Results for 'Information and computing technologies'

1000+ found
Order:
  1. Dewey, Mitra, and the “technological proletariat:” Democratizing the information revolution.John Hartmann - manuscript
    In his 1939 essay, “Creative Democracy – The Task Before Us,” John Dewey described democracy as “a way of personal life controlled not merely by faith in human nature in general but by faith in the capacity of human beings for intelligent judgment and action if proper conditions are furnished.”1 While this may seem an odd definition, it is emblematic of the reconstructive tendency in Dewey’s philosophy. If we are to achieve a truly democratic society, we must reconstruct democracy itself (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The university computer based assessment and the technology.Carolina Asuaga, Ana Golpe & Esther Hochsztain - 2012 - XIV Jornadas de Educacion de FCEA, 2012.
    The changes that have occurred as a result of the possibility of accessing the technologies of information inclouds the teaching-learning processes. The objective of this work is to show a project to carry out assesstment using the Moodle platform, whith the implementation of a pilot plan in the first half of 2013. Methodologically, the paper start whith a literature review about the computer-based assessment systems (CBA), then its describe the characteristics of the questionnaires on the Moodle platform. Finally, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  4. Information Technology, the Good and Modernity.Pak-Hang Wong - 2010 - In Thinking Machines and the Philosophy of Computer Science: Concepts and Principles. pp. 223-236.
    In Information and Computer Ethics (ICE), and, in fact, in normative and evaluative research of Information Technology (IT) in general, researchers have paid few attentions to the prudential values of IT. Hence, analyses of the prudential values of IT are mostly found in popular discourse. Yet, the analyses of the prudential values of IT are important for answering normative questions about people’s well-being. In this chapter, the author urges researchers in ICE to take the analyses of the prudential (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Bibliometric mapping of computer and information ethics.Richard Heersmink, Jeroen van den Hoven, Nees Jan van Eck & Jan van den Berg - 2011 - Ethics and Information Technology 13 (3):241-249.
    This paper presents the first bibliometric mapping analysis of the field of computer and information ethics (C&IE). It provides a map of the relations between 400 key terms in the field. This term map can be used to get an overview of concepts and topics in the field and to identify relations between information and communication technology concepts on the one hand and ethical concepts on the other hand. To produce the term map, a data set of over (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is (...)
    Download  
     
    Export citation  
     
    Bookmark   114 citations  
  7. Philosophy of computing and information: 5 Questions.Luciano Floridi - 2008 - Copenhagen, Denmark: Automatic Press/VIP.
    Computing and information, and their philosophy in the broad sense, play a most important scientific, technological and conceptual role in our world. This book collects together, for the first time, the views and experiences of some of the visionary pioneers and most influential thinkers in such a fundamental area of our intellectual development.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  8. Information and Communication Technology in Elementary Schools: A Comparison Between Hybrid and Face-to-Face Learning Systems.Wisnu Zakaria, Turmudi Turmudi & Jupeth Pentang - 2022 - Profesi Pendidikan Dasar 9 (1):46-54.
    At the beginning of 2020, the world was experiencing the Covid-19 pandemic, and Indonesia was no exception. The occurrence of this affects the learning system in Indonesia, the learning system that was originally face-to-face was forced to online form, in this case the teachers are required to provide a creative, efficient and optimal learning system for students. So the purpose of this study is to find out the difference in the average learning result of elementary school students during the pandemic. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  9. Computation, Information, Meaning. Anticipation and Games.Mihai Nadin - 2011 - International Journal of Applied Research on Information Technology and Computing 2 (1).
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Informed Consent in Computed Tomography: A Case for Standardization.Casey Rentmeester - 2019 - Radiologic Technology 90 (3):300-306.
    Informed consent has become the most obvious instantiation of patient autonomy in contemporary medicine, though as a practice it does not encompass all spheres of medicine. While diagnostic radiological procedures carry some risk due to the use of radiation, there is no standardized practice of informed consent in the United States. The authors describe the ethical justification of informed consent, the legal background surrounding it, and a brief history of radiology and radiological protection. They ultimately argue that informed consent should (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  97
    Market of information and communication technologies and place of Ukraine in it.R. Strilchuk & Igor Kryvovyazyuk - 2017 - Economic Forum 1 (2):152-157.
