6,593 research outputs found

    Online Manipulation: Hidden Influences in a Digital World

    Get PDF
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that addresses these enhanced capacities, investigate how information technologies facilitate manipulative practices, and describe the harms—to individuals and to social institutions—that flow from such practices. We use the term “online manipulation” to highlight the particular class of manipulative practices enabled by a broad range of information technologies. We argue that at its core, manipulation is hidden influence—the covert subversion of another person’s decision-making power. We argue that information technology, for a number of reasons, makes engaging in manipulative practices significantly easier, and it makes the effects of such practices potentially more deeply debilitating. And we argue that by subverting another person’s decision-making power, manipulation undermines his or her autonomy. Given that respect for individual autonomy is a bedrock principle of liberal democracy, the threat of online manipulation is a cause for grave concern

    Mutuality talk in a family-owned multinational: anthropological categories & critical analyses of corporate ethicizing

    Get PDF
    This article draws on work carried out as part of a collaboration between an elite business school and a family-owned multinational corporation, concerned with promoting ‘mutuality in business’ as a new frontier of responsible capitalism. While the business school partners treated mutuality as a new principle central to an emergent ethical capitalism, the corporation claimed mutuality as a long-established value unique to their company. Both interpretations foreground a central problem in recent writing on the anthropology of business/corporations: the tension between the claim that economic life is always embedded within a moral calculus, and the shift towards increasingly ethical behaviour among many corporations. Further, recent work in the anthropology of business rejects normative evaluations of corporate ethicizing. When corporations lay claim to ethical renewal, but maintain a commitment to competition and growth, then anthropologists must balance a sympathetic engagement with corporate ethicizing, and critical engagement with growth-based strategie

    Hope, Choice and the Improvable Self: A Critical Analysis of ‘New Recovery’ in Australia

    Get PDF
    Drawing on science and technology studies, this thesis analyses how ‘new recovery’ is enacted in Australian alcohol and other drug policy, psychological science and treatment, and the extent to which authoritative enactments of recovery inform individuals’ lives. It argues that there exist important threads of continuity with older forms of recovery, most notably, in the neoliberal politics of responsibilisation, erasure of socio-political forces, and continuing stigmatisation of people who use drugs and their social relationships

    Hybrid Cloud Model Checking Using the Interaction Layer of HARMS for Ambient Intelligent Systems

    Get PDF
    Soon, humans will be co-living and taking advantage of the help of multi-agent systems in a broader way than the present. Such systems will involve machines or devices of any variety, including robots. These kind of solutions will adapt to the special needs of each individual. However, to the concern of this research effort, systems like the ones mentioned above might encounter situations that will not be seen before execution time. It is understood that there are two possible outcomes that could materialize; either keep working without corrective measures, which could lead to an entirely different end or completely stop working. Both results should be avoided, specially in cases where the end user will depend on a high level guidance provided by the system, such as in ambient intelligence applications. This dissertation worked towards two specific goals. First, to assure that the system will always work, independently of which of the agents performs the different tasks needed to accomplish a bigger objective. Second, to provide initial steps towards autonomous survivable systems which can change their future actions in order to achieve the original final goals. Therefore, the use of the third layer of the HARMS model was proposed to insure the indistinguishability of the actors accomplishing each task and sub-task without regard of the intrinsic complexity of the activity. Additionally, a framework was proposed using model checking methodology during run-time for providing possible solutions to issues encountered in execution time, as a part of the survivability feature of the systems final goals

    An Extended Semantic Interoperability Model for Distributed Electronic Health Record Based on Fuzzy Ontology Semantics

