Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Journal

2019

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

A Study Of Existing Cross-Site Scripting Detection And Prevention Techniques Using Xampp And Virtualbox, Jalen Mack, Yen-Hung (Frank) Hu, Mary Ann Hoppa Oct 2019

A Study Of Existing Cross-Site Scripting Detection And Prevention Techniques Using Xampp And Virtualbox, Jalen Mack, Yen-Hung (Frank) Hu, Mary Ann Hoppa

Virginia Journal of Science

Most operating websites experience a cyber-attack at some point. Cross-site Scripting (XSS) attacks are cited as the top website risk. More than 60 percent of web applications are vulnerable to them, and they ultimately are responsible for over 30 percent of all web application attacks. XSS attacks are complicated, and they often are used in conjunction with social engineering techniques to cause even more damage. Although prevention techniques exist, hackers still find points of vulnerability to launch their attacks. This project explored what XSS attacks are, examples of popular attacks, and ways to detect and prevent them. Using knowledge gained …


Mercury Concentrations In Bat Guano From Caves And Bat Houses In Florida And Georgia, Amy E. Edwards, Jenise L. Swall, Charles H. Jagoe Oct 2019

Mercury Concentrations In Bat Guano From Caves And Bat Houses In Florida And Georgia, Amy E. Edwards, Jenise L. Swall, Charles H. Jagoe

Virginia Journal of Science

Previous studies have indicated that several pollutants are bioaccumulating in insectivorous bats, including the heavy metal mercury. This has resulted in an increased presence of mercury in bat waste (guano). In this study, we collected bat guano from ten caves in Florida and Georgia and two bat houses in Florida and analyzed the samples for mercury concentrations (ppm). Since the predominant bat species using caves (Myotis austroriparius) versus bat houses (Tadarida braziliensis) were different, the objective of this study was to make statistical comparisons of the mercury concentrations among caves, between caves and bat houses, and between …


Hacking The Extended Mind: The Security Implications Of The New Metaphysics, Robin L. Zebrowski May 2019

Hacking The Extended Mind: The Security Implications Of The New Metaphysics, Robin L. Zebrowski

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Computer security expert Paul Syverson has argued that there is a computer security equivalent of gaslighting: where a clever adversary could convince some system that some component that is not really a part of the system is in fact a part of the system. If non-biological items from our environments (or even pieces of our environments themselves) can be part of our minds (the standard Extended Mind hypothesis, EM), they are therefore part of our selves, and therefore subject to Syverson’s worry about boundary in a way that has not been explored before. If some version of EM holds, then …


Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen May 2019

Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In the literature of artificial moral agents (AMAs), most work is influenced by either deontological or utilitarian frameworks. It has also been widely acknowledged that these Western “rule-based” ethical theories have encountered both philosophical and computing challenges. To tackle these challenges, this paper explores a non-Western, role-based, Confucian approach to robot ethics. In this paper, we start by providing a short introduction to some theoretical fundamentals of Confucian ethics. Then, we discuss some very preliminary ideas for constructing a Confucian approach to robot ethics. Lastly, we briefly share a couple of empirical studies our research group has recently conducted that …


Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider May 2019

Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.


Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers May 2019

Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In 2017, Amazon discontinued an attempt at developing a hiring algorithm which would enable the company to streamline its hiring processes due to apparent gender discrimination. Specifically, the algorithm, trained on over a decade’s worth of resumes submitted to Amazon, learned to penalize applications that contained references to women, that indicated graduation from all women’s colleges, or otherwise indicated that an applicant was not male. Amazon’s algorithm took up the history of Amazon’s applicant pool and integrated it into its present “problematic situation,” for the purposes of future action. Consequently, Amazon declared the project a failure: even after attempting to …


Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith W. Miller May 2019

Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith W. Miller

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Autonomous vehicle manufacturers, people inside an autonomous vehicle (occupants), and people outside the vehicle (non-occupants) are among the distinct stakeholders when addressing ethical issues inherent in systems that include autonomous vehicles. As responses to recent tragic cases illustrate, advocates for autonomous vehicles tend to focus on occupant safety, sometimes to the exclusion of non-occupant safety. Thus, we aim to examine ethical issues associated with non-occupant safety, including pedestrians, bicyclists, motorcyclists, and riders of motorized scooters. We also explore the ethical implications of technical and policy ideas that some might propose to improve non-occupant safety. In addition, if safety (writ large) …


What To Do When Privacy Is Gone, James Brusseau May 2019

What To Do When Privacy Is Gone, James Brusseau

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction. It considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, transient existence responds to privacy’s loss by ceaselessly generating new personal identities, which translates into constantly producing temporarily unviolated private information. The …


Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky May 2019

Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper, we examine a cluster of ethical controversies generated by the re-identification of anonymized personal data in the context of big data analytics, with particular attention to the implications for personal privacy. Our paper is organized into two main parts. Part One examines some ethical problems involving re-identification of personally identifiable information (PII) in large data sets. Part Two begins with a brief description of Moor and Weckert’s Dynamic Ethics (DE) and Nissenbaum’s Contextual Integrity (CI) Frameworks. We then investigate whether these frameworks, used together, can provide us with a more robust scheme for analyzing privacy concerns that …


