Results for 'General Data Protection Regulation'

976 found
Order:
  1. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. (...)
    Download  
     
    Export citation  
     
    Bookmark   64 citations  
  2. Soft ethics: its application to the General Data Protection Regulation and its dual advantage.Luciano Floridi - 2018 - Philosophy and Technology 31 (1):163-167.
    In previous works (Floridi 2018) I introduced the distinction between hard ethics (which may broadly be described as what is morally right and wrong independently of whether something is legal or illegal), and soft or post-compliance ethics (which focuses on what ought to be done over and above existing legislation). This paper analyses the applicability of soft ethics to the General Data Protection Regulation and advances the theory that soft ethics has a dual advantage—as both an (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  3. Workshop Report: Creating a Citizens’ Information Pack on Ethical and Legal Issues Around Icts: What Should Be Included?Janice Asine, Corelia Baibarac-Duignan, Elisabetta Broglio, Alexandra Castańeda, Helen Feord, Linda Freyburg, Marcel Leppée, Andreas Matheus, Marta Camara Oliveira, Christoforos Pavlakis, Jaume Peira, Karen Soacha, Gefion Thuermer, Katrin Vohland, Katherin Wagenknecht, Tim Woods, Katerina Zourou, Federico Caruso, Annelies Duerinckx, Andrzej Klimczuk, Mieke Sterken & Anna Berti Suman - 2020 - European Citizen Science Association.
    The aim of this workshop was to ask potential end-users of the citizens’ information pack on legal and ethical issues around ICTs the following questions: What is your knowledge of the EU’s General Data Protection Regulation, and what actions have you taken in response to these regulations? What challenges are you experiencing in ensuring the protection and security of your project data, and compliance with the GDPR, within existing data management processes/systems? What information/tools/resources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Towards a digital ethics: EDPS ethics advisory group.J. Peter Burgess, Luciano Floridi, Aurélie Pols & Jeroen van den Hoven - 2018 - EDPS Ethics Advisory Group.
    The EDPS Ethics Advisory Group (EAG) has carried out its work against the backdrop of two significant social-political moments: a growing interest in ethical issues, both in the public and in the private spheres and the imminent entry into force of the General Data Protection Regulation (GDPR) in May 2018. For some, this may nourish a perception that the work of the EAG represents a challenge to data protection professionals, particularly to lawyers in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Etica Big Data în cercetare.Nicolae Sfetcu - manuscript
    Principalele probleme cu care se confruntă oamenii de știință în lucrul cu seturile mari de date (Big Data), evidențiind principale aspecte etice, luând în considerare inclusiv legislația din Uniunea Europeană. După o scurtă Introducere despre Big Data, secțiunea Tehnologia prezintă aplicațiile specifice în cercetare. Urmează o abordare a principalelor probleme filosofice specifice în Aspecte filosofice, și Aspecte legale cu evidențierea problemelor etice specifice din Regulamentul UE privind protecția datelor 2016/679 (General Data Protection Regulation, "GDPR"). (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8. Legal aspects of Big Data - GDPR.Nicolae Sfetcu - manuscript
    The use of Big Data presents significant legal problems, especially in terms of data protection. The existing legal framework of the European Union based in particular on the Directive no. 46/95/EC and the General Regulation on the Protection of Personal Data provide adequate protection. But for Big Data, a comprehensive and global strategy is needed. The evolution over time was from the right to exclude others to the right to control their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Big Data Ethics in Research.Nicolae Sfetcu - 2019 - Bucharest, Romania: MultiMedia Publishing.
    The main problems faced by scientists in working with Big Data sets, highlighting the main ethical issues, taking into account the legislation of the European Union. After a brief Introduction to Big Data, the Technology section presents specific research applications. There is an approach to the main philosophical issues in Philosophical Aspects, and Legal Aspects with specific ethical issues in the EU Regulation on the protection of natural persons with regard to the processing of personal (...) and on the free movement of such data, and repealing Directive 95/46/EC (Data Protection Directive - General Data Protection Regulation, "GDPR"). The Ethics Issues section details the specific aspects of Big Data. After a brief section of Big Data Research, I finalize my work with the presentation of Conclusions on research ethics in working with Big Data. -/- ISBN 978-606-033-307-4 , DOI: 10.58679/MM14975 . (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove the (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  11. Ethical and social reflections on the proposed European Health Data Space.Ciara Staunton, Mahsa Shabani, Deborah Mascalzoni, Signe Mezinska & Santa Slokenberga - 2024 - European Journal of Human Genetics 1 (1):1-9.
