Results for 'privacy engineering'

1000+ found
Order:
  1. Online information of vaccines: information quality, not only privacy, is an ethical responsibility of search engines.Pietro Ghezzi, Peter Bannister, Gonzalo Casino, Alessia Catalani, Michel Goldman, Jessica Morley, Marie Neunez, Andreu Prados-Bo, Pierre Robert Smeeters, Mariarosaria Taddeo, Tania Vanzolini & Luciano Floridi - 2021 - Frontiers in Medicine 7.
    The fact that Internet companies may record our personal data and track our online behavior for commercial or political purpose has emphasized aspects related to online privacy. This has also led to the development of search engines that promise no tracking and privacy. Search engines also have a major role in spreading low-quality health information such as that of anti-vaccine websites. This study investigates the relationship between search engines’ approach to privacy and the scientific quality of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  4. Engaging Engineering Teams Through Moral Imagination: A Bottom-Up Approach for Responsible Innovation and Ethical Culture Change in Technology Companies.Benjamin Lange, Geoff Keeling, Amanda McCroskery, Ben Zevenbergen, Sandra Blascovich, Kyle Pedersen, Alison Lentz & Blaise Aguera Y. Arcas - 2023 - AI and Ethics 1:1-16.
    We propose a ‘Moral Imagination’ methodology to facilitate a culture of responsible innovation for engineering and product teams in technology companies. Our approach has been operationalized over the past two years at Google, where we have conducted over 50 workshops with teams from across the organization. We argue that our approach is a crucial complement to existing formal and informal initiatives for fostering a culture of ethical awareness, deliberation, and decision-making in technology design such as company principles, ethics and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Engineering Social Justice into Traffic Control for Self-Driving Vehicles?Milos N. Mladenovic & Tristram McPherson - 2016 - Science and Engineering Ethics 22 (4):1131-1149.
    The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal access. Our (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  6. Operationalizing the Ethics of Connected and Automated Vehicles. An Engineering Perspective.Fabio Fossa - 2022 - International Journal of Technoethics 13 (1):1-20.
    In response to the many social impacts of automated mobility, in September 2020 the European Commission published Ethics of Connected and Automated Vehicles, a report in which recommendations on road safety, privacy, fairness, explainability, and responsibility are drawn from a set of eight overarching principles. This paper presents the results of an interdisciplinary research where philosophers and engineers joined efforts to operationalize the guidelines advanced in the report. To this aim, we endorse a function-based working approach to support the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on data scientists, or (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated public sphere, including which rights (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  70
    Connected and Automated Vehicles: Integrating Engineering and Ethics.Fabio Fossa & Federico Cheli (eds.) - 2023 - Cham: Springer.
    This book reports on theoretical and practical analyses of the ethical challenges connected to driving automation. It also aims at discussing issues that have arisen from the European Commission 2020 report “Ethics of Connected and Automated Vehicles. Recommendations on Road Safety, Privacy, Fairness, Explainability and Responsibility”. Gathering contributions by philosophers, social scientists, mechanical engineers, and UI designers, the book discusses key ethical concerns relating to responsibility and personal autonomy, privacy, safety, and cybersecurity, as well as explainability and human-machine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. AI, Biometric Analysis, and Emerging Cheating Detection Systems: The Engineering of Academic Integrity?Jo Ann Oravec - 2022 - Education Policy Analysis Archives 175 (30):1-18.
    Abstract: Cheating behaviors have been construed as a continuing and somewhat vexing issue for academic institutions as they increasingly conduct educational processes online and impose metrics on instructional evaluation. Research, development, and implementation initiatives on cheating detection have gained new dimensions in the advent of artificial intelligence (AI) applications; they have also engendered special challenges in terms of their social, ethical, and cultural implications. An assortment of commercial cheating–detection systems have been injected into educational contexts with little input on the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against viable challenges, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Yol ve Yolcu Arasındaki İlişki Üzerine Kısa bir Felsefi-Edebi İnceleme: Herakleitos DK 22B60 VE Frost'un Road Not Taken Şiirinden Hareketle Yol.Engin Yurt - 2018 - Journal of History School (JOHS) 11 (XXXIV):987-1003.
