Results for ' software vulnerability'

993 found
Order:
  1.  36
    Software vulnerability due to practical drift.Christian V. Lundestad & Anique Hommels - 2007 - Ethics and Information Technology 9 (2):89-100.
    The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  39
    Agents of responsibility in software vulnerability processes.Ari Takanen, Petri Vuorijärvi, Marko Laakso & Juha Röning - 2004 - Ethics and Information Technology 6 (2):93-110.
    Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  2
    A comparative study of neural network architectures for software vulnerability forecasting.Ovidiu Cosma, Petrică C. Pop & Laura Cosma - forthcoming - Logic Journal of the IGPL.
    The frequency of cyberattacks has been rapidly increasing in recent times, which is a significant concern. These attacks exploit vulnerabilities present in the software components that constitute the targeted system. Consequently, the number of vulnerabilities within these software components serves as an indicator of the system’s level of security and trustworthiness. This paper compares the accuracy, trainability and stability to configuration parameters of several neural network architectures, namely Long Short-Term Memory, Multilayer Perceptron and Convolutional Neural Network. These architectures (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  20
    Vulnerability identified in clinical practice: a qualitative analysis.Laura Sossauer, Mélinée Schindler & Samia Hurst - 2019 - BMC Medical Ethics 20 (1):1-10.
    Background Although it is the moral duty of physicians to protect vulnerable patients, there are no data on how vulnerability is perceived in clinical practice. This study explores how physicians classify someone as “vulnerable”. Method Thirty-three physicians were initially questioned about resource allocation problems in their work. The results of these interviews were examined with qualitative study software to identify characteristics associated with vulnerability in patients. Data were conceptualized, classified and cross-linked to highlight the major determinants of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  5. Robot Care Ethics Between Autonomy and Vulnerability: Coupling Principles and Practices in Autonomous Systems for Care.Alberto Pirni, Maurizio Balistreri, Steven Umbrello, Marianna Capasso & Federica Merenda - 2021 - Frontiers in Robotics and AI 8 (654298):1-11.
    Technological developments involving robotics and artificial intelligence devices are being employed evermore in elderly care and the healthcare sector more generally, raising ethical issues and practical questions warranting closer considerations of what we mean by “care” and, subsequently, how to design such software coherently with the chosen definition. This paper starts by critically examining the existing approaches to the ethical design of care robots provided by Aimee van Wynsberghe, who relies on the work on the ethics of care by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  28
    Open source software and software patents: A constitutional perspective.Bryan Pfaffenberger - 1999 - Knowledge, Technology & Policy 12 (3):94-112.
    Imagine if each square of pavement on the sidewalk had an owner, and pedestrians required a license to step on it. Imagine the negotiations necessary to walk an entire block under this system. That is what writing a program will be like if software patents continue. The sparks of creativity and individualism that have driven the computer revolution will be snuffed out. Imagine if each square of pavement on the sidewalk had an owner, and pedestrians required a license to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  64
    Research on the Vulnerability of Government Procurement of Elderly Care Services: A Complex Network Perspective.Yuting Zhang, Lan Xu & Zhengnan Lu - 2022 - Complexity 2022:1-15.
    The policy of government procurement of elderly care services has the vulnerability characteristics that all complex systems have. To maintain the policy’s robustness, this paper studies the vulnerability of government procurement of elderly care services from the perspective of complex network. Case analysis and sample statistics are used to obtain the vulnerability influencing factors of the policy. Then, complex network diagram of vulnerability influencing factors is constructed through Pajek software. The compatibility coefficient is used to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  39
    Assessing environmental impacts of aviation on connected cities using environmental vulnerability studies and fluid dynamics: an Indian case study.G. Ramchandran, J. Nagawkar, K. Ramaswamy, S. Ghosh, A. Goenka & A. Verma - 2017 - AI and Society 32 (3):421-432.
