Results for 'human security risks'

961 found
Order:
  1. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Being Sure and Living Well: How Security Affects Human Flourishing.J. A. M. Daemen - 2024 - Journal of Value Inquiry 58 (1):93-110.
    This paper analyses how security affects well-being. Security is understood as someone’s sureness of enjoying some good in the future; well-being is treated as a matter of human flourishing. Security can contribute to our well-being in various ways: if we are in fact bound to enjoy a good, in principle this is positive for our flourishing in the future; if we also believe that we will enjoy this good, we can be more efficient in pursuing our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Risks of artificial general intelligence.Vincent C. Müller (ed.) - 2014 - Taylor & Francis (JETAI).
    Special Issue “Risks of artificial general intelligence”, Journal of Experimental and Theoretical Artificial Intelligence, 26/3 (2014), ed. Vincent C. Müller. http://www.tandfonline.com/toc/teta20/26/3# - Risks of general artificial intelligence, Vincent C. Müller, pages 297-301 - Autonomous technology and the greater human good - Steve Omohundro - pages 303-315 - - - The errors, insights and lessons of famous AI predictions – and what they mean for the future - Stuart Armstrong, Kaj Sotala & Seán S. Ó hÉigeartaigh - pages (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  5. Risks of artificial intelligence.Vincent C. Müller (ed.) - 2016 - CRC Press - Chapman & Hall.
    Papers from the conference on AI Risk (published in JETAI), supplemented by additional work. --- If the intelligence of artificial systems were to surpass that of humans, humanity would face significant risks. The time has come to consider these issues, and this consideration must include progress in artificial intelligence (AI) as much as insights from AI theory. -- Featuring contributions from leading experts and thinkers in artificial intelligence, Risks of Artificial Intelligence is the first volume of collected chapters (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Epidemics and food security: the duties of local and international communities.Angela K. Martin - 2021 - In Hanna Schübel & Ivo Wallimann-Helmer (eds.), Justice and food security in a changing climate. Wageningen Academic Publishers. pp. 408-413.
    Over 60% of all epidemics have a zoonotic origin, that is, they result from the transmission of infectious diseases from animals to humans. The spill-over of diseases often happens because humans exploit and use animals. In this article, I outline the four most common interfaces that favour the emergence and spread of zoonotic infectious diseases: wildlife hunting, small-scale farming, industrialised farming practices and live animal markets. I analyse which practices serve human food security – and thus have a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Justifying the risks of COVID-19 challenge trials: The analogy with organ donation.Athmeya Jayaram, Jacob Sparks & Daniel Callies - 2022 - Bioethics 36 (1):100-106.
    In the beginning of the COVID pandemic, researchers and bioethicists called for human challenge trials to hasten the development of a vaccine for COVID. However, the fact that we lacked a specific, highly effective treatment for COVID led many to argue that a COVID challenge trial would be unethical and we ought to pursue traditional phase III testing instead. These ethical objections to challenge trials may have slowed the progress of a COVID vaccine, so it is important to evaluate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the global (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. European urban (counter)terrorism's spacetimematterings: More-than-human materialisations in situationscaping times.Evelien Geerts, Katharina Karcher, Yordanka Dimcheva & Mireya Toribio Medina - 2023 - In Alice Martini & Raquel Da Silva (eds.), Contemporary Reflections on Critical Terrorism Studies. Routledge. pp. 31-52.
