Results for 'Pervasive computing'

1000+ found
Order:
  1.  22
    Pervasive computing and an aging populace.Kalpana Shankar - 2010 - Journal of Information, Communication and Ethics in Society 8 (3):236-248.
    PurposeThe purpose of this paper is to describe some of the methodological challenges of investigating privacy and ubiquitous computing in the home, particularly among the healthy elderly.Design/methodology/approachThe paper is based on focus groups with 60 senior citizens either living independently or in an assisted living facility. Prototypes of home‐based ubiquitous computing devices were created and deployed in a home‐like living lab setting; elders were brought to the lab to interact with the prototypes, then brought together in focus groups (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  2.  62
    Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3. HCI Model with Learning Mechanism for Cooperative Design in Pervasive Computing Environment.Hong Liu, Bin Hu & Philip Moore - 2015 - Journal of Internet Technology 16.
    This paper presents a human-computer interaction model with a three layers learning mechanism in a pervasive environment. We begin with a discussion around a number of important issues related to human-computer interaction followed by a description of the architecture for a multi-agent cooperative design system for pervasive computing environment. We present our proposed three- layer HCI model and introduce the group formation algorithm, which is predicated on a dynamic sharing niche technology. Finally, we explore the cooperative reinforcement (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  23
    Public involvement in technology policy: focus on the pervasive computing environment.Jenifer S. Winter - 2006 - Acm Sigcas Computers and Society 36 (3):49-57.
    This paper examines the role of the general public in informing technology policy, observing that public involvement often occurs only through the electoral process or via feedback after plans have been implemented. Planners and policymakers are not necessarily in touch with the feelings and desires of the public who will be affected by their decisions. For this reason it is important to seek a clearer understanding of the views of citizens who are not typically involved in the planning or design (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  27
    The semiotics of smart appliances and pervasive computing.Peter Bøgh Andersen & Martin Brynskov - 2007 - In R. Gudwin & J. Queiroz (eds.), Semiotics and Intelligent Systems Development. Idea Group.
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  18
    Context-aware security management system for pervasive computing environment.Seon-Ho Park, Young-Ju Han & Tai-Myoung Chung - 2001 - In P. Bouquet V. Akman (ed.), Modeling and Using Context. Springer. pp. 384--396.
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  78
    Mechanistic Computational Individuation without Biting the Bullet.Nir Fresco & Marcin Miłkowski - 2021 - British Journal for the Philosophy of Science 72 (2):431-438.
    Is the mathematical function being computed by a given physical system determined by the system’s dynamics? This question is at the heart of the indeterminacy of computation phenomenon (Fresco et al. [unpublished]). A paradigmatic example is a conventional electrical AND-gate that is often said to compute conjunction, but it can just as well be used to compute disjunction. Despite the pervasiveness of this phenomenon in physical computational systems, it has been discussed in the philosophical literature only indirectly, mostly with reference (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  8. Mechanistic Computational Individuation without Biting the Bullet.Nir Fresco & Marcin Miłkowski - 2019 - British Journal for the Philosophy of Science:axz005.
    Is the mathematical function being computed by a given physical system determined by the system’s dynamics? This question is at the heart of the indeterminacy of computation phenomenon (Fresco et al. [unpublished]). A paradigmatic example is a conventional electrical AND-gate that is often said to compute conjunction, but it can just as well be used to compute disjunction. Despite the pervasiveness of this phenomenon in physical computational systems, it has been discussed in the philosophical literature only indirectly, mostly with reference (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  9.  26
    Urban-semantic computer vision: a framework for contextual understanding of people in urban spaces.Anthony Vanky & Ri Le - 2023 - AI and Society 38 (3):1193-1207.
    Increasing computational power and improving deep learning methods have made computer vision technologies pervasively common in urban environments. Their applications in policing, traffic management, and documenting public spaces are increasingly common (Ridgeway 2018, Coifman et al. 1998, Sun et al. 2020). Despite the often-discussed biases in the algorithms' training and unequally borne benefits (Khosla et al. 2012), almost all applications similarly reduce urban experiences to simplistic, reductive, and mechanistic measures. There is a lack of context, depth, and specificity in these (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  41
    The computational therapeutic: exploring Weizenbaum’s ELIZA as a history of the present.Caroline Bassett - 2019 - AI and Society 34 (4):803-812.
