6,344 research outputs found
Recommended from our members
"The dearest of our possessions": applying Floridi's information privacy concept in models of information behavior and information literacy
This conceptual paper argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics. This approach involves achieving informational privacy, through the features of anonymity and obscurity, through an optimal balance of ontological frictions. This approach may be used to modify models for information behavior and for information literacy, giving them a fuller and more effective coverage of privacy issues in the infosphere. For information behavior, the Information Seeking and Communication Model, and the Information Grounds conception, are most appropriate for this purpose. For information literacy, the metaliteracy model, using a modification a privacy literacy framework, is most suitable
Bitcoin: a Money-like Informational Commodity
The question "what is Bitcoin" allows for many answers depending on the
objectives aimed at when providing such answers. The question addressed in this
paper is to determine a top-level classification, or type, for Bitcoin. We will
classify Bitcoin as a system of type money-like informational commodity (MLIC)
Big Data Privacy Context: Literature Effects On Secure Informational Assets
This article's objective is the identification of research opportunities in
the current big data privacy domain, evaluating literature effects on secure
informational assets. Until now, no study has analyzed such relation. Its
results can foster science, technologies and businesses. To achieve these
objectives, a big data privacy Systematic Literature Review (SLR) is performed
on the main scientific peer reviewed journals in Scopus database. Bibliometrics
and text mining analysis complement the SLR. This study provides support to big
data privacy researchers on: most and least researched themes, research
novelty, most cited works and authors, themes evolution through time and many
others. In addition, TOPSIS and VIKOR ranks were developed to evaluate
literature effects versus informational assets indicators. Secure Internet
Servers (SIS) was chosen as decision criteria. Results show that big data
privacy literature is strongly focused on computational aspects. However,
individuals, societies, organizations and governments face a technological
change that has just started to be investigated, with growing concerns on law
and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions
and the only consistent country between literature and SIS adoption is the
United States. Countries in the lowest ranking positions represent future
research opportunities.Comment: 21 pages, 9 figure
Still minding the gap? Reflecting on transitions between concepts of information in varied domains
This conceptual paper, a contribution to the tenth anniversary special issue of information, gives a cross-disciplinary review of general and unified theories of information. A selective literature review is used to update a 2013 article on bridging the gaps between conceptions of information in different domains, including material from the physical and biological sciences, from the humanities and social sciences including library and information science, and from philosophy. A variety of approaches and theories are reviewed, including those of Brenner, Brier, Burgin and Wu, Capurro, CĆ”rdenas-GarcĆa and Ireland, Hidalgo, Hofkirchner, Kolchinsky and Wolpert, Floridi, Mingers and Standing, Popper, and Stonier. The gaps between disciplinary views of information remain, although there has been progress, and increasing interest, in bridging them. The solution is likely to be either a general theory of sufficient flexibility to cope with multiple meanings of information, or multiple and distinct theories for different domains, but with a complementary nature, and ideally boundary spanning concepts
Robot rights? Towards a social-relational justification of moral consideration \ud
Should we grant rights to artificially intelligent robots? Most current and near-future robots do not meet the hard criteria set by deontological and utilitarian theory. Virtue ethics can avoid this problem with its indirect approach. However, both direct and indirect arguments for moral consideration rest on ontological features of entities, an approach which incurs several problems. In response to these difficulties, this paper taps into a different conceptual resource in order to be able to grant some degree of moral consideration to some intelligent social robots: it sketches a novel argument for moral consideration based on social relations. It is shown that to further develop this argument we need to revise our existing ontological and social-political frameworks. It is suggested that we need a social ecology, which may be developed by engaging with Western ecology and Eastern worldviews. Although this relational turn raises many difficult issues and requires more work, this paper provides a rough outline of an alternative approach to moral consideration that can assist us in shaping our relations to intelligent robots and, by extension, to all artificial and biological entities that appear to us as more than instruments for our human purpose
The Unsecure Side of (Meta)Data in IoT Systems
The exponential spreading and deployment of emerging digital technologies such as the Internet of Things (IoT) has been remarkable: the IoT market is expected to triple, at least, from USD 170.57 billion in 2017 to USD 561.04 billion by 2022. IoT technologies collect, generate and communicate a huge amount of different data and metadata, through an increasing number of interconnected devices and sensors. Current EU legislation on data protection classifies data into personal and non-personal. The paper aims at charting the resulting entanglements from an interdisciplinary perspective. The legal analysis, integrated with a technical perspective, will address firstly the content of IoT communications, i.e. \u201cdata\u201d, and the underlying distinction between personal and non-personal. Secondly, the focus will shift on the metadata related to communications. Through a technical analysis of the highly sensitive nature of metadata, even when the content is encrypted, I will argue that metadata are likely to undermine even more the ontological and sharp division between personal and non-personal data upon which the European legal frameworks for privacy and data protection have been built. The incoming ePrivacy Regulation shall provide metadata, which should be considered always personal data, the same level of protection of \u201ccontent\u201d data. This interpretation might broaden the scope of application of GDPR and the connected obligations and responsibilities of data controllers and data processors too much
Network tourism: A fallacy of location privacy!
This contribution aims to discuss if ālocationalā privacy in tourism is a fallacy! Nevertheless, the authors inform that the reason for this debate is 21st century tourist distinctive characteristic, constantly āwiredā through ICT, leading to serious ethical issues as regards to personal privacy. Therefore, this paper is divided into five core sections: background (tourist, and ICT for tourism and tourist); control (etymology, the thin bound concerning security, and control and personal data); privacy (the concept, evolution, and dimensions); empirical evidences (overview, crime scene investigation, and keen exhibits); and finally, discussion (act 1 and act 2)
Information and Design: Book Symposium on Luciano Floridiās The Logic of Information
Purpose ā To review and discuss Luciano Floridiās 2019 book The Logic of Information: A Theory of Philosophy as Conceptual Design, the latest instalment in his philosophy of information (PI) tetralogy, particularly with respect to its implications for library and information studies (LIS).
Design/methodology/approach ā Nine scholars with research interests in philosophy and LIS read and responded to the book, raising critical and heuristic questions in the spirit of scholarly dialogue. Floridi responded to these questions.
Findings ā Floridiās PI, including this latest publication, is of interest to LIS scholars, and much insight can be gained by exploring this connection. It seems also that LIS has the potential to contribute to PIās further development in some respects.
Research implications ā Floridiās PI work is technical philosophy for which many LIS scholars do not have the training or patience to engage with, yet doing so is rewarding. This suggests a role for translational work between philosophy and LIS.
Originality/value ā The book symposium format, not yet seen in LIS, provides forum for sustained, multifaceted and generative dialogue around ideas
- ā¦