Results for 'Technologies vis-a-vis privacy'

1000+ found
Order:
  1. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund (ed.), The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Ethics for Records and Information Management.Norman A. Mooradian - 2018 - Chicago, IL, USA: American Library Association.
    The scope and reach of information, driven by the explosive growth of information technologies and content types, has expanded dramatically over the past 30 years. The consequences of these changes to records and information management (RIM) professionals are profound, necessitating not only specialized knowledge but added responsibilities. RIM professionals require a professional ethics to guide them in their daily practice and to form a basis for developing and implementing organizational policies, and Mooradian’s new book provides a rigorous outline of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of dimensions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  7. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  8. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Privacy, Autonomy, and Personalised Targeting: rethinking how personal data is used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. On human dignity as a foundation for the right to privacy.Luciano Floridi - 2016 - Philosophy and Technology 29 (4):307-312.
    In 2016, the European Parliament approved the General Data Protection Regulation (GDPR) whose core aim is the safeguarding of information privacy, and, by corollary, human dignity. Drawing on the field of philosophical anthropology, this paper analyses various interpretations of human dignity and human exceptionalism. It concludes that privacy is essential for humans to flourish and enable individuals to build a sense of self and the world.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  12. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Is Mental Privacy a Component of Personal Identity?Abel Wajnerman Paz - 2021 - Frontiers in Human Neuroscience 15:773441.
    One of the most prominent ethical concerns regarding emerging neurotechnologies is mental privacy. This is the idea that we should have control over access to our neural data and to the information about our mental processes and states that can be obtained by analyzing it. A key issue is whether this information needs more stringent protection than other kinds of personal information. I will articulate and support the view, underlying recent regulatory frameworks, that mental privacy requires a special (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  15. Real Virtuality: A Code of Ethical Conduct. Recommendations for Good Scientific Practice and the Consumers of VR-Technology.Michael Madary & Thomas Metzinger - 2016 - Frontiers in Robotics and AI 3:1-23.
    The goal of this article is to present a first list of ethical concerns that may arise from research and personal use of virtual reality (VR) and related technology, and to offer concrete recommendations for minimizing those risks. Many of the recommendations call for focused research initiatives. In the first part of the article, we discuss the relevant evidence from psychology that motivates our concerns. In Section “Plasticity in the Human Mind,” we cover some of the main results suggesting that (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  16. Bleeding Fingers: An Existentialist Lament Regarding Technological Evolution.A. Zachman - manuscript
    As a member of the so-demarcated 'Generation Z,' I have been blessed/damned with a front-row seat to the technological evolution kicked off by the COVID-19 Pandemic of 2020, and have succeeded to varying degrees in recognizing its effects and responding to them with the efficiency and care that my neurological soul deserves. Jean-Paul Sartre's conception of bad faith provides an excellent scalpel for the dissection of such a quasi-biological progression, and in this paper, I analyze the third dimension of bad (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Privacy.Edmund Byrne - 1998 - In Encyclopedia of Applied Ethics. San Diego: Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  94
    Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Privacy as an Asset.Jarek Gryz - 2017 - In Marcellus Mindel, Kelly Lyons & Joe Wigglesworth (eds.), Proceedings of the 27th CASCON Conference. Markham, Canada: IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  24. Wearable Technologies for Healthy Ageing: Prospects, Challenges, and Ethical Considerations.Stefano Canali, Agara Ferretti, Viola Schiaffonati & Alessandro Blasimme - 2024 - Journal of Frailty and Aging 2024:1-8.
    Digital technologies hold promise to modernize healthcare. Such opportunity should be leveraged also to address the needs of rapidly ageing populations. Against this backdrop, this paper examines the use of wearable devices for promoting healthy ageing. Previous work has assessed the prospects of digital technologies for health promotion and disease prevention in older adults. However, to our knowledge, ours is one of the first attempts to specifically address the use of wearables for healthy ageing, and to offer ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Awareness of Plagiarism among Student Teachers of Indian Teacher Educational Institutions.Subaveerapandiyan A. & R. Nandhakumar - 2023 - Indian Journal of Educational Technology 5 (2):44-54.
    Today, the Internet is a rich source of study materials, and Google Scholar offers free access to a large number of scientific articles. There are excellent research publications available in many more databases. Students have the option of easily copying the material. Reusing, paraphrasing, patchwriting, and ghostwriting without citing the original documents are plagiarism. Plagiarism is increasing in academics, particularly in research. This study aims to study the awareness of plagiarism and to analyze the reasons for plagiarism. The study samples (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to achieve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Old Dominion. pp. 2-8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  30. Engaging Engineering Teams Through Moral Imagination: A Bottom-Up Approach for Responsible Innovation and Ethical Culture Change in Technology Companies.Benjamin Lange, Geoff Keeling, Amanda McCroskery, Ben Zevenbergen, Sandra Blascovich, Kyle Pedersen, Alison Lentz & Blaise Aguera Y. Arcas - 2023 - AI and Ethics 1:1-16.