    This paper explores the history of ELIZA, a computer programme approximating a Rogerian therapist, developed by Jospeh Weizenbaum at MIT in the 1970s, as an early AI experiment. ELIZA’s reception provoked Weizenbaum to re-appraise the relationship between ‘computer power and human reason’ and to attack the ‘powerful delusional thinking’ about computers and their intelligence that he understood to be widespread in the general public and also amongst experts. The root issue for Weizenbaum was whether human thought could be ‘entirely computable’. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11.  15
    The computational therapeutic: exploring Weizenbaum’s ELIZA as a history of the present.Caroline Bassett - 2018 - AI and Society 34 (4):803-812.
    This paper explores the history of ELIZA, a computer programme approximating a Rogerian therapist, developed by Jospeh Weizenbaum at MIT in the 1970s, as an early AI experiment. ELIZA’s reception provoked Weizenbaum to re-appraise the relationship between ‘computer power and human reason’ and to attack the ‘powerful delusional thinking’ about computers and their intelligence that he understood to be widespread in the general public and also amongst experts. The root issue for Weizenbaum was whether human thought could be ‘entirely computable’. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  6
    Computing and Philosophy in Asia.Soraj Hongladarom (ed.) - 2007 - Cambridge Scholars Press.
    This volume is a collection of selected papers presented at the Second Asia-Pacific Computing and Philsosophy Conference, which was held in Bangkok, Thailand in January 2005. The conference was organized by the Center for Ethics of Science and Technology, Chulalongkorn University on behalf of the International Association of Computing and Philosophy (www.ia-cap.org). Computing have had a long relationship with philosophy, starting from the problem of how symbols being manipulated in computing bear a relation to the outside (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Brain to computer communication: Ethical perspectives on interaction models. [REVIEW]Guglielmo Tamburrini - 2009 - Neuroethics 2 (3):137-149.
    Brain Computer Interfaces (BCIs) enable one to control peripheral ICT and robotic devices by processing brain activity on-line. The potential usefulness of BCI systems, initially demonstrated in rehabilitation medicine, is now being explored in education, entertainment, intensive workflow monitoring, security, and training. Ethical issues arising in connection with these investigations are triaged taking into account technological imminence and pervasiveness of BCI technologies. By focussing on imminent technological developments, ethical reflection is informatively grounded into realistic protocols of brain-to-computer communication. In particular, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  14.  7
    Everything is Animated: Pervasive Media and the Networked Subject.Beth Coleman - 2012 - Body and Society 18 (1):79-98.
    In a world of pervasive media and ubiquitous computing, this article asks what happens as everything (objects, subjects, and actions) moves toward animation across a network. How do media and mediation affect our sense of agency? I argue that the contemporary subject, as described by real-world media practice and animated film, exists within a space of accelerated mediation that distorts self-perception. I use the example of A Scanner Darkly, the 2006 Richard Linklater film, to discuss the effects of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  19
    Mapping an expanding territory: computer simulations in evolutionary biology.Philippe Huneman - 2014 - History and Philosophy of the Life Sciences 36 (1):60-89.
    The pervasive use of computer simulations in the sciences brings novel epistemological issues discussed in the philosophy of science literature since about a decade. Evolutionary biology strongly relies on such simulations, and in relation to it there exists a research program (Artificial Life) that mainly studies simulations themselves. This paper addresses the specificity of computer simulations in evolutionary biology, in the context (described in Sect. 1) of a set of questions about their scope as explanations, the nature of validation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  15
    Philosophical presuppositions in ‘computational thinking’—old wine in new bottles?Nina Bonderup Dohn - forthcoming - Journal of Philosophy of Education.
    ‘Computational thinking’ (CT) is highlighted in research literature, societal debates, and educational policies alike as being of prime significance in the 21st century. It is currently being introduced into K–12 (primary and secondary education) curricula around the world. However, there is no consensus on what exactly CT consists of, which skills it involves, and how it relates to programming. This article pinpoints four competing claims as to what constitutes the defining traits of CT. For each of the four claims, inherent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  44
    Computer ethics: Codes, commandments, and quandries.Julie Van Camp - manuscript
    Surprise – these much-publicized rules are not the least bit reassuring to people who specialize in the study of ethics. While attention to ethics is certainly welcome, these ethical codes provide a too-easy cop-out, a way to neatly dispose of attention to nagging and pervasive problems. The typical professional code is little more than a checklist of rules that enables professionals of any stripe to give lip service to ethical behavior without engaging in continuing dialogue on ethical dilemmas. Neatly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  18
    Design Issues in Ethical Agent Computing.L. Pretorius, A. Barnard & E. Cloete - 2004 - Acm Sigcas Computers and Society 34 (1):3.
