Results for 'algorithm exploitation'

976 found
Order:
  1. Algorithm exploitation: humans are keen to exploit benevolent AI.Jurgis Karpus, Adrian Krüger, Julia Tovar Verba, Bahador Bahrami & Ophelia Deroy - 2021 - iScience 24 (6):102679.
    We cooperate with other people despite the risk of being exploited or hurt. If future artificial intelligence (AI) systems are benevolent and cooperative toward us, what will we do in return? Here we show that our cooperative dispositions are weaker when we interact with AI. In nine experiments, humans interacted with either another human or an AI agent in four classic social dilemma economic games and a newly designed game of Reciprocity that we introduce here. Contrary to the hypothesis that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  2. Exploitation in the Platform Age.Daniel Susser - forthcoming - In Beate Roessler & Valerie Steeves, Being Human in the Digital World. Cambridge University Press.
    In this chapter I consider a common refrain among critics of digital platforms: big tech "exploits" us. It gives voice to a shared sense that technology firms are somehow mistreating people—taking advantage of us, extracting from us—in a way that other data-driven harms, such as surveillance and algorithmic bias, fail to capture. Exploring several targets of this charge—gig work, algorithmic pricing, and surveillance advertising—I ask: What does exploitation entail, exactly, and how do platforms perpetrate it? Is exploitation in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. How to Discover Composition with the PC Algorithm.Clark Glymour - manuscript
    Some recent exchanges (Gebharter 2017a,2017b; Baumgartner and Cassini, 2023) concern whether composition can have conditional independence properties analogous to causal relations. If so, composition might sometimes be detectable by the application of causal search algorithms. The discussion has focused on a particular algorithm, PC (Spirtes and Glymour, 1991). PC is but one, and in many circumstances not the best, of a host of causal search algorithms that are candidates for methods of discovering composition provided appropriate statistical relations obtain. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Privacy preserving data mining using hiding maximum utility item first algorithm by means of grey wolf optimisation algorithm.Sugumar Rajendran - 2023 - Int. J. Business Intell. Data Mining 10 (2):1-20.
    In the privacy preserving data mining, the utility mining casts a very vital part. The objective of the suggested technique is performed by concealing the high sensitive item sets with the help of the hiding maximum utility item first (HMUIF) algorithm, which effectively evaluates the sensitive item sets by effectively exploiting the user defined utility threshold value. It successfully attempts to estimate the sensitive item sets by utilising optimal threshold value, by means of the grey wolf optimisation (GWO) (...). The optimised threshold value is then checked for its performance analysis by employing several constraints like the HF, MC and DIS. The novel technique is performed and the optimal threshold resultant item sets are assessed and contrasted with those of diverse optimisation approaches. The novel HMUIF considerably cuts down the calculation complication, thereby paving the way for the enhancement in hiding performance of the item sets. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   63 citations  
  7. Using cross-lingual information to cope with underspecification in formal ontologies.Werner Ceusters, Ignace Desimpel, Barry Smith & Stefan Schulz - 2003 - Studies in Health Technology and Informatics 95:391-396.
    Description logics and other formal devices are frequently used as means for preventing or detecting mistakes in ontologies. Some of these devices are also capable of inferring the existence of inter-concept relationships that have not been explicitly entered into an ontology. A prerequisite, however, is that this information can be derived from those formal definitions of concepts and relationships which are included within the ontology. In this paper, we present a novel algorithm that is able to suggest relationships among (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. AI-powered phishing detection: Integrating natural language processing and deep learning for email security.Saswata Dey - 2023 - World Journal of Advanced Engineering Technology and Sciences 2023 (10(02)):394-415.
    Phishing attacks are major threats to email security and pose challenges, while cyber attackers utilize increasingly sophisticated means to deceive the user and steal away important information. Well-established ways of detecting phishing attacks, such as rule-based systems or simple machine-learning models, usually cannot deal efficiently with such advanced threats. This research proposes an approach to detect phishing attacks on email systems, which deploys natural language processing and deep learning technologies. The method proposes to improve the detection accuracies and efficiencies of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Reinforcement Learning In Dynamic Environments: Optimizing Real-Time Decision Making For Complex Systems.N. Geetha - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 14 (3):694-697.