    Infusing contemporary critical terrorism studies (CTS) with concepts and methodologies from philosophy and critical theory via a Baradian posthumanist agential realist perspective and (counter)terrorist cases and vignettes, this chapter argues for a retheorisation of (counter)terrorism. It does so, firstly, by reconceptualising terrorism and counterterrorism as complex assemblages consisting not only of discursive-material components – an entanglement now largely accepted within CTS and critical security studies (CSS) – but also of affective layers and more-than-human phenomena. Secondly, by analysing European (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Abundance of words versus Poverty of mind: The hidden human costs of LLMs.Quan-Hoang Vuong & Manh-Tung Ho - manuscript
    This essay analyzes the rise of Large Language Models (LLMs) such as GPT-4 or Gemini, which are now incorporated in a wide range of products and services in everyday life. Importantly, it considers some of their hidden human costs. First, is the question of who is left behind by the further infusion of LLMs in society. Second, is the issue of social inequalities between lingua franca and those which are not. Third, LLMs will help disseminate scientific concepts, but their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. (1 other version)UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    From year to year some of us, people of planet Earth, Earthlings, attacks intensify on the veto right in the UN Security Council. They consciously or unconsciously ignore its metaphisical, ontological and existential statuses established in 1945 by the founders of the United Nations as a result of the multimillion sacrificial struggle of all Humanity against nazism. Perhaps this is due to a misunderstanding of the metaphysics of international relations, the enduring existential significance of the veto for the viability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Australia's Approach to AI Governance in Security and Defence.Susannah Kate Devitt & Damian Copeland - forthcoming - In M. Raska, Z. Stanley-Lockman & R. Bitzinger (eds.), AI Governance for National Security and Defence: Assessing Military AI Strategic Perspectives. Routledge. pp. 38.
    Australia is a leading AI nation with strong allies and partnerships. Australia has prioritised the development of robotics, AI, and autonomous systems to develop sovereign capability for the military. Australia commits to Article 36 reviews of all new means and method of warfare to ensure weapons and weapons systems are operated within acceptable systems of control. Additionally, Australia has undergone significant reviews of the risks of AI to human rights and within intelligence organisations and has committed to producing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Age of Genetics and the age of biotechnology on the way to editing of, human genome.Valentin Teodorovich Cheshko (ed.) - 2016 - Moscow Russia: Kurs-INFRA-M.
    The book discusses some of the stages in the development of genetics, biotechnology in terms of basic strategy of humanity towards the formation of a modern agrarian civilization. Agricultural civilization is seen as part of the biosphere and primary user of its energy flows. Consistently a steps of creation of management tools for live objects to increasing the number of food security of mankind are outlines. The elements of the biosphere degradation started in the results of human activities, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Physical Signals and their Thermonuclear Astrochemical Potentials: A Review on Outer Space Technologies.Yang Immanuel Pachankis - 2022 - International Journal of Innovative Science and Research Technology 7 (5):669-674.
    The article reviews on the technical attributes on current technologies deployed in outer space and those that are being developed and mass produced. The article refutes the Chinese state-controlled Xinhua News’ propaganda several years ago on objecting America’s deployment of nuclear technologies in outer space with rigorous scientific evidence. Furthermore, the article warns on the dangers of physical signals applied in outer space technologies that can threaten the solar system, especially the Mozi quantum satellite with photon beams. The article concludes (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. The Human Security Paradigm and Cosmopolitan Democracy.Andreea Iancu - 2014 - Symposion: Theoretical and Applied Inquiries in Philosophy and Social Sciences 1 (2): 167-174.
