Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Information Security (3)
- Applied Ethics (2)
- Artificial Intelligence and Robotics (2)
- Arts and Humanities (2)
- Computer Engineering (2)
-
- Engineering (2)
- Philosophy (2)
- Science and Technology Studies (2)
- Social and Behavioral Sciences (2)
- Agency (1)
- Animal Law (1)
- Animal Studies (1)
- Disability Studies (1)
- Engineering Education (1)
- Ethics and Political Philosophy (1)
- Feminist, Gender, and Sexuality Studies (1)
- Human Rights Law (1)
- International Humanitarian Law (1)
- Law (1)
- OS and Networks (1)
- Other Computer Engineering (1)
- Other Philosophy (1)
- Race, Ethnicity and Post-Colonial Studies (1)
- Risk Analysis (1)
- Robotics (1)
- Keyword
-
- Cybersecurity (3)
- AI ethics (1)
- AWARE Program (1)
- Animal studies (1)
- Autonomous vehicles (1)
-
- CVE Database (1)
- Common Vulnerabilities and Exposures (1)
- Cyber (1)
- Encryption (1)
- Ethics (1)
- Hampton Roads (1)
- Ideal theory (1)
- Maleware (1)
- Network Security (1)
- Non-occupants (1)
- Occupants (1)
- Personally identifiable information (1)
- Posthuman (1)
- RSA Algorithm (1)
- Ransomeware (1)
- Robot studies (1)
- Smartphone (1)
- Virtual (1)
- Virtual environment (1)
- Virtual machine (1)
- Virtual software (1)
- Vulnerability management (1)
Articles 1 - 6 of 6
Full-Text Articles in Physical Sciences and Mathematics
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller
The Journal of Sociotechnical Critique
Given that the creation and deployment of autonomous vehicles is likely to continue, it is important to explore the ethical responsibilities of designers, manufacturers, operators, and regulators of the technology. We specifically focus on the ethical responsibilities surrounding autonomous vehicles that these stakeholders have to protect the safety of non-occupants, meaning individuals who are around the vehicles while they are operating. The term “non-occupants” includes, but is not limited to, pedestrians and cyclists. We are particularly interested in how to assign moral responsibility for the safety of non-occupants when autonomous vehicles are deployed in a complex, land-based transportation system.
A Survey On Securing Personally Identifiable Information On Smartphones, Dar’Rell Pope, Yen-Hung (Frank) Hu, Mary Ann Hoppa
A Survey On Securing Personally Identifiable Information On Smartphones, Dar’Rell Pope, Yen-Hung (Frank) Hu, Mary Ann Hoppa
Virginia Journal of Science
With an ever-increasing footprint, already topping 3 billion devices, smartphones have become a huge cybersecurity concern. The portability of smartphones makes them convenient for users to access and store personally identifiable information (PII); this also makes them a popular target for hackers. This survey shares practical insights derived from analyzing 16 real-life case studies that exemplify: the vulnerabilities that leave smartphones open to cybersecurity attacks; the mechanisms and attack vectors typically used to steal PII from smartphones; the potential impact of PII breaches upon all parties involved; and recommended defenses to help prevent future PII losses. The contribution of this …
Human Supremacy As Posthuman Risk, Daniel Estrada
Human Supremacy As Posthuman Risk, Daniel Estrada
The Journal of Sociotechnical Critique
Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …
Understanding The Use Of Malware And Encryption, Eva M. Castillo
Understanding The Use Of Malware And Encryption, Eva M. Castillo
OUR Journal: ODU Undergraduate Research Journal
The main objective of this research project is understanding malware and encryption.
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
OUR Journal: ODU Undergraduate Research Journal
The progress towards an interconnected digital world offers an exciting level of advancement for humanity. Unfortunately, this “online” connection is not safe from the threats and dangers typically associated with physical operations. With the foundation of Cyber Command of DoD cyberspace, the United States Government is taking a prominent stance in cyberspace operations. Like the federal government, both industries and individuals are not immune and are oftentimes unknowingly at risk to cyberattack. This report hopes to bring awareness to common vulnerabilities in multi-user networks by describing a historical background on cyber security as well as outlining current methods of vulnerability …
Study Of The Feasibility Of A Virtual Environment For Home User Cybersecurity, Sean Powell
Study Of The Feasibility Of A Virtual Environment For Home User Cybersecurity, Sean Powell
OUR Journal: ODU Undergraduate Research Journal
This research focuses on the average home computer user’s ability to download, install and manage a virtual machine software program. The findings of this research is to be used as a foundation to the possibility of using a virtual machine software program as another form of defense for the home user’s computer. Virtual machines already have various uses, some in the cybersecurity field; this possibility could add another useful application for the software program. This research is conducted by monitoring volunteers’ ability to download, install, set up, and perform basic instructions on the virtual environment. It was from the volunteers’ …