    Reinforcement Learning (RL) has emerged as a powerful technique for optimizing decision-making in dynamic, uncertain, and complex environments. The ability of RL algorithms to adapt and learn from interactions with the environment enables them to solve challenging problems in fields such as robotics, autonomous systems, finance, and healthcare. In dynamic environments, where conditions change in real-time, RL must continually update its policy to maximize cumulative rewards. This paper explores the application of RL in dynamic environments, with a focus on its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  48
    Quantum-Safe Cryptography Readiness in Enterprise Networks: Challenges and Roadmap.Babatunde Tunji - 2021 - International Journal of Computer Technology and Electronics Communication 4 (2):1006-1010.
    With advancements in quantum computing, existing public-key cryptographic standards such as RSA and Elliptic Curve Cryptography (ECC) face an impending risk of obsolescence. These foundational systems underpin critical components of secure communications, from VPNs to TLS-protected web traffic. This paper evaluates the current state of enterprise preparedness for post-quantum cryptography (PQC) and proposes a structured transition roadmap. We analyse leading post-quantum algorithms submitted to the NIST standardization process, particularly focusing on latticebased (Kyber, NTRU) and code-based (Classic McEliece) cryptosystems. Each is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Concept Combination in Weighted Logic.Guendalina Righetti, Claudio Masolo, Nicolas Toquard, Oliver Kutz & Daniele Porello - 2021 - In Guendalina Righetti, Claudio Masolo, Nicolas Toquard, Oliver Kutz & Daniele Porello, Proceedings of the Joint Ontology Workshops 2021 Episode {VII:} The Bolzano Summer of Knowledge co-located with the 12th International Conference on Formal Ontology in Information Systems {(FOIS} 2021), and the 12th Internati.
    We present an algorithm for concept combination inspired and informed by the research in cognitive and experimental psychology. Dealing with concept combination requires, from a symbolic AI perspective, to cope with competitive needs: the need for compositionality and the need to account for typicality effects. Building on our previous work on weighted logic, the proposed algorithm can be seen as a step towards the management of both these needs. More precisely, following a proposal of Hampton [1], it combines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Invisible Influence: Artificial Intelligence and the Ethics of Adaptive Choice Architectures.Daniel Susser - 2019 - Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society 1.
    For several years, scholars have (for good reason) been largely preoccupied with worries about the use of artificial intelligence and machine learning (AI/ML) tools to make decisions about us. Only recently has significant attention turned to a potentially more alarming problem: the use of AI/ML to influence our decision-making. The contexts in which we make decisions—what behavioral economists call our choice architectures—are increasingly technologically-laden. Which is to say: algorithms increasingly determine, in a wide variety of contexts, both the sets of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  13. Digital Working Lives: Worker Autonomy and the Gig Economy.Tim Christiaens - 2022 - Rowman & Littlefield Publishers.
    Christiaens argues that digital technologies are fundamentally undermining workers’ autonomy by enacting systems of surveillance that lead to exploitation, alienation, and exhaustion. For a more sustainable future of work, digital technologies should support human development instead of subordinating it to algorithmic control.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  14. Defining Digital Authoritarianism.James S. Pearson - 2024 - Philosophy and Technology 37 (2):1-19.
    It is becoming increasingly common for authoritarian regimes to leverage digital technologies to surveil, repress and manipulate their citizens. Experts typically refer to this practice as digital authoritarianism (DA). Existing definitions of DA consistently presuppose a politically repressive agent intentionally exploiting digital technologies to pursue authoritarian ends. I refer to this as the intention-based definition. This paper argues that this definition is untenable as a general description of DA. I begin by illustrating the current predominance of the intention-based definition (Section (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Hijacking Epistemic Agency - How Emerging Technologies Threaten our Wellbeing as Knowers.John Dorsch - 2022 - Proceedings of the 2022 Aaai/Acm Conference on Ai, Ethics, and Society 1.