    This paper discusses the relation between the human security paradigm and the cosmopolitan democracy scenario as models for humanizing and changing the current international system and transforming it in a global security and development system centered on the individual rather than on the nation state. The main idea for which I argue is that the human security paradigm and the changes it determined in international relations (especially through the responsibility to protect principle) are compatible with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  15
    Leveraging Disaster: Securitization in the Shadow of an Environmental Catastrophe: The Case of the Safer Floating Oil Tanker.Pezzano Riccardo - 2024 - Dissertation, Leiden University
    Recent scholarship on climate and conflict has increasingly examined the dynamic relationship between environmental scarcities and geopolitical tensions. Overall, climate-related shocks often lead to escalated disputes over natural resources, thus positioning climate hazards not only as an environmental issue but also as a catalyst that intensifies existing geopolitical and social frictions. The discourse on climate and conflict has mostly centred on its direct effects on natural resources and environmental conditions. However, its role in precipitating conflicts underscores the critical need to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. AI Sovereignty: Navigating the Future of International AI Governance.Yu Chen - manuscript
    The rapid proliferation of artificial intelligence (AI) technologies has ushered in a new era of opportunities and challenges, prompting nations to grapple with the concept of AI sovereignty. This article delves into the definition and implications of AI sovereignty, drawing parallels to the well-established notion of cyber sovereignty. By exploring the connotations of AI sovereignty, including control over AI development, data sovereignty, economic impacts, national security considerations, and ethical and cultural dimensions, the article provides a comprehensive understanding of this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. On Controllability of Artificial Intelligence.Roman Yampolskiy - 2016
    Invention of artificial general intelligence is predicted to cause a shift in the trajectory of human civilization. In order to reap the benefits and avoid pitfalls of such powerful technology it is important to be able to control it. However, possibility of controlling artificial general intelligence and its more advanced version, superintelligence, has not been formally established. In this paper, we present arguments as well as supporting evidence from multiple domains indicating that advanced AI can’t be fully controlled. Consequences (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  22. AI-Related Misdirection Awareness in AIVR.Nadisha-Marie Aliman & Leon Kester - manuscript
    Recent AI progress led to a boost in beneficial applications from multiple research areas including VR. Simultaneously, in this newly unfolding deepfake era, ethically and security-relevant disagreements arose in the scientific community regarding the epistemic capabilities of present-day AI. However, given what is at stake, one can postulate that for a responsible approach, prior to engaging in a rigorous epistemic assessment of AI, humans may profit from a self-questioning strategy, an examination and calibration of the experience of their own (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become especially (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Uncertain Future of Global Climate Change Commitments.Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La - manuscript
    In the face of the climate crisis, countries around the globe have committed to reducing greenhouse gas emissions (GHG) and achieving carbon neutrality. While the effects of such commitments remain ambiguous, some risks and obstacles could potentially hinder nations, even leading to failure in fulfilling their climate commitments. The paper presents four major challenges that can impede the global progress towards emission reduction targets as pledged: 1) energy security and global socio-economic development demands, 2) political conflicts, geopolitical instability, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. (1 other version)Singularity and Coordination Problems: Pandemic Lessons from 2020.Nicholas Kluge Corrêa & Nythamar De Oliveira - 2021 - Journal of Future Studies 26 (1): 61–74.
    One of the strands of the Transhumanist movement, Singulitarianism, studies the possibility that high-level artificial intelligence may be created in the future, debating ways to ensure that the interaction between human society and advanced artificial intelligence can occur safely and beneficially. But how can we guarantee this safe interaction? Are there any indications that a Singularity may be on the horizon? In trying to answer these questions, We'll make a small introduction to the area of security research in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Philosophy of Devotion: The Longing for Invulnerable Ideals.Paul Katsafanas - 2023 - Oxford: Oxford University Press.
    Why do people persist in commitments that threaten their happiness, security, and comfort? Why do some of our most central, identity-defining commitments resist the effects of reasoning and critical reflection? Drawing on real-life examples, empirical psychology, and philosophical reflection, this book argues that these commitments involve an ethical stance called devotion, which plays a pervasive—but often hidden—role in human life. Devotion typically involves sacralizing certain values, goals, or relationships. To sacralize a value is to treat it as inviolable (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. "Houselessness".Kevin Jobe - 2019 - In Joseph S. Biehl, Samantha Noll & Sharon M. Meagher (eds.), The Routledge Handbook of the Philosophy of the City. London, UK: Routledge. pp. 203-215.
    When we take into consideration all those who fall under the UN-Habitat’s definition of “houseless” or at risk of houselessness, we see that the central issue of homelessness is not the specific problems or failings of the various subpopulations of the houseless, but rather the structural causes of houselessness themselves: social, political, economic, and ecological factors which deprive and dispossess people of their livelihoods, their labor, their security, and their dignity. However, when debates are framed too narrowly as if (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Eksperci i narcyzm kulturowy - próba analizy wzajemnych relacji.Andrzej Klimczuk - 2011 - In Narcyzm: Jednostka--Społeczeństwo--Kultura. Uwb. pp. 218--255.
