375 research outputs found

    The Resonating-Valence-Bond Ground State of Li Nanoclusters

    Full text link
    We have performed Diffusion Quantum Monte Carlo simulations of Li clusters showing that Resonating-Valence-Bond (RVB) pairing correlations between electrons provide a substantial contribution to the cohesive energy. The RVB effects are identified in terms of electron transfers from s- to p-like character, constituting a possible explanation for the breakdown of the Fermi liquid picture observed in recent high resolution Compton scattering experiments for bulk Li.Comment: 4 pages, 2 figures, 3 table

    In Things We Trust? Towards trustability in the Internet of Things

    Full text link
    This essay discusses the main privacy, security and trustability issues with the Internet of Things

    A qualitative study of stakeholders' perspectives on the social network service environment

    Get PDF
    Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information. There are, however, ethical issues due to the monitoring-and-surveillance, data mining and autonomous nature of software agents. Considering the context, this study aims to comprehend stakeholders' perspectives on the social network service environment in order to identify the main considerations for the design of software agents in social network services in the near future. Twenty-one stakeholders, belonging to three key stakeholder groups, were recruited using a purposive sampling strategy for unstandardised semi-structured e-mail interviews. The interview data were analysed using a qualitative content analysis method. It was possible to identify three main considerations for the design of software agents in social network services, which were classified into the following categories: comprehensive understanding of users' perception of privacy, user type recognition algorithms for software agent development and existing software agents enhancement

    Distilling Privacy Requirements for Mobile Applications

    Get PDF
    As mobile computing applications have become commonplace, it is increasingly important for them to address end-users’ privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors to which mobility adds another level of contextual variation. However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile end users. On the other hand, methods that do investigate contextual factors tend to produce data that does not lend itself to the process of requirements extraction. To address this problem we have developed a Privacy Requirements Distillation approach that employs a problem analysis framework to extract and refine privacy requirements for mobile applications from raw data gathered through empirical studies involving end users. Our approach introduces privacy facets that capture patterns of privacy concerns which are matched against the raw data. We demonstrate and evaluate our approach using qualitative data from an empirical study of a mobile social networking application

    Spectacles of intimacy? Mapping the moral landscape of teenage social media

    Get PDF
    This paper explores young people's expressed concerns about privacy in the context of a highly mediated cultural environment, mapping social media practices against axes of visibility and participation. Drawing on interdisciplinary conceptual resources from both the humanities and social sciences, we use ‘spectacles of intimacy’ to conceptualise breaches of privacy, mapping an emergent moral landscape for young people that moves beyond concerns with e-safety to engage with the production and circulation of audiences and value. The paper draws on data from a methodological innovation project using multi-media and mixed methods to capture lived temporalities for children and young people. We present a model that captures a moral landscape shaped by emotional concerns about social media, the affordances of those media and affective discourses emerging from young people's use of the media

    Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles

    Full text link
    Online dating is an increasingly thriving business which boasts billion-dollar revenues and attracts users in the tens of millions. Notwithstanding its popularity, online dating is not impervious to worrisome trust and privacy concerns raised by the disclosure of potentially sensitive data as well as the exposure to self-reported (and thus potentially misrepresented) information. Nonetheless, little research has, thus far, focused on how to enhance privacy and trustworthiness. In this paper, we report on a series of semi-structured interviews involving 20 participants, and show that users are significantly concerned with the veracity of online dating profiles. To address some of these concerns, we present the user-centered design of an interface, called Certifeye, which aims to bootstrap trust in online dating profiles using existing social network data. Certifeye verifies that the information users report on their online dating profile (e.g., age, relationship status, and/or photos) matches that displayed on their own Facebook profile. Finally, we present the results of a 161-user Mechanical Turk study assessing whether our veracity-enhancing interface successfully reduced concerns in online dating users and find a statistically significant trust increase.Comment: In Proceedings of Financial Cryptography and Data Security (FC) Workshop on Usable Security (USEC), 201

    Saving lives in road traffic—ethical aspects

    Get PDF
    Aim: This article aims at giving an overview of five ethical problem areas relating to traffic safety, thereby providing a general framework for analysing traffic safety from an ethical perspective and encouraging further discussion concerning problems, policies and technology in this area. Subjects and methods: The problems presented in the article are criminalisation, paternalism, privacy, justice and responsibility, and the reasons for choosing these are the following. First, they are all important areas in moral philosophy. Second, they are fairly general and it should be possible to categorise more specific problems under these headings. Ethical aspects of road traffic have not received the philosophical attention they deserve. Every year, more than 1 million people die globally in traffic accidents, and 20 to 50 million people are injured. Ninety per cent of the road traffic fatalities occur in low- and middle-income countries, where it is a growing problem. Politics, economics, culture and technology affect the number of fatalities and injuries, and the measures used to combat deaths in traffic as well as the role of road traffic should be ethically scrutinised. The topics are analysed and discussed from a moral-philosophical perspective, and the discussion includes both theory and applications. Results and conclusion: The author concludes with some thoughts on how the ethical discussion can be included in the public debate on how to save lives in road traffic. People in industrialised societies are so used to road traffic that it is almost seen as part of nature. Consequently, we do not acknowledge that we can introduce change and that we can affect the role we have given road traffic and cars. By acknowledging the ethical aspects of road traffic and illuminating the way the choices society makes are ethically charged, it becomes clear that there are alternative ways to design the road traffic system. The most important general conclusion is that discussion concerning these alternative ways of designing the system should be encouraged

    Cultivating reflexive research practice when using participants’ photographs as research data

    Get PDF
    This chapter reflects on a study exploring the development of a feminist consciousness. During the interviews participants were invited to share photographs that were significant to their feminist becoming. Various ethical and methodological challenges arose through the use of visual data, in particular the ethics of the interpretation and dissemination of participants’ personal photographs. Both issues were highlighted and addressed through reflexive research practice, which exposed how the researcher’s reaction to and feelings about the photographs impacted upon how they were interpreted and shared. Reflexivity demands that researchers interrogate their research choices and is essential for ethical and rigorous research. This chapter argues that visual methods, whilst posing new ethical challenges, can enhance the reflexive research practice necessary for responding to and navigating its challenges

    What Values in Design? The Challenge of Incorporating Moral Values into Design

    Get PDF
    Recently, there is increased attention to the integration of moral values into the conception, design, and development of emerging IT. The most reviewed approach for this purpose in ethics and technology so far is Value-Sensitive Design (VSD). This article considers VSD as the prime candidate for implementing normative considerations into design. Its methodology is considered from a conceptual, analytical, normative perspective. The focus here is on the suitability of VSD for integrating moral values into the design of technologies in a way that joins in with an analytical perspective on ethics of technology. Despite its promising character, it turns out that VSD falls short in several respects: (1) VSD does not have a clear methodology for identifying stakeholders, (2) the integration of empirical methods with conceptual research within the methodology of VSD is obscure, (3) VSD runs the risk of committing the naturalistic fallacy when using empirical knowledge for implementing values in design, (4) the concept of values, as well as their realization, is left undetermined and (5) VSD lacks a complimentary or explicit ethical theory for dealing with value trade-offs. For the normative evaluation of a technology, I claim that an explicit and justified ethical starting point or principle is required. Moreover, explicit attention should be given to the value aims and assumptions of a particular design. The criteria of adequacy for such an approach or methodology follow from the evaluation of VSD as the prime candidate for implementing moral values in design
    • 

    corecore