    The aim of this project to expose the reasons behind the pandemic of misinformation (henceforth, PofM) by examining the enabling conditions of epistemic agency and the emerging technologies that threaten it. I plan to research the emotional origin of epistemic agency, i.e. on the origin of our capacity to acquire justification for belief, as well as on the significance this emotional origin has for our lives as epistemic agents in our so-called Misinformation Age. This project has three objectives. First, I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Conceptual atomism and the computational theory of mind: a defense of content-internalism and semantic externalism.John-Michael Kuczynski - 2007 - John Benjamins & Co.
    Contemporary philosophy and theoretical psychology are dominated by an acceptance of content-externalism: the view that the contents of one's mental states are constitutively, as opposed to causally, dependent on facts about the external world. In the present work, it is shown that content-externalism involves a failure to distinguish between semantics and pre-semantics---between, on the one hand, the literal meanings of expressions and, on the other hand, the information that one must exploit in order to ascertain their literal meanings. It is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Minimum Intelligent Signal Test as an Alternative to the Turing Test.Paweł Łupkowski & Patrycja Jurowska - 2019 - Diametros 59:35-47.
    The aim of this paper is to present and discuss the issue of the adequacy of the Minimum Intelligent Signal Test (MIST) as an alternative to the Turing Test. MIST has been proposed by Chris McKinstry as a better alternative to Turing’s original idea. Two of the main claims about MIST are that (1) MIST questions exploit commonsense knowledge and as a result are expected to be easy to answer for human beings and difficult for computer programs; and that (2) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Leaky Levels and the Case for Proper Embodiment.Mog Stapleton - 2016 - In G. Etzelmüller & C. Tewes, Embodiment in Evolution and Culture. pp. 17-30.
    In this chapter I present the thesis of Proper Embodiment: the claim that (at least some of) the details of our physiology matter to cognition and consciousness in a fundamental way. This thesis is composed of two sub-claims: (1) if we are to design, build, or evolve artificial systems that are cognitive in the way that we are, these systems will have to be internally embodied, and (2) the exploitation of the particular internal embodiment that allows systems to evolve (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. The Homo Rationalis in the Digital Society: an Announced Tragedy.Tommaso Ostillio - 2023 - Dissertation, University of Warsaw
    This dissertation compares the notions of homo rationalis in Philosophy and homo oeconomicus in Economics. Particularly, in Part I, we claim that both notions are close methodological substitutes. Accordingly, we show that the constraints involved in the notion of economic rationality apply to the philosophical notion of rationality. On these premises, we explore the links between the notions of Kantian and Humean rationality in Philosophy and the constructivist and ecological approaches to rationality in economics, respectively. Particularly, we show that the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  71
    Generative AI-Driven Automated Financial Advisory Systems: Integrating NLP and Reinforcement Learning for Personalized Investment Strategies in FinTech Applications.Sachin Dixit - 2026 - Acta Scientific Computer Sciences 7 (1).
    The advent of generative artificial intelligence (AI) in the financial technology (FinTech) sector has created unprecedented opportunities for automating and enhancing financial advisory systems. This research focuses on the application of generative AI to develop automated financial advisory platforms, integrating natural language processing (NLP) and reinforcement learning (RL) for the formulation of personalized investment strategies. Traditional financial advisory models, often characterized by manual processes, human bias, and limited scalability, are increasingly unable to meet the demands of a fast-paced and diverse (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Occam's Razor For Big Data?Birgitta Dresp-Langley - 2019 - Applied Sciences 3065 (9):1-28.
    Detecting quality in large unstructured datasets requires capacities far beyond the limits of human perception and communicability and, as a result, there is an emerging trend towards increasingly complex analytic solutions in data science to cope with this problem. This new trend towards analytic complexity represents a severe challenge for the principle of parsimony (Occam’s razor) in science. This review article combines insight from various domains such as physics, computational science, data engineering, and cognitive science to review the specific properties (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  59
    Fully Homomorphic Encryption: Revolutionizing Payment Security.Hirenkumar Patel - 2025 - International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11 (2):2379-2396.
