Results for 'Security Engineering'

996 found
Order:
  1. Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A)-Experiments and Hardware Countermeasures on Power Analysis Attacks.ManKi Ahn & HoonJae Lee - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3982--48.
     
    Export citation  
     
    Bookmark  
  2. Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A)-A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks.Mary Wu, SangJoon Jung, Seunghwan Lee & Chonggun Kim - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 93-103.
    No categories
     
    Export citation  
     
    Bookmark  
  3. Special Session on Computational Intelligence Approaches and Methods for Security Engineering-Adaptable Designated Group Signature.Chunbo Ma & Jianhua Li - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4113--1053.
     
    Export citation  
     
    Bookmark  
  4. Minisymposia-XV Approaches or Methods of Security Engineering (AMSE)-Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications.Jin Kwak, Soohyun Oh & Dongho Won - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3732--1009.
     
    Export citation  
     
    Bookmark  
  5. Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A)-Pseudorandom Number Generator Using Optimal Normal Basis.Injoo Jang & Hyeong Seon Yoo - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 206-212.
     
    Export citation  
     
    Bookmark  
  6. Special Session on Computational Intelligence Approaches and Methods for Security Engineering-A Study on the Improvement of Military Logistics System Using RFID.Mingyun Kang, Minseong Ju, Taihoon Kim, Geuk Leek & Kyung Sung - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 1098-1102.
    No categories
     
    Export citation  
     
    Bookmark  
  7. Computational Intelligence Approaches and Methods for Security Engineering-Development of an Attack Packet Generator Applying an NP to the Intelligent APS.Wankyung Kim & Wooyoung Soh - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4252--709.
  8. Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A)-Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared Communications. [REVIEW]Hae Geun Kim - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 104-114.
    No categories
     
    Export citation  
     
    Bookmark  
  9. Conceptual Engineering and the Politics of Implementation.Matthieu Queloz & Friedemann Bieber - 2022 - Pacific Philosophical Quarterly 103 (3):670-691.
    Conceptual engineering is thought to face an ‘implementation challenge’: the challenge of securing uptake of engineered concepts. But is the fact that implementation is challenging really a defect to be overcome? What kind of picture of political life would be implied by making engineering easy to implement? We contend that the ambition to obviate the implementation challenge goes against the very idea of liberal democratic politics. On the picture we draw, the implementation challenge can be overcome by institutionalizing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  10.  10
    'Protecting the public, securing the profession': Enforcing ethical standards among software engineers.John Wilkes - 1997 - Business Ethics, the Environment and Responsibility 6 (2):87–93.
    The public interest should be a central ethical concern of members of the computer profession, and this would also result in the social status and power of software engineers being augmented. One attractive means to encourage and enforce ethical standards on the part of engineers and employers would be a system of licensing by internationally recognised professional bodies whose legitimacy stems from their capacity to act in the public interest. The author is Senior Lecturer in the Department of Computer Science, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  66
    How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone - 2009 - Artificial Intelligence and Law 17 (1):1-30.
    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security engineers and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  12. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13. Invited Sessions-Information Engineering and Applications in Ubiquotous Computing Environments-General Drawing of the Integrated Framework for Security Governance.Heejun Park, Sangkyun Kim & Hong Joo Lee - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 1234-1241.
     
    Export citation  
     
    Bookmark  
  14.  12
    ‘Protecting the Public, Securing the Profession’: Enforcing Ethical Standards among Software Engineers.John Wilkes - 1997 - Business Ethics, the Environment and Responsibility 6 (2):87-93.
    The public interest should be a central ethical concern of members of the computer profession, and this would also result in the social status and power of software engineers being augmented. One attractive means to encourage and enforce ethical standards on the part of engineers and employers would be a system of licensing by internationally recognised professional bodies whose legitimacy stems from their capacity to act in the public interest. The author is Senior Lecturer in the Department of Computer Science, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-A Model of XML Access Control with Dual-Level Security Views.Wei Sun, Da-xin Liu & Tong Wang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3842--799.
     
