Results for 'Technology abuse'

978 found
Order:
  1.  22
    On Some Uses and Abuses of Topology in the Social Analysis of Technology.Noortje Marres - 2012 - Theory, Culture and Society 29 (4-5):288-310.
    This paper examines the limits and possibilities of topological approaches in the social analysis of technology. It proposes that topology should be considered not just as a theory to be adopted, but equally as a device that is deployed in social life in a variety of ways. Digital technologies help to make clear why: these technologies have facilitated the spread of a topological imagination, but they have also enabled a weak form of topological imagination, one that leaves in place (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  2.  6
    “All of Me Is Completely Different”: Experiences and Consequences Among Victims of Technology-Assisted Child Sexual Abuse.Malin Joleby, Carolina Lunde, Sara Landström & Linda S. Jonsson - 2020 - Frontiers in Psychology 11.
    The aim of the present study was to gain a first-person perspective on the experiences of technology-assisted child sexual abuse (TA-CSA), and a deeper understanding of the way it may affect its victims. Seven young women (aged 17–24) with experience of TA-CSA before the age of 18 participated in individual in-depth interviews. The interviews were teller-focused with the aim of capturing the interviewee’s own story about how they made sense of their experiences over time, and what impact the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Cognitive Biases for the Design of Persuasive Technologies: Uses, Abuses and Ethical Concerns.Antonio Lieto - 2021 - ACM Distinguished Speakers - Lecture Series.
    In the last decades Human-Computer Interaction (HCI) has started to focus attention on “persuasive technologies” having the goal of changing users’ behavior and attitudes according to a predefined direction. In this talk we show how some of the techniques employed in such technologies trigger some well known cognitive biases by adopting a strategy relying on logical fallacies (i.e. forms of reasoning which are logically invalid but psychologically persuasive). In particular, we will show how the mechanisms reducible to logical fallacies are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  24
    Impulsivity-Compulsivity Axis: Evidence of Its Clinical Validity to Individually Classify Subjects on the Use/Abuse of Information and Communication Technologies.Daniel Cassú-Ponsatí, Eduardo J. Pedrero-Pérez, Sara Morales-Alonso & José María Ruiz-Sánchez de León - 2021 - Frontiers in Psychology 12.
    The compulsive habit model proposed by Everitt and Robbins has accumulated important empirical evidence. One of their proposals is the existence of an axis, on which each a person with a particular addiction can be located depending on the evolutionary moment of his/her addictive process. The objective of the present study is to contribute in addressing the identification of such axis, as few studies related to it have been published to date. To do so, the use/abuse of Information and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Editorial to the special section on misuse and abuse of interactive technologies.Christoph Bartneck, Sheryl Brahnam, Antonella De Angeli & Catherine Pelachaud - 2008 - Interaction Studies 9 (3):397.
  6. Does Technology Warrant Absolute Power of Religious Autonomy?Marvin J. H. Lee & Bridget McGarry - 2017 - Journal of Healthcare Ethics and Administration 3 (1).
    Investigating an actual case that occurred in a New York state hospital where an Orthodox Jewish patient’s legal proxy demands that the clinicians and hospital administrators should provide aggressive treatment with all available technological resources for the seemingly brain-dead patient with a medically futile condition. The authors argue that a health care policy or regulation should be developed to limit patient’s access to technology in critical care. Otherwise, we will be allowing society to issue a carte blanche to religious (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. Review of Expecting Trouble: Surrogacy, Fetal Abuse and New Reproductive Technologies. [REVIEW]L. L. Layne - 1998 - Social Epistemology 12:191-196.
     
