21 research outputs found

    Further Observations

    Get PDF

    Exploring Buddhist Ethics for New Technologies

    Get PDF
    Ongoing developments in information, bio- and nano-technology are reorderingevolution, and transforming our very physical and mental bases. An examination of theliterature indicates that the dominant, Eurocentric ethical systems for these newtechnologies are derived from Christianity, Judaism or Islam (“Abrahamaic” religions)or from presumably "secular" roots. The ethical system in the Abrahamaic religions is“revealed” by “God”, but the new developments challenge some of the coreAbrahamaic ethical assumptions. Western "secular ethics" are ultimately derived fromthe idea of "humanity”, a Eurocentric concept of humans as “sacred” which probablyderives from the ideas of the Renaissance Humanists. But, in an increasingly nonhumanand “post-human” world, humanity has to be transcended in search of ethics. Asthe production, consumption and creative bases of the world increasingly shift to Asia,Asian thought could provide answers to these culture impregnated issues. A majortrans-Asian approach, Buddhism, is not revealed, and has a strong core of observationsand philosophy. Buddhist approaches with change and process as its core have directrelevance to a future where both the human and his environment are constructed andreconstructed.The paper explores the literature of the core Buddhist position on the humanbody and mind, as well as the environment he operates in, as not given or sacred butconstructed and changing.The paper concludes that an orientation from this core Buddhist perspective ofcontinuous change, no permanent self and both human and nature as constructed wouldfit better as a cultural orientation to examine and live in a future where humans andnature are continuously reinvented and reconstructed. Buddhist ethics from such aperspective may better fit the emerging world.Key words: New technologies, Ethics, Eurocentrism, Buddhism

    Probabilistic Models for Anomaly Detection Based on Usage of Network Traffic

    Get PDF
    Recent advances in intrusions and attacks reflect vulnerabilities in computer networks. Innovative methods and tools can help attack defenses, prevent attack propagations, detect and respond to such attacks in a timely manner. Intrusion detection and prevention systems search for unauthorized use, recognize anomalous behavior, and prevent attempts to deny services.  These systems gather and analyze information from the network, identify possible breaches of the security profile, as well as misuses. We have been experimenting with methods for introducing important concepts related to intrusion detection and improving undergraduate research experiences and education. To achieve this goal, probabilistic models are introduced to students in computer, information system and network security courses. This article presents a set of probabilistic methods and statistical models for network traffic anomaly detection. It also describes some prospects and how models have ripened from theories to big data analysis applications. Keywords: Intrusion, conditional probability, network system, regression, data analysi

    The Historical Geopolitics of Knowledge

    No full text

    Position Paper Number 3 for the Workshop “Towards Criteria of Sustainability and Social Meaningfulness in Development“: The emerging ecology of genetic, digital and cultural (including non-Western) information environments

    No full text
    Position Paper Number 3 for the Workshop “Towards Criteria of Sustainability and Social Meaningfulness in Development“: The emerging ecology of genetic, digital and cultural (including non-Western) information environment
    corecore