    As the annual air passenger traffic in India is increasing steeply, an environmental impact assessment on important cities connected by air is becoming increasingly indispensable. This study proposes an innovative screening method that uses a modified Environmental Vulnerability Index. This modified EVI calculator includes aviation-related parameters and can be used to assess the environmental vulnerabilities of political states and cities, in addition to countries as is being already done. This study also suggests the need to include aspects of human (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  38
    Detection, exploitation and mitigation of memory errors.Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez & Pablo Garcia Bringas - 2024 - Logic Journal of the IGPL 32 (2):281-292.
    Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  30
    Forbidden knowledge in machine learning reflections on the limits of research and publication.Thilo Hagendorff - 2021 - AI and Society 36 (3):767-781.
    Certain research strands can yield “forbidden knowledge”. This term refers to knowledge that is considered too sensitive, dangerous or taboo to be produced or shared. Discourses about such publication restrictions are already entrenched in scientific fields like IT security, synthetic biology or nuclear physics research. This paper makes the case for transferring this discourse to machine learning research. Some machine learning applications can very easily be misused and unfold harmful consequences, for instance, with regard to generative video or text synthesis, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  11.  16
    Economies of disclosure.Jeff Bollinger - 2004 - Acm Sigcas Computers and Society 34 (3):1-1.
    Imagine this scenario: a bank customer walks up to an ATM to withdraw cash from her account. While entering her PIN, she accidentally presses the '3' key at the same time as the 'Clear' key. Instantly $100 comes out of the cash dispenser! Curious, she checks the receipt and seeing that the money did not from her account, she tries the same operation. Again, $100 comes out of the cash dispenser. At this point she has two options, A: she can (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  12.  40
    Bosses without a heart: socio-demographic and cross-cultural determinants of attitude toward Emotional AI in the workplace.Peter Mantello, Manh-Tung Ho, Minh-Hoang Nguyen & Quan-Hoang Vuong - 2023 - AI and Society 38 (1):97-119.
    Biometric technologies are becoming more pervasive in the workplace, augmenting managerial processes such as hiring, monitoring and terminating employees. Until recently, these devices consisted mainly of GPS tools that track location, software that scrutinizes browser activity and keyboard strokes, and heat/motion sensors that monitor workstation presence. Today, however, a new generation of biometric devices has emerged that can sense, read, monitor and evaluate the affective state of a worker. More popularly known by its commercial moniker, Emotional AI, the technology (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  13. AI Can Help Us Live More Deliberately.Julian Friedland - 2019 - MIT Sloan Management Review 60 (4).
    Our rapidly increasing reliance on frictionless AI interactions may increase cognitive and emotional distance, thereby letting our adaptive resilience slacken and our ethical virtues atrophy from disuse. Many trends already well underway involve the offloading of cognitive, emotional, and ethical labor to AI software in myriad social, civil, personal, and professional contexts. Gradually, we may lose the inclination and capacity to engage in critically reflective thought, making us more cognitively and emotionally vulnerable and thus more anxious and prone to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  15.  13
    Assessment of nurses’ ethical performance from the perspective of mothers and nurses in pediatric wards of beast hospital, Hamadan, 2019.Danial Shadi, Saba Bashiri, Naser Mohammad Gholi Mezerji & Tayebeh Hasan Tehrani - 2021 - Clinical Ethics 16 (3):240-245.
    Background and aim Difficult moral situations assume more critical importance in pediatric wards since children are more vulnerable than adults. Given that professional ethics is a substantial part of children treatment, the present study was conducted to determine the ethical performance of nurses from the perspective of mothers and nurses in the pediatric wards of Be'esat Hospital in Hamadan. Materials and methods The present descriptive-analytical study was conducted on 58 nurses and 263 mothers of children referred to the pediatric wards (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  10
    The politics of algorithmic governance in the black box city.Gavin J. D. Smith - 2020 - Big Data and Society 7 (2).