    The COVID-19 pandemic demonstrated the benefits of international data sharing. Data sharing enabled the health care policy makers to make decisions based on real-time data, it enabled the tracking of the virus, and importantly it enabled the development of vaccines that were crucial to mitigating the impact of the virus. This data sharing is not the norm as data sharing needs to navigate complex ethical and legal rules, and in particular, the fragmented application of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. L’éthique des mégadonnées (Big Data) en recherche.Nicolae Sfetcu - 2020 - Drobeta Turnu Severin: MultiMedia Publishing.
    Les principaux problèmes rencontrés par les scientifiques qui travaillent avec des ensembles de données massives (mégadonnées, Big Data), en soulignant les principaux problèmes éthiques, tout en tenant compte de la législation de l'Union européenne. Après une brève Introduction au Big Data, la section Technologie présente les applications spécifiques de la recherche. Il suit une approche des principales questions philosophiques spécifiques dans Aspects philosophiques, et Aspects juridiques en soulignant les problèmes éthiques spécifiques du règlement de l'UE sur la (...) des données 2016/679 (General Data Protection Regulation, « GDPR »). La section Problèmes éthiques détaille les problèmes spécifiques générés par le big data. Après une brève section de Recherche de big data, sont présentées les Conclusions sur l’éthique de la recherche dans l’utilisation du big data. SOMMAIRE: Abstract 1. Introduction - 1.1 Définitions - 1.2 Les dimensions du big data 2. La technologie - 2.1 Applications - - 2.1.1 En recherche 3. Aspects philosophiques 4 Aspects juridiques - 4.1 RGPD (GDPR) - - Étapes du traitement des données personnelles - - Principes du traitement des données - - Politique de confidentialité et transparence - - Finalités du traitement des données - - Confidentialité par conception et confidentialité implicite - - Le paradoxe (juridique) des mégadonnées 5. Problèmes éthiques - L'éthique dans la recherche - Prise de conscience - Consentement - Contrôle - Transparence - Confiance - Propriété - Surveillance et sécurité - Identité numérique - Réalité ajustée - De-anonymisation - Inégalité numérique - Confidentialité 6. Recherche des mégadonnées Conclusions Bibliographie DOI: 10.13140/RG.2.2.10128.56328 . (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  13. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. On human dignity as a foundation for the right to privacy.Luciano Floridi - 2016 - Philosophy and Technology 29 (4):307-312.
    In 2016, the European Parliament approved the General Data Protection Regulation (GDPR) whose core aim is the safeguarding of information privacy, and, by corollary, human dignity. Drawing on the field of philosophical anthropology, this paper analyses various interpretations of human dignity and human exceptionalism. It concludes that privacy is essential for humans to flourish and enable individuals to build a sense of self and the world.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  15. What We Informationally Owe Each Other.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Alan Rubel, Clinton Castro & Adam Pham (eds.), Algorithms and Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press. pp. 21-42.
    ABSTRACT: One important criticism of algorithmic systems is that they lack transparency. Such systems can be opaque because they are complex, protected by patent or trade secret, or deliberately obscure. In the EU, there is a debate about whether the General Data Protection Regulation (GDPR) contains a “right to explanation,” and if so what such a right entails. Our task in this chapter is to address this informational component of algorithmic systems. We argue that information access (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. A practical checklist for return of results from genomic research in the European context.Danya F. Vears, Signe Mežinska, Nina Hallowell, Heidi Beate Hallowell, Bridget Ellul, Therese Haugdahl Nøst, , Berge Solberg, Angeliki Kerasidou, Shona M. Kerr, Michaela Th Mayrhofer, Elizabeth Ormondroyd, Birgitte Wirum Sand & Isabelle Budin-Ljøsne - 2023 - European Journal of Human Genetics 1:1-9.
    An increasing number of European research projects return, or plan to return, individual genomic research results (IRR) to participants. While data access is a data subject’s right under the General Data Protection Regulation (GDPR), and many legal and ethical guidelines allow or require participants to receive personal data generated in research, the practice of returning results is not straightforward and raises several practical and ethical issues. Existing guidelines focusing on return of IRR are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Becoming and being a biobank donor: The role of relationships and ethics.Signe Mezinska, Ilze Mileiko & Jekaterina Kaleja - 2020 - PLoS ONE 11 (15):1-14.
