Results for 'Ida Susser'

377 found
Order:
  1. A critical anthropology for the present.Jeff Maskovsky & Ida Susser - 2016 - In James G. Carrier (ed.), After the crisis: anthropological thought, neoliberalism and the aftermath. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  2. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood data collection (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  3. L'ambiente, la cultura, le amicizie.Ida Bozzini, Valerio Onida, Carlo Russo & Giovanni B. Varnier - 2003 - Studium 99 (1):29-52.
    No categories
     
    Export citation  
     
    Bookmark  
  4. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   33 citations  
  5. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   32 citations  
  6.  45
    The sociology of knowledge and its enemies.Bernard Susser - 1989 - Inquiry: An Interdisciplinary Journal of Philosophy 32 (3):245 – 260.
    My objective in the following study is to present and analyze the objections to the "classical argument" in the sociology of knowledge raised by Leo Strauss and Karl Popper. Building on this expository account, I will attempt to demonstrate (1) that the opposition of Strauss and Popper is more apparent and polemical than real, (2) that the position taken by Strauss and Popper on the viability of a sociology of knowledge is essentially no different from that taken by the discipline's (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  12
    Postures énonciatives et rôles interactionnels des modérateurs dans les débats télévisés politiques.Ida Hekmat - 2020 - Corela. Cognition, Représentation, Langage.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  38
    The experience, representational content, and epistemology of perceptual and intellectual impressions.Ida Toivonen - 2022 - Metascience 32 (1):67-70.
  9. Predictive Policing and the Ethics of Preemption.Daniel Susser - 2021 - In Ben Jones & Eduardo Mendieta (eds.), The Ethics of Policing: New Perspectives on Law Enforcement. New York: NYU Press.
    The American justice system, from police departments to the courts, is increasingly turning to information technology for help identifying potential offenders, determining where, geographically, to allocate enforcement resources, assessing flight risk and the potential for recidivism amongst arrestees, and making other judgments about when, where, and how to manage crime. In particular, there is a focus on machine learning and other data analytics tools, which promise to accurately predict where crime will occur and who will perpetrate it. Activists and academics (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  10. Invisible Influence: Artificial Intelligence and the Ethics of Adaptive Choice Architectures.Daniel Susser - 2019 - Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society 1.
    For several years, scholars have (for good reason) been largely preoccupied with worries about the use of artificial intelligence and machine learning (AI/ML) tools to make decisions about us. Only recently has significant attention turned to a potentially more alarming problem: the use of AI/ML to influence our decision-making. The contexts in which we make decisions—what behavioral economists call our choice architectures—are increasingly technologically-laden. Which is to say: algorithms increasingly determine, in a wide variety of contexts, both the sets of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  11.  45
    Ethics committees identify four key factors for success.Ida Critelli Schick & Fache Sally Moore - 1998 - HEC Forum 10 (1):75-85.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  12.  59
    Exploring researchers’ experiences of working with a researcher-driven, population-specific community advisory board in a South African schizophrenia genomics study.Megan M. Campbell, Ezra Susser, Jantina de Vries, Adam Baldinger, Goodman Sibeko, Michael M. Mndini, Sibonile G. Mqulwana, Odwa A. Ntola, Raj S. Ramesar & Dan J. Stein - 2015 - BMC Medical Ethics 16 (1):1-9.
    BackgroundCommunity engagement within biomedical research is broadly defined as a collaborative relationship between a research team and a group of individuals targeted for research. A Community Advisory Board is one mechanism of engaging the community. Within genomics research CABs may be particularly relevant due to the potential implications of research findings drawn from individual participants on the larger communities they represent. Within such research, CABs seek to meet instrumental goals such as protecting research participants and their community from research-related risks, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  13. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  18
    The pampered children of the poor.Ida M. Metcalf - 1902 - International Journal of Ethics 13 (1):87-98.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  4
    The Pampered Children of the Poor.Ida M. Metcalf - 1902 - International Journal of Ethics 13 (1):87-98.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  12
    A study of association in Negro children.Ida Mitchell, Isabel R. Rosanoff & Aaron J. Rosanoff - 1919 - Psychological Review 26 (5):354-359.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  17. Značenje kroz vrijeme: poglavlja iz dijakronijske semantike.Ida Raffaelli - 2009 - Zagreb: Disput.
     
