22 research outputs found

    Cyber Ethics 4.0 : Serving Humanity with Values

    Get PDF
    Cyber space influences all sectors of life and society: Artificial Intelligence, Robots, Blockchain, Self-Driving Cars and Autonomous Weapons, Cyberbullying, telemedicine and cyber health, new methods in food production, destruction and conservation of the environment, Big Data as a new religion, the role of education and citizens’ rights, the need for legal regulations and international conventions. The 25 articles in this book cover the wide range of hot topics. Authors from many countries and positions of international (UN) organisations look for solutions from an ethical perspective. Cyber Ethics aims to provide orientation on what is right and wrong, good and bad, related to the cyber space. The authors apply and modify fundamental values and virtues to specific, new challenges arising from cyber technology and cyber society. The book serves as reading material for teachers, students, policy makers, politicians, businesses, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and solution

    Automating Society : Taking Stock of Automated Decision-Making in the EU

    Get PDF
    This is the first comprehensive study regarding the state of automated decision-making in Europe. Experts have looked at the situation at the EU level but also in 12 Member States: Belgium, Denmark, Finland, France, Germany, Italy, Netherlands Poland, Slovenia, Spain, Sweden and the UK. They assessed not only the political discussions and initiatives in these countries but also present a section "ADM in Action" for all states, listing examples of automated decision-making already in use

    Automating Society: Taking Stock of Automated Decision-Making in the EU. BertelsmannStiftung Studies 2019

    Get PDF
    Imagine you’re looking for a job. The company you are applying to says you can have a much easier application process if you provide them with your username and password for your personal email account. They can then just scan all your emails and develop a personality profile based on the result. No need to waste time filling out a boring questionnaire and, because it’s much harder to manipulate all your past emails than to try to give the ‘correct’ answers to a questionnaire, the results of the email scan will be much more accurate and truthful than any conventional personality profiling. Wouldn’t that be great? Everyone wins—the company looking for new personnel, because they can recruit people on the basis of more accurate profiles, you, because you save time and effort and don’t end up in a job you don’t like, and the company offering the profiling service because they have a cool new business model

    Capital, State, Empire

    Get PDF
    The United States presents the greatest source of global geo-political violence and instability. Guided by the radical political economy tradition, this book offers an analysis of the USA’s historical impulse to weaponize communication technologies. Scott Timcke explores the foundations of this impulse, then demonstrates how the militarization of digital society creates structural injustices and social inequalities. He analyses how new digital communication technologies support and fund indirect and informal means that ensures American paramountcy, in turn sustaining enduring conditions for worldwide capital accumulation. Identifying selected features of contemporary American society, Capital, State, Empire undertakes a materialist critique of this digital society and assesses the impact of The New American Way of War, understood here as an outcome of a capitalist state’s military budgets priorities under imperial strategy

    The corrosive moment : a look at the apocalyptic glitch

    Get PDF
    vii, 113 leaves ; col. ill. ; 29 cmThis thesis focuses on the contextualization of my artistic practice, which explores digital glitch as a disruptive force and an aesthetic treatment in the contemporary technological world. While the body of work draws on the methodology of glitch art, this paper attempts to relate the idea of glitch to a wider range of philosophical and artistic frameworks stemming from Lettrism, Situationist International, Punk, and Nihilism. The aim of this investigation of a digital disturbance through its categorization into natural, stimulated and assimilated glitch, is to facilitate an understanding of the glitch event as both something threatening and attractive, while it transitions from a spontaneous to a controlled process in a photoreal image. The passing of the destructive glitch from life to art is placed against the backdrop of the apocalypse, which one may imagine as a literal and metaphorical disaster in the physical world and value systems of western society

    Protecting Privacy in Indian Schools: Regulating AI-based Technologies' Design, Development and Deployment