    Everyday surveillance work is increasingly performed by non-human algorithms. These entities can be conceptualised as machinic flâneurs that engage in distanciated flânerie: subjecting urban flows to a dispassionate, calculative and expansive gaze. This paper provides some theoretical reflections on the nascent forms of algorithmic practice materialising in two Australian cities, and some of their implications for urban relations and social justice. It looks at the idealisation – and operational black boxing – of automated watching programs, before considering their impacts on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  16
    Psychosocial Framework of Resilience: Navigating Needs and Adversities During the Pandemic, A Qualitative Exploration in the Indian Frontline Physicians.Debanjan Banerjee, T. S. Sathyanarayana Rao, Roy Abraham Kallivayalil & Afzal Javed - 2021 - Frontiers in Psychology 12.
    IntroductionFrontline healthcare workers have faced significant plight during the ongoing Coronavirus disease 2019 pandemic. Studies have shown their vulnerabilities to depression, anxiety disorders, post-traumatic stress, and insomnia. In a developing country like India, with a rising caseload, resource limitations, and stigma, the adversities faced by the physicians are more significant. We attempted to hear their “voices” to understand their adversities and conceptualize their resilience framework.MethodsA qualitative approach was used with a constructivist paradigm. After an initial pilot, a socio-demographically heterogeneous population (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  11
    Smartphone addiction risk, technology-related behaviors and attitudes, and psychological well-being during the COVID-19 pandemic.Alexandrina-Mihaela Popescu, Raluca-Ștefania Balica, Emil Lazăr, Valentin Oprea Bușu & Janina-Elena Vașcu - 2022 - Frontiers in Psychology 13.
    COVID-19 pandemic-related perceived risk of infection, illness fears, acute stress, emotional anxiety, exhaustion, and fatigue, psychological trauma and depressive symptoms, and sustained psychological distress can cause smartphone addiction risk and lead to technology-related cognitive, emotional, and behavioral disorders, thus impacting psychological well-being. Behavioral addiction of smartphone users can result in anxiety symptom severity, psychiatric symptoms, and depressive stress. We carried out a quantitative literature review of the Web of Science, Scopus, and ProQuest throughout June 2022, with search terms including “smartphone (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  12
    Guardians and research staff experiences and views about the consent process in hospital-based paediatric research studies in urban Malawi: A qualitative study.Nicola Desmond, Michael Parker, David Lalloo, Ian J. C. MacCormick, Markus Gmeiner, Charity Gunda, Neema Mtunthama Toto & Mtisunge Joshua Gondwe - 2022 - BMC Medical Ethics 23 (1):1-15.
    BackgroundObtaining consent has become a standard way of respecting the patient’s rights and autonomy in clinical research. Ethical guidelines recommend that the child’s parent/s or authorised legal guardian provides informed consent for their child’s participation. However, obtaining informed consent in paediatric research is challenging. Parents become vulnerable because of stress related to their child’s illness. Understanding the views held by guardians and researchers about the consent process in Malawi, where there are limitations in health care access and research literacy will (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  37
    Advice for Plagiarism Whistleblowers.Mark Fox & Jeffrey Beall - 2014 - Ethics and Behavior 24 (5):341-349.
    Scholarly open-access publishing has made it easier for researchers to discover and report academic misconduct such as plagiarism. However, as the website Retraction Watch shows, plagiarism is by no means limited to open-access journals. Moreover, various web-based services provide plagiarism detection software, facilitating one’s ability to detect pirated content. Upon discovering plagiarism, some are compelled to report it, but being a plagiarism whistleblower is inherently stressful and can leave one vulnerable to criticism and retaliation by colleagues and others. Reporting (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  21.  9
    How Do Perceived Health Threats Affect the Junk Food Eating Behavior and Consequent Obesity? Moderating Role of Product Knowledge Hiding.Yanxia Li, Xiaohong Li, Tuanting Zhang, Haixia Guo & Caili Sun - 2022 - Frontiers in Psychology 13.
    The predominant use of junk food in our societies is continuously held responsible for the obese body physiques and overweight among the kids and adolescents. The current supportive environments where organic foods are limited, and new processed foods have been brought to the market with more variant tastes and acceptability for the kids and adolescents that have diverged their eating patterns. It has significantly contributed to the health issues and growth discrepancies of the users. However, the awareness of the food (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  5
    Just Because We Can Doesn’t Mean We Should: On Knowing and Protecting Data Produced by the Jewish Consumptives’ Relief Society.Jack Maness & Kim Pham - 2022 - Humanist Studies and the Digital Age 7 (1).