    In here, philosophical-literate thinking on the way is mainly tried. On one side, making a philosophical analysis of Heraclitus’ fragment 60 is aimed. The different views on what Heraclitus might have meant in this article which is generally translated as the way up and the way down are one and the same are examined. On the other side, with a reading of Robert Frost’s famous poem of Road Not Taken, it has been tried whether a phenomenological interpretation of the way (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Nietzsche’nin Zerdüşt’ünün Çınlayamadığı Kulaklar: Nietzsche 21. Yüzyıl İnsanına Ahlak Üzerine Ne Söyleyebilir?Engin Yurt & Nurten Ki̇ri̇ş Yilmaz - 2018 - Beytulhikme An International Journal of Philosophy 8 (1):170-190.
    In this article, it has been aimed to examine Nietzsche’s main critique towards different understandings of morals in his era. With this criticism, it is aimed to integrally understand the opinions -which are articulated directly or metaphorically- towards morals which have been encountered. In here, while keeping in mind the difference between the concepts of immoralism and amoralism, Nietzsche’s views are interpreted. Being parallel to that aim mentioned above, it has been investigated if there is a thinking in Nietzsche which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Felsefede İnsan-Hayvan Sorunu: Derrida ve Levinas Arasındaki Karşıtlığa Yeni Bir Yaklaşım: Kucaklama Olarak Sarılma Üzerine.Engin Yurt - 2018 - Flsf 25 (25):181-206.
    In this article, the difference between human and animal in philosophy is mainly handled. This difference is thought over the concept of “the other” and Heidegger’s phenomenological distinction between human and animal. With respect to especially the views of Derrida and Levinas regarding to this matter, it has been attempted to exhibit this difference. Therefore, the two approaches -which were represented as the opposition of Derrida and Levinas- have been tried to clarify. After this, as a new approach to this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Varlıktan Dile Dilden Varlığa.Engin Yurt & Erdal Yıldız - 2016 - Kutadgubilig Felsefe-Bilim Araştırmaları Dergisi 30 (30):777-799.
    In this text presented here, it has been tried to Show the difference between Heidegger’s first and second era understanding of language. In his first era, to manifest Heidegger’s understanding of language, outlines of Being and Time has been discussed and concerned chapter is read carefully. To manifest his understanding of language in second era, the work of On the Way to the Language has been taken as a base. With this comparative study, it has been tried to shown the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Negatif Teoloji Bağlamında Apophasis ile Aphairesis ve Aristoteles'te Olası Terim Kökeni Araştırması.Engin Yurt - 2017 - Kutadgubilig Felsefe-Bilim Araştırmaları Dergisi 34 (34):111-137.
    In this work, it has been mainly aimed to make a research on origin, meaning and context of two terms [Apophasis and Aphairesis]. These two terms which have an important place within the negative theology that has been thought explicitly appeared first with Pseudo-Dionysos Areopagita –but if required, it can be started in Plotinus, Aristotle, Plato or Parmenides– in history of philosophy [terms which also have been a subject to a misunderstanding, to a problem due to their being understood as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. İnsan Aklının Evrimsel Gelişimi Üzerine: Zıt Görüşlerin Kısa bir Analizi ve Felsefi bir Yorum.Engin Yurt - 2018 - Felsefe Dünyasi 67 (67):120-143.
    In this article, some theories about evolutionary progress of human mind are examined and criticised. Through a comparative reading of these theories -which are sometimes contradictory to each other- it has been tried to present the common missing parts of these theories. The meaning of these theories for philosophy has been thought and the presupposition of linearity in these theories is criticised. The relation of the concept of emotion with the terms like cognition, apprehension, comprehension, intellect, self-awareness, consciousness -which stand (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Heidegger-Sartre Anlaşmazlığının Hümanizmin Güncel Terminoloji Sorununa bir Çözüm Getirme Olasılığına Dair bir Araştırma.Engin Yurt - 2017 - Felsefi Düsün 9 (9):289-317.
