Results for 'Computer abuse'

1000+ found
Order:
  1.  36
    Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse.Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett - 2014 - Journal of Business Ethics 121 (3):385-401.
    Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  2.  27
    Abusive interactions with embodied agents.Chris Creed & Russell Beale - 2008 - Interaction Studies 9 (3):481-503.
    Numerous research groups around the world are attempting to build realistic and believable autonomous embodied agents that attempt to have natural interactions with users. Research into these entities has primarily focused on their potential to enhance human–computer interaction. As a result, there is little understanding of the potential for embodied entities to abuse and manipulate users for questionable purposes. We highlight the potential opportunities for abuse when interacting with embodied agents in virtual worlds and discuss how our (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3.  13
    Abusive interactions with embodied agents.Chris Creed & Russell Beale - 2008 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 9 (3):481-503.
    Numerous research groups around the world are attempting to build realistic and believable autonomous embodied agents that attempt to have natural interactions with users. Research into these entities has primarily focused on their potential to enhance human–computer interaction. As a result, there is little understanding of the potential for embodied entities to abuse and manipulate users for questionable purposes. We highlight the potential opportunities for abuse when interacting with embodied agents in virtual worlds and discuss how our (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. AI as IA: The use and abuse of artificial intelligence (AI) for human enhancement through intellectual augmentation (IA).Alexandre Erler & Vincent C. Müller - 2023 - In Fabrice Jotterand & Marcello Ienca (eds.), The Routledge Handbook of the Ethics of Human Enhancement. Routledge. pp. 187-199.
    This paper offers an overview of the prospects and ethics of using AI to achieve human enhancement, and more broadly what we call intellectual augmentation (IA). After explaining the central notions of human enhancement, IA, and AI, we discuss the state of the art in terms of the main technologies for IA, with or without brain-computer interfaces. Given this picture, we discuss potential ethical problems, namely inadequate performance, safety, coercion and manipulation, privacy, cognitive liberty, authenticity, and fairness in more (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5.  12
    Exploring the abuse of robots.Christoph Bartneck & Jun Hu - 2008 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 9 (3):415-433.
    Robots have been introduced into our society, but their social role is still unclear. A critical issue is whether the robot’s exhibition of intelligent behaviour leads to the users’ perception of the robot as being a social actor, similar to the way in which people treat computers and media as social actors. The first experiment mimicked Stanley Milgram’s obedience experiment, but on a robot. The participants were asked to administer electric shocks to a robot, and the results show that people (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  6.  42
    Exploring the abuse of robots.Christoph Bartneck & Jun Hu - 2008 - Interaction Studies 9 (3):415-433.
    Robots have been introduced into our society, but their social role is still unclear. A critical issue is whether the robot’s exhibition of intelligent behaviour leads to the users’ perception of the robot as being a social actor, similar to the way in which people treat computers and media as social actors. The first experiment mimicked Stanley Milgram’s obedience experiment, but on a robot. The participants were asked to administer electric shocks to a robot, and the results show that people (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  7.  45
    Judgements about computer ethics: Do individual, co-worker, and company judgements differ? Do company codes make a difference. [REVIEW]Margaret Anne Pierce & John W. Henry - 2000 - Journal of Business Ethics 28 (4):307 - 322.
    When faced with an ambiguous ethical situation related to computer technology (CT), the individual's course of action is influenced by personal experiences and opinions, consideration of what co-workers would do in the same situation, and an expectation of what the organization might sanction. In this article, the judgement of over three-hundred Association of Information Technology Professionals (AITP) members concerning the actions taken in a series of CT ethical scenarios are examined. Respondents expressed their personal judgement, as well as their (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  8.  89