    Agent computing, and in particular intelligent mobile agent computing, is at present awarded increasing prominence in the literature. This is partly due to the pervasive nature of available Internet technologies such as search engines and booking agents. It is within this context that the importance of investigating various characteristics demonstrated by mobile agent computing is becoming apparent. In order to perform specialized tasks on behalf of their owners, a certain amount of intelligence in mobile agents is (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  20. Recent Developments in Computing and Philosophy.Anthony F. Beavers - 2011 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 42 (2):385-397.
    Because the label "computing and philosophy" can seem like an ad hoc attempt to tie computing to philosophy, it is important to explain why it is not, what it studies (or does) and how it differs from research in, say, "computing and history," or "computing and biology". The American Association for History and Computing is "dedicated to the reasonable and productive marriage of history and computer technology for teaching, researching and representing history through scholarship and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  21.  57
    The Borg–eye and the We–I. The production of a collective living body through wearable computers.Nicola Liberati - 2020 - AI and Society 35 (1):39-49.
    The aim of this work is to analyze the constitution of a new collective subject thanks to wearable computers. Wearable computers are emerging technologies which are supposed to become pervasively used in the near future. They are devices designed to be on us every single moment of our life and to capture every experience we have. Therefore, we need to be prepared to such intrusive devices and to analyze potential effect they will have on us and our society. Thanks to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  22.  47
    Towards a decolonial I in AI: mapping the pervasive effects of artificial intelligence on the art ecosystem.Amir Baradaran - forthcoming - AI and Society:1-13.
    This paper delves into the intricate relationship between Artificial Intelligence (AI) and the art ecosystem, emphasizing the need for a decolonizing approach in the face of AI's growing influence. It argues that the development of AI is not just a technological leap but also a significant cultural and societal moment, akin to the advent of moving images that Walter Benjamin famously analyzed. The paper examines how AI, particularly in its current oligarchical and corporate-driven form, perpetuates and magnifies the existing social (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  4
    Feeling present in the physical world and in computer-mediated environments.John A. Waterworth - 2014 - New York: Palgrave-Macmillan. Edited by Giuseppe Riva.
    Our experience of the physical world around us, and of the social environments in which we function, is increasingly mediated by information and communication technology, which is itself evolving ever more rapidly and pervasively. This book presents a coherent and detailed account of why we experience feelings of being present in the physical world and in computer-mediated environments, why we often don't, and why it matters - for design, psychotherapy, tool use and social creativity amongst other practical applications. Since the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  4
    Abstraction, Law, and Freedom in Computer Science.Timothy Colburn & Gary Shute - 2011-04-22 - In Armen T. Marsoobian, Brian J. Huschle, Eric Cavallero & Patrick Allo (eds.), Putting Information First. Wiley‐Blackwell. pp. 97–115.
    This chapter contains sections titled: Introduction Computer Science as the Master of Its Domain The Concept of Law in Computer Science Computer Science Laws as Invariants The Interplay of Freedom and Constraint Conclusion References.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  7
    Probing Lexical Ambiguity in Chinese Characters via Their Word Formations: Convergence of Perceived and Computed Metrics.Tianqi Wang, Xu Xu, Xurong Xie & Manwa Lawrence Ng - 2023 - Cognitive Science 47 (11):e13379.
    Lexical ambiguity is pervasive in language, and the nature of the representations of an ambiguous word's multiple meanings is yet to be fully understood. With a special focus on Chinese characters, the present study first established that native speaker's perception about a character's number of meanings was heavily influenced by the availability of its distinct word formations, while whether these meanings would be perceived to be closely related was driven by further conceptual analysis. These notions were operationalized as two (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  30
    Effects of Attention on the Strength of Lexical Influences on Speech Perception: Behavioral Experiments and Computational Mechanisms.Daniel Mirman, James L. McClelland, Lori L. Holt & James S. Magnuson - 2008 - Cognitive Science 32 (2):398-417.