    When humanism is thought, especially within the borders of 20th century philosophy, one of the things that first comes to mind is the statements which have occurred in 1950s between Martin Heidegger and Jean-Paul Sartre, can be named as Heidegger-Sartre Controversy on Humanism and mainly based on two texts. Sartre, in one of his speeches, builds an essential connection between humanism and existentialism and in here he defines Heidegger as an existentialist like himself. In return, Heidegger, probably as a criticism (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Hıristiyanlıkta Kutsalın Doğasına Dair Fikir Ayrılığı ve Buna Kilise Babaları'nda Olası bir Çözüm.Engin Yurt - 2018 - Felsefi Düsün 10 (10):337-363.
    This article mainly aims to make an examination over the holy. It has been inquired into how something being ascribed holy can have a meaning in philosophy. As the article's research area, the differences in both opinion and execution which have later divided Christianity into two as Catholic and Orthodox Churches have been selected. The separation of these two churches under the subject titles such as Filioque controversy, the idea of First Among Equals (primas inter pares), and ritual of Transubstantiation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Herder'den Heidegger'e: Sorge.Engin Yurt & Erdal Yıldız - 2016 - Kutadgubilig Felsefe-Bilim Araştırmaları Dergisi 30 (30):375-399.
    The article which is presented here includes an analysis of concept of “care” which mostly has found itself a place in history of philosophy in different forms. Even though thinkers who gave a place to this concept in their works, the main interest is about what Herder and Heidegger said. It has been tried to show how concept of “care” is understood throughout the history of philosophy. Lastly, it has been tried if there is a possible and genuine interpretation.
    Download  
     
    Export citation  
     
    Bookmark  
  22. İnsan Olmak: Dil ve Bilincin Eşkökenliğine Dair bir Analiz ve Araştırma.Engin Yurt - 2018 - Kutadgubilig Felsefe-Bilim Araştırmaları Dergisi 37 (37):233-250.
    In this article, it has been searched if the language and consciousness have a co-origin or not. This origin of language and consciousness problem which draws interest in areas especially like anthropology, biology and evolutionary linguistics and evolutionary psychology is tried to be handled from a philosophical point of view. By presenting the theories about the relation between language and consciousness, theories that are well-accepted but contradicted to another from certain aspects, a thinking -which tries to go beyond this contradiction- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Integration of Motion Capture and EMG data for Classifying the Human Motions.Mihai Nadin, Gaurav N. Pradhan, Navzer Engineer & Balakrishnan Prabhakaran - 2007 - 2007 IEEE 23rd International Conference on Data Engineering Workshop.
    Download  
     
    Export citation  
     
    Bookmark  
  24. Technoscience and ethics foresight.Luciano Floridi - 2014 - Philosophy and Technology 27 (4):499-501.
    In October 2014, a European Commission conference discussed SETI (Science, Engineering, Technology and Industry) achievements and their potential future impact on the economy and individuals’ well-being. This article highlights and discusses three of the salient features to emerge from the conference: the connection between science and technology, the issue of data privacy, and the need to develop ethical foresight.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  25. “Don’t Be Evil” and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility).Jo Ann Oravec (ed.) - 2018 - IGI Global.
    Societal pressures on high tech organizations to define and disseminate their ethical stances are increasing as the influences of the technologies involved expand. Many Internet-based businesses have emerged in the past decades; growing numbers of them have developed some kind of moral declaration in the form of mottos or ethical statements. For example, the corporate motto “don’t be evil” (often linked with Google/Alphabet) has generated considerable controversy about social and cultural impacts of search engines. After addressing the origins of these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Will Hominoids or Androids Destroy the Earth? —A Review of How to Create a Mind by Ray Kurzweil (2012).Michael Starks - 2017 - In Suicidal Utopian Delusions in the 21st Century 4th ed (2019). Henderson, NV USA: Michael Starks. pp. 675.
    Some years ago I reached the point where I can usually tell from the title of a book, or at least from the chapter titles, what kinds of philosophical mistakes will be made and how frequently. In the case of nominally scientific works these may be largely restricted to certain chapters which wax philosophical or try to draw general conclusions about the meaning or long term significance of the work. Normally however the scientific matters of fact are generously interlarded with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And it (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  28. Gaming Google: Some Ethical Issues Involving Online Reputation Management.Jo Ann Oravec - 2013 - Journal of Business Ethics Education 10:61-81.