    Export citation  
     
    Bookmark  
  8.  45
    Toward mutual dependency between empathy and technology.Toyoaki Nishida - 2013 - AI and Society 28 (3):277-287.
    Technology explosion induced by information explosion will eventually change artifacts into intelligent autonomous agents consisting of surrogates and mediators from which humans can receive services without special training. Four potential problems might arise as a result of the paradigm shift: technology abuse, responsibility flaw, moral in crisis, and overdependence on artifacts. Although the first and second might be resolved in principle by introduction of public mediators, the rest seems beyond technical solution. Under the circumstances, a reasonable goal (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  62
    Designed to abuse? Deepfakes and the non-consensual diffusion of intimate images.Cristina Voto & Marco Viola - 2023 - Synthese 201 (1):1-20.
    The illicit diffusion of intimate photographs or videos intended for private use is a troubling phenomenon known as the diffusion of Non-Consensual Intimate Images (NCII). Recently, it has been feared that the spread of deepfake technology, which allows users to fabricate fake intimate images or videos that are indistinguishable from genuine ones, may dramatically extend the scope of NCII. In the present essay, we counter this pessimistic view, arguing for qualified optimism instead. We hypothesize that the growing diffusion of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  7
    Maquiladoras: The first world abusing the third world?Joseph D. Gordon - 1998 - Business Ethics, the Environment and Responsibility 7 (1):7–11.
    The industrial border region between Mexico and the USA is notorious for its physical, social and moral squalor. But is it entirely a matter of total exploitation or is the answer to the title’s question more complex than a simple yes? The author is completing his MBA degree at London Business School, is an American citizen and has a background as a consultant in information technology.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  7
    Bias, Controversy, and Abuse in the Study of the Scientific Publication System.Michael J. Mahoney - 1990 - Science, Technology and Human Values 15 (1):50-55.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   37 citations  
  12. Technology to Prevent Criminal Behavior.Gabriel De Marco & Thomas Douglas - 2021 - In David Edmonds (ed.), Future Morality. Oxford: Oxford University Press.
    The Case of Jim: Jim was arrested arriving at the house of an unattended minor, having brought with him some alcoholic drinks, condoms, and an overnight bag. Records of online conversations Jim was having with the minor give the court strong evidence that the purpose of this meet-up was to engage in sexual relations with the minor. In the course of searching his home computer, investigators also found child pornography. Jim was charged with intent to sexually abuse a child (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  43
    The use and abuse of metatags.Richard A. Spinello - 2002 - Ethics and Information Technology 4 (1):23-30.
    The web creates manyopportunities for encroachment on intellectualproperty including trademarks. Our principaltask in this paper is an investigation into anunusual form of such encroachment: theimproper use of metatags. A metatag is a pieceof HTML code that provides summary informationabout a web page. If used in an appropriatemanner, these metatags can play a legitimaterole in helping consumers locate information. But the ``keyword'' metatag is particularlysusceptible to manipulation. These tags can beeasily abused by web site creators anxious tobait search engines and bring (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  27
    Their Pain, Our Pleasure: How and When Peer Abusive Supervision Leads to Third Parties’ Schadenfreude and Work Engagement.Yueqiao Qiao, Zhe Zhang & Ming Jia - 2019 - Journal of Business Ethics 169 (4):695-711.
    Abusive supervision negatively affects its direct victims. However, recent studies have begun to explore how abusive supervision affects third parties. We use the emotion-based process model of schadenfreude as a basis to suggest that third parties will experience schadenfreude and increase their work engagement as a response to peer abusive supervision. Furthermore, we suggest that the context of competitive goal interdependence facilitates the indirect relationship between PAS and third parties’ work engagement on schadenfreude. We use a mixed-method approach to test (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  15.  25
    The Use and Abuse of the Digital Humanities in the History of Ideas: How to Study the Encyclopédie.Marie Leca-Tsiomis - 2013 - History of European Ideas 39 (4):467-476.
    Summary New information technology can be an invaluable aid to research in the history of ideas provided it is built on scientific foundations. This article discusses the case of Diderot and D'Alembert's Encyclopédie and analyses its use of earlier dictionaries (the Dictionnaire de Trévoux, Chambers's Cyclopaedia and Moréri's dictionary). It also shows how neglect of existing research in the history of ideas and ignorance of how these eighteenth-century European publications were elaborated, combined with inappropriate use of software for detecting (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16. Information Technology and Biometric Databases: Eugenics and Other Threats to Disability Rights.Jacqueline A. Laing - 2008 - Journal of Legal Technology Risk Management 3.
    Laing contends that the practice of eugenics has not disappeared. Conceptually related to the utilitarian and Social Darwinist worldview and historically evolving out of the practice of slavery, it led to some of the most spectacular human rights abuses in human history. The compulsory sterilization of and experimentation on those deemed “undesirable” and “unfit” in many technologically developed states like the US, Scandinavia, and Japan, led inexorably and most systematically to Nazi Germany with the elimination of countless millions of people (...)
     