    Relational aspects, such as involvement of donor’s relatives or friends in the decision-making on participation in a research biobank, providing relatives’ health data to researchers, or sharing research findings with relatives should be considered when reflecting on ethical aspects of research biobanks. The aim of this paper is to explore what the role of donor’s relatives and friends is in the process of becoming and being a biobank donor and which ethical issues arise in this context. We performed qualitative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Privacy and Machine Learning- Based Artificial Intelligence: Philosophical, Legal, and Technical Investigations.Haleh Asgarinia - 2024 - Dissertation, Department of Philisophy, University of Twente
    This dissertation consists of five chapters, each written as independent research papers that are unified by an overarching concern regarding information privacy and machine learning-based artificial intelligence (AI). This dissertation addresses the issues concerning privacy and AI by responding to the following three main research questions (RQs): RQ1. ‘How does an AI system affect privacy?’; RQ2. ‘How effectively does the General Data Protection Regulation (GDPR) assess and address privacy issues concerning both individuals and groups?’; and RQ3. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Aspects juridiques des mégadonnées - RGPD (GDPR).Nicolae Sfetcu - manuscript
    L'utilisation des mégadonnée présente des problèmes juridiques importants, notamment en termes de protection des données. Le cadre juridique existant de l'Union européenne, basé notamment sur la Directive 46/95/CE et le Règlement général sur la protection des données (RGPD - en anglais : General Data Protection Regulation, GDPR) assurent une protection adéquate. Mais pour les mégadonnées, une stratégie globale et complète est nécessaire. L'évolution au fil du temps est passée du droit d'exclure les autres (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.), Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Reality of Achieving the Requirements of Total Quality Management in University Colleges.Abdalqader A. Msallam, Amal A. Al Hila, Samy S. Abu Naser & Mazen J. Al Shobaki - 2020 - International Journal of Academic Management Science Research (IJAMSR) 4 (8):67-90.
    The study aimed to identify the reality of total quality management in university colleges in Gaza Strip, through its dimensions, which are (commitment of senior management; organizational building; employee empowerment; continuous improvement; focus on beneficiaries; management by facts), and to detect differences in the responses of sample members according to For personal variables (type; educational qualification; college; nature of work; years of service). The researchers used the descriptive analytical method, and used a main tool to collect information: the questionnaire consisted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Effect of Total Quality Management in Achieving the Requirements of Quality of Career among University Colleges Employees.Abdalqader A. Msallam, Amal A. Al Hila, Samy S. Abu Naser & Mazen J. Al Shobaki - 2020 - International Journal of Academic Management Science Research (IJAMSR) 4 (10):45-65.
    The study aimed to identify the effect of Total Quality Management in achieving the requirements of the quality of job life among university college employees, and the researchers used the descriptive and analytical approach, and used a main tool to collect information, which is: the questionnaire. The study population reached (596) academic and administrative employees distributed among (5) University colleges in Gaza Strip, and a stratified random sample of (240) employees was selected, approximately (40.3%) of the study population. SPSS software (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Functioning of Healthcare Facilities under the Martial Law.Tetiana Sviatenko, Inna Gogunska, Oleksandr P. Krupskyi, Tetiana Ihnatova & Liubov Bilyk - 2023 - Khazar Journal of Humanities and Social Sciences 26 (3):24-27.
    This topic focuses on the problems that arise in providing medical care to the population during armed conflict or martial law. Under such conditions, hospitals, clinics, and other healthcare facilities have to work in challenging circumstances with limited resources and reduced security for medical personnel. This topic explores such issues as how martial law affects the work of medical institutions, what problems arise in providing medical care to the population in war, how war affects the health of the people, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. La regulación de los drones y la protección de los derechos fundamentales: especial atención a la tutela del menor (The regulation of drones and the protection of fundamental rights: special attention to the protection of minors).Joaquin Sarrión - 2018 - In Desafíos de la protección de menores en la sociedad digital: Internet, redes sociales y comunicación, Francisco Javier Durán Ruiz (dir.), Tirant lo blanch, 2018, ISBN 978-84-9169-753-4,. Valencia: Tirant lo Blanch. pp. 385-411.
    This paper is an approach to the regulation of drones and the protection of fundamental rights, particularly in relation to the use of drones equipped with image and data capture technologies, with special attention to the position and protection of minors.
    Download  
     
    Export citation  
     
    Bookmark  
  28. Regulations Matter: Epistemic Monopoly, Domination, Patents, and the Public Interest.Zahra Meghani - 2021 - Philosophy and Technology (tba):1-26.