    At the beginning of the XXI century, human societies are entering a period of "late modernity" characterized by new forms of trust and risk, untransparent social situations and economic, political and cultural globalization. These processes are associated with the presence of abstract systems that surround people and which require support of people with expertise in the fields which include transport, telecommunications, finance, security, media, energy. At the same time, it is noted that the expertise cult is born and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. (1 other version)Pandemic Economic Crisis: Changes and New Challenges to Society: scientific monograph.Maksym Bezpartochnyi (ed.) - 2020 - Sofia, Bułgaria: VUZF Publishing House “St. Grigorii Bogoslov”.
    The current economic crisis caused by the COVID-19 pandemic has created new changes and challenges for society, which has led to a deeper identification of pressing problems and to develop strategies and models for overcoming crises in various countries, industries and businesses. The formation and improvement of modern strategies and models of crisis management is impossible without optimizing the resources of economic entities, providing assistance at various levels of government to support priority sectors of the economy, finding additional sources of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Risking Our Security, or Securing Our Risk?: Neoimperialists Play With A Stacked Deck.Leigh M. Johnson - 2005 - Contretemps 4 (1):45-57.
    Download  
     
    Export citation  
     
    Bookmark  
  34. Socio-economic factors of providing quality of livestock products in Ukraine.Iryna Kyryliuk, Yevhenii Kyryliuk, Alina Proshchalykina & Sergii Sardak - 2020 - Journal of Hygienic Engineering and Design 31:37-47.
    In the context of Ukraine’s membership in the WTO, the functioning of a free trade area with the EU, the opportunity for agricultural producers to obtain a larger share of the value added is primarily linked to the intensification of trade in domestic livestock products and their processing products. However, their production is one of the high-risk areas and requires a set of measures aimed at ensuring proper quality. Without effective solution of the problem of quality of livestock products it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. ‘Liberal Democracy’ in the ‘Post-Corona World’.Shirzad Peik - 2020 - Journal of Philosophical Investigations at University of Tabriz 14 (31):1-29.
    ABSTRACT A new ‘political philosophy’ is indispensable to the ‘post-Corona world,’ and this paper tries to analyze the future of ‘liberal democracy’ in it. It shows that ‘liberal democracy’ faces a ‘global crisis’ that has begun before, but the ‘novel Coronavirus pandemic,’ as a setback for it, strongly encourages that crisis. ‘Liberalism’ and ‘democracy,’ which had long been assumed by ‘political philosophers’ to go together, are now becoming decoupled, and the ‘liberal values’ of ‘democracy’ are eroding. To find why and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Artificial intelligence as a public service: learning from Amsterdam and Helsinki.Luciano Floridi - 2020 - Philosophy and Technology 33 (4):541–⁠546.
    In September 2020, Helsinki and Amsterdam announced the launch of their open AI registers—the first cities in the world to offer such a service. The AI registers describe what, where, and how AI applications are being used in the two municipalities; how algorithms were assessed for potential bias or risks; and how humans use the AI services. Examining issues of security and transparency, this paper discusses the potential for implementing AI in an urban public service setting and how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Making Better Informed, More Confident COVID-19 Decisions: Vaccine Hesitancy, Its Barriers and Impact Studies: Taking Bayelsa State as an Example.Morufu Olalekan Raimi, Emeka Chisom Lucky, Ebikapaye Okoyen, Angalabiri Clement, Christopher Ogbointuwei & Atoyebi Babatunde - 2021 - International Journal of Vaccines and Immunization 5 (1):1-13.
    Background: Health care practitioners are recognized to have a large influence in shaping uptake of vaccine in new borns, children, adolescents, as well as adults. Parents remain more secure in their decisions when health care practitioners communicate successfully with them about vaccine dangers and benefits, the value as well as necessity for vaccinations, as well as vaccine safety. Thus, immunization remain the foundation of the primary health care system, an indisputable human right as well as a global health and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Climate Change and Our Moral Obligations to Future Generations: A Critical Analysis (8th edition).Shamim Ara Pia - 2018 - Jibon Doshon 8 (ISSN 2312-7848):141-160.