    On the Use and Abuse of Dasein in Cognitive Science.Joseph Ulric Neisser - 1999 - The Monist 82 (2):347-361.
    Dasein is one of several twentieth-century notions which paint a portrait of the “post-Cartesian subject.” Critics of cognitivism such as Dreyfus (1992) have invoked Dasein in arguing that computational models cannot be sufficient to account for situated cognition. Van Gelder (1995) argues that dynamic systems theory provides an empirical model of cognition as practical activity which avoids the Cartesianism implicit in the computational approach. I assess Van Gelder’s claim for dynamic systems as a model of being-in-the-world. Contra Van Gelder, I (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  29
    The virtual simulation of child sexual abuse: online gameworld users’ views, understanding and responses to sexual ageplay.Carla Reeves - 2018 - Ethics and Information Technology 20 (2):101-113.
    This paper explores cultural understandings of virtual sexual ageplay in the online world of Second Life. Online sexual ageplay is the virtual simulation of child abuse by consensual adults operating in-world with child computer characters. Second Life is primarily governed by Community Standards which rely on residents to recognise sexual ageplay and report it, which requires an appreciation of how residents view, understand and construct sexual ageplay. The research presented drew on 12 months of resident blog posts referring (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  18
    Function and Mechanism of Myelin Regulation in Alcohol Abuse and Alcoholism.James Rice & Chen Gu - 2019 - Bioessays 41 (7):1800255.
    Excessive alcohol use has adverse effects on the central nervous system (CNS) and can lead to alcohol use disorders (AUDs). Recent studies have suggested that myelin reductions may directly contribute to CNS dysfunctions associated with AUDs. Myelin consists of compact lipid membranes wrapped around axons to provide electrical insulation and trophic support. Regulation of myelin is considered as a new form of neural plasticity due to its profound impacts on the computation of neural networks. In this review, the authors first (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Cognitive Biases for the Design of Persuasive Technologies: Uses, Abuses and Ethical Concerns.Antonio Lieto - 2021 - ACM Distinguished Speakers - Lecture Series.
    In the last decades Human-Computer Interaction (HCI) has started to focus attention on “persuasive technologies” having the goal of changing users’ behavior and attitudes according to a predefined direction. In this talk we show how some of the techniques employed in such technologies trigger some well known cognitive biases by adopting a strategy relying on logical fallacies (i.e. forms of reasoning which are logically invalid but psychologically persuasive). In particular, we will show how the mechanisms reducible to logical fallacies (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  5
    Do Personality Traits Matter? Exploring Anti-drug Behavioral Patterns in a Computer-Assisted Situated Learning Environment.Tien-Chi Huang & Yu-Jie Chen - 2022 - Frontiers in Psychology 13.
    Drug abuse has been and continues to be, a common social issue worldwide, yet the efficiency of widely adopted sweeping speech for anti-drug campaigns has proven inefficient. To provide students with a safe and efficient learning situation related to drug refusal skills, we used a novel approach rooted in a serious learning game and concept map during a brief extracurricular period to help students understand drugs and their negative effects. The proposed game-based situational learning system allowed all students to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  8
    The Principles of Biological Classification: The Use and Abuse of Philosophy.David L. Hull - 1978 - PSA Proceedings of the Biennial Meeting of the Philosophy of Science Association 1978 (2):130-153.
    In recent years two groups of taxonomists have attempted to influence the general goals and methods of biological classification. The first group, which emerged in the late 1950’s, has been called variously neo-Adansonian, numerical, computer and phenetic taxonomy. The founders of this school, Robert R. Sokal and P.H.A. Sneath, termed their unified approach to systematics “neo-Adansonian” because of the affinities which they saw between their views and those of the 18th century botanist, Michel Adanson (1727-1806). Today little mention is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Framework for a Church Response, Report of the Irish Catholic Bishops' Advisory Committee on Child Sexual Abuse by Priests and Religious.Child Sexual Abuse - forthcoming - Veritas – Revista de Filosofia da Pucrs.
     
    Export citation  
     
    Bookmark  
  15. John D. Corrigan.Substance Abuse - 2005 - In Walter M. High Jr, Angelle M. Sander, Margaret A. Struchen & Karen A. Hart (eds.), Rehabilitation for Traumatic Brain Injury. Oxford University Press. pp. 133.
     
    Export citation  
     
    Bookmark  
  16. Section 2. Model Theory.Va Vardanyan, On Provability Resembling Computability, Proving Aa Voronkov & Constructive Logic - 1989 - In Jens Erik Fenstad, Ivan Timofeevich Frolov & Risto Hilpinen (eds.), Logic, Methodology, and Philosophy of Science Viii: Proceedings of the Eighth International Congress of Logic, Methodology, and Philosophy of Science, Moscow, 1987. Sole Distributors for the U.S.A. And Canada, Elsevier Science.
    No categories
     
    Export citation  
     
    Bookmark  
  17.  17
    Hector freytes, Antonio ledda, Giuseppe sergioli and.Roberto Giuntini & Probabilistic Logics in Quantum Computation - 2013 - In Hanne Andersen, Dennis Dieks, Wenceslao González, Thomas Uebel & Gregory Wheeler (eds.), New Challenges to Philosophy of Science. Springer Verlag. pp. 49.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Randomness and Recursive Enumerability.Siam J. Comput - unknown
    One recursively enumerable real α dominates another one β if there are nondecreasing recursive sequences of rational numbers (a[n] : n ∈ ω) approximating α and (b[n] : n ∈ ω) approximating β and a positive constant C such that for all n, C(α − a[n]) ≥ (β − b[n]). See [R. M. Solovay, Draft of a Paper (or Series of Papers) on Chaitin’s Work, manuscript, IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 1974, p. 215] and [G. J. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. The fortieth annual lecture series 1999-2000.Brain Computations & an Inevitable Conflict - 2000 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 31:199-200.
  20. Paul M. kjeldergaard.Pittsburgh Computations Centers - 1968 - In T. Dixon & Deryck Horton (eds.), Verbal Behavior and General Behavior Theory. Prentice-Hall.
    No categories
     
    Export citation  
     
    Bookmark  
  21. Proceedings of the Eighth Amsterdam Colloquium: December 17-20, 1991.P. Dekker, M. Stokhof, Language Institute for Logic & Computation - 1992 - Illc, University of Amsterdam.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  22. A Description of the Erhard Seminars Training (est).Donald M. Baer, Stephanie B. Stolz & Drug Abuse Alcohol - 1978 - Behaviorism 6 (1):45-70.
  23. The general problem of the primitive was finally solved in 1912 by A. Den-joy. But his integration process was more complicated than that of Lebesgue. Denjoy's basic idea was to first calculate the definite integral∫ b. [REVIEW]How to Compute Antiderivatives - 1995 - Bulletin of Symbolic Logic 1 (3).
     
    Export citation  
     
    Bookmark  
  24.  8
    Proceedings of the 1986 Conference on Theoretical Aspects of Reasoning about Knowledge: March 19-22, 1988, Monterey, California.Joseph Y. Halpern, International Business Machines Corporation, American Association of Artificial Intelligence, United States & Association for Computing Machinery - 1986
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  7
    ALPUK91: Proceedings of the 3rd UK Annual Conference on Logic Programming, Edinburgh, 10–12 April 1991.Tim Duncan, C. S. Mellish, Geraint A. Wiggins & British Computer Society - 1992 - Springer.
    Since its conception nearly 20 years ago, Logic Programming - the idea of using logic as a programming language - has been developed to the point where it now plays an important role in areas such as database theory, artificial intelligence and software engineering. However, there are still many challenging research issues to be addressed and the UK branch of the Association for Logic Programming was set up to provide a forum where the flourishing research community could discuss important issues (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  7
    Computer Science Logic: 11th International Workshop, CSL'97, Annual Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected Papers.M. Nielsen, Wolfgang Thomas & European Association for Computer Science Logic - 1998 - Springer Verlag.
    This book constitutes the strictly refereed post-workshop proceedings of the 11th International Workshop on Computer Science Logic, CSL '97, held as the 1997 Annual Conference of the European Association on Computer Science Logic, EACSL, in Aarhus, Denmark, in August 1997. The volume presents 26 revised full papers selected after two rounds of refereeing from initially 92 submissions; also included are four invited papers. The book addresses all current aspects of computer science logics and its applications and thus (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. The gamer’s dilemma: An analysis of the arguments for the moral distinction between virtual murder and virtual paedophilia.Morgan Luck - 2009 - Ethics and Information Technology 11 (1):31-36.
    Most people agree that murder is wrong. Yet, within computer games virtual murder scarcely raises an eyebrow. In one respect this is hardly surprising, as no one is actually murdered within a computer game. A virtual murder, some might argue, is no more unethical than taking a pawn in a game of chess. However, if no actual children are abused in acts of virtual paedophilia (life-like simulations of the actual practice), does that mean we should disregard these acts (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   46 citations  
  28.  8
    Labouring women perspectives on mistreatment during childbirth: a qualitative study.Farzaneh Pazandeh, Maryam Moridi & Kolsoom Safari - 2023 - Nursing Ethics 30 (4):513-525.
    Background Respectful care during labour and childbirth, which has recently received a great deal of attention around the world, is vital for providing high-quality maternity care. However, this area has been underexplored in developing countries including Iran. Research aim This study aimed to assess postpartum women’s views regarding disrespect and abuse during labour and childbirth in Iran. Methods A qualitative study that involved a purposive sample of 21 postpartum women was conducted in Tehran, Iran, between 2019 and 2020. Following (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  36
    Information systems ethics: A practitioner survey. [REVIEW]Thomas Hilton - 2000 - Journal of Business Ethics 28 (4):279 - 284.
    Fortune 500 non-management employees who work in their company's information systems department were polled via a mail survey; of 191 surveys sent (one to a company), 123 (64%) were returned. Virtually all respondents (97%) indicated that management should define ethical computer use for employees. A majority of respondents (60%) reported that the method management uses to do this should be some form of consensus building. Almost two thirds of respondents (63%) reported that the definition of ethical computer use (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30. 科技發展的倫理省思:評《為什麼侵入性腦機介面技術是危險的》.振明 翟 - 2023 - International Journal of Chinese and Comparative Philosophy of Medicine 21 (2):123-127.
    LANGUAGE NOTE | Document text in Chinese; abstract also in English. The emergence and application of brain–computer interface technology have raised many ethical concerns related to individual autonomy, privacy, and potential for abuse. I support technological progress, but I emphasize ethics first. I believe that the application of brain–computer interface technology should respect the inherent value and dignity of every life. Subject to caution, exploring the use of this technology to alleviate the suffering of terminally ill patients (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  31
    Prosthetic gods: The posthuman threat of self-service technology.Thomas B. Cavanagh - 2008 - Interaction Studies 9 (3):458-480.
    Computer-facilitated self-service technologies have become ubiquitous in today’s consumer-focused world. Yet, few human–computer interactions elicit such dramatically polarizing emotional reactions from users as those involving SSTs. ATMs, pay-at-the-pump gas stations, and self-scanning retail registers tend to produce both passionate supporters and critics. While negative comments often center on unpleasant personal user experiences, the actual “abuse” related to such systems is really much deeper and more complex. SSTs carry with them a number of potentially insidious consequences, including the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  18
    Prosthetic gods: The posthuman threat of self-service technology.Thomas B. Cavanagh - 2008 - Interaction Studiesinteraction Studies Social Behaviour and Communication in Biological and Artificial Systems 9 (3):458-480.
    Computer-facilitated self-service technologies have become ubiquitous in today’s consumer-focused world. Yet, few human–computer interactions elicit such dramatically polarizing emotional reactions from users as those involving SSTs. ATMs, pay-at-the-pump gas stations, and self-scanning retail registers tend to produce both passionate supporters and critics. While negative comments often center on unpleasant personal user experiences, the actual “abuse” related to such systems is really much deeper and more complex. SSTs carry with them a number of potentially insidious consequences, including the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  14
    Algorithmic disclosure rules.Fabiana Di Porto - 2023 - Artificial Intelligence and Law 31 (1):13-51.
    During the past decade, a small but rapidly growing number of Law&Tech scholars have been applying algorithmic methods in their legal research. This Article does it too, for the sake of saving disclosure regulation failure: a normative strategy that has long been considered dead by legal scholars, but conspicuously abused by rule-makers. Existing proposals to revive disclosure duties, however, either focus on the industry policies (e.g. seeking to reduce consumers’ costs of reading) or on rulemaking (e.g. by simplifying linguistic intricacies). (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  6
    Prosthetic gods.Thomas B. Cavanagh - 2008 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 9 (3):458-480.
    Computer-facilitated self-service technologies have become ubiquitous in today’s consumer-focused world. Yet, few human–computer interactions elicit such dramatically polarizing emotional reactions from users as those involving SSTs. ATMs, pay-at-the-pump gas stations, and self-scanning retail registers tend to produce both passionate supporters and critics. While negative comments often center on unpleasant personal user experiences, the actual “abuse” related to such systems is really much deeper and more complex. SSTs carry with them a number of potentially insidious consequences, including the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. Hacking into the Church Mainframe: A Theological Engagement of the Post-Informational World.Henry S. Kuo - 2010 - Princeton Theological Review 17 (43):81-90.
    Is Web 2.0 and its related communications technology ethically neutral? With the exception of obvious ills, do they indeed have very few, if any, ethical drawbacks? Even before the internet underwent its evolutionary ascension, computer engineers and philosophers have given some thought to these questions. Few have taken such insights and applied them to the life of the church. How does the church make use of such technologies? How has the church abused it? And, most importantly, what is the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  7
    Fiduciary requirements for virtual assistants.Leonie Koessler - 2024 - Ethics and Information Technology 26 (2):1-18.
    Virtual assistants (VAs), like Amazon’s Alexa, Google’s Assistant, and Apple’s Siri, are on the rise. However, despite allegedly being ‘assistants’ to users, they ultimately help firms to maximise profits. With more and more tasks and leeway bestowed upon VAs, the severity as well as the extent of conflicts of interest between firms and users increase. This article builds on the common law field of fiduciary law to argue why and how regulators should address this phenomenon. First, the functions of VAs (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Science as salvation: a modern myth and its meaning.Mary Midgley - 1992 - New York: Routledge.
    Science as Salvation discusses the high spiritual ambitions which tend to gather round the notion of science. Officially, science claims only the modest function of establishing facts. Yet people still hope for something much grander from it--namely, the myths by which to shape and support life in an increasingly confusing age. Our faith in science is abused by some scientists whose adolescent fantasies have spilled over into their professional lives. Salvation, immortality, mastery of the universe, humans without bodies, and intelligent (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  38.  25
    Intelligent service robots for elderly or disabled people and human dignity: legal point of view.Katarzyna Pfeifer-Chomiczewska - 2023 - AI and Society 38 (2):789-800.
    This article aims to present the problem of the impact of artificial intelligence on respect for human dignity in the sphere of care for people who, for various reasons, are described as particularly vulnerable, especially seniors and people with various disabilities. In recent years, various initiatives and works have been undertaken on the European scene to define the directions in which the development and use of artificial intelligence should go. According to the human-centric approach, artificial intelligence should be developed, used (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  17
    Letter to Turing.Giuseppe Longo - 2019 - Theory, Culture and Society 36 (6):73-94.
    This personal, yet scientific, letter to Alan Turing, reflects on Turing's personality in order to better understand his scientific quest. It then focuses on the impact of his work today. By joining human attitude and particular scientific method, Turing is able to “immerse himself” into the phenomena on which he works. This peculiar blend justifies the epistolary style. Turing makes himself a “human computer”, he lives the dramatic quest for an undetectable imitation of a man, a woman, a machine. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  40.  22
    The ethics of ex-bots.Paula Sweeney - forthcoming - AI and Society:1-2.
    Imagine if, when broken-hearted by their romantic partner leaving them, a person could continue the relationship with a chatbot or avatar version of them. This might seem like a far-fetched scenario but a little thought reveals that, first, this is a product that could plausibly make its way to the market and, second, it would be harmful for both parties of the former relationship and plausibly abusive for the person who has been ‘bot-ed’ without their consent.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  6
    Territories of evil.Nancy Billias (ed.) - 2008 - New York, NY: Rodopi.
    Evil is not only an abstract concept to be analyzed intellectually, but a concrete reality that we all experience and wrestle with on an ongoing basis. To truly understand evil we must always approach it from both angles: the intellective and the phenomenological. This same assertion resounds through each of the papers in this volume, in which an interdisciplinary and international group (including nurses, psychologists, philosophers, professors of literature, history, computer studies, and all sorts of social science) presented papers (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  10
    The icepick surgeon: murder, fraud, sabotage, piracy, and other dastardly deeds perpetrated in the name of science.Sam Kean - 2021 - New York: Little, Brown and Company, a division of Hachette Book Group.