    This paper argues that regulatory agencies have a responsibility to further the public interest when they determine the conditions under which new technological products may be commercialized. As a case study, this paper analyzes the US 9th Circuit Court’s ruling on the efforts of the US Environmental Protection Agency to regulate an herbicide meant for use with seed that are genetically modified to be tolerant of the chemical. Using that case, it is argued that when regulatory agencies evaluate new (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. The DNA Technology (Use and Application) Regulation Bill, 2019: A Critical Analysis.Deepa Kansra, Manpreet Dhillon, Mandira Narain, Prabhat Mishra, Nupur Chowdhury & P. Puneeth - 2021 - Indian Law Institute Law Review 1 (Winter):278-301.
    The aim of this paper is to explain the emergence and use of DNA fingerprinting technology in India, noting the specific concerns faced by the Indian Legal System related to the use of this novel forensic technology in the justice process. Furthermore, the proposed construction of a National DNA Data Bank is discussed taking into consideration the challenges faced by the government in legislating the DNA Bill into law. A critical analysis of the DNA Technology (Use and Application) (...) Bill, 2019 is provided to throw light upon many ethical, social, and legal issues that need to be addressed before the operationalization of the Bill to ensure that this technology is governed democratically to protect the civil liberties of citizens. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Sphere transgressions: reflecting on the risks of big tech expansionism.Marthe Stevens, Steven R. Kraaijeveld & Tamar Sharon - forthcoming - Information, Communication and Society.
    The rapid expansion of Big Tech companies into various societal domains (e.g., health, education, and agriculture) over the past decade has led to increasing concerns among governments, regulators, scholars, and civil society. While existing theoretical frameworks—often revolving around privacy and data protection, or market and platform power—have shed light on important aspects of Big Tech expansionism, there are other risks that these frameworks cannot fully capture. In response, this editorial proposes an alternative theoretical framework based on the notion (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Transparent, explainable, and accountable AI for robotics.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - Science (Robotics) 2 (6):eaan6080.
    To create fair and accountable AI and robotics, we need precise regulation and better methods to certify, explain, and audit inscrutable systems.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  32. Open data, data protection, and group privacy.Luciano Floridi - 2014 - Philosophy and Technology 27 (1):1–3.
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  33. A Structural Equation Model of Writing Skills: Mixed Method.Merlyn E. Arevalo & Melissa C. Napil - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (4):37-59.
    The study's general objective is to determine the students' stance on the most appropriate model of writing skills, using Structural Equation Modeling (SEM) as a basic design in the relationship of self-regulated learning strategies, communicative learning strategies, learning grammatical strategies, and writing skills. This study used a mixed-method sequential explanatory design, in which quantitative design is more widely used than qualitative Creswell, J., & Creswell, D. (2017). The researcher used the stratified random sampling technique for selecting respondents and, by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The historical foundations of the research-practice distinction in bioethics.Tom L. Beauchamp & Yashar Saghai - 2012 - Heoretical Medicine and Bioethics 33 (1):45-56.
    The distinction between clinical research and clinical practice directs how we partition medicine and biomedical science. Reasons for a sharp distinction date historically to the work of the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, especially to its analysis of the “boundaries” between research and practice in the Belmont Report (1978). Belmont presents a segregation model of the research-practice distinction, according to which research and practice form conceptually exclusive sets of activities and interventions. (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  35. Is Time Travel Too Strange to Be Possible? - Determinism and Indeterminism on Closed Timelike Curves.Ruward A. Mulder & Dennis Dieks - 2017 - In Anguel S. Stefanov & Marco Giovanelli (eds.), General Relativity 1916 - 2016. Minkowski Institute Press. pp. 93-114.
    Notoriously, the Einstein equations of general relativity have solutions in which closed timelike curves occur. On these curves time loops back onto itself, which has exotic consequences: for example, traveling back into one's own past becomes possible. However, in order to make time travel stories consistent constraints have to be satisfied, which prevents seemingly ordinary and plausible processes from occurring. This, and several other "unphysical" features, have motivated many authors to exclude solutions with CTCs from consideration, e.g. by conjecturing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Bridging the Gap Between Ethical Theory and Practice in Medicine: A Constructivist Grounded Theory Study.Mansure Madani, AbouAli Vedadhir, Bagher Larijani, Zahra Khazaei & Ahad Faramarz Gharamaleki - 2020 - Science and Engineering Ethics 26 (2):2255-2275.