    The meaning of “information and communication technologies (ICT)”, “market of information and communication technologies” were clarified in the article. Components and priority areas for capital investment in the ICT market were determined. The relativity of relationship between the placement of supercomputers in the countries and their level of innovation was revealed. The tendencies of world ICT market development were defined. The place of Ukraine in the world ICT market was established.
    Download  
     
    Export citation  
     
    Bookmark  
  13. Ethics after the information revolution.Luciano Floridi - 2010 - In The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press. pp. 3-19.
    This chapter discusses some conceptual undercurrents, which flow beneath the surface of the literature on information and computer ethics (ICE). It focuses on the potential impact of Information and Communication Technologies (ICTs) on our lives. Because of their 'data superconductivity', ICTs are well known for being among the most influential factors that affect the ontological friction in the infosphere. As a full expression of techne, the information society has already posed fundamental ethical problems, whose complexity and (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  14. European Computing and Philosophy.Gordana Dodig-Crnkovic - 2009 - The Reasoner 3 (9):18-19.
    European Computing and Philosophy conference, 2–4 July Barcelona The Seventh ECAP (European Computing and Philosophy) conference was organized by Jordi Vallverdu at Autonomous University of Barcelona. The conference started with the IACAP (The International Association for CAP) presidential address by Luciano Floridi, focusing on mechanisms of knowledge production in informational networks. The first keynote delivered by Klaus Mainzer made a frame for the rest of the conference, by elucidating the fundamental role of complexity of informational structures that can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. A Behavioral Perspective on Technology Evolution and Domain Name Regulation.Todd Davies - 2008 - Pacific McGeorge Global Business and Development Law Journal 21 (1):1-25.
    This paper argues that private property and rights assignment, especially as applied to communication infrastructure and information, should be informed by advances in both technology and our understanding of psychology. Current law in this area in the United States and many other jurisdictions is founded on assumptions about human behavior that have been shown not to hold empirically. A joint recognition of this fact, together with an understanding of what new technologies make possible, leads one to question basic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm, Sweden: pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. “Extimate” Technologies and Techno-Cultural Discontent.Hub Zwart - 2017 - Techné: Research in Philosophy and Technology 21 (1):24-54.
    According to a chorus of authors, the human life-world is currently invaded by an avalanche of high-tech devices referred to as “emerging,” ”intimate,” or ”NBIC” technologies: a new type of contrivances or gadgets designed to optimize cognitive or sensory performance and / or to enable mood management. Rather than manipulating objects in the outside world, they are designed to influence human bodies and brains more directly, and on a molecular scale. In this paper, these devices will be framed as (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. Epistemological and phenomenological issues in the use of brain-computer interfaces.Richard Heersmink - 2011 - In C. Ess & R. Hagengruber (eds.), Proceedings of the International Association for Computing and Philosophy 2011 (pp. 98-102). MV-Wissenschaft.
    Brain-computer interfaces (BCIs) are an emerging and converging technology that translates the brain activity of its user into command signals for external devices, ranging from motorized wheelchairs, robotic hands, environmental control systems, and computer applications. In this paper I functionally decompose BCI systems and categorize BCI applications with similar functional properties into three categories, those with (1) motor, (2) virtual, and (3) linguistic applications. I then analyse the relationship between these distinct BCI applications and their users from an epistemological and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can deny (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Information ethics, its nature and scope.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (2):21-36.
    In recent years, “Information Ethics” (IE) has come to mean different things to different researchers working in a variety of disciplines, including computer ethics, business ethics, medical ethics, computer science, the philosophy of information, social epistemology and library and information science. Using an ontocentric approach, this paper seeks to define the parameters of IE and thereby increase our understanding of the moral challenges associated with Information Communication Technologies.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  21. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an organized set (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Editorial introduction – ethics of new information technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Decision support information and analytical technology in discharge military personnel employment// 9th International Conference on Monitoring, Modeling & Management of Emergent Economy (M3E2 2021) 24 May 2021. - SHS Web of Conferences Volume 107, 05001 (2021). – 7 p.Mykhailo Medvid, Peter Ivashchenko, Igor Britchenko, Iryna Trubavina & Volodymyr Liutyi - 2021 - 9th International Conference on Monitoring, Modeling and Management of Emergent Economy (M3E2 2021).