    Export citation  
     
    Bookmark  
  18. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  20.  56
    Seeing Agents When we Need to, Attributing Experience When we Feel Like it.Ida Hallgren - 2012 - Review of Philosophy and Psychology 3 (3):369-382.
    Mind attribution may be divided into the subcategories of attribution of agency, associated with moral agency, and attribution of experience and emotion, associated with moral concern and moral patiency (Gray et al. Science 315(5812):619, 2007; Gray et al. Proceedings of the National Academy of Sciences of the United States of America 108(2):477–479, 2011b; Robbins and Jack Philosophical Studies 127(1):59–85, 2006). In this paper I attend to social context and the different psychological needs influencing the different types of mind attribution. A (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  21. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  22
    Kompakt framstilling av ytre høyre.Ida Lyngstad Wernø - 2020 - Agora Journal for metafysisk spekulasjon 38 (1-2):377-383.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  14
    European Security Capabilities in the Region of the Western Balkans in the Beginning of the Twenty-First Century.Ida Orzechowska - 2014 - Seeu Review 10 (1):143-155.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  8
    Et manifest for kollektiv selvhjelp.Ida Lyngstad Wernø - 2021 - Agora Journal for metafysisk spekulasjon 38 (3-4):324-329.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  7
    The roles of self-construal in sharpening reputation judgment: an experimental study on earnings management.Ida Nur Aeni, Supriyadi & Heri Yanto - 2021 - Asian Journal of Business Ethics 10 (2):183-204.
    This study aims to investigate the role of self-construal in sharpening reputation judgment on earnings management cases. This study involves a personality variable that can provide sharper insights into individual assessments, namely self-construal. The study uses an experimental case with involved participants to judge the ethics of earnings management done by other managers (the target managers). Participants of this study consist of 109 master’s degree students majoring in accounting and management who acts as fellow managers. Participants provide ethical judgment and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to achieve (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  32
    Demonstrator skill modulates observational aversive learning.Ida Selbing, Björn Lindström & Andreas Olsson - 2014 - Cognition 133 (1):128-139.
  28.  62
    Ida Görres on the History of the Family.Ida Görres & Barbara Waldstein-Wartenberg - 2009 - The Chesterton Review 35 (1/2):277-279.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Venus's Strabismus. Looking at the Crisis of Politics from the Politics of Difference.Ida Dominijanni - 2010 - Iris. European Journal of Philosophy and Public Debate 2 (3):167-182.
    One of the main features of Italian feminism of "difference," as seen from an international perspective, is its distinctly political vocation. This vocation is not only, nor especially, limited to the perimeter of a gender politics, but is to be found in the radical critique or in the rethinking of traditional political categories, in the invention of new practices, in the redefinition of the very sphere of politics and in the modes of its transformation. The Italian case, as far as (...)
     
    Export citation  
     
    Bookmark  
  31.  29
    A Jewish Mystical Tradition.Ida Goerres - 2000 - The Chesterton Review 26 (1/2):270-272.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  38
    A Perceptive Comment about the Significance of an Irreligious Technological Society.Ida Goerres - 1995 - The Chesterton Review 21 (1/2):219-219.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  27
    The Power of Images.Ida Goerres - 2001 - The Chesterton Review 27 (1/2):199-201.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  25
    Managers’ Moral Struggle: A Case Study on Ethical Dilemmas and Ethical Decision-making in the Context of Immigration.Ida Okkonen & Tuomo Takala - 2019 - Ethics and Social Welfare 13 (4):392-408.
  35.  24
    Examining the Relationship Between Teachers’ ICT Self-Efficacy for Educational Purposes, Collegial Collaboration, Lack of Facilitation and the Use of ICT in Teaching Practice.Ida K. R. Hatlevik & Ove E. Hatlevik - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36. Butsuri kūkan to wa nani ka.Kōjirō Ida - 1969
     
    Export citation  
     
    Bookmark  
  37.  9
    Madkhal ilá al-ansanah al-Islāmīyah.ʻAbd Allāh Idālkūs - 2022 - al-Dār al-Bayḍāʼ: Afrīqīyā al-Sharq.
  38. Should We Improve Human Nature? An Interrogation from an Asian Perspective.Ryuichi Ida - 2010 - In Julian Savulescu & Nick Bostrom (eds.), Human Enhancement. Oxford University Press.
     