    Physicians try hard to alleviate mental and physical ailments of their patients. Thus, they are heavily burdened by observing ethics and staying well-informed while improving health of their patients. A major ethical concern or dilemma in medication is that some physicians know their behavior is unethical, yet act against their moral compass. This study develops models of theory–practice gap, offering optimal solutions for the gap. These solutions would enhance self-motivation or remove external obstacles to stimulate ethical practices in medicine. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Is Mental Privacy a Component of Personal Identity?Abel Wajnerman Paz - 2021 - Frontiers in Human Neuroscience 15:773441.
    One of the most prominent ethical concerns regarding emerging neurotechnologies is mental privacy. This is the idea that we should have control over access to our neural data and to the information about our mental processes and states that can be obtained by analyzing it. A key issue is whether this information needs more stringent protection than other kinds of personal information. I will articulate and support the view, underlying recent regulatory frameworks, that mental privacy requires a special (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. Truth and assertion: rules vs aims.Neri Marsili - 2018 - Analysis 78 (4):638–648.
    There is a fundamental disagreement about which norm regulates assertion. Proponents of factive accounts argue that only true propositions are assertable, whereas proponents of non-factive accounts insist that at least some false propositions are. Puzzlingly, both views are supported by equally plausible (but apparently incompatible) linguistic data. This paper delineates an alternative solution: to understand truth as the aim of assertion, and pair this view with a non-factive rule. The resulting account is able to explain all the relevant linguistic (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  40. Pharmaceutical risk communication: sources of uncertainty and legal tools of uncertainty management.Barbara Osimani - 2010 - Health Risk and Society 12 (5):453-69.
    Risk communication has been generally categorized as a warning act, which is performed in order to prevent or minimize risk. On the other side, risk analysis has also underscored the role played by information in reducing uncertainty about risk. In both approaches the safety aspects related to the protection of the right to health are on focus. However, it seems that there are cases where a risk cannot possibly be avoided or uncertainty reduced, this is for instance valid for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  42. Explaining ambiguity in scientific language.Beckett Sterner - 2022 - Synthese 200 (5):1-27.
    The idea that ambiguity can be productive in data science remains controversial. Efforts to make scientific publications and data intelligible to computers generally assume that accommodating multiple meanings for words, known as polysemy, undermines reasoning and communication. This assumption has nonetheless been contested by historians, philosophers, and social scientists, who have applied qualitative research methods to demonstrate the generative and strategic value of polysemy. Recent quantitative results from linguistics have also shown how polysemy can actually improve the efficiency (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. Fintech: Creative Innovation for Entrepreneurs.Youssef M. Abu Amuna, Samy S. Abu-Naser, Mazen J. Al Shobaki & Yasser A. Abu Mostafa - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (3):8-15.
    The article studies the impact of Fintech on entrepreneurship in Arabic region by using Crowdfunding platforms as the field of study. The article focuses on Arabic Crowdfunding platforms. The population of (12) platforms consist of: individuals, entrepreneurs, investors, employees at Crowdfunding platforms. Descriptive and quantitative approach used in this article, and a questionnaire used as a tool to collect primary data. The results indicate an impact for Fintech on entrepreneurship in general and obvious obstacles to use it widely (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  44. Economic Cycles, Crises, and the Global Periphery.Leonid Grinin, Arno Tausch & Andrey Korotayev (eds.) - 2016 - Switzerland: Springer International Publishing Switzerland.
    This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is argued that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous and purposive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Sideloading: Creating A Model of a Person via LLM with Very Large Prompt.Alexey Turchin & Roman Sitelew - manuscript
    Sideloading is the creation of a digital model of a person during their life via iterative improvements of this model based on the person's feedback. The progress of LLMs with large prompts allows the creation of very large, book-size prompts which describe a personality. We will call mind-models created via sideloading "sideloads"; they often look like chatbots, but they are more than that as they have other output channels, like internal thought streams and descriptions of actions. -/- By arranging the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Klauzula limitacyjna a nienaruszalność praw i godności [Limitation Clause and the Inviolability of Rights and Dignity].Marek Piechowiak - 2009 - Przegląd Sejmowy 17 (2 (91)):55-77.
    The author examines the arguments for applicability of the limitation clause which specifies the requirements for limitation of constitutional freedoms and rights (Article 31 para. 3 of the Constitution) to the right to protection of life (Article 38). Even if there is almost a general acceptance of such applicability, this approach does not hold up to criticism based on the rule existing in the Polish legal order that treaty commitments concerning human rights have supremacy over national statutory regulations. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 976