    Using the search engine Google to locate information linked to individuals and organizations has become part of everyday functioning. This article addresses whether the “gaming” of Internet applications in attempts to modify reputations raises substantial ethical concerns. It analyzes emerging approaches for manipulation of how personally-identifiable information is accessed online as well as critically-important international differences in information handling. It investigates privacy issues involving the data mining of personally-identifiable information with search engines and social media platforms. Notions of “gaming” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Intersex Athletes: Do We Need A Gender Police In Professional Sports?Maren Behrensen - 2010 - IWM Junior Visiting Fellows' Conferences XXIX.
    Based on the case of Caster Semenya, I argue in this paper that the practice of Gender Verification Testing (GVT) in professional sports is unethical and pointless. The presumed benefit of GVT—ensuring fair competition for female athletes—is virtually nonexistent compared to its potential harms, in particular the exposure of individual athletes to a largely interphobic public. GVTs constitute a serious incursion on the athlete’s dignity, autonomy, and privacy; an incursion that cannot be justified by the appeal to fairness. My (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Bioethics, Complementarity, and Corporate Criminal Liability.Ryan Long - 2017 - International Criminal Law Review 17 (6):997-1021.
    This article provides a brief introduction to some contemporary challenges found in the intersection of bioethics and international criminal law involving genetic privacy, organ trafficking, genetic engineering, and cloning. These challenges push us to re-evaluate the question of whether the international criminal law should hold corporations criminally liable. I argue that a minimalist and Strawsonian conception of corporate responsibility could be useful for deterring the wrongs outlined in first few sections and in answering compelling objections to corporate criminal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Ethics of Driving Automation. Artificial Agency and Human Values.Fabio Fossa - 2023 - Cham: Springer.
    This book offers a systematic and thorough philosophical analysis of the ways in which driving automation crosses path with ethical values. Upon introducing the different forms of driving automation and examining their relation to human autonomy, it provides readers with in-depth reflections on safety, privacy, moral judgment, control, responsibility, sustainability, and other ethical issues. Driving is undoubtedly a moral activity as a human act. Transferring it to artificial agents such as connected and automated vehicles necessarily raises many philosophical questions. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not restricted to, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Good Robot, Bad Robot: Dark and Creepy Sides of Robotics, Automated Vehicles, and Ai.Jo Ann Oravec - 2022 - New York, NY, USA: Palgrave-Macmillan.
    This book explores how robotics and artificial intelligence can enhance human lives but also have unsettling “dark sides.” It examines expanding forms of negativity and anxiety about robots, AI, and autonomous vehicles as our human environments are reengineered for intelligent military and security systems and for optimal workplace and domestic operations. It focuses on the impacts of initiatives to make robot interactions more humanlike and less creepy. It analyzes the emerging resistances against these entities in the wake of omnipresent AI (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. "Don't Be Evil" and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility).Jo Ann Oravec - 2018 - In “Don’t Be Evil” and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility). IGI Global. pp. 200-237.
    Societal pressures on high tech organizations to define and disseminate their ethical stances are increasing as the influences of the technologies involved expand. Many Internet-based businesses have emerged in the past decades; growing numbers of them have developed some kind of moral declaration in the form of mottos or ethical statements. For example, the corporate motto “don’t be evil” (often linked with Google/ Alphabet) has generated considerable controversy about social and cultural impacts of search engines. After addressing the origins of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Health Care Using AI.T. Poongodi - 2019 - International Journal of Research and Analytical Reviews 6 (2):141-145.
    Breast cancer treatment is being transformed by artificial intelligence (AI). Nevertheless, most scientists, engineers, and physicians aren't ready to contribute to the healthcare AI revolution. In this paper, we discuss our experiences teaching a new American student undergraduate course that seeks to train the next generation for cross-cultural design thinking, which we believe is critical for AI to realize its full potential in breast cancer treatment. The main tasks of this course are preparing, performing and translating interviews with healthcare professionals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Conceptual Engineering and the Politics of Implementation.Matthieu Queloz & Friedemann Bieber - 2022 - Pacific Philosophical Quarterly 103 (3):670-691.
