Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (3)
- Arts and Humanities (2)
- Communication (2)
- Computer Sciences (2)
- Ethics and Political Philosophy (2)
-
- Feminist, Gender, and Sexuality Studies (2)
- Law (2)
- Other Philosophy (2)
- Philosophy (2)
- Physical Sciences and Mathematics (2)
- Science and Technology Studies (2)
- Agency (1)
- Animal Law (1)
- Animal Studies (1)
- Applied Ethics (1)
- Artificial Intelligence and Robotics (1)
- Communication Technology and New Media (1)
- Computer Law (1)
- Digital Communications and Networking (1)
- Digital Humanities (1)
- Disability Studies (1)
- Economics (1)
- Engineering Education (1)
- Human Rights Law (1)
- Information Security (1)
- International Humanitarian Law (1)
- Library and Information Science (1)
- Other Computer Engineering (1)
- Keyword
-
- AI ethics (1)
- AWARE Program (1)
- Animal studies (1)
- Automotive Supply Chain (1)
- Blockchain Technology (1)
-
- CVE Database (1)
- Common Vulnerabilities and Exposures (1)
- Consent (1)
- Contextual integrity (1)
- Cybersecurity (1)
- Data (1)
- Dimond Trade (1)
- Fake Protection (1)
- Food Trust (1)
- Fraud Protection (1)
- Hampton Roads (1)
- Ideal theory (1)
- Identity (1)
- Network Security (1)
- Online Voting (1)
- Performativity (1)
- Posthuman (1)
- Power (1)
- Privacy (1)
- Robot studies (1)
- Vulnerability management (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Human Supremacy As Posthuman Risk, Daniel Estrada
Human Supremacy As Posthuman Risk, Daniel Estrada
The Journal of Sociotechnical Critique
Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun
The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun
OUR Journal: ODU Undergraduate Research Journal
No abstract provided.
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
OUR Journal: ODU Undergraduate Research Journal
The progress towards an interconnected digital world offers an exciting level of advancement for humanity. Unfortunately, this “online” connection is not safe from the threats and dangers typically associated with physical operations. With the foundation of Cyber Command of DoD cyberspace, the United States Government is taking a prominent stance in cyberspace operations. Like the federal government, both industries and individuals are not immune and are oftentimes unknowingly at risk to cyberattack. This report hopes to bring awareness to common vulnerabilities in multi-user networks by describing a historical background on cyber security as well as outlining current methods of vulnerability …