    Fully Homomorphic Encryption (FHE) represents a transformative approach to securing payment transactions, particularly Card-Not-Present (CNP) transactions in e-commerce environments. This article explores how FHE addresses the fundamental vulnerability in current payment security frameworks: the necessity to decrypt sensitive data for processing. By enabling computation on encrypted data, FHE maintains complete data privacy throughout the transaction lifecycle, eliminating exposure points that hackers traditionally exploit. The synergistic integration of FHE with existing tokenization technologies creates a multi-layered security approach that significantly enhances protection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight the efficacy of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Psychological Foundations of Political Attachment and Strategies for Countering Mass Brainwashing.Angelito Malicse - manuscript
    -/- Title: The Psychological Foundations of Political Attachment and Strategies for Countering Mass Brainwashing Author: Angelito Malicse -/- Abstract: This paper explores the psychological and neurological mechanisms underlying the intense emotional attachment individuals form toward political figures, often without personal interaction. It examines how such attachments can be manipulated to facilitate mass brainwashing, resulting in cognitive rigidity, social polarization, and the erosion of democratic values. The paper proposes a multi-faceted strategy to counter these effects through foundational educational reform, media literacy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Mechanizmy predykcyjne i ich normatywność [Predictive mechanisms and their normativity].Michał Piekarski - 2020 - Warszawa, Polska:
    The aim of this study is to justify the belief that there are biological normative mechanisms that fulfill non-trivial causal roles in the explanations (as formulated by researchers) of actions and behaviors present in specific systems. One example of such mechanisms is the predictive mechanisms described and explained by predictive processing (hereinafter PP), which (1) guide actions and (2) shape causal transitions between states that have specific content and fulfillment conditions (e.g. mental states). Therefore, I am guided by a specific (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Beyond Capitalism: Designing a New Economic System for Humanity.Angelito Malicse - manuscript
    Beyond Capitalism: Designing a New Economic System for Humanity -/- Introduction -/- For centuries, capitalism has been the dominant economic system, driving technological innovation, wealth creation, and global trade. However, its flaws—extreme inequality, environmental destruction, and economic instability—have made many question whether it is still the best model for humanity. Instead of reforming capitalism, perhaps the time has come to replace it entirely with a new system that better aligns with modern challenges, human well-being, and sustainability. -/- This essay explores (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  83
    The Future of AI-Human Brain Integration: A Path to Balanced Intelligence.Angelito Malicse - manuscript
    The Future of AI-Human Brain Integration: A Path to Balanced Intelligence -/- The rapid advancement of artificial intelligence (AI) has opened the possibility of integrating AI with the human brain, a development that could redefine intelligence, decision-making, and even the nature of consciousness. However, to ensure that AI-brain integration enhances human potential without disrupting the natural order, a holistic and ethical approach must be followed. This essay explores how AI can be merged with human cognition while maintaining balance with nature, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  81
    The Dangers of Unfiltered Social Media: A Threat to Society.Angelito Malicse - manuscript
    The Dangers of Unfiltered Social Media: A Threat to Society -/- Introduction -/- In the digital age, social media has revolutionized communication, providing an open platform for information sharing, networking, and public discourse. However, the lack of a comprehensive filtering mechanism on social media apps poses significant risks to individuals and society as a whole. Without proper content moderation, social media can become a breeding ground for misinformation, manipulation, social division, and various forms of harm. This essay explores the dangers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  82
    The Violation of the Absolute Law of Free Will: The Consequences of Misinformation and the Flaws in Freedom of Speech.Angelito Malicse - manuscript
    The Violation of the Absolute Law of Free Will: The Consequences of Misinformation and the Flaws in Freedom of Speech -/- Introduction -/- Free will is often regarded as humanity’s defining characteristic—the ability to make choices based on conscious thought, personal experience, and available information. However, free will is not merely about the freedom to choose; it is intrinsically tied to the accuracy and reliability of the information upon which those choices are made. The absolute law of free will, when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  67
    The Universal Law of Balance as the Key to Ethical AI and Internet Governance.Angelito Malicse - manuscript
    The Universal Law of Balance as the Key to Ethical AI and Internet Governance -/- The rapid advancement of internet technology and artificial intelligence (AI) has brought unprecedented opportunities for innovation, communication, and economic growth. However, the dominant profit-driven model of capitalism has also led to severe imbalances, particularly in the spread of black propaganda and misinformation. These issues arise because many websites, apps, and AI systems prioritize engagement and revenue over truth and societal well-being. If left unchecked, these imbalances (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  65