    A recent project at the University of Denver Libraries used handwritten text recognition (HTR) software to create transcriptions of records from the Jewish Consumptives’ Relief Society (JCRS), a tuberculosis sanatorium located in Denver, Colorado from 1904 to 1954. Among a great many other potential uses, these type- and hand-written records give insight into the human experience of disease and epidemic, its treatment, its effect on cultures, and of Jewish immigration to and early life in the American West. Our intent (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23. Motives and risk perceptions of participants in a phase 1 trial for Hepatitis C Virus investigational therapy in pregnancy.Yasaswi Kislovskiy, Catherine Chappell, Emily Flaherty, Megan E. Hamm, Flor de Abril Cameron, Elizabeth Krans & Judy C. Chang - 2022 - Research Ethics 18 (2):132-150.
    Limited research has been done among pregnant people participating in investigational drug trials. To enhance the ethical understanding of pregnant people’s perspectives on research participation, we sought to describe motives and risk perceptions of participants in a phase 1 trial of ledipasvir/sofosbuvir treatment for chronic Hepatitis C virus during pregnancy. Pregnant people with chronic HCV infection enrolled in an open-label, phase 1 study of LDV/SOF participated in semi-structured, in-depth interviews to explore their reasons for participation and experiences within the study. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  8
    Challenging Disability Discrimination in the Clinical Use of PDMP Algorithms.Elizabeth Pendo & Jennifer Oliva - 2024 - Hastings Center Report 54 (1):3-7.
    State prescription drug monitoring programs (PDMPs) use proprietary, predictive software platforms that deploy algorithms to determine whether a patient is at risk for drug misuse, drug diversion, doctor shopping, or substance use disorder (SUD). Clinical overreliance on PDMP algorithm‐generated information and risk scores motivates clinicians to refuse to treat—or to inappropriately treat—vulnerable people based on actual, perceived, or past SUDs, chronic pain conditions, or other disabilities. This essay provides a framework for challenging PDMP algorithmic discrimination as disability discrimination under (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  19
    Motives and risk perceptions of participants in a phase 1 trial for Hepatitis C Virus investigational therapy in pregnancy.Yasaswi Kislovskiy, Catherine Chappell, Emily Flaherty, Megan E. Hamm, Flor de Abril Cameron, Elizabeth Krans & Judy C. Chang - 2021 - Sage Publications Ltd: Research Ethics 18 (2):132-150.
    Research Ethics, Volume 18, Issue 2, Page 132-150, April 2022. Limited research has been done among pregnant people participating in investigational drug trials. To enhance the ethical understanding of pregnant people’s perspectives on research participation, we sought to describe motives and risk perceptions of participants in a phase 1 trial of ledipasvir/sofosbuvir treatment for chronic Hepatitis C virus during pregnancy. Pregnant people with chronic HCV infection enrolled in an open-label, phase 1 study of LDV/SOF participated in semi-structured, in-depth interviews to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  8
    Moving through adulthood: The lived experience of Irish adults with PKU.Mary-Ellen O'Shea, Bernadette Sheehan Gilroy, Anna-Marie Greaney & Anita MacDonald - 2022 - Frontiers in Psychology 13.
    BackgroundThis paper represents a portion of the findings from one of the first research studies eliciting the lived experience of adults with an early diagnosis of Phenylketonuria living in Ireland. Ireland has one of the highest prevalence rates of PKU in Europe, however, little is known about the experience of Irish adults with PKU. Furthermore, Ireland is one of the first countries in the world to introduce neonatal screening followed by the introduction of long-term dietary therapy over 50 years ago. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  87
    Moral luck and computer ethics: Gauguin in cyberspace. [REVIEW]David Sanford Horner - 2010 - Ethics and Information Technology 12 (4):299-312.