    Export citation  
     
    Bookmark  
  17.  36
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  18. Broad-Spectrum Conceptual Engineering.Manuel Gustavo Https://Orcidorg Isaac - 2021 - Ratio: An International Journal for Analytic Philosophy 34 (4):286-302.
    Conceptual engineering is the method for assessing and improving our representational devices. On its ‘broad-spectrum’ version, it is expected to be appropriately applicable to any of our representation-involving cognitive activities, with major consequences for our whole cognitive life. This paper is about the theoretical foundations of conceptual engineering thus characterised. With a view to ensuring the actionability of conceptual engineering as a broad-spectrum method, it addresses the issue of how best to construe the subject matter of conceptual (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  19.  20
    Broad-spectrum conceptual engineering.Manuel Gustavo Https://Orcidorg Isaac - 2021 - Ratio 34 (4):286-302.
    Conceptual engineering is the method for assessing and improving our representational devices. On its ‘broad‐spectrum’ version, it is expected to be appropriately applicable to any of our representation‐involving cognitive activities, with major consequences for our whole cognitive life. This paper is about the theoretical foundations of conceptual engineering thus characterised. With a view to ensuring the actionability of conceptual engineering as a broad‐spectrum method, it addresses the issue of how best to construe the subject matter of conceptual (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  20.  75
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Conceptual re-engineering: from explication to reflective equilibrium.Georg Brun - 2020 - Synthese 197 (3):925-954.
    Carnap and Goodman developed methods of conceptual re-engineering known respectively as explication and reflective equilibrium. These methods aim at advancing theories by developing concepts that are simultaneously guided by pre-existing concepts and intended to replace these concepts. This paper shows that Carnap’s and Goodman’s methods are historically closely related, analyses their structural interconnections, and argues that there is great systematic potential in interpreting them as aspects of one method, which ultimately must be conceived as a component of theory development. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  22.  9
    Genetically Engineered Foods and Moral Absolutism: A Representative Study from Germany.Johanna Jauernig, Matthias Uhl & Gabi Waldhof - 2023 - Science and Engineering Ethics 29 (5):1-17.
    There is an ongoing debate about genetic engineering (GE) in food production. Supporters argue that it makes crops more resilient to stresses, such as drought or pests, and should be considered by researchers as a technology to address issues of global food security, whereas opponents put forward that GE crops serve only the economic interests of transnational agrifood-firms and have not yet delivered on their promises to address food shortage and nutrient supply. To address discourse failure regarding the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  12
    Ethical Engineering for International Development and Environmental Sustainability.Marion Hersh (ed.) - 2015 - London: Imprint: Springer.
    Ensuring that their work has a positive influence on society is a responsibility and a privilege for engineers, but also a considerable challenge. This book addresses the ways in which engineers meet this challenge, working from the assumption that for a project to be truly ethical both the undertaking itself and its implementation must be ethically sound. The contributors discuss varied topics from an international and interdisciplinary perspective, including: · robot ethics; · outer space; · international development; · internet privacy (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  22
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.Wolter Pieters, Dina Hadžiosmanović & Francien Dechesne - 2016 - Science and Engineering Ethics 22 (3):831-850.
    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  21
    Value-based argumentation for designing and auditing security measures.Brigitte Burgemeestre, Joris Hulstijn & Yao-Hua Tan - 2013 - Ethics and Information Technology 15 (3):153-171.
    Designing security measures often involves trade-offs between various types of objectives. Multiple stakeholders may have conflicting demands and may have different ideas on how to resolve the resulting design conflicts. This paper reports on an application of value-sensitive design. Based on argumentation theory and social values, the paper develops a structured approach for discussing design conflicts, called value-based argumentation. The application domain examined in the paper is concerned with physical safety and security issues that arise in cross-border shipments. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  18
    Assessing Security Technology’s Impact: Old Tools for New Problems.Reinhard Kreissl - 2014 - Science and Engineering Ethics 20 (3):659-673.
    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  99
    Enhancing the Species: Genetic Engineering Technologies and Human Persistence.Chris Gyngell - 2012 - Philosophy and Technology 25 (4):495-512.
    Many of the existing ethical analyses of genetic engineering technologies (GET) focus on how they can be used to enhance individuals—to improve individual well-being, health and cognition. There is a gap in the current literature about the specific ways enhancement technologies could be used to improve our populations and species, viewed as a whole. In this paper, I explore how GET may be used to enhance the species through improvements in the gene pool. I argue one aspect of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  28.  15
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  13
    Software Engineering Ethics.Daniela Marcu, Dan Laurenţiu Milici & Mirela Danubianu - 2020 - Postmodern Openings 11 (4):248-261.
    Over the past 30 years, computer engineering has developed a lot. Currently, computer and software applications have a central role in business, medicine, security, communications, industry, education, and everyday life. Software developers, peoples who manage computer networks, data security analysts can do well, but they also have the potential to cause suffering and harm to the clients or ordinary peoples, willingly or not. For this reason, IT activities must be regulated by specific laws. From the beginning, we (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  83
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  31.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  19
    Contextualizing Security Innovation: Responsible Research and Innovation at the Smart Border?Frederik C. Huettenrauch & Nina Klimburg-Witjes - 2021 - Science and Engineering Ethics 27 (1):1-19.
    Current European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of various (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  15
    Do You Ignore Information Security in Your Journal Website?Mehdi Dadkhah, Glenn Borchardt & Mohammad Lagzian - 2017 - Science and Engineering Ethics 23 (4):1227-1231.
    Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  12
    Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses.Alexander Wentland & Nina Klimburg-Witjes - 2021 - Science, Technology, and Human Values 46 (6):1316-1339.
    Today, social engineering techniques are the most common way of committing cybercrimes through the intrusion and infection of computer systems. Cybersecurity experts use the term “social engineering” to highlight the “human factor” in digitized systems, as social engineering attacks aim at manipulating people to reveal sensitive information. In this paper, we explore how discursive framings of individual versus collective security by cybersecurity experts redefine roles and responsibilities at the digitalized workplace. We will first show how the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  31
    An Overview of Engineering Approaches to Improving Agricultural Animal Welfare.Candace Croney, William Muir, Ji-Qin Ni, Nicole Olynk Widmar & Gary Varner - 2018 - Journal of Agricultural and Environmental Ethics 31 (2):143-159.
    In this essay, we provide an overview of how production systems can be re-engineered to improve the welfare of the animals involved. At least three potential options exist: engineering their environments to better fit the animals, engineering the animals themselves to better fit their environments, and eliminating the animals from the system by growing meat in vitro rather than on farms. The morality of consuming animal products and the conditions under which agricultural animals are maintained remain highly contentious, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36. Toward ethical norms and institutions for climate engineering research.David R. Morrow, Robert E. Kopp & Michael Oppenheimer - 2009 - Environmental Research Letters 4.
    Climate engineering (CE), the intentional modification of the climate in order to reduce the effects of increasing greenhouse gas concentrations, is sometimes touted as a potential response to climate change. Increasing interest in the topic has led to proposals for empirical tests of hypothesized CE techniques, which raise serious ethical concerns. We propose three ethical guidelines for CE researchers, derived from the ethics literature on research with human and animal subjects, applicable in the event that CE research progresses beyond (...)
     