    Climate is a fundamental element of the environment. Human beings' sound living depends on a healthy and sustainable climate. However, our climate is losing its natural balance day by day. As a result, it is posing harmful effects on us through different types of natural calamities. Apart from several natural processes, anthropocentric (human-caused) activities are the main cause of it. Different types of natural disasters that are occurring in the environment—for instance, hurricanes, cyclones, earthquakes, mudslides, floods, wildfires, volcanic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. All too human? Identifying and mitigating ethical risks of Social AI.Henry Shevlin - manuscript
    This paper presents an overview of the risks and benefits of Social AI, understood as conversational AI systems that cater to human social needs like romance, companionship, or entertainment. Section 1 of the paper provides a brief history of conversational AI systems and introduces conceptual distinctions to help distinguish varieties of Social AI and pathways to their deployment. Section 2 of the paper adds further context via a brief discussion of anthropomorphism and its relevance to assessment of (...)-chatbot relationships. Section 3 of the paper provides a survey of potential and in some cases demonstrated harms associated with user interactions with Social AI systems. Finally, Section 4 discusses how the benefits and harms of Social AI can best be addressed, with a primary focus on how frameworks from AI ethics can inform their development. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Casteism, Social Security and Violation of Human Rights.Desh Raj Sirswal - 2012 - In Manoj Kumar (ed.), Human Rights for All. CPPIS Pehowa. pp. 128-131.
    The consciousness of social security comes to a man when he feels that he is getting his basic rights. Human Rights are related to those rights which are related to man’s life, freedom, equality and self-esteem, are established by Indian constitution or universal declaration of human rights and implemented by Indian judiciary system. In other words, “Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Monitoring Peace and Security Mandates for Human Rights.Deepa Kansra - 2022 - Artha: The Sri Ram Economics Journal 1 (1):188-192.
    The jurisprudence under international human rights treaties has had a considerable impact across countries. Known for addressing complex agendas, the work of expert bodies under the treaties has been credited and relied upon for filling the gaps in the realization of several objectives, including the peace and security agenda. -/- In 1982, the Human Rights Committee (ICCPR), in a General Comment observed that “states have the supreme duty to prevent wars, acts of genocide and other acts of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The Return of Quarantinism and How to Keep It in Check: From Wishful Regulations to Political Accountability.Giovanni De Grandis - 2010 - Dissertation, University College London
    Concerns about emerging and re-emerging infectious diseases have given a new lease of life to quarantinist measures: a series of time-honoured techniques for controlling the spread of infectious diseases through breaking the chain of human contagion. Since such measures typically infringe individual rights or privacy their use is subject to legal regulations and gives rise to ethical and political worries and suspicions. Yet in some circumstances they can be very effective. After considering some case studies that show how epidemics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. “The myth of the nuclear revolution: Power politics in the atomic age,”. [REVIEW]Campbell Craig & S. M. Amadae - 2021 - Journal of Strategic Studies 1:1-9.
    This book review of Lieber and Press's “The myth of the nuclear revolution: Power politics in the atomic age" challenges the authors' position that nuclear weapons essentially have the same properties of conventional weapons. We argue that nuclear weapons alter warfare because they can end human civilization, and they pose a shared risk of mutual destruction.
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Edge of Sentience: Risk and Precaution in Humans, Other Animals, and AI.Jonathan Birch - 2024 - Oxford: Oxford University Press.
    An Open Access book published under a CC-BY-NC-ND 4.0 licence. Can octopuses feel pain and pleasure? What about crabs, shrimps, insects, or spiders? How do we tell whether a person unresponsive after severe brain injury might be suffering? When does a fetus in the womb start to have conscious experiences? Could there even be rudimentary feelings in miniature models of the human brain, grown from human stem cells? And what about AI? These are questions about the edge of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Selection and application of appropriate analytical methods needed to assess the risks reducing the security of the protected system.Josef Reitšpís, Martin Mašľan & Igor Britchenko - 2021 - Baltic Journal of Economic Studies 7 (3):1 – 8.