    Export citation  
     
    Bookmark  
  17.  8
    The Current State of U.S. Regulation of Electronic Monitoring to Combat Elder Abuse and Its Future.Laura C. Hoffman - 2023 - Journal of Law, Medicine and Ethics 51 (3):708-716.
    The incidence of elder abuse has led to a growing trend of states taking various methods to regulate the use of electronic monitoring in institutional settings through programs, guidelines, regulations, and laws. This article attempts evaluate how the regulation of electronic monitoring has evolved and may be advanced in the future with the anticipated increase of elder abuse.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  7
    Technologies, Inbetweenness and Affordances.Alexander Koutamanis - 2023 - Global Philosophy 33 (1):1-22.
    Categorization of technologies by the order of their inbetweenness is a useful device for parsing complex structures info fundamental parts and understanding the application of a technology. This promises a coherent foundation for explaining how we deploy technologies in design, in particular with respect to the affordances they create. By connecting the categorization of technologies to the matching of user effectivities to features of the environment in affordances, the paper proposes an approach to the transparent description of the assemblages (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. AI as IA: The use and abuse of artificial intelligence (AI) for human enhancement through intellectual augmentation (IA).Alexandre Erler & Vincent C. Müller - 2023 - In Fabrice Jotterand & Marcello Ienca (eds.), The Routledge Handbook of the Ethics of Human Enhancement. Routledge. pp. 187-199.
    This paper offers an overview of the prospects and ethics of using AI to achieve human enhancement, and more broadly what we call intellectual augmentation (IA). After explaining the central notions of human enhancement, IA, and AI, we discuss the state of the art in terms of the main technologies for IA, with or without brain-computer interfaces. Given this picture, we discuss potential ethical problems, namely inadequate performance, safety, coercion and manipulation, privacy, cognitive liberty, authenticity, and fairness in more detail. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  20.  41
    Information technology, GIS and democraticvalues: Ethical implications for ITprofessionals in public service. [REVIEW]Akhlaque Haque - 2003 - Ethics and Information Technology 5 (1):39-48.
    Information technologies (IT) play a criticalrole in transforming public administration andredefining the role of bureaucracy in ademocratic society. New applications of ITbring great promises for government, but at thesame time raise concerns about administrativepower and its abuse. Using GeographicInformation Systems (GIS) as the centralexample, this paper provides the philosophicalunderpinnings of the role of technology anddiscusses the importance of an ethicaldiscourse in IT for public serviceprofessionals. Such ethical discourse must bebased on upholding the democratic values andpreserving the institutional integrity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21.  5
    Theism and Technology.Frederick Ferré - 2010 - In Charles Taliaferro, Paul Draper & Philip L. Quinn (eds.), A Companion to Philosophy of Religion. Oxford, UK: Wiley‐Blackwell. pp. 566–573.
    This chapter contains sections titled: Technology and Premodern Concern Technology and Modern Debate Technology and Conceptual Issues Technology and Postmodern Ideals Technologies for the Future Works cited.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22. The Making and Molding of Child Abuse.Ian Hacking - 1991 - Critical Inquiry 17 (2):253-288.
    Some evil actions are public. Maybe genocide is the most awful. Other evil actions are private, a matter of one person harming another or of self-inflicted injury. Child abuse, in our current reckoning, is the worst of private evils. We want to put a stop to it. We know we can’t do that, not entirely. Human wickedness won’t go away. But we must protect as many children as we can. We want also to discover and help those who have (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   43 citations  
  23. Uses and abuses of patent statistics.Keith Pavitt - 1988 - In A. F. J. van Raan (ed.), Handbook of Quantitative Studies of Science and Technology. Elsevier. pp. 509--536.
    No categories
     