    The effects of lexical context on phonological processing are pervasive and there have been indications that such effects may be modulated by attention. However, attentional modulation in speech processing is neither well documented nor well understood. Experiment 1 demonstrated attentional modulation of lexical facilitation of speech sound recognition when task and critical stimuli were identical across attention conditions. We propose modulation of lexical activation as a neurophysiologically plausible computational mechanism that can account for this type of modulation. Contrary to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  27. An Ontology-Based Approach to Metaphor Cognitive Computation.Xiaoxi Huang, Huaxin Huang, Beishui Liao & Cihua Xu - 2013 - Minds and Machines 23 (1):105-121.
    Language understanding is one of the most important characteristics for human beings. As a pervasive phenomenon in natural language, metaphor is not only an essential thinking approach, but also an ingredient in human conceptual system. Many of our ways of thinking and experiences are virtually represented metaphorically. With the development of the cognitive research on metaphor, it is urgent to formulate a computational model for metaphor understanding based on the cognitive mechanism, especially with the view to promoting natural language (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  75
    The role of metaethics and the future of computer ethics.Antonio Marturano - 2002 - Ethics and Information Technology 4 (1):71-78.
    In the following essay, I will discuss D.Johnson's argument in her ETHICOMP99 KeynoteSpeech (Johnson 1999) regarding the possiblefuture disappearance of computer ethics as anautonomous discipline, and I will analyze somelikely objections to Johnson's view.In the future, there are two ways in whichcomputer ethics might disappear: (1) therejection of computer ethics as an aspect ofapplied ethics, or (2) the rejection ofcomputer ethics as an autonomous discipline.The first path, it seems to me, would lead tothe death of the entire field of appliedethics, (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  17
    Locative media and data-driven computing experiments.Leighton Evans, Rob Kitchin & Sung-Yueh Perng - 2016 - Big Data and Society 3 (1).
    Over the past two decades urban social life has undergone a rapid and pervasive geocoding, becoming mediated, augmented and anticipated by location-sensitive technologies and services that generate and utilise big, personal, locative data. The production of these data has prompted the development of exploratory data-driven computing experiments that seek to find ways to extract value and insight from them. These projects often start from the data, rather than from a question or theory, and try to imagine and identify (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. Business Intelligence and Ambient Intelligence-Some thoughts on the main trends of business information processing, their opportunities, prob-lems and limitations.Oliver Siemoneit - 2009 - International Review of Information Ethics 10:02.
    Ambient Intelligence, often also referred to as Pervasive Computing, Ubiquitous Computing or Context-Aware Computing, is supposed to have a lot of advantages for future business information processing. However, as in many cases, technological developments do not only provide opportunities, improve work conditions and make life more comfort for customers, but they also give rise to new problems. Aim of this paper is to discuss the pros and cons of Ambient Intelligence for future business intelligence on the (...)
     
    Export citation  
     
    Bookmark  
  32. What is the philosophy of information?Luciano Floridi - 2002 - Metaphilosophy 33 (1-2):123–145.
    Computational and information-theoretic research in philosophy has become increasingly fertile and pervasive, giving rise to a wealth of interesting results. In consequence, a new and vitally important field has emerged, the philosophy of information (PI). This essay is the first attempt to analyse the nature of PI systematically. PI is defined as the philosophical field concerned with the critical investigation of the conceptual nature and basic principles of information, including its dynamics, utilisation, and sciences, and the elaboration and application (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  33.  19
    Robots, after all.Hans Moravec - manuscript
    Computers have invaded everyday life, and networked machines are worming their way into our gadgets, dwellings, clothes, even bodies. But if pervasive computing soon handles most of our information needs, it will still not clean the floors, take out the garbage, assemble kit furniture or do any of a thousand other other essential physical tasks. The old dream of mechanical servants will remain mostly unmet.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  16
    Robots among us.Hans Moravec - manuscript
    Bedazzled by the explosion of computers into everyday life, pundits predict a world saturated by communicating chips, in our gadgets, dwellings, clothes, even bodies. But if pervasive computing handles most of our information needs, it will still not clean the floors, take out the garbage, assemble kit furniture or do any of a thousand other other essential physical tasks. The old dream of mechanical servants will remain unmet.
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  31
    What is the Philosophy of Information?Luciano Floridi - 2002 - Metaphilosophy 33 (1‐2):123-145.