    Counteracting Evil Influence in the Mind and Society Through Balance.Angelito Malicse - manuscript
    Counteracting Evil Influence in the Mind and Society Through Balance -/- Evil influence exists both in the human mind and in society, shaping destructive behaviors, corrupting leadership, and creating suffering. Understanding its roots and impact is essential to restoring balance, which aligns with the universal law of balance—the principle that all decisions must maintain harmony within nature and human systems. This essay explores the presence of evil influence in the mind and society and provides solutions to counteract its effects through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  49
    Scientific Explanation of Political Polarization and Mind Control Bias Techniques.Angelito Malicse - manuscript
    Scientific Explanation of Political Polarization and Mind Control Bias Techniques -/- Political polarization and mind control bias techniques are interconnected phenomena that shape public opinion and influence societal divisions. These processes can be explained scientifically through psychology, neuroscience, and mass communication studies. This essay will explore both concepts in depth, including their cognitive, social, and technological underpinnings. -/- I. Political Polarization: The Science Behind Division -/- Definition of Political Polarization -/- Political polarization is the process by which political attitudes and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  43
    Restructuring Profit-Oriented Social Media to Align with the Three Universal Laws of Nature.Angelito Malicse - manuscript
    -/- Restructuring Profit-Oriented Social Media to Align with the Three Universal Laws of Nature -/- By Angelito Malicse -/- In today’s world, social media platforms have become powerful tools for shaping thought, behavior, and society itself. However, the dominance of profit-oriented models in these platforms has led to widespread harm—ranging from misinformation and emotional manipulation to mental health crises and societal division. When assessed through the lens of my Three Universal Laws of Nature—the Law of Karma, the Law of Feedback, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  41
    Detection of Cyberbullying using NLP and Machine Learning in Social Networks for BI-Language.Janani Shree M. Nikitha Gs, Amritasri Shenoyy, K. Chaturya, Latha Jc - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9451-9454.
    Cyberbullying, a contemporary menace within the realm of social media, has emerged alongside the surge in social media usage, leading to the exploitation of freedom of expression. Statistics indicate that a substantial 36.5% of individuals believe they have experienced cyberbullying at some point in their lives. This figure has more than doubled since 2007, and there has been a noticeable increase from 2018 to 2023, indicating an unfavorable trend. Although existing solutions in the market aim to mitigate this issue, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  32
    Assessing TikTok through the Lens of the Universal Formula on the Problem of Free Will.Angelito Malicse - manuscript
    -/- Assessing TikTok through the Lens of the Universal Formula on the Problem of Free Will -/- In the modern digital age, social media platforms play a central role in shaping the minds and behaviors of individuals and societies. Among these platforms, TikTok stands out due to its immense popularity and powerful influence across all age groups. However, in evaluating its impact on human free will and societal well-being, it is essential to use a precise and universal standard. This essay (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  28
    Assessing Facebook through the Lens of the Universal Formula on the Problem of Free Will.Angelito Malicse - manuscript
    -/- Assessing Facebook through the Lens of the Universal Formula on the Problem of Free Will -/- Facebook, once the world’s most prominent digital town square, continues to play a major role in how people communicate, consume information, and form identities. As society grapples with rising mental health issues, polarization, and disinformation, the question arises: does Facebook help uphold or violate the natural laws that support human free will, balance, and systemic harmony? This essay assesses Facebook through my Universal Formula, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey. [REVIEW]Tosin Ige - manuscript
    Phishing is one of the most effective ways in which cybercriminals get sensitive details such as credentials for online banking, digital wallets, state secrets, and many more from potential victims. They do this by spamming users with malicious URLs with the sole purpose of tricking them into divulging sensitive information which is later used for various cybercrimes. In this research, we did a comprehensive review of current state-of-the-art machine learning and deep learning phishing detection techniques to expose their vulnerabilities and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Historical and Conceptual Foundations of Information Physics.Anta Javier - 2021 - Dissertation, Universitat de Barcelona
    The main objective of this dissertation is to philosophically assess how the use of informational concepts in the field of classical thermostatistical physics has historically evolved from the late 1940s to the present day. I will first analyze in depth the main notions that form the conceptual basis on which 'informational physics' historically unfolded, encompassing (i) different entropy, probability and information notions, (ii) their multiple interpretative variations, and (iii) the formal, numerical and semantic-interpretative relationships among them. In the following, I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Epistemic Exploitation.Nora Berenstain - 2016 - Ergo: An Open Access Journal of Philosophy 3:569-590.
