natural language text in response to prompts and queries. This mode of engagement raises a number of social and ethical questions. For example, what does it mean to align conversational agents with human norms or values? Which norms or values should they be aligned with? And how can this be accomplished? In this (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  45. Can Machines Read our Minds?Christopher Burr & Nello Cristianini - 2019 - Minds and Machines 29 (3):461-494.
    We explore the question of whether machines can infer information about our psychological traits or mental states by observing samples of our behaviour gathered from our online activities. Ongoing technical advances across a range of research communities indicate that machines are now able to access this information, but the extent to which this is possible and the consequent implications have not been well explored. We begin by highlighting the urgency of asking this question, and then explore its conceptual underpinnings, in (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  46. From Analysis to Synthesis: Conceiving a Transformative Metaphysics for the Twenty-First Century.Mikhail Epstein - 2020 - In Mikhail Sergeev, Alexander Nikolaevich Chumakov & Mary Elizabeth Theis (eds.), Russian Philosophy in the Twenty-First Century: An Anthology. Boston: Brill | Rodopi. pp. 74–100.
    The article aims to substantiate the philosophy of synthesis, which is built on the basis of analysis, but gives it a constructive direction. The turning point from analysis to synthesis is the problematization of the elements identified in the analysis, their criticism, replacement, or rearrangement, leading to the construction of alternative concepts and propositions that expand the field of the thinkable and innovate the categorical apparatus of philosophy. This article provides examples of philosophical synthesis at different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Panopticon Factor: Privacy and Surveillance in the Digital Age.Jordanco Sekulovski - 2016 - Project Innovative Ethics 1 (9).
    This paper questions the use of new technologies as tools of modern surveillance in order to: (a) advance the research done by Michel Foucault on panoptic techniques of surveillance and dominance; and (b) give new insights on the way we use these new surveillance technologies in violation of democratic principles and legal norms. Furthermore, it questions Foucault’s statements on the expansion of Bentham’s Panopticon scheme as a universal model of modern-day democratic institutions. Therefore the purpose of this paper is to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. (1 other version)Computer models and the evidence of anthropogenic climate change: An epistemology of variety-of-evidence inferences and robustness analysis.Martin Vezer - 2016 - Computer Models and the Evidence of Anthropogenic Climate Change: An Epistemology of Variety-of-Evidence Inferences and Robustness Analysis MA Vezér Studies in History and Philosophy of Science 56:95-102.
    To study climate change, scientists employ computer models, which approximate target systems with various levels of skill. Given the imperfection of climate models, how do scientists use simulations to generate knowledge about the causes of observed climate change? Addressing a similar question in the context of biological modelling, Levins (1966) proposed an account grounded in robustness analysis. Recent philosophical discussions dispute the confirmatory power of robustness, raising the question of how the results of computer modelling studies contribute to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  49. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 956