    Issue Title: Moral Luck, Social Networking Sites, and Trust on the Web I argue that the problem of 'moral luck' is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its 'logical malleability', leads to ever greater levels of complexity, unreliability and uncertainty. The ever widening contexts of application in turn lead to greater scope for the operation of chance and the phenomenon of moral luck. Moral luck bears down most heavily (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  28
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  29.  19
    With great power comes great vulnerability: an ethical analysis of psychedelics’ therapeutic mechanisms proposed by the REBUS hypothesis.Daniel Https://Orcidorg624X Villiger & Manuel Trachsel - 2023 - Journal of Medical Ethics 49 (12):826-832.
    Psychedelics are experiencing a renaissance in mental healthcare. In recent years, more and more early phase trials on psychedelic-assisted therapy have been conducted, with promising results overall. However, ethical analyses of this rediscovered form of treatment remain rare. The present paper contributes to the ethical inquiry of psychedelic-assisted therapy by analysing the ethical implications of its therapeutic mechanisms proposed by the relaxed beliefs under psychedelics (REBUS) hypothesis. In short, the REBUS hypothesis states that psychedelics make rigid beliefs revisable by increasing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  41
    The concept of vulnerability in medical ethics and philosophy.Joachim Boldt - 2019 - Philosophy, Ethics, and Humanities in Medicine 14 (1):1-8.
    BackgroundHealthcare is permeated by phenomena of vulnerability and their ethical significance. Nonetheless, application of this concept in healthcare ethics today is largely confined to clinical research. Approaches that further elaborate the concept in order to make it suitable for healthcare as a whole thus deserve renewed attention.MethodsConceptual analysis.ResultsTaking up the task to make the concept of vulnerability suitable for healthcare ethics as a whole involves two challenges. Firstly, starting from the concept as it used in research ethics, a (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  31.  22
    The concept of vulnerability in medical ethics and philosophy.Joachim Boldt - 2019 - Philosophy, Ethics, and Humanities in Medicine 14 (1):1-8.
    Healthcare is permeated by phenomena of vulnerability and their ethical significance. Nonetheless, application of this concept in healthcare ethics today is largely confined to clinical research. Approaches that further elaborate the concept in order to make it suitable for healthcare as a whole thus deserve renewed attention. Conceptual analysis. Taking up the task to make the concept of vulnerability suitable for healthcare ethics as a whole involves two challenges. Firstly, starting from the concept as it used in research (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  32. Why bioethics needs a concept of vulnerability.Wendy Rogers, Catriona Mackenzie & Susan Dodds - 2012 - International Journal of Feminist Approaches to Bioethics 5 (2):11-38.
    Concern for human vulnerability seems to be at the heart of bioethical inquiry, but the concept of vulnerability is under-theorized in the bioethical literature. The aim of this article is to show why bioethics needs an adequately theorized and nuanced conception of vulnerability. We first review approaches to vulnerability in research ethics and public health ethics, and show that the bioethical literature associates vulnerability with risk of harm and exploitation, and limited capacity for autonomy. We (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   85 citations  
  33. Basic ethical principles in European bioethics and biolaw: Autonomy, dignity, integrity and vulnerability – Towards a foundation of bioethics and biolaw.Jacob Dahl Rendtorff - 2002 - Medicine, Health Care and Philosophy 5 (3):235-244.
    This article summarizes some of the results of the BIOMED II project “Basic Ethical Principles in European Bioethics and Biolaw” connected to a research project of the Danish Research Councils “Bioethics and Law”. The BIOMED project was based on cooperation between 22 partners in most EU countries. The aim of the project was to identify the ethical principles of respect for autonomy, dignity, integrity and vulnerability as four important ideas or values for a European bioethics and biolaw. The research (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   61 citations  
  34. Climate Justice: Vulnerability and Protection.Henry Shue - 2014 - Oxford University Press.
    Climate change is the most difficult threat facing humanity this century and negotiations to reach international agreement have so far foundered on deep issues of justice. Providing provocative and imaginative answers to key questions of justice, informed by political insight and scientific understanding, this book offers a new way forward.