    We propose a ‘Moral Imagination’ methodology to facilitate a culture of responsible innovation for engineering and product teams in technology companies. Our approach has been operationalized over the past two years at Google, where we have conducted over 50 workshops with teams from across the organization. We argue that our approach is a crucial complement to existing formal and informal initiatives for fostering a culture of ethical awareness, deliberation, and decision-making in technology design such as company principles, ethics and (...) review procedures, and compliance controls. We characterize some distinctive benefits of our methodology for the technology sector in particular. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Parents, Privacy, and Facebook: Legal and Social Responses to the Problem of Over-Sharing.Renée Nicole Souris - 2018 - In Ann Cudd & Mark Christopher Navin (eds.), Core Concepts and Contemporary Issues in Privacy. Springer. pp. 175-188.
    This paper examines whether American parents legally violate their children’s privacy rights when they share embarrassing images of their children on social media without their children’s consent. My inquiry is motivated by recent reports that French authorities have warned French parents that they could face fines and imprisonment for such conduct, if their children sue them once their children turn 18. Where French privacy law is grounded in respect for dignity, thereby explaining the French concerns for parental “over-sharing,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. What to Do When Privacy Is Gone.James Brusseau - 2019 - In Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. pp. 1 - 8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Privacy Without the Right to Privacy.Scott A. Anderson - 2008 - The Monist 91 (1):81-107.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  35. Deepfake Technology and Individual Rights.Francesco Stellin Sturino - 2023 - Social Theory and Practice 49 (1):161-187.
    Deepfake technology can be used to produce videos of real individuals, saying and doing things that they never in fact said or did, that appear highly authentic. Having accepted the premise that Deepfake content can constitute a legitimate form of expression, it is not immediately clear where the rights of content producers and distributors end, and where the rights of individuals whose likenesses are used in this content begin. This paper explores the question of whether it can be plausibly argued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience:1-12.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  37. Between Thanatos and Eros: Erich Fromm and the psychoanalysis of social networking technology use.Jean du Toit - 2019 - South African Journal of Philosophy 38 (2):136-148.
    Social networking technologies have become a ubiquitous framework for social interaction, serving to organise much of the individual’s social life. Such technological structuring affects not merely the individual’s psyche (as a psychotechnics), it also affects broader aspects of society (as a socio-technics). While social networking technologies may serve to transform society in positive ways, such technologies also have the potential to significantly encroach upon and (re) construct individual and cultural meaning in ways that must be investigated. Erich (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. A Proposed Expert System for Passion Fruit Diseases.Hanan I. A. Radwan, Hadeel A. El-Hamarnah, Nora J. H. Al-Saloul, Ola I. A. LAfi & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (5):24-33.
    Plant diseases are numerous in the world of agriculture. These diseases cause a lot of trouble to most farmers. Among these common diseases, we single out the diseases that affect the Passion fruit, which is affected by about seven diseases, with different symptoms for each disease. Today, technology is facilitating human life in all areas of life, and among these facilities are expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  39. Artifacts and Their Functions.A. W. Eaton - 2020 - In Sarah Anne Carter & Ivan Gaskell (eds.), The Oxford Handbook of History and Material Culture. Oxford University Press.
    How do artifacts get their functions? It is typically thought that an artifact’s function depends on its maker’s intentions. This chapter argues that this common understanding is fatally flawed. Nor can artifact function be understood in terms of current uses or capacities. Instead, it proposes that we understand artifact function on the etiological model that Ruth Millikan and others have proposed for the biological realm. This model offers a robustly normative conception of function, but it does so naturalistically by employing (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  40. The ethics of the extended mind: Mental privacy, manipulation and agency.Robert William Clowes, Paul R. Smart & Richard Heersmink - forthcoming - In B. Beck, O. Friedrich & J. Heinrichs (eds.), Neuroprosthetics: Ethics of applied situated cognition.
    According to proponents of the extended mind, bio-external resources, such as a notebook or a smartphone, are candidate parts of the cognitive and mental machinery that realises cognitive states and processes. The present chapter discusses three areas of ethical concern associated with the extended mind, namely mental privacy, mental manipulation, and agency. We also examine the ethics of the extended mind from the standpoint of three general normative frameworks, namely, consequentialism, deontology, and virtue ethics.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. The Technology of Metaphor.Martin A. Coleman - 2000 - Southern Journal of Philosophy 38 (3):379-392.
    According to Larry Hickman, John Dewey’s general philosophical project of analyzing and critiquing human experience may be understood in terms of technological inquiry (Hickman 1990, 1). Following this, I contend that technology provides a model for Dewey’s analysis of language and meaning, and this analysis suggests a treatment of linguistic metaphor as a way of meeting new demands of experience with old tools of a known and understood language. An account of metaphor consistent with Dewey’s views on language and meaning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. JIF của Nature và Nature Human Behaviour theo JCR 2023.A. I. S. D. L. Adm - 2023 - Adm-Jif23.
    Do thay đổi chính sách Journal Citation Reports (JCR) 2023 có vài cải tiến. Các ấn phẩm trong Core Collections đều được công bố Journal Impact Factor (JIF).
    Download  
     