    Get PDF
    Education is one of the priority areas for the Indian government, where Artificial Intelligence (AI) technologies are touted to bring digital transformation. Several Indian states have also started deploying facial recognition-enabled CCTV cameras, emotion recognition technologies, fingerprint scanners, and Radio frequency identification tags in their schools to provide personalised recommendations, ensure student security, and predict the drop-out rate of students but also provide 360-degree information of a student. Further, Integrating Aadhaar (digital identity card that works on biometric data) across AI technologies and learning and management systems (LMS) renders schools a ‘panopticon’. Certain technologies or systems like Aadhaar, CCTV cameras, GPS Systems, RFID tags, and learning management systems are used primarily for continuous data collection, storage, and retention purposes. Though they cannot be termed AI technologies per se, they are fundamental for designing and developing AI systems like facial, fingerprint, and emotion recognition technologies. The large amount of student data collected speedily through the former technologies is used to create an algorithm for the latter-stated AI systems. Once algorithms are processed using machine learning (ML) techniques, they learn correlations between multiple datasets predicting each student’s identity, decisions, grades, learning growth, tendency to drop out, and other behavioural characteristics. Such autonomous and repetitive collection, processing, storage, and retention of student data without effective data protection legislation endangers student privacy. The algorithmic predictions by AI technologies are an avatar of the data fed into the system. An AI technology is as good as the person collecting the data, processing it for a relevant and valuable output, and regularly evaluating the inputs going inside an AI model. An AI model can produce inaccurate predictions if the person overlooks any relevant data. However, the state, school administrations and parents’ belief in AI technologies as a panacea to student security and educational development overlooks the context in which ‘data practices’ are conducted. A right to privacy in an AI age is inextricably connected to data practices where data gets ‘cooked’. Thus, data protection legislation operating without understanding and regulating such data practices will remain ineffective in safeguarding privacy. The thesis undergoes interdisciplinary research that enables a better understanding of the interplay of data practices of AI technologies with social practices of an Indian school, which the present Indian data protection legislation overlooks, endangering students’ privacy from designing and developing to deploying stages of an AI model. The thesis recommends the Indian legislature frame better legislation equipped for the AI/ML age and the Indian judiciary on evaluating the legality and reasonability of designing, developing, and deploying such technologies in schools

    Modern Perspectives in Business Applications

    Get PDF
    This book is unique! Until now, purchasing and supply management books have had a primarily domestic outlook. However in this book, important issues related to sales management and supply management are handled with a modern perspective. This book has global vision tied into management principles based on an understanding of the sales management and basic job of purchasing and supply management, as all authors have held high-level positions directing the effort. Distinguished researchers from prestigious universities have written chapters and case studies from real-world events that challenge the brightest minds

    Managing complexity in marketing:from a design Weltanschauung

    Get PDF

    Electronic Evidence and Electronic Signatures

    Get PDF
    In this updated edition of the well-established practitioner text, Stephen Mason and Daniel Seng have brought together a team of experts in the field to provide an exhaustive treatment of electronic evidence and electronic signatures. This fifth edition continues to follow the tradition in English evidence text books by basing the text on the law of England and Wales, with appropriate citations of relevant case law and legislation from other jurisdictions. Stephen Mason (of the Middle Temple, Barrister) is a leading authority on electronic evidence and electronic signatures, having advised global corporations and governments on these topics. He is also the editor of International Electronic Evidence (British Institute of International and Comparative Law 2008), and he founded the innovative international open access journal Digital Evidence and Electronic Signatures Law Review in 2004. Daniel Seng (Associate Professor, National University of Singapore) is the Director of the Centre for Technology, Robotics, AI and the Law (TRAIL). He teaches and researches information technology law and evidence law. Daniel was previously a partner and head of the technology practice at Messrs Rajah & Tann. He is also an active consultant to the World Intellectual Property Organization, where he has researched, delivered papers and published monographs on copyright exceptions for academic institutions, music copyright in the Asia Pacific and the liability of Internet intermediaries

    The Play in the System

    Get PDF
    What does artistic resistance look like in the twenty-first century, when disruption and dissent have been co-opted and commodified in ways that reinforce dominant systems? In The Play in the System Anna Watkins Fisher locates the possibility for resistance in artists who embrace parasitism—tactics of complicity that effect subversion from within hegemonic structures. Fisher tracks the ways in which artists on the margins—from hacker collectives like Ubermorgen to feminist writers and performers like Chris Kraus—have willfully abandoned the radical scripts of opposition and refusal long identified with anticapitalism and feminism. Space for resistance is found instead in the mutually, if unevenly, exploitative relations between dominant hosts giving only as much as required to appear generous and parasitical actors taking only as much as they can get away with. The irreverent and often troubling works that result raise necessary and difficult questions about the conditions for resistance and critique under neoliberalism today
    corecore