Information Privacy: Not Just Gdpr, Danilo Bruschi May 2019

Information Privacy: Not Just Gdpr, Danilo Bruschi

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The "information rush" which is characterizing the current phase of the information age calls for actions aimed at enforcing the citizens' right to privacy. Since the entire information life-cycle (collection, manipulation, storing) is now carried out by digital technologies, most of such actions consists of the adoption of severe measures (both organizational and technological) aimed at improving the security of computer systems, as in the case of the EU General Data Protection Regulation. Usually, data processors which comply with these requirements are exempted by any other duty. Unfortunately recent trends in the computer attack field show that even the adoption …


Human Supremacy As Posthuman Risk, Daniel Estrada May 2019

Human Supremacy As Posthuman Risk, Daniel Estrada

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of public policy. Posthumanism is an historical and cultural situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on Rosi Braidotti’s critical posthumanism and the critique of ideal theory in Charles Mills and Serene Khader to address the use of human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis leads to identifying a set of risks posed by human supremacist policy in a posthuman context, specifically …


Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie May 2019

Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.

This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such …


The Right To Human Intervention: Law, Ethics And Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki May 2019

The Right To Human Intervention: Law, Ethics And Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The paper analyses the new right of human intervention in use of information technology, automatization processes and advanced algorithms in individual decision-making activities. Art. 22 of the new General Data Protection Regulation (GDPR) provides that the data subject has the right not to be subject to a fully automated decision on matters of legal importance to her interests, hence the data subject has a right to human intervention in this kind of decisions.


Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou May 2019

Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Web harvesting and archiving pertains to the processes of collecting from the web and archiving of works that reside on the Web. Web harvesting and archiving is one of the most attractive applications for libraries which plan ahead for their future operation. When works retrieved from the Web are turned into archived and documented material to be found in a library, the amount of works that can be found in said library can be far greater than the number of works harvested from the Web. The proposed participation in the 2019 CEPE Conference aims at presenting certain issues related to …


On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky May 2019

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software’s …


Rates Of Relative Sea Level Rise Along The United States East Coast, Jesse N. Beckman, Joseph E. Garcia Apr 2019

Rates Of Relative Sea Level Rise Along The United States East Coast, Jesse N. Beckman, Joseph E. Garcia

Virginia Journal of Science

Recent studies have indicated that some coastal areas, including the East Coast of the United States, are experiencing higher rates of sea level rise than the global average. Rates of relative sea level rise are affected by changes in ocean dynamics, as well as by surface elevation fluctuations due to local land subsidence or uplift. In this study, we derived long-term trends in annual mean relative sea level using tide gauge data obtained from the Permanent Service for Mean Sea Level for stations along the United States East Coast. Stations were grouped by location into the Northeast, Mid-Atlantic, and Southeast …


Detecting Change: Observations Of Temperature And Precipitation Across Virginia’S Climate Divisions, Jeremy S. Hoffman, Michael J. Allen, Christopher F. Labosier Apr 2019

Detecting Change: Observations Of Temperature And Precipitation Across Virginia’S Climate Divisions, Jeremy S. Hoffman, Michael J. Allen, Christopher F. Labosier

Virginia Journal of Science

Modern global climate change is primarily attributable to human activities and the release of greenhouse gases into the atmosphere. Climate change impacts span a range of sectors, including agriculture, forestry, public health, and water resource management. The Commonwealth of Virginia has already and will continue to deal with many of these impacts, yet lacks concentrated effort to detect, document, and adapt to local climate changes. This study documents observed changes in temperature and precipitation across Virginia’s six climate divisions. Mean seasonal anomalies of minimum temperature, maximum temperature, and precipitation from 1986 to 2016 are examined relative to a long-term 1895-2000 …


Variables Associated With Thermal Emittance Of Wall Mural Art In Richmond, Virginia, Sarah Kwon, Eugene G. Maurakis Apr 2019

Variables Associated With Thermal Emittance Of Wall Mural Art In Richmond, Virginia, Sarah Kwon, Eugene G. Maurakis

Virginia Journal of Science

The objectives of this research are to determine the factors associated with the minimum, maximum, and average thermal emittance temperatures of wall murals in Richmond, Virginia, and make recommendations for color and location of wall murals. Data for 17 parameters were collected for 64 art murals in downtown Richmond, VA from 28 June 2018 – 19 July 2018. Date, time, solar exposure duration, solar elevation, latitude, longitude, air temperature (C), lux, color, solar cardinal minutes, cardinal direction, minimum, maximum, and average surface thermal emittance temperatures of mural face were recorded for each mural. We reject the hypothesis that minimum, maximum, …


Precipitation Trends Across The Commonwealth Of Virginia (1947 – 2016), Michael J. Allen, Thomas R. Allen Apr 2019

Precipitation Trends Across The Commonwealth Of Virginia (1947 – 2016), Michael J. Allen, Thomas R. Allen

Virginia Journal of Science

Water is an important resource for the Commonwealth of Virginia. Too much water increases runoff, disrupt transportation networks, and contributes to school closures. Too little water may adversely impact agricultural operations. To improve climate-related information to Virginia citizens, this study assesses means and changes in precipitation across the Commonwealth of Virginia (1947 – 2016). Using daily station-level precipitation data from the Global Historical Climate Network (GHCN), descriptive statistics were calculated for 43 locations in terms of total precipitation (inches decade-1), precipitation days (x>0”), and heavy precipitation days (x>1.0”). On average, locations showed an overall increase in …