    Get PDF
    Semantic interoperability of distributed electronic health record (EHR) systems is a crucial problem for querying EHR and machine learning projects. The main contribution of this paper is to propose and implement a fuzzy ontology-based semantic interoperability framework for distributed EHR systems. First, a separate standard ontology is created for each input source. Second, a unified ontology is created that merges the previously created ontologies. However, this crisp ontology is not able to answer vague or uncertain queries. We thirdly extend the integrated crisp ontology into a fuzzy ontology by using a standard methodology and fuzzy logic to handle this limitation. The used dataset includes identified data of 100 patients. The resulting fuzzy ontology includes 27 class, 58 properties, 43 fuzzy data types, 451 instances, 8376 axioms, 5232 logical axioms, 1216 declarative axioms, 113 annotation axioms, and 3204 data property assertions. The resulting ontology is tested using real data from the MIMIC-III intensive care unit dataset and real archetypes from openEHR. This fuzzy ontology-based system helps physicians accurately query any required data about patients from distributed locations using near-natural language queries. Domain specialists validated the accuracy and correctness of the obtained resultsThis work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (NRF-2021R1A2B5B02002599)S

    Complexity in a systems engineering organization: An empirical case study

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.ystems Engineering development projects often fail to meet delivery expectations in terms of timescales and cost. Project plans, which set cost and deadline expectations, are produced and monitored within a reductionist paradigm, incorporating a deterministic view of cause and effect. This assumes that the cumulative activities and their corresponding durations that comprise the developed solution can be known in advance, and that monitoring and management intervention can ensure satisfactory delivery of an adequate solution, through implementation of this plan. This paper presents a case study that examines the Systems Engineering function within a Thales UK business line. The focus is the organization. The research is exploratory. It gathers evidence through participant-observation, interviews, documentation, and archival records. It considers two perspectives, a ‘traditional’ predominantly reductionist perspective, and a novel Complex Adaptive System (CAS) perspective. Evidence is analyzed in light of both perspectives to consider how each is able to explain the observations. Research that considers an organization as a CAS is predominately theoretical, rather than empirical. This paper contributes by viewing a systems engineering development organisation as a CAS, and considering the novel insights this perspective brings to the issue of satisfactory project delivery

    Enacting heavy sessional drinking: a multi-sited ethnographic study of young adults’ drinking events and related epidemiology, policy and treatment

    Get PDF
    Taking cues from science and technology studies, this thesis explores how problems associated with the heavy sessional drinking of young adults are currently enacted in significant sites of research, policy and service provision. It demonstrates that alcohol epidemiology, policy initiatives to change ‘drinking culture’, and the clinical science associated with alcohol and other drug treatment erase the effects of socioeconomic disadvantage. With reference to ethnographic data, it proposes a range of alternate formulations

    Digital Inequality

    Get PDF
    Unpicking and understanding if and how the web is linked to inequality means: Recognising that the access divide is not over, Thinking beyond hardware, Thinking beyond demographic variables, Developing a conceptual and theoretical toolkit, Beyond technological determinism, Co-constitution, Intersectionality, Technical capita

    Transparent government, not transparent citizens: a report on privacy and transparency for the Cabinet Office

    No full text
    1. Privacy is extremely important to transparency. The political legitimacy of a transparency programme will depend crucially on its ability to retain public confidence. Privacy protection should therefore be embedded in any transparency programme, rather than bolted on as an afterthought. 2. Privacy and transparency are compatible, as long as the former is carefully protected and considered at every stage. 3. Under the current transparency regime, in which public data is specifically understood not to include personal data, most data releases will not raise privacy concerns. However, some will, especially as we move toward a more demand-driven scheme. 4. Discussion about deanonymisation has been driven largely by legal considerations, with a consequent neglect of the input of the technical community. 5. There are no complete legal or technical fixes to the deanonymisation problem. We should continue to anonymise sensitive data, being initially cautious about releasing such data under the Open Government Licence while we continue to take steps to manage and research the risks of deanonymisation. Further investigation to determine the level of risk would be very welcome. 6. There should be a focus on procedures to output an auditable debate trail. Transparency about transparency – metatransparency – is essential for preserving trust and confidence. Fourteen recommendations are made to address these conclusions
    • 

    corecore