    The research material proposes the use of decision support information-analytical technology in discharge military personnel employment, which, in contrast to the usual processing of survey results, makes it possible to obtain more information for decision-making. Adherence to such an approach in the development of public administration mechanisms increases the likelihood that in the case of their implementation in the country there will be positive changes, as they will indirectly take into account the availability of necessary resources. Information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Teachers’ Information and Communication Technology Application Skills Influencing English Curriculum Implementation in Schools in Kenya.Josiah Waiti, Rosemary Imonje & Mercy Mugambi - 2023 - Journal of Education and Development 7 (4):38-51.
    With English as a universal language and a central player in a globalized digital world, the need for an acceptable level of teacher ICT application skills, competence among teachers of English is necessary. The Government of Kenya (GoK) has put in concerted efforts to propel Kenya towards vision 2030 by investing in ICT integration in curriculum implementation, to equip a professional teacher with ICT skills for quality classroom practices and satisfactory learner performance in national examinations. Despite the efforts by the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  28. The role of robotics and AI in technologically mediated human evolution: a constructive proposal.Jeffrey White - 2020 - AI and Society 35 (1):177-185.
    This paper proposes that existing computational modeling research programs may be combined into platforms for the information of public policy. The main idea is that computational models at select levels of organization may be integrated in natural terms describing biological cognition, thereby normalizing a platform for predictive simulations able to account for both human and environmental costs associated with different action plans and institutional arrangements over short and long time spans while minimizing computational requirements. Building from established research programs, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. The Uses of Information and Communication Technologies to Strengthen Girls Education in Govt. Girls Secondary Schools of Rural Areas of Sindh.Farzana Jabeen Khoso, Dr Najum Nisa & Dad Shah - 2019 - IJAPR 3 (3):1-7.
    Abstract: The usage of ICTs has become essential component of the teaching methodology in the field of Education. ICT can equip the female students of the area with global information and they can meet the challenges of 21st century. The purpose behind the survey is to analyze the current practices of emerging technologies. The title of the study is; “The Uses of Information and Communication Technologies to Strengthen Girls Education in Govt. Girls Secondary Schools of Rural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Computer-assisted argument mapping: A Rationale Approach.Martin Davies - 2009 - Higher Education 58:799-820.
    Computer-Assisted Argument Mapping (CAAM) is a new way of understanding arguments. While still embryonic in its development and application, CAAM is being used increasingly as a training and development tool in the professions and government. Inroads are also being made in its application within education. CAAM claims to be helpful in an educational context, as a tool for students in responding to assessment tasks. However, to date there is little evidence from students that this is the case. This paper outlines (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  31. Economic and mathematical modeling of integration influence of information and communication technologies on the development of e-commerce of industrial enterprises.Igor Kryvovyazyuk, Igor Britchenko, Liubov Kovalska, Iryna Oleksandrenko, Liudmyla Pavliuk & Olena Zavadska - 2023 - Journal of Theoretical and Applied Information Technology 101 (11):3801-3815.
    This research aims at establishing the impact of information and communication technologies (ICT) on e-commerce development of industrial enterprises by means of economic and mathematical modelling. The goal was achieved using the following methods: theoretical generalization, analysis and synthesis (to critically analyse the scientific approaches of scientists regarding the expediency of using mathematical models in the context of enterprises’ e-commerce development), target, comparison and grouping (to reveal innovative methodological approach to assessing ICT impact on e-commerce development of industrial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Thought, Sign and Machine - the Idea of the Computer Reconsidered.Niels Ole Finnemann - 1999 - Copenhagen: Danish Original: Akademisk Forlag 1994. Tanke, Sprog og Maskine..
    Throughout what is now the more than 50-year history of the computer many theories have been advanced regarding the contribution this machine would make to changes both in the structure of society and in ways of thinking. Like other theories regarding the future, these should also be taken with a pinch of salt. The history of the development of computer technology contains many predictions which have failed to come true and many applications that have not been foreseen. While we must (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  34. Rebound effects of progress in information technology.Lorenz M. Hilty, Andreas Köhler, Fabian Schéele, Rainer Zah & Thomas Ruddy - 2006 - Poiesis and Praxis 4 (1):19-38.