    Computational and information‐theoretic research in philosophy has become increasingly fertile and pervasive, giving rise to a wealth of interesting results. In consequence, a new and vitally important field has emerged, the philosophy of information (PI). This essay is the first attempt to analyse the nature of PI systematically. PI is defined as the philosophical field concerned with the critical investigation of the conceptual nature and basic principles of information, including its dynamics, utilisation, and sciences, and the elaboration and application (...)
    Direct download  
     
    Export citation  
     
    Bookmark   49 citations  
  36.  20
    Introduction to IRIE Vol. 8‖.David Phillips & Klaus Wiegerling - 2007 - International Review of Information Ethics 8:5-6.
    Ubiquitous Computing, an idea introduced by Mark Weiser , and often bracketed with slight modifications under the concepts of Pervasive Computing or Ambient Intelligence, imagines in the extreme case the entire mesosphere saturated by information and communication technologies . All of the essays of this issue probe the practices, ideologies, and power relations of UbiComp development. They note both the successes and the failures of a variety of ethical and theoretical approaches to UbiComp and they offer alternative (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  24
    Exploring What Is Encoded in Distributional Word Vectors: A Neurobiologically Motivated Analysis.Akira Utsumi - 2020 - Cognitive Science 44 (6):e12844.
    The pervasive use of distributional semantic models or word embeddings for both cognitive modeling and practical application is because of their remarkable ability to represent the meanings of words. However, relatively little effort has been made to explore what types of information are encoded in distributional word vectors. Knowing the internal knowledge embedded in word vectors is important for cognitive modeling using distributional semantic models. Therefore, in this paper, we attempt to identify the knowledge encoded in word vectors by (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  7
    Practices of place-making through locative media artworks.Elisenda Ardévol & Gemma San Cornelio - 2011 - Communications 36 (3):313-333.
    In recent years, the vast increase in information flows has made it possible to instantly connect location-dependent information with physical spaces. These technologies have provided new forms of the representation of space as much as new forms of perception through tools and techniques used in land surveying, remote sensing, etc. From a critical point of view, pervasive computing, location-based applications, or, in other words, “locative media” provide an interesting framework to understand how these technologies relate to our understanding (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  39
    Agents of responsibility in software vulnerability processes.Ari Takanen, Petri Vuorijärvi, Marko Laakso & Juha Röning - 2004 - Ethics and Information Technology 6 (2):93-110.
    Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the light of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  40
    Augmented societies with mirror worlds.Alessandro Ricci, Luca Tummolini & Cristiano Castelfranchi - 2019 - AI and Society 34 (4):745-752.
    Computing systems can function as augmentation of individual humans as well as of human societies. In this contribution, we take mirror worlds as a conceptual blueprint to envision future smart environments in which the physical and the virtual layers are blended into each other. We suggest that pervasive computing technologies can be used to create a coupling between these layers, so that actions or, more generally, events in the physical layer would have an effect in the virtual (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  28
    Thinking about stuff: posthumanist phenomenology and cognition. [REVIEW]Ron Broglio - 2011 - AI and Society 26 (2):187-192.
    Emerging digital technologies, such as sensors and pervasive computing, provide a robust interplay between digital and physical space. Architecture as a disciplinary endeavor has subsumed the capacities of these technologies without allowing the difference these technologies afford to challenge fundamental notions of architecture, such as cognition, visibility, and presence. This essay explores the inverse of the architectural ground by exploring the cognitive capacity for non-animate entities. The implication of this posthuman phenomenology is that entities themselves pose questions and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  86
    Towards a metaphorical biology.R. C. Paton - 1992 - Biology and Philosophy 7 (3):279-294.
    The metaphorical nature of biological language is examined and the use of metaphors for providing the linguistic context in which similarities and differences are made is described. Certain pervasive metaphors which are characterised by systemic properties are noted, and in order to provide some focus to the study, systemic metaphors associated with machine, text and organism are discussed. Other systemic metaphors such as society and circuit are also reported. Some details concerning interrelations between automaton and organism are presented in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  43.  41
    Bosses without a heart: socio-demographic and cross-cultural determinants of attitude toward Emotional AI in the workplace.Peter Mantello, Manh-Tung Ho, Minh-Hoang Nguyen & Quan-Hoang Vuong - 2023 - AI and Society 38 (1):97-119.
