Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Data (2)
- Privacy (2)
- Algorithm (1)
- Assistive systems (1)
- Automotive Supply Chain (1)
-
- Blockchain Technology (1)
- Consent (1)
- Content mining (1)
- Contextual integrity (1)
- Culture (1)
- Cultured technology (1)
- Cyberbullying (1)
- Dimond Trade (1)
- Ethics (1)
- Fake Protection (1)
- Food Trust (1)
- Fraud Protection (1)
- Hegel (1)
- Identity (1)
- Interactive systems (1)
- Kant (1)
- Manners (1)
- Objective spirit (1)
- Online Voting (1)
- Performativity (1)
- Philosophy of technology (1)
- Power (1)
- Social appropriateness (1)
- Social media (1)
- Teenagers (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun
The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun
OUR Journal: ODU Undergraduate Research Journal
No abstract provided.
A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche
A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The article introduces a concept of cultured technology, i.e. intelligent systems capable of interacting with humans and showing (or simulating) manners, of following customs and of socio-sensitive considerations. Such technologies might, when deployed on a large scale, influence and change the realm of human customs, traditions, standards of acceptable behavior, etc. This realm is known as the "objective spirit" (Hegel), which usually is thought of as being historically changing but not subject to deliberate human design. The article investigates the question of whether the purposeful design of interactive technologies (as cultured technologies) could enable us to shape modes of …
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Virginia Journal of Science
The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …