4,724 research outputs found

    Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine?

    Get PDF
    This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to a computer database. In the UK, the issues that these cases raise have resulted in legislation designed to protect children which allows for the creation of a huge database for children. Paradoxically, we have the situation where we failed to use digital data in enforcing the law to protect children, yet we may now rely heavily on digital technologies to care for children. I draw on the work of Floridi, Sanders, Collins, Kusch, Latour and Akrich, a spectrum of work stretching from philosophy to sociology of technology and the “seamless web” or “actor–network” approach to studies of technology. Intentionality is considered, but not deemed necessary for meaningful moral behaviour. Floridi’s and Sanders’ concept of “distributed morality” accords with the network of agency characterized by actor–network approaches. The paper concludes that enfranchizing non-humans, in the shape of computer databases of personal data, as moral agents is not necessarily problematic but a balance of delegation of morality must be made between human and non-human actors

    The Vulnerability of Subsea Infrastructure to Underwater Attack: Legal Shortcomings and the Way Forward

    Get PDF
    This Article explores the vulnerability of submarine pipelines and cables to underwater subterfuge beyond territorial waters, particularly with regards to the emerging threat posed by unmanned vehicles in executing such mal intent. Next, it describes the legal status of this critical infrastructure before identifying shortcomings in legal protection from underwater attack. Finally, potential solutions are offered for the way forward

    Release Planning for Successful Reentry: A Guide for Corrections, Service Providers, and Community Groups

    Get PDF
    Outlines the concept of release planning, identifies the fundamental needs released prisoners face in reentering society, and recommends ways for corrections agencies and community organizations to help meet those needs through improved release planning

    Framework for security and privacy in automotive telematics

    Full text link

    Cloud technology options towards Free Flow of Data

    Get PDF
    This whitepaper collects the technology solutions that the projects in the Data Protection, Security and Privacy Cluster propose to address the challenges raised by the working areas of the Free Flow of Data initiative. The document describes the technologies, methodologies, models, and tools researched and developed by the clustered projects mapped to the ten areas of work of the Free Flow of Data initiative. The aim is to facilitate the identification of the state-of-the-art of technology options towards solving the data security and privacy challenges posed by the Free Flow of Data initiative in Europe. The document gives reference to the Cluster, the individual projects and the technologies produced by them
    • …
    corecore