    Direct download  
     
    Export citation  
     
    Bookmark   28 citations  
  35. An Analysis of the Interaction Between Intelligent Software Agents and Human Users.Christopher Burr, Nello Cristianini & James Ladyman - 2018 - Minds and Machines 28 (4):735-774.
    Interactions between an intelligent software agent and a human user are ubiquitous in everyday situations such as access to information, entertainment, and purchases. In such interactions, the ISA mediates the user’s access to the content, or controls some other aspect of the user experience, and is not designed to be neutral about outcomes of user choices. Like human users, ISAs are driven by goals, make autonomous decisions, and can learn from experience. Using ideas from bounded rationality, we frame these (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   37 citations  
  36.  87
    Informed consent in a tuberculosis genetic study in Cameroon: information overload, situational vulnerability and diagnostic misconception.Ali Ibrahim Mohammed-Ali, Eyoab Iyasu Gebremeskel, Emmanuel Yenshu, Theobald Nji, Apungwa Cornelius Ntabe, Samuel Wanji, Godfrey B. Tangwa & Nchangwi Syntia Munung - 2022 - Research Ethics 18 (4):265-280.
    Research Ethics, Volume 18, Issue 4, Page 265-280, October 2022. Concerns around comprehension and recall of consent information by research participants have typically been associated with low health and research literacy levels. In genomics research, this concern is heightened as the scientific and ethical complexities of genetics research, such as biobanking, genetic susceptibility, data sharing, and incidental findings may be more difficult for potential research participants to understand. However, challenges to research participants’ comprehension of consent information may be compounded by (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  31
    Obstetric Violence and Vulnerability: A Bioethical Approach.Corinne Berzon & Sara Cohen Shabot - 2023 - International Journal of Feminist Approaches to Bioethics 16 (1):52-76.
    At healthcare facilities worldwide, women during childbirth undergo medical procedures they haven’t consented to and experience mistreatment and disrespect. This phenomenon is recognized as obstetric violence (OV), a distinct form of gender violence. The resulting trauma carries both immediate and long-term implications, making it vital to address for promoting women’s health. OV is partly shaped by a narrow, paternalistic conception of vulnerability. A flawed conception of the vulnerability of pregnant women and fetuses has opened the door to medical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  28
    SILENCING AND SPEAKER VULNERABILITY: undoing an oppressive form of (wilful) ignorance.Nicholas Bunnin & Pamela Sue Anderson - 2020 - Angelaki 25 (1-2):36-45.
    The French feminist philosopher Michèle Le Doeuff has taught us something about “the collectivity,” which she discovers in women’s struggle for access to the philosophical, but also about “the unknown” and “the unthought.” It is the unthought which will matter most to what I intend to say today about a fundamental ignorance on which speaker vulnerability is built. On International Women’s Day, it seems appropriate to speak about – or, at least, to evoke – the silencing which has been (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  37
    On the Vulnerability of a Community: Edith Stein and Gerda Walther.Antonio Calcagno - 2018 - Journal of the British Society for Phenomenology 49 (3):255-266.
    Edith Stein and Gerda Walther explain how community comes to be and how it is structured, but they do not develop significant accounts of how communities disintegrate or die, albeit they make passing allusions to how this may happen. I argue that what makes communities vulnerable to their possible demise, following both Stein’s and Walther’s social ontology, is the breakdown of the sense of the communal bond, that is, the failure of the community members’ ability to make sense of their (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  36
    A Theory of Vulnerability-based Morality.Anton J. M. Dijker - 2014 - Emotion Review 6 (2):175-183.
    The recent introduction of the concepts of tenderness, vulnerability, and parental care in the field of moral emotions has brought us closer to an understanding of the underlying mechanisms, but has not yet resulted in a systematic evolutionary and proximate analysis. Applying such an analysis, the present article proposes a hypothetical care mechanism that produces different motivational states or moral emotions in response to individuals perceived as vulnerable. The mechanism consists of a care system automatically triggered by vulnerability (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  41.  23
    Respecting relational agency in the context of vulnerability: What can research ethics learn from the social sciences?Jennifer Roest, Busisiwe Nkosi, Janet Seeley, Sassy Molyneux & Maureen Kelley - 2023 - Bioethics 37 (4):379-388.