    Information technology (IT) is continuously making astounding progress in technical efficiency. The time, space, material and energy needed to provide a unit of IT service have decreased by three orders of magnitude since the first personal computer (PC) was sold. However, it seems difficult for society to translate IT’s efficiency progress into progress in terms of individual, organizational or socio-economic goals. In particular it seems to be difficult for individuals to work more efficiently, for organizations to be more productive (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Springer Netherlands. Edited by Luciano Floridi & J. W. Sanders.
    Moral reasoning traditionally distinguishes two types of evil:moral (ME) and natural (NE). The standard view is that ME is the product of human agency and so includes phenomena such as war,torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in cyberspace, (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  36. Technology Ethics: A Philosophical Introduction and Readings.Gregory Robson & Jonathan Y. Tsou (eds.) - 2023 - New York, NY, USA: Routledge.
    The first of its kind, this anthology in the burgeoning field of technology ethics offers students and other interested readers 32 chapters, each written in an accessible and lively manner specifically for this volume. The chapters are conveniently organized into five sections: I. Perspectives on Technology and its Value II. Technology and the Good Life III. Computer and Information Technology IV. Technology and Business V. Biotechnologies and Enhancement A hallmark of the volume is multidisciplinary contributions both in analytic and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Relevance of Philosophical Ontology to Information and Computer Science.Barry Smith - 2014 - In Ruth Hagenbruger & Uwe V. Riss (eds.), Philosophy, computing and information science. Pickering & Chattoo. pp. 75-83.
    The discipline of ontology has enjoyed a checkered history since 1606, with a significant expansion in recent years. We focus here on those developments in the recent history of philosophy which are most relevant to the understanding of the increased acceptance of ontology, and especially of realist ontology, as a valuable method also outside the discipline of philosophy.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Information and Semiotic Processes. The Semiotics of Computation (review article).Mihai Nadin - 2011 - Cybernetics and Human Knowing 18 (1-2):153-175.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  39. Ethics in e-trust and e-trustworthiness: the case of direct computer-patient interfaces.Philip J. Nickel - 2011 - Ethics and Information Technology 13 (2):355-363.
    In this paper, I examine the ethics of e - trust and e - trustworthiness in the context of health care, looking at direct computer-patient interfaces (DCPIs), information systems that provide medical information, diagnosis, advice, consenting and/or treatment directly to patients without clinicians as intermediaries. Designers, manufacturers and deployers of such systems have an ethical obligation to provide evidence of their trustworthiness to users. My argument for this claim is based on evidentialism about trust and trustworthiness: the idea (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  40. Distributed Cognition, Toward a New Foundation for Human-Computer Interaction Research.David Kirsh, Jim Hollan & Edwin Hutchins - 2000 - ACM Transactions on Computer-Human Interaction 7 (2):174-196.
    We are quickly passing through the historical moment when people work in front of a single computer, dominated by a small CRT and focused on tasks involving only local information. Networked computers are becoming ubiquitous and are playing increasingly significant roles in our lives and in the basic infrastructure of science, business, and social interaction. For human-computer interaction o advance in the new millennium we need to better understand the emerging dynamic of interaction in which the focus task is (...)
    Download  
     
    Export citation  
     
    Bookmark   77 citations  
  41. Mapping the foundationalist debate in computer ethics.Luciano Floridi & J. W. Sanders - 2002 - Ethics and Information Technology 4 (1):1-9.
    The paper provides a critical review of the debate on the foundations of Computer Ethics (CE). Starting from a discussion of Moor’s classic interpretation of the need for CE caused by a policy and conceptual vacuum, five positions in the literature are identified and discussed: the “no resolution approach”, according to which CE can have no foundation; the professional approach, according to which CE is solely a professional ethics; the radical approach, according to which CE deals with absolutely unique issues, (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  42. Tracing app technology: an ethical review in the COVID-19 era and directions for post-COVID-19.Saleh Afroogh, Amir Esmalian, Ali Mostafavi, Ali Akbari, Kambiz Rasoulkhani, Shahriar Esmaeili & Ehsan Hajiramezanali - 2022 - Ethics and Information Technology 24 (3):1-15.
    We conducted a systematic literature review on the ethical considerations of the use of contact tracing app technology, which was extensively implemented during the COVID-19 pandemic. The rapid and extensive use of this technology during the COVID-19 pandemic, while benefting the public well-being by providing information about people’s mobility and movements to control the spread of the virus, raised several ethical concerns for the post-COVID-19 era. To investigate these concerns for the post-pandemic situation and provide direction for future events, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Computational entrepreneurship: from economic complexities to interdisciplinary research.Quan-Hoang Vuong - 2019 - Problems and Perspectives in Management 17 (1):117-129.