    Export citation  
     
    Bookmark  
  24.  85
    The Face of Technology-Facilitated Aggression in New Zealand: Exploring Adult Aggressors’ Behaviors.Edgar Pacheco & Neil Melhuish - 2021 - In Jane Bailey, Asher Flynn & Nicola Henry (eds.), The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald Publishing Limited. pp. 103-123.
    The nature and extent of adults’ engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Digital Technology and Media Spectacle.Douglas Kellner - unknown
    The unfolding of the panorama of images of US prisoner abuse of Iraqis and the quest to pin responsibility on the soldiers and higher US military and political authorities is one of the most intense media spectacles of contemporary journalism. Evoking universal disgust and repugnance, the images of young American soldiers humiliating Iraqis circulated with satellite-driven speed through broadcasting channels, the Internet, and print media and may stand as some of the most influential images of all time.
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  13
    The Covid-19 Impact on Global Police Response in Relation to Online Child Sexual Exploitation and Abuse.Tanja Miloshevska - 2023 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 76 (1):511-522.
    In this paper we draw attention that there have been significant increases in activity relating to child sexual abuse and exploitation on both the surface web and dark web during the COVID-19 lockdown period. This paper aim is an analyse about how the COVID-19 pandemic is presently modifying the trends and threats of child sexual exploitation and abuse offences, which were already at high levels prior to the pandemic. This article highlights the trends and threats in the current (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  36
    How to abuse biometric passport systems.Olli I. Heimo, Antti Hakkala & Kai K. Kimppa - 2012 - Journal of Information, Communication and Ethics in Society 10 (2):68-81.
    PurposeThe purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other, non‐intended uses.Design/methodology/approachThe approach of this paper is both a meta‐study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Finland is used as a case, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  17
    Security, digital border technologies, and immigration admissions: Challenges of and to non-discrimination, liberty and equality.Natasha Saunders - forthcoming - European Journal of Political Theory.
    Normative debates on migration control, while characterised by profound disagreement, do appear to agree that the state has at least a prima facie right to prevent the entry of security threats. While concern is sometimes raised that this ‘security exception’ can be abused, there has been little focus by normative theorists on concrete practices of security, and how we can determine what a ‘principled’ use of the security exception would be. I argue that even if states have a right to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. On the technologizing and technocratic trends in bioethics.Y. Barilan - 2002 - Eubios Journal of Asian and International Bioethics 12 (5):176-180.
    Contemporary bioethics is usually notable for its focus on the uses and abuses of biomedical technology, on personal liberty and the on the formulation of ethical problems as dilemmas to be solved by utilitarian calculus within the frameworks of committees and institutional guidelines. It is argued that these developments actually reflect a technologization of medical ethics itself, which more often relies non-personal algorithms of utility.This is explained, from a historical point of view, by the impact of technology on (...)
     
    Export citation  
     
    Bookmark  
  30.  18
    Tying of Products as a Form of an Abuse of a Dominant Position (text only in LIthuanian).Daivis Švirinas & Ana Novosad - 2010 - Jurisprudencija: Mokslo darbu žurnalas 120 (2):305-323.
    The paper deals with the issue of tying (as well as bundling) practices which are applied by dominant undertakings and which, under certain circumstances, can be considered as abuses of a dominant position. The authors describe the concept of tying, indicate its types, and reveal its economic aspects, since all these issues have a certain impact on the legal assessment of tying practices. The authors conclude that the European Commission (the Commission) and the European Community (EC) courts have usually been (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31. Exploring New Zealand children’s technology access, use, skills and opportunities. Evidence from Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    While children’s interaction with digital technologies is a matter of interest around the world, evidence based on nationally representative data about how integrated these tools are in children’s everyday life is still limited in New Zealand. This research report presents findings from a study that explores children’s internet access, online skills, practices, and opportunities. This report is part of Netsafe’s research project Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online, and our first publication as a member of Global (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  7
    Adverse Childhood Experiences and Early Maladaptive Schemas as Predictors of Cyber Dating Abuse: An Actor-Partner Interdependence Mediation Model Approach.Laura Celsi, F. Giorgia Paleari & Frank D. Fincham - 2021 - Frontiers in Psychology 12.
    The increasing role that new technologies play in intimate relationships has led to the emergence of a new form of couple violence, cyber dating abuse, especially among adolescents and young adults. Although this phenomenon has received increased attention, no research has investigated predictors of cyber dating abuse taking into account the interdependence of the two partners. The study examines adverse childhood experiences and early maladaptive schemas as possible predictors of young adults’ perpetrated and suffered cyber dating abuse. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33. New reproductive technologies in the treatment of human infertility and genetic disease.Lee M. Silver - 1990 - Theoretical Medicine and Bioethics 11 (2).
    In this paper I will discuss three areas in which advances in human reproductive technology could occur, their uses and abuses, and their effects on society. First is the potential to drastically increase the success rate and availability of in vitro fertilization and embryo freezing. Second is the ability to perform biopsies on embryos prior to the onset of pregnancy. Finally, I will consider the adding or altering of genes in embryos, commonly referred to as genetic engineering.As new reproductive (...)
     
    Export citation  
     
    Bookmark  
  34.  10
    On the application of program evaluation designs: Sorting out their use and abuse.Ray C. Rist - 1989 - Knowledge, Technology & Policy 2 (4):74-96.
    Increasingly complex methodological options, as well as growing sophistication of users, means that the formulation of a research design prior to conducting an evaluation study is likely to be more demanding and time-consucting than previously. In fact, one of the most difficult problems in the entire evaluation endeavor is the development of an appropriate design.. But the issue is not only one of complexity—it is also one of the appropriateness of the designs to the questions at hand. The concern of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  4
    Innovative Analytical and Statistical Technologies as a Tool for Monitoring and Counteracting Corruption.Юлія Олександрівна ЯЦИНА - 2023 - Epistemological studies in Philosophy, Social and Political Sciences 6 (1):145-156.
    The article focuses on exploring the directions for implementing innovative analytical-statistical technologies as a tool for monitoring and detecting corruption in the state. To achieve this goal, the author clarifies the content of key concepts, defines the essence of innovative analytical-statistical technologies, and analyzes the applications of these technologies as elements of the state’s anti-corruption policy. It is determined that modern analytical-statistical technologies are integral to information technologies, which have emerged as a separate branch of production known as the information (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  30
    The virtual simulation of child sexual abuse: online gameworld users’ views, understanding and responses to sexual ageplay.Carla Reeves - 2018 - Ethics and Information Technology 20 (2):101-113.
    This paper explores cultural understandings of virtual sexual ageplay in the online world of Second Life. Online sexual ageplay is the virtual simulation of child abuse by consensual adults operating in-world with child computer characters. Second Life is primarily governed by Community Standards which rely on residents to recognise sexual ageplay and report it, which requires an appreciation of how residents view, understand and construct sexual ageplay. The research presented drew on 12 months of resident blog posts referring to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  32
    On the Genealogy and Potential Abuse of Assertoric Norms.Mitchell Green - 2023 - Topoi 42 (2):357-368.
    After briefly laying out a cultural-evolutionary approach to speech acts (Sects. 1–2), I argue that the notion of commitment at play in assertion and related speech acts comprises multiple dimensions (Sect. 3). Distinguishing such dimensions enables us to hypothesize evolutionary precursors to the modern practice of assertion, and facilitates a new way of posing the question whether, and if so to what extent, speech acts are conventional (Sect. 4). Our perspective also equips us to consider how a modern speaker might (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  25
    Exploring ethical problems in today's technological world.Tamara Phillips Fudge (ed.) - 2022 - Hershey PA: Engineering Science Reference.
    This volume will focus on ethical dilemmas created by today's ever-changing technologies and how these issues have affected individuals, companies, and society to include policies, responsibilities, abuses, consequences, whistle-blowing, and other factors in a wide variety of technology areas.
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  7
    Biology as a Technology of Social Justice in Interwar Britain: Arguments from Evolutionary History, Heredity, and Human Diversity.Marianne Sommer - 2014 - Science, Technology, and Human Values 39 (4):561-586.
    In this article, I am concerned with the public engagements of Julian Huxley, Lancelot Hogben, and J. B. S. Haldane. I analyze how they used the new insights into the genetics of heredity to argue against any biological foundations for antidemocratic ideologies, be it Nazism, Stalinism, or the British laissez-faire and class system. The most striking fact—considering the abuse of biological knowledge they contested—is that these biologists presented genetics itself as inherently democratic. Arguing from genetics, they developed an understanding (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  40. Framework for a Church Response, Report of the Irish Catholic Bishops' Advisory Committee on Child Sexual Abuse by Priests and Religious.Child Sexual Abuse - forthcoming - Veritas – Revista de Filosofia da Pucrs.
     
    Export citation  
     
    Bookmark  
  41. Intellectuals and New Technologies.Douglas Kellner - unknown
    Critical intellectuals were traditionally those who utilized their skills of speaking and writing to denounce injustices and abuses of power, and to fight for truth, justice, progress, and other positive values. In the words of Jean-Paul Sartre (1974: 285), "the duty of the intellectual is to denounce injustice wherever it occurs." The modern critical intellectual's field of action was what Habermas (1989) called the public sphere of democratic debate, political dialogue, and the writing and discussion of newspapers, journals, pamphlets, and (...)
     
    Export citation  
     
    Bookmark  
  42.  9
    Migrant and Marginalized Body in Connection with Digital Technologies as a Prosthesis of the Monstrous.Claudia Tazreiter - 2023 - Filozofski Vestnik 44 (2):199-216.
    This article situates the (human) body as a signifier for society at large, arguing that developments in many societies of structural and systematic violence that targets minorities such as refugees and first nation peoples, points to a failure of democratic values. Using two examples, we elaborate technology and digital devices as prosthesis of the body, that are also acting as proxy for state violence. The first example is from the carceral archipelago of Manus Island as a site of remote (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43. John D. Corrigan.Substance Abuse - 2005 - In Walter M. High Jr, Angelle M. Sander, Margaret A. Struchen & Karen A. Hart (eds.), Rehabilitation for Traumatic Brain Injury. Oxford University Press. pp. 133.
     
    Export citation  
     
    Bookmark  
  44.  24
    Classifying Generalization: Paradigm War or Abuse of Terminology?John N. Williams & Eric W. K. Tsang - 2015 - Journal of Information Technology 30 (1):18-19.
    Lee and Baskerville (2003) attempted to clarify the concept of generalization and classify it into four types. In Tsang and Williams (2012) we objected to their account of generalization as well as their classification and offered repairs. Then we proposed a classification of induction, within which we distinguished five types of generalization. In their (2012) rejoinder, they argue that their classification is compatible with ours, claiming that theirs offers a ‘new language.’ Insofar as we resist this ‘new language’ and insofar (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  35
    The Fundamental Right of Medical Necessity and Genetic Intervention for Substance Abuse.William Kitchin - 2006 - Journal of Evolution and Technology 15 (1):1.
    Genetic intervention is on the near horizon for the treatment of substance abu se. Genetic intervention involves a reprogramming of a person’s own genetic instructions so that that person will no longer have the physical craving for the drug of choice. Unlike pharmacologic intervention, genetic intervention will change the genetic identity of the person, albeit slightly. The legal issue is whether one has a fundamental right to this medical procedure. A fundamental right is one that the government cannot deny without (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  31
    The Hippocratic Bargain and Health Information Technology.Mark A. Rothstein - 2010 - Journal of Law, Medicine and Ethics 38 (1):7-13.
    The shift to longitudinal, comprehensive electronic health records means that any health care provider or third-party user of the EHR will be able to access much health information of questionable clinical utility and possibly of great sensitivity. Genetic test results, reproductive health, mental health, substance abuse, and domestic violence are examples of sensitive information that many patients would not want routinely available. The likely policy response is to give patients the ability to segment information in their EHRs and to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  47.  22
    Women’s Bodies and the Evolution of Anti-rape Technologies: From the Hoop Skirt to the Smart Frock.Robyn Lincoln, Alex Bevan & Caroline Wilson-Barnao - 2021 - Body and Society 27 (4):30-54.
    In this article, we explore smart deterrents and their historical precedents marketed to women and girls for the purpose of preventing harassment, sexual abuse and violence. Rape deterrents, as we define them, encompass customs, architectures, fashions, surveillant infrastructures, apps and devices conceived to manage and protect the body. Online searches reveal an array of technologies, and we engage with their prevention narratives and cultural construction discourses of the gendered body. Our critical analysis places recent rape deterrents in conversation with (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  31
    Prosthetic gods: The posthuman threat of self-service technology.Thomas B. Cavanagh - 2008 - Interaction Studies 9 (3):458-480.
    Computer-facilitated self-service technologies have become ubiquitous in today’s consumer-focused world. Yet, few human–computer interactions elicit such dramatically polarizing emotional reactions from users as those involving SSTs. ATMs, pay-at-the-pump gas stations, and self-scanning retail registers tend to produce both passionate supporters and critics. While negative comments often center on unpleasant personal user experiences, the actual “abuse” related to such systems is really much deeper and more complex. SSTs carry with them a number of potentially insidious consequences, including the exploitation of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  18
    Prosthetic gods: The posthuman threat of self-service technology.Thomas B. Cavanagh - 2008 - Interaction Studiesinteraction Studies Social Behaviour and Communication in Biological and Artificial Systems 9 (3):458-480.
    Computer-facilitated self-service technologies have become ubiquitous in today’s consumer-focused world. Yet, few human–computer interactions elicit such dramatically polarizing emotional reactions from users as those involving SSTs. ATMs, pay-at-the-pump gas stations, and self-scanning retail registers tend to produce both passionate supporters and critics. While negative comments often center on unpleasant personal user experiences, the actual “abuse” related to such systems is really much deeper and more complex. SSTs carry with them a number of potentially insidious consequences, including the exploitation of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  7
    Theorising about child maltreatment: Narrative review on health education models, conceptual frameworks and the importance of the information and communication technologies.Sagrario Gómez-Cantarino, Victoria Mazoteras-Pardo, José Rodríguez-Montejano, Cinzia Gradellini, Aliete Cunha-Oliveira & María Idoia Ugarte-Gurrutxaga - 2022 - Frontiers in Psychology 13.
    Child maltreatment is conceived as a public health problem. Therefore, it is appropriate to analyse the explanatory models that deal with this behaviour, reflecting these postulates within the panorama of health education, which makes health professionals responsible for taking action. In order to do this, the theoretical context and the awareness of nursing students in relation to these theories must be analysed. In turn, the use of information and communication technologies in this field should be valued, due to their capacity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 978