    Despite advances in theory, often driven by feminist ethicists, research ethics struggles in practice to adequately account for and respond to the agency and autonomy of people considered vulnerable in the research context. We argue that shifts within feminist research ethics scholarship to better characterise and respond to autonomy and agency can be bolstered by further grounding in discourses from the social sciences, in work that confirms the complex nature of human agency in contexts of structural and other sources of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42. Dubbing and redubbing: The vulnerability of rigid designation.Thomas S. Kuhn - 1990 - In C. Wade Savage, James Conant & John Haugeland (eds.), Minnesota Studies in the Philosophy of Science. University of Minnesota Press. pp. 58-89.
  43.  52
    Ethics, Poverty and Children’s Vulnerability.Gottfried Schweiger - 2019 - Ethics and Social Welfare 13 (3):288-301.
    This paper is concerned with child poverty from an ethical perspective and applies the normative concept of vulnerability for this purpose. The first part of the paper will briefly outline children’s particular vulnerability and distinguish important aspects of this. Then the concept will be applied to child poverty and it will be shown that child poverty is a corrosive situational vulnerability, with many severe consequences. In this part of the paper normative reasoning and empirical literature will be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  38
    The Hero’s Silences: Vulnerability, Complicity, Ambivalence.Mihaela Mihai - 2021 - Critical Review of International Social and Political Philosophy 24 (3):346-367.
  45.  75
    Normative Violence, Vulnerability, and Responsibility.Catherine Mills - 2007 - Differences 18 (2):133--156.
  46. Responding to vulnerability: The case of injection drug use.Elizabeth Ben-Ishai - 2012 - International Journal of Feminist Approaches to Bioethics 5 (2):39-63.
    This article examines the case of Insite, North America’s only supervised injection facility, to consider the relationship between dependence, relational autonomy, and vulnerability. At state-funded Insite, users inject illicit drugs under medical supervision. By conceiving of Insite as a health-care facility and addiction as disease, advocates evoke a shared sense of vulnerability among the nonusing public and users, garnering considerable support for the site. Through Insite, the state responds to vulnerability by reshaping the meaning of dependence and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Disability and Vulnerability: On Bodies, Dependence, and Power.Jackie Leach Scully - 2013 - In Catriona Mackenzie, Wendy Rogers & Susan Dodds (eds.), Vulnerability: New Essays in Ethics and Feminist Philosophy. Oup Usa.
  48.  62
    Feminist Reflections on Vulnerability: Disrespect, Obligation, Action.Ewa Plonowska Ziarek - 2013 - Substance 42 (3):67-84.
  49.  20
    On Violence and Vulnerability in a Pandemic.Michael Bernard-Donals - 2020 - Philosophy and Rhetoric 53 (3):225-231.
    ABSTRACT Pandemics and plagues function rhetorically, by doing violence to the structures of discourse, sociality, hospitality, and mutual engagement that characterize ethical human interaction. They infect us, as rhetorical subjects, and reorient our capacity for engagement. The coronavirus's “novelty” renders it uncertain as to how long it will last or who will be infected next; the near-uniform response to it has been a forced distance of ourselves from others and a displacement from our itineraries and our locations. Through COVID-19 we (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  8
    Age, Equality, and Vulnerability.Alexander A. Boni-Saenz - 2020 - Theoretical Inquiries in Law 21 (1):161-185.
    This Article uses age as an entry point for examining how temporal and methodological issues in egalitarianism make substantive equality an unattractive goal for vulnerability theory. Instead, vulnerability theory should adopt a continuous doctrine of sufficiency, which is a better fit with vulnerability theory’s underlying aims and rhetoric. Instead of evaluating what individuals have in relation to others, sufficiency refocuses the inquiry on whether we have enough throughout the lifecourse. In the context of vulnerability theory, enough (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 993