    Risk assessment is one of the prerequisites for understanding its causes and possible consequences. We base our risk assessment on the principles described in the European standard EN 31000 - Risk Management Process. This standard comprehensively describes the continuous activities that are necessary in managing risks and minimizing their possible adverse effects on the operation of the system under investigation. In this activity, it is necessary to first identify the existing risks, then analyze and evaluate the identified (...). In the analysis of existing risks, it is possible to use both qualitative and quantitative analytical methods, or combine them. We use qualitative methods in cases where we do not have a sufficient amount of input information, these are more subjective. Quantitative methods are more accurate, but also more demanding on input information and time. The choice of a suitable analytical method is a basic prerequisite for knowledge of risks and their evaluation. The values of individual risks obtained in this way are the basis for determining the measures that are ecessary to minimize them, i.e., to adjust them to an acceptable level. The draft measures are always based on the value of the individual components used to calculate the risk number, as well as on the value of the asset , which needs to be protected. Appropriately chosen analytical methods are one of the basic prerequisites for the consistent application of the principles of risk management, as a continuous process aimed at increasing the overall security of the system under study. In the article, the author describes the procedures used in risk assessment, as well as specific analytical methods that can be used in working with risks. The aim of identifying risk factors is to create a list of events that could cause undesirable disruption to ongoing processes. At this stage, we define all the risks that will be subsequently analyzed and evaluated. When identifying, we can use methods such as, e.g. SWOT, PHA (Preliminary Hazard Analysis) or CA (Checklist Analysis). Methods suitable for determining the causes and creating scenarios for the course of a risk event are ETA (Event Tree Analysis) or FTA (Fault Tree Analysis). The basic analysis of the system can be performed using the FMEA method (Failure Mode and Effect Analysis), which provides a numerical risk assessment. By comparison with the numerical value of the risk that we are willing to accept, we obtain 2 groups of risks. Acceptable, which will be given regular attention and unacceptable, which we will focus on in risk management and we will try to minimize its negative affect on the functioning of the system under study. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Surviving global risks through the preservation of humanity's data on the Moon.Alexey Turchin & D. Denkenberger - 2018 - Acta Astronautica:in press.
    Many global catastrophic risks are threatening human civilization, and a number of ideas have been suggested for preventing or surviving them. However, if these interventions fail, society could preserve information about the human race and human DNA samples in the hopes that the next civilization on Earth will be able to reconstruct Homo sapiens and our culture. This requires information preservation of an order of magnitude of 100 million years, a little-explored topic thus far. It is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Painless Civilization and Fundamental Sense of Security: A Philosophical Challenge in the Age of Human Biotechnology.Masahiro Morioka - 2005 - Polylog: Forum for Intercultural Philosophy 6:1-1.
    This paper discusses some philosophical problems lurking behind the issues of human biotechnology, particularly prenatal screening. Firstly, prenatal screening technology disempowers existing disabled people. The second problem is that it systematically deprives us of the “fundamental sense of security.” This is a sense of security that allows us to believe that we will never be looked upon by anyone with such unspoken words as, “I wish you were never born” or “I wish you would disappear from the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  50. Mitigating emotional risks in human-social robot interactions through virtual interactive environment indication.Aorigele Bao, Yi Zeng & Enmeng lu - 2023 - Humanities and Social Sciences Communications 2023.
    Humans often unconsciously perceive social robots involved in their lives as partners rather than mere tools, imbuing them with qualities of companionship. This anthropomorphization can lead to a spectrum of emotional risks, such as deception, disappointment, and reverse manipulation, that existing approaches struggle to address effectively. In this paper, we argue that a Virtual Interactive Environment (VIE) exists between humans and social robots, which plays a crucial role and demands necessary consideration and clarification in order to mitigate potential emotional (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 961