    Epistemic exploitation occurs when privileged persons compel marginalized persons to educate them about the nature of their oppression. I argue that epistemic exploitation is marked by unrecognized, uncompensated, emotionally taxing, coerced epistemic labor. The coercive and exploitative aspects of the phenomenon are exemplified by the unpaid nature of the educational labor and its associated opportunity costs, the double bind that marginalized persons must navigate when faced with the demand to educate, and the need for additional labor created by (...)
    Download  
     
    Export citation  
     
    Bookmark   115 citations  
  40. Democratizing Algorithmic Fairness.Pak-Hang Wong - 2020 - Philosophy and Technology 33 (2):225-244.
    Algorithms can now identify patterns and correlations in the (big) datasets, and predict outcomes based on those identified patterns and correlations with the use of machine learning techniques and big data, decisions can then be made by algorithms themselves in accordance with the predicted outcomes. Yet, algorithms can inherit questionable values from the datasets and acquire biases in the course of (machine) learning, and automated algorithmic decision-making makes it more difficult for people to see algorithms as biased. While researchers have (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  41. The ethics of algorithms: mapping the debate.Brent Mittelstadt, Patrick Allo, Mariarosaria Taddeo, Sandra Wachter & Luciano Floridi - 2016 - Big Data and Society 3 (2):2053951716679679.
    In information societies, operations, decisions and choices previously left to humans are increasingly delegated to algorithms, which may advise, if not decide, about how data should be interpreted and what actions should be taken as a result. More and more often, algorithms mediate social processes, business transactions, governmental decisions, and how we perceive, understand, and interact among ourselves and with the environment. Gaps between the design and operation of algorithms and our understanding of their ethical implications can have severe consequences (...)
    Download  
     
    Export citation  
     
    Bookmark   252 citations  
  42. Epistemic exploitation in education.Alkis Kotsonis & Gerry Dunne - 2022 - Educational Philosophy and Theory 55 (3):343-355.
    ‘Epistemic exploitation occurs when privileged persons compel marginalised knowers to educate them [and others] about the nature of their oppression’ (Berenstain, 2016, p. 569). This paper scrutinizes some of the purported wrongs underpinning this practice, so that educators might be better equipped to understand and avoid or mitigate harms which may result from such interventions. First, building on the work of Berenstain and Davis (2016), we argue that when privileged persons (in this context, educators) repeatedly compel marginalised or oppressed (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  43. Disambiguating Algorithmic Bias: From Neutrality to Justice.Elizabeth Edenberg & Alexandra Wood - 2023 - In Francesca Rossi, Sanmay Das, Jenny Davis, Kay Firth-Butterfield & Alex John, AIES '23: Proceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society. Association for Computing Machinery. pp. 691-704.
    As algorithms have become ubiquitous in consequential domains, societal concerns about the potential for discriminatory outcomes have prompted urgent calls to address algorithmic bias. In response, a rich literature across computer science, law, and ethics is rapidly proliferating to advance approaches to designing fair algorithms. Yet computer scientists, legal scholars, and ethicists are often not speaking the same language when using the term ‘bias.’ Debates concerning whether society can or should tackle the problem of algorithmic bias are hampered by conflations (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Algorithmic paranoia: the temporal governmentality of predictive policing.Bonnie Sheehey - 2019 - Ethics and Information Technology 21 (1):49-58.