    The development of technology is unbelievably rapid. From limited local networks to high speed Internet, from crude computing machines to powerful semi-conductors, the world had changed drastically compared to just a few decades ago. In the constantly renewing process of adapting to such an unnaturally high-entropy setting, innovations as well as entirely new concepts, were often born. In the business world, one such phenomenon was the creation of a new type of entrepreneurship. This paper proposes a new academic discipline (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  44. Extended Computation: Wide Computationalism in Reverse.Paul Smart, Wendy Hall & Michael Boniface - 2021 - Proceedings of the 13th ACM Web Science Conference (Companion Volume).
    Arguments for extended cognition and the extended mind are typically directed at human-centred forms of cognitive extension—forms of cognitive extension in which the cognitive/mental states/processes of a given human individual are subject to a form of extended or wide realization. The same is true of debates and discussions pertaining to the possibility of Web-extended minds and Internet-based forms of cognitive extension. In this case, the focus of attention concerns the extent to which the informational and technological elements of the online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Brain in the Shell. Assessing the Stakes and the Transformative Potential of the Human Brain Project.Philipp Haueis & Jan Slaby - 2015 - In Philipp Haueis & Jan Slaby (eds.), Neuroscience and Critique. London: pp. 117–140.
    The “Human Brain Project” (HBP) is a large-scale European neuroscience and information communication technology (ICT) project that has been a matter of heated controversy since its inception. With its aim to simulate the entire human brain with the help of supercomputing technologies, the HBP plans to fundamentally change neuroscientific research practice, medical diagnosis, and eventually the use of computers itself. Its controversial nature and its potential impacts render the HBP a subject of crucial importance for critical studies of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  73
    MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Cognitive Science: Recent Advances and Recurring Problems.Fred Adams, Joao Kogler & Osvaldo Pessoa Junior (eds.) - 2017 - Wilmington, DE, USA: Vernon Press.
    This book consists of an edited collection of original essays of the highest academic quality by seasoned experts in their fields of cognitive science. The essays are interdisciplinary, drawing from many of the fields known collectively as “the cognitive sciences.” Topics discussed represent a significant cross-section of the most current and interesting issues in cognitive science. Specific topics include matters regarding machine learning and cognitive architecture, the nature of cognitive content, the relationship of information to cognition, the role of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Computer ethics beyond mere compliance.Richard Volkman - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):176-189.
    If computer ethics is to constitute a real engagement with industry and society that cultivates a genuine sensitivity to ethical concerns in the creation, development, and implementation of technologies, a genuine sensitivity that stands in marked contrast to ethics as “mere compliance,” then computer ethics will have to consist in issuing an open invitation to inquiry, since going beyond mere compliance requires a sensitivity to the importance of what we care about, and inquiry has the potential to leverage what (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. On the intrinsic value of information objects and the infosphere.Luciano Floridi - 2002 - Ethics and Information Technology 4 (4):287–304.
    What is the most general common set of attributes that characterises something as intrinsically valuable and hence as subject to some moral respect, and without which something would rightly be considered intrinsically worthless or even positively unworthy and therefore rightly to be disrespected in itself? This paper develops and supports the thesis that the minimal condition of possibility of an entity's least intrinsic value is to be identified with its ontological status as an information object. All entities, even when (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  50. Managing the Ethical Dimensions of Brain-Computer Interfaces in eHealth: An SDLC-based Approach.Matthew E. Gladden - 2016 - In Demetris Vrontis, Yaakov Weber & Evangelos Tsoukatos (eds.), Proceedings of the 9th Annual EuroMed Academy of Business Conference: Innovation, Entrepreneurship and Digital Ecosystems (EUROMED 2016). EuroMed Press. pp. 889-902.
    A growing range of brain-computer interface (BCI) technologies is being employed for purposes of therapy and human augmentation. While much thought has been given to the ethical implications of such technologies at the ‘macro’ level of social policy and ‘micro’ level of individual users, little attention has been given to the unique ethical issues that arise during the process of incorporating BCIs into eHealth ecosystems. In this text a conceptual framework is developed that enables the operators of eHealth (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000