    Biometric technologies are becoming more pervasive in the workplace, augmenting managerial processes such as hiring, monitoring and terminating employees. Until recently, these devices consisted mainly of GPS tools that track location, software that scrutinizes browser activity and keyboard strokes, and heat/motion sensors that monitor workstation presence. Today, however, a new generation of biometric devices has emerged that can sense, read, monitor and evaluate the affective state of a worker. More popularly known by its commercial moniker, Emotional AI, the technology (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  39
    Challenges and Opportunities of Lifelog Technologies: A Literature Review and Critical Analysis.Tim Jacquemard, Peter Novitzky, Fiachra O’Brolcháin, Alan F. Smeaton & Bert Gordijn - 2014 - Science and Engineering Ethics 20 (2):379-409.
    In a lifelog, data from various sources are combined to form a record from which one can retrieve information about oneself and the environment in which one is situated. It could be considered similar to an automated biography. Lifelog technology is still at an early stage of development. However, the history of lifelogs so far shows a clear academic, corporate and governmental interest. Therefore, a thorough inquiry into the ethical aspects of lifelogs could prove beneficial to the responsible development of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  45.  17
    Witnessing: iteration and social change.Ella McPherson - 2023 - AI and Society 38 (5):1987-1995.
    At first thought, iteration seems banal. It is about repeating the existing; nothing is changing. But this special issue shows that, in an era obsessed with the new, it is often the repetition of the old that creates social change. Iteration fosters persuasion. It affords opportunities for critical and creative engagement with meaning, values and knowledge. It invites collaboration, though its apparent simplicity often belies a tremendous amount of individual and collective labour involved in the practices of iteration. Through its (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  53
    Artificial intelligence is an oxymoron.Jakob Svensson - 2023 - AI and Society 38 (1):363-372.
    Departing from popular imaginations around artificial intelligence (AI), this article engages in the I in the AI acronym but from perspectives outside of mathematics, computer science and machine learning. When intelligence is attended to here, it most often refers to narrow calculating tasks. This connotation to calculation provides AI an image of scientificity and objectivity, particularly attractive in societies with a pervasive desire for numbers. However, as is increasingly apparent today, when employed in more general areas of our messy (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47. The Precautionary Principle as a Framework for a Sustainable Information Society.Claudia Som, Lorenz M. Hilty & Andreas R. Köhler - 2009 - Journal of Business Ethics 85 (S3):493 - 505.
    The precautionary principle (PP) aims to anticipate and minimize potentially serious or irreversible risks under conditions of scientific uncertainty. Thus it preserves the potential for future developments. It has been incorporated into many international treaties and pieces of national legislation for environmental protection and sustainable development. In this article, we outline an interpretation of the PP as a framework of orientation for a sustainable information society. Since the risks induced by future information and communication technologies (ICT) are social risks for (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48. From the philosophy of AI to the philosophy of information.Luciano Floridi - 2004 - The Philosophers’ Magazine 28 (4):56-60.
    Computational and information-theoretic research in philosophy has become increasingly fertile and pervasive, giving rise to a wealth of interesting results. Consequently, a new and vitally important field has emerged, the philosophy of information (PI). This paper introduces PI as the philosophical field concerned with (i) the critical investigation of the conceptual nature and basic principles of information, including its dynamics, utilisation and sciences, and with (ii) the elaboration and application of information-theoretic and computational methodologies to philosophical problems. It is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Cognition and the power of continuous dynamical systems.Whit Schonbein - 2004 - Minds and Machines 15 (1):57-71.
    Traditional approaches to modeling cognitive systems are computational, based on utilizing the standard tools and concepts of the theory of computation. More recently, a number of philosophers have argued that cognition is too subtle or complex for these tools to handle. These philosophers propose an alternative based on dynamical systems theory. Proponents of this view characterize dynamical systems as (i) utilizing continuous rather than discrete mathematics, and, as a result, (ii) being computationally more powerful than traditional computational automata. Indeed, the (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  50.  58
    Society under threat… but not from AI.Ajit Narayanan - 2013 - AI and Society 28 (1):87-94.
    25 years ago, when AI & Society was launched, the emphasis was, and still is, on dehumanisation and the effects of technology on human life, including reliance on technology. What we forgot to take into account was another very great danger to humans. The pervasiveness of computer technology, without appropriate security safeguards, dehumanises us by allowing criminals to steal not just our money but also our confidential and private data at will. Also, denial-of-service attacks prevent us from accessing the information (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000