    Conceptual engineering is thought to face an ‘implementation challenge’: the challenge of securing uptake of engineered concepts. But is the fact that implementation is challenging really a defect to be overcome? What kind of picture of political life would be implied by making engineering easy to implement? We contend that the ambition to obviate the implementation challenge goes against the very idea of liberal democratic politics. On the picture we draw, the implementation challenge can be overcome by institutionalizing (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  37. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  38. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  40. Engineering what? On concepts in conceptual engineering.Steffen Koch - 2020 - Synthese 199 (1-2):1955-1975.
    Conceptual engineers aim to revise rather than describe our concepts. But what are concepts? And how does one engineer them? Answering these questions is of central importance for implementing and theorizing about conceptual engineering. This paper discusses and criticizes two influential views of this issue: semanticism, according to which conceptual engineers aim to change linguistic meanings, and psychologism, according to which conceptual engineers aim to change psychological structures. I argue that neither of these accounts can give us the full (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  41. Conceptual Engineering: The Master Argument.Herman Cappelen - 2019 - In Alexis Burgess, Herman Cappelen & David Plunkett (eds.), Conceptual Engineering and Conceptual Ethics. New York, USA: Oxford University Press.
    I call the activity of assessing and developing improvements of our representational devices ‘conceptual engineering’.¹ The aim of this chapter is to present an argument for why conceptual engineering is important for all parts of philosophy (and, more generally, all inquiry). Section I of the chapter provides some background and defines key terms. Section II presents the argument. Section III responds to seven objections. The replies also serve to develop the argument and clarify what conceptual engineering is.
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  42. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Group privacy: a defence and an interpretation.Luciano Floridi - 2017 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group Privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  46. Compound Metric Assisted Trust Aware Routing for Internet of Things through Firefly Algorithm.Mohammad Osman, Kaleem Fatima & P. Naveen Kumar - 2023 - International Journal of Intelligent Engineering and Systems 16 (3):280-291.
    Security and privacy are the major concerns in the internet of things (IoT) which are uncertain and unpredictable. Trust aware routing is one of the recent and effective strategies which ensure better resilience for IoT nodes from different security threats. Towards such concern, this paper proposes a new strategy called independent onlooker withstanding trust aware routing (IOWTAR) for IoT. IOWTAR introduced a new compound trust metric by combining three individual metrics namely independent trust, onlooker trust, and withstanding trust (a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Forecasting COVID-19 cases Using ANN.Ibrahim Sufyan Al-Baghdadi & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):22-31.
    Abstract: The COVID-19 pandemic has posed unprecedented challenges to global healthcare systems, necessitating accurate and timely forecasting of cases for effective mitigation strategies. In this research paper, we present a novel approach to predict COVID-19 cases using Artificial Neural Networks (ANNs), harnessing the power of machine learning for epidemiological forecasting. Our ANNs-based forecasting model has demonstrated remarkable efficacy, achieving an impressive accuracy rate of 97.87%. This achievement underscores the potential of ANNs in providing precise and data-driven insights into the dynamics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Engineer education as citizenship education.Ogawa Taiji, Murase Tomoyuki & Kei Nishiyama - 2020 - In Ogawa Taiji, Murase Tomoyuki & Kei Nishiyama (eds.), Proceedings of InInternational Symposium on Advances in Technology Education Conference. International Symposium on Advances in Technology Education. pp. 326-331.
    Engineering and technology aim to lead a better life for people. But the meaning of “better” is highly contested in modern democratic societies where different citizens have different cultures and values. Engineers, as one of the citizens in such societies, are also living in multicultural and multi-value settings, and therefore they need to be responsible for such diversity when they engage in technological developments. Therefore, in engineering education, it is necessary to aim at not only acquiring the specialized (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Privacy.Edmund Byrne - 1998 - In Encyclopedia of Applied Ethics. San Diego: Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 1000