Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- AI ethics (1)
- AWARE Program (1)
- Algorithm (1)
- Animal studies (1)
- Applied ethics (1)
-
- Artificial moral agents (1)
- CVE Database (1)
- Common Vulnerabilities and Exposures (1)
- Comparative studies (1)
- Computing ethics (1)
- Confucian ethics (1)
- Cybersecurity (1)
- Diagnosis (1)
- Downstream responsibility (1)
- Error reduction (1)
- Ethical responsibility (1)
- Fraud detection (1)
- Hampton Roads (1)
- Healthcare (1)
- Ideal theory (1)
- Machine learning (1)
- Network Security (1)
- Optimization (1)
- Posthuman (1)
- Precision medicine (1)
- Quantum computing (1)
- Risk (1)
- Robot ethics (1)
- Robot studies (1)
- Simulation (1)
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Quantum Computing And Its Applications In Healthcare, Vu Giang
Quantum Computing And Its Applications In Healthcare, Vu Giang
OUR Journal: ODU Undergraduate Research Journal
This paper serves as a review of the state of quantum computing and its application in healthcare. The various avenues for how quantum computing can be applied to healthcare is discussed here along with the conversation about the limitations of the technology. With more and more efforts put into the development of these computers, its future is promising with the endeavors of furthering healthcare and various other industries.
Human Supremacy As Posthuman Risk, Daniel Estrada
Human Supremacy As Posthuman Risk, Daniel Estrada
The Journal of Sociotechnical Critique
Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
OUR Journal: ODU Undergraduate Research Journal
The progress towards an interconnected digital world offers an exciting level of advancement for humanity. Unfortunately, this “online” connection is not safe from the threats and dangers typically associated with physical operations. With the foundation of Cyber Command of DoD cyberspace, the United States Government is taking a prominent stance in cyberspace operations. Like the federal government, both industries and individuals are not immune and are oftentimes unknowingly at risk to cyberattack. This report hopes to bring awareness to common vulnerabilities in multi-user networks by describing a historical background on cyber security as well as outlining current methods of vulnerability …
Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen
Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In the literature of artificial moral agents (AMAs), most work is influenced by either deontological or utilitarian frameworks. It has also been widely acknowledged that these Western “rule-based” ethical theories have encountered both philosophical and computing challenges. To tackle these challenges, this paper explores a non-Western, role-based, Confucian approach to robot ethics. In this paper, we start by providing a short introduction to some theoretical fundamentals of Confucian ethics. Then, we discuss some very preliminary ideas for constructing a Confucian approach to robot ethics. Lastly, we briefly share a couple of empirical studies our research group has recently conducted that …
On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky
On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software’s …