4,724 research outputs found
Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine?
This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to a computer database. In the UK, the issues that these cases raise have resulted in legislation designed to protect children which allows for the creation of a huge database for children. Paradoxically, we have the situation where we failed to use digital data in enforcing the law to protect children, yet we may now rely heavily on digital technologies to care for children. I draw on the work of Floridi, Sanders, Collins, Kusch, Latour and Akrich, a spectrum of work stretching from philosophy to sociology of technology and the “seamless web” or “actor–network” approach to studies of technology. Intentionality is considered, but not deemed necessary for meaningful moral behaviour. Floridi’s and Sanders’ concept of “distributed morality” accords with the network of agency characterized by actor–network approaches. The paper concludes that enfranchizing non-humans, in the shape of computer databases of personal data, as moral agents is not necessarily problematic but a balance of delegation of morality must be made between human and non-human actors
The Vulnerability of Subsea Infrastructure to Underwater Attack: Legal Shortcomings and the Way Forward
This Article explores the vulnerability of submarine pipelines and cables to underwater subterfuge beyond territorial waters, particularly with regards to the emerging threat posed by unmanned vehicles in executing such mal intent. Next, it describes the legal status of this critical infrastructure before identifying shortcomings in legal protection from underwater attack. Finally, potential solutions are offered for the way forward
Release Planning for Successful Reentry: A Guide for Corrections, Service Providers, and Community Groups
Outlines the concept of release planning, identifies the fundamental needs released prisoners face in reentering society, and recommends ways for corrections agencies and community organizations to help meet those needs through improved release planning
Recommended from our members
Southwest Border Violence: Issues in Identifying and Measuring Spillover Violence
[Excerpt] There has been a recent increase in the level of drug trafficking-related violence within and between the drug trafficking organizations in Mexico. This violence has generated concern among U.S. policy makers that the violence in Mexico might spill over into the United States. Currently, U.S. federal officials deny that the recent increase in drug trafficking-related violence in Mexico has resulted in a spillover into the United States, but they acknowledge that the prospect is a serious concern.
Currently, no comprehensive, publicly available data exist that can definitively answer the question of whether there has been a significant spillover of drug trafficking-related violence into the United States. Although anecdotal reports have been mixed, U.S. government officials maintain that there has not yet been a significant spillover. In an examination of data that could provide insight into whether there has been a significant spillover in drug trafficking-related violence from Mexico into the United States, CRS analyzed violent crime data from the Federal Bureau of Investigation’s Uniform Crime Report program. The data, however, do not allow analysts to determine what proportion of the violent crime rate is related to drug trafficking or, even more specifically, what proportion of drug trafficking-related violent crimes can be attributed to spillover violence. In conclusion, because the trends in the overall violent crime rate may not be indicative of trends in drug trafficking-related violent crimes, CRS is unable to draw definitive claims about trends in drug trafficking-related violence spilling over from Mexico into the United States.
This report will be updated as circumstances warrant
Cloud technology options towards Free Flow of Data
This whitepaper collects the technology solutions that the projects in the Data Protection, Security and Privacy Cluster propose to address the challenges raised by the working areas of the Free Flow of Data initiative. The document describes the technologies, methodologies, models, and tools researched and developed by the clustered projects mapped to the ten areas of work of the Free Flow of Data initiative. The aim is to facilitate the identification of the state-of-the-art of technology options towards solving the data security and privacy challenges posed by the Free Flow of Data initiative in Europe. The document gives reference to the Cluster, the individual projects and the technologies produced by them
- …