    Export citation  
     
    Bookmark   1 citation  
  39. Zur Widerspruchsauffassung des Aristoteles.Vas Ida - 1971 - In László Erdei (ed.), Aufsätze über Logik. Budapest: Akadémiai Kiadó.
     
    Export citation  
     
    Bookmark  
  40.  8
    A ironia como estratégia comunicativa e argumentativa.Ida Lucia Machado - 2014 - Bakhtiniana 9 (1):108-128.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  62
    Jean Reith schroedel, is the fetus a person? A comparison of policies across the fifty states.Ida Roy - 2001 - Theoretical Medicine and Bioethics 22 (4):385-389.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42. Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  9
    Book Reviews : Howard Williams, Concepts of Ideology. St. Martin, New York, 1988. Pp. xiii, 136, $35.00. [REVIEW]Bernard Susser - 1992 - Philosophy of the Social Sciences 22 (4):527-531.
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  32
    Vaccine Passports and Political Legitimacy: A Public Reason Framework for Policymakers.Anne Barnhill, Matteo Bonotti & Daniel Susser - 2023 - Ethical Theory and Moral Practice 26 (5):667-687.
    As the COVID-19 pandemic continues to evolve, taking its toll on people’s lives around the world, vaccine passports remain a contentious topic of debate in most liberal democracies. While a small literature on vaccine passports has sprung up over the past few years that considers their ethical pros and cons, in this paper we focus on the question of when vaccine passports are politically legitimate. Specifically, we put forward a ‘public reason ethics framework’ for resolving ethical disputes and use the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, a change in emphasis from (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  18
    Veni Vidi Vici and caesar's Triumph.Ida Östenberg - 2013 - Classical Quarterly 63 (2):813-827.
    Without doubt,veni vidi viciis one of the most famous quotations from Antiquity. It is well known that it was Julius Caesar who coined the renowned expression. Less frequently discussed is the fact that ‘I came, I saw, I conquered’ was announced as written text. According to Suetonius, Caesar paraded a placard displaying the wordsveni vidi viciin his triumph held over Pontus in 46b.c.(Suet.Iul. 37.2):Pontico triumpho inter pompae fercula trium verborum praetulit titulum VENI VIDI VICI non acta belli significantem sicut ceteris, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  11
    Individual versus general structured feedback to improve agreement in grant peer review: a randomized controlled trial.Ida Svege, Pål Ulleberg, Knut Inge Fostervold & Jan-Ole Hesselberg - 2021 - Research Integrity and Peer Review 6 (1).
    BackgroundVast sums are distributed based on grant peer review, but studies show that interrater reliability is often low. In this study, we tested the effect of receiving two short individual feedback reports compared to one short general feedback report on the agreement between reviewers.MethodsA total of 42 reviewers at the Norwegian Foundation Dam were randomly assigned to receive either a general feedback report or an individual feedback report. The general feedback group received one report before the start of the reviews (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  18
    “Whose demand?” The co-construction of markets, demand and gender in development-oriented crop breeding.Ida Arff Tarjem, Ola Tveitereid Westengen, Poul Wisborg & Katharina Glaab - forthcoming - Agriculture and Human Values:1-18.
    Advancing women’s empowerment and gender equality in agriculture is a recognised development goal, also within crop breeding. Increasingly, breeding teams are expected to use ‘market-based’ approaches to design more ‘demand-led’ and ‘gender-responsive’ crop varieties. Based on an institutional ethnography that includes high-profile development-oriented breeding initiatives, we unpack these terms using perspectives from political agronomy and feminist science and technology studies. By conceptualising the market as an ongoing, relational performance made up of discourses, practices and human and nonhuman actors, we trace (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49. Das Grundprinzip der Hegelschen dialektischen Logik.Ida Vas - 1983 - In György Tamás & Anna Madarász-Zsigmond (eds.), Studien zur Logik. Budapest: Akadémiai Kiadó.
     
    Export citation  
     
    Bookmark  
  50.  9
    Munka és logika: a hegeli abszolút eszme kritikai elemzéséhez.Ida Vas - 1977 - Budapest: Akadémiai Kiadó.
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 377