    Science is a force for good in the world--at least usually. But sometimes, when obsession gets the better of scientists, they twist a noble pursuit into something sinister. Under this spell, knowledge isn't everything, it's the only thing--no matter the cost. Bestselling author Sam Kean tells the true story of what happens when unfettered ambition pushes otherwise rational men and women to cross the line in the name of science, trampling ethical boundaries and often committing crimes in the process. The (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  25
    Organ Transplant Allocation.Pat Milmoe McCarrick - 1995 - Kennedy Institute of Ethics Journal 5 (4):365-384.
    In lieu of an abstract, here is a brief excerpt of the content:Organ Transplant AllocationPat Milmoe McCarrick (bio)The introduction of the antibiotic, cyclosporin, which enhances the success rate of transplantation surgery, has resulted in the steady growth of organ transplantation since the mid-1980s. This growth increasingly focuses ethical interest on both the procurement and the allocation of human organs. Not everyone who might benefit from organ transplants can receive them since the number of patients in need of organs far exceeds (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  44.  27
    Are Jurors Intuitive Statisticians? Bayesian Causal Reasoning in Legal Contexts.Tamara Shengelia & David Lagnado - 2021 - Frontiers in Psychology 11.
    In criminal trials, evidence often involves a degree of uncertainty and decision-making includes moving from the initial presumption of innocence to inference about guilt based on that evidence. The jurors’ ability to combine evidence and make accurate intuitive probabilistic judgments underpins this process. Previous research has shown that errors in probabilistic reasoning can be explained by a misalignment of the evidence presented with the intuitive causal models that people construct. This has been explored in abstract and context-free situations. However, less (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  54
    The Priority of Privacy for Medical Information.Judith Wagner DeCew - 2000 - Social Philosophy and Policy 17 (2):213.
    Individuals care about and guard their privacy intensely in many areas. With respect to patient medical records, people are exceedingly concerned about privacy protection, because they recognize that health care generates the most sensitive sorts of personal information. In an age of advancing technology, with the switch from paper medical files to massive computer databases, privacy protection for medical information poses a dramatic challenge. Given high-speed computers and Internet capabilities, as well as other advanced communications technologies, the potential for (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  12
    Science as Salvation: A Modern Myth and its Meaning.Mary Midgley - 1992 - New York: Routledge.
    Science as Salvationdiscusses the high spiritual ambitions which tend to gather round the notion of science. Officially, science claims only the modest function of establishing facts. Yet people still hope for something much grander from it--namely, the myths by which to shape and support life in an increasingly confusing age. Our faith in science is abused by some scientists whose adolescent fantasies have spilled over into their professional lives. Salvation, immortality, mastery of the universe, humans without bodies, and intelligent self-reproducing (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47. On the spectral ideology of cultural globalization as social hauntology.George Rossolatos - 2018 - International Journal of Marketing Semiotics 6 (1):1-21.
    Globalization allegedly constitutes one of the most used and abused concepts in the contemporary academic and lay lexicons alike. This paper pursues a deconstructive avenue for canvassing the semiotic economy of cultural globalization. The variegated ways whereby ideology has been framed in different semiotic perspectives (Peircean, structuralist, post-structuralist, neo-Marxist) are laid out. By engaging with the post-structuralist semiotic terrain, cultural globalization is identified with a transition from Baudrillard’s Political Economy of Signs towards a spectral ideology where signs give way to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  62
    Virtual child pornography and utilitarianism.Per Sandin - 2004 - Journal of Information, Communication and Ethics in Society 2 (4):217-223.
    The most common argument against child pornography is that children are harmed in the process of producing it. This is the argument from abusive production. However, it does not apply to ‘virtual’ child pornography, i.e. child pornography produced using computer technology without involving real children. Autilitarian who wishes to condemn virtual child pornography cannot appeal to the argument from abusive production. I discuss three possible ways out of this: abandoning the intuition that virtual child pornography is wrong, abandoning utilitarianism, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  86
    The critique of natural rights and the search for a non-anthropocentric basis for moral behavior.Michael E. Zimmerman - 1985 - Journal of Value Inquiry 19 (1):43-53.
    MacIntyre, Clark, and Heidegger would all agree that the current problem with moral theory is its lack of a satisfactory conception of human telos. This lack leads us to resort to such fictions as rights, interests, and utility, which are “disguises for the will to power.” Ibid., p. 240. These thinkers would also agree that modern nation-states are cut off from the roots of the Western tradition. Modern political economy, with “its individualism, its acquisitiveness and its elevation of the values (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  19
    Artificial Intelligence: The Case Against.Rainer Born (ed.) - 1987 - St Martin's Press.
    The purpose of this book, originally published in 1987, was to contribute to the advance of artificial intelligence by clarifying and removing the major sources of philosophical confusion at the time which continued to preoccupy scientists and thereby impede research. Unlike the vast majority of philosophical critiques of AI, however, each of the authors in this volume has made a serious attempt to come to terms with the scientific theories that have been developed, rather than attacking superficial 'straw men' which (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 1000