    In light of the recent emergence of predictive techniques in law enforcement to forecast crimes before they occur, this paper examines the temporal operation of power exercised by predictive policing algorithms. I argue that predictive policing exercises power through a paranoid style that constitutes a form of temporal governmentality. Temporality is especially pertinent to understanding what is ethically at stake in predictive policing as it is continuous with a historical racialized practice of organizing, managing, controlling, and stealing time. After first (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  45. Algorithmic Profiling as a Source of Hermeneutical Injustice.Silvia Milano & Carina Prunkl - forthcoming - Philosophical Studies:1-19.
    It is well-established that algorithms can be instruments of injustice. It is less frequently discussed, however, how current modes of AI deployment often make the very discovery of injustice difficult, if not impossible. In this article, we focus on the effects of algorithmic profiling on epistemic agency. We show how algorithmic profiling can give rise to epistemic injustice through the depletion of epistemic resources that are needed to interpret and evaluate certain experiences. By doing so, we not only demonstrate how (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  46. Algorithms, Agency, and Respect for Persons.Alan Rubel, Clinton Castro & Adam Pham - 2020 - Social Theory and Practice 46 (3):547-572.
    Algorithmic systems and predictive analytics play an increasingly important role in various aspects of modern life. Scholarship on the moral ramifications of such systems is in its early stages, and much of it focuses on bias and harm. This paper argues that in understanding the moral salience of algorithmic systems it is essential to understand the relation between algorithms, autonomy, and agency. We draw on several recent cases in criminal sentencing and K–12 teacher evaluation to outline four key ways in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  47. Algorithmic neutrality.Milo Phillips-Brown - manuscript
    Algorithms wield increasing control over our lives—over the jobs we get, the loans we're granted, the information we see online. Algorithms can and often do wield their power in a biased way, and much work has been devoted to algorithmic bias. In contrast, algorithmic neutrality has been largely neglected. I investigate algorithmic neutrality, tackling three questions: What is algorithmic neutrality? Is it possible? And when we have it in mind, what can we learn about algorithmic bias?
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Algorithmic Fairness Criteria as Evidence.Will Fleisher - forthcoming - Ergo: An Open Access Journal of Philosophy.
    Statistical fairness criteria are widely used for diagnosing and ameliorating algorithmic bias. However, these fairness criteria are controversial as their use raises several difficult questions. I argue that the major problems for statistical algorithmic fairness criteria stem from an incorrect understanding of their nature. These criteria are primarily used for two purposes: first, evaluating AI systems for bias, and second constraining machine learning optimization problems in order to ameliorate such bias. The first purpose typically involves treating each criterion as a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Algorithmic decision-making: the right to explanation and the significance of stakes.Lauritz Munch, Jens Christian Bjerring & Jakob Mainz - 2024 - Big Data and Society.
    The stakes associated with an algorithmic decision are often said to play a role in determining whether the decision engenders a right to an explanation. More specifically, “high stakes” decisions are often said to engender such a right to explanation whereas “low stakes” or “non-high” stakes decisions do not. While the overall gist of these ideas is clear enough, the details are lacking. In this paper, we aim to provide these details through a detailed investigation of what we will call (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  50. Algorithms and Autonomy: The Ethics of Automated Decision Systems.Alan Rubel, Clinton Castro & Adam Pham - 2021
    Algorithms influence every facet of modern life: criminal justice, education, housing, entertainment, elections, social media, news feeds, work… the list goes on. Delegating important decisions to machines, however, gives rise to deep moral concerns about responsibility, transparency, freedom, fairness, and democracy. Algorithms and Autonomy connects these concerns to the core human value of autonomy in the contexts of algorithmic teacher evaluation, risk assessment in criminal sentencing, predictive policing, background checks, news feeds, ride-sharing platforms, social media, and election interference. Using these (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
1 — 50 / 976