    Export citation  
     
    Bookmark  
  43. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Mental Illness and Moral Discernment: A Clinical Psychiatric Perspective.Duncan A. P. Angus & Marion L. S. Carson - 2020 - European Journal for Philosophy of Religion 12 (4):191-211.
    As a contribution to a wider discussion on moral discernment in theological anthropology, this paper seeks to answer the question “What is the impact of mental illness on an individual’s ability to make moral decisions?” Written from a clinical psychiatric perspective, it considers recent contributions from psychology, neuropsychology and imaging technology. It notes that the popular conception that mental illness necessarily robs an individual of moral responsibility is largely unfounded. Most people who suffer from mental health problems do not lose (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  88
    BATTERY-POWERED DEVICE FOR MONITORING PHYSICAL DISTANCING THROUGH WIRELESS TECHNOLOGY.Angelica A. Cabaya, Rachel Grace B. Rizardo, Clesphsyche April O. Magno, Aubrey Madar B. Magno, Fredolen A. Causing, Steven V. Batislaong & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    One method for preventing the spread of the coronavirus and other contagious diseases is through social distancing. Therefore, creating a tool to measure and quickly discover the precise distance is necessary. In order to prevent physical contact between individuals, this study aimed to detects individuals’ physical distance, through an inaugurated battery-powered device that monitors physical distance through wireless technology. Specifically, in public or crowded areas, to lessen the spread of the virus. This study focuses on detecting people’s physical distance in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  47. Design and Evaluation of a Wireless Electronic Health Records System for Field Care in Mass Casualty Settings.David Kirsh, L. A. Lenert, W. G. Griswold, C. Buono, J. Lyon, R. Rao & T. C. Chan - 2011 - Journal of the American Medical Informatic Association 18 (6):842-852.
    There is growing interest in the use of technology to enhance the tracking and quality of clinical information available for patients in disaster settings. This paper describes the design and evaluation of the Wireless Internet Information System for Medical Response in Disasters (WIISARD).
    Download  
     
    Export citation  
     
    Bookmark  
  48.  58
    Những tiếng nói giá trị từ lối sống của các minh tinh tài tử màn bạc có thể làm nên thay đổi vì môi trường sống.A. I. S. D. L. Team - manuscript
    Trong ghi chép ngắn, chúng tôi đưa sớm ra một số suy nghĩ về việc xây dựng văn hóa phụng sự môi trường, xuất phát từ một góc nhìn gần gũi với hoạt động văn hóa, nghệ thuật. Đó là góc nhìn từ lối sống của một tập hợp, có lẽ hiện nay khá bé, những nhân vật được yêu mến bởi dông đảo công chúng khán giả, thông qua các vai diễn trên màn ảnh. Họ hay được gọi bằng (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Challenging the dominant grand narrative in global education and culture.A. Gare - 2023 - In R. Rozzi, A. Tauro, N. Avriel-Avni & T. Wright (eds.), Field Environmental Philosophy. Springer. pp. 309-326.
    This chapter critically examines the dominant tradition in formal education as an indirect driver of biocultural homogenization while revealing that there is an alternative tradition that fosters biocultural conservation. The dominant tradition, originating in the Seventeenth Century scientific revolution effected by René Descartes, Thomas Hobbes, Isaac Newton, John Locke and allied thinkers, privileges science, seen as facilitating the technological domination of the world in the service of economic growth, as the only genuine knowledge. This is at the foundation of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  49
    Scrutinizing Privacy in Multi-Omics Research: How to Provide Ethical Grounding for the Identification of Privacy-Relevant Data Properties.C. W. Safarlou, A. L. Bredenoord, R. Vermeulen & K. R. Jongsma - 2021 - American Journal of Bioethics 21 (12):73-75.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000