    Export citation  
     
    Bookmark   8 citations  
  37. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  38.  45
    Printing Insecurity? The Security Implications of 3D-Printing of Weapons.Gerald Walther - 2015 - Science and Engineering Ethics 21 (6):1435-1445.
    In 2013, the first gun printed out of plastic by a 3D-printer was successfully fired in the US. This event caused a major media hype about the dangers of being able to print a gun. Law enforcement agencies worldwide were concerned about this development and the potentially huge security implications of these functional plastic guns. As a result, politicians called for a ban of these weapons and a control of 3D-printing technology. This paper reviews the security implications of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  55
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  54
    Security and Privacy: Why Privacy Matters. [REVIEW]Stephanie J. Bird - 2013 - Science and Engineering Ethics 19 (3):669-671.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  38
    Editors' Overview Perspectives on Teaching Social Responsibility to Students in Science and Engineering.Henk Zandvoort, Tom Børsen, Michael Deneke & Stephanie J. Bird - 2013 - Science and Engineering Ethics 19 (4):1413-1438.
    Global society is facing formidable current and future problems that threaten the prospects for justice and peace, sustainability, and the well-being of humanity both now and in the future. Many of these problems are related to science and technology and to how they function in the world. If the social responsibility of scientists and engineers implies a duty to safeguard or promote a peaceful, just and sustainable world society, then science and engineering education should empower students to fulfil this (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  42.  14
    Academic Information Security Researchers: Hackers or Specialists?Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (2):785-790.
    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  41
    World Food Security and Agriculture in a Globalizing World.Eric Tollens & Johan de Tavernier - 2006 - Ethical Perspectives 13 (1):91-115.
    There is an increasing awareness of the importance of food security, of which the UN’s Millennium Development Goals are the best measure. Although some progress has been made in some regions, much progress still needs to be made in Sub-Saharan Africa, where agriculture largely remains subsistence and personal savings extremely low, and where population growth outstrips economic growth.Thus, there has been a renewed effort to bring these problems back on the development agenda. Food insecurity is a major manifestation of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  25
    Defusing the legal and ethical minefield of epigenetic applications in the military, defence and security context.Gratien Dalpe, Katherine Huerne, Charles Dupras, Katherine Cheung, Nicole Palmour, Eva Winkler, Karla Alex, Maxwell Mehlmann, John W. Holloway, Eline Bunnik, Harald König, Isabelle M. Mansuy, Marianne G. Rots, Cheryl Erwin, Alexandre Erler, Emanuele Libertini & Yann Joly - 2023 - Journal of Law and the Biosciences 10 (2):1-32.
    Epigenetic research has brought several important technological achievements, including identifying epigenetic clocks and signatures, and developing epigenetic editing. The potential military applications of such technologies we discuss are stratifying soldiers’ health, exposure to trauma using epigenetic testing, information about biological clocks, confirming child soldiers’ minor status using epigenetic clocks, and inducing epigenetic modifications in soldiers. These uses could become a reality. This article presents a comprehensive literature review, and analysis by interdisciplinary experts of the scientific, legal, ethical, and societal issues (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  78
    Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
    This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  63
    Critical Theory as an Approach to the Ethics of Information Security.Bernd Carsten Stahl, Neil F. Doherty, Mark Shaw & Helge Janicke - 2014 - Science and Engineering Ethics 20 (3):675-699.
    Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  47.  13
    Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map. [REVIEW]Fei Yu, Shuai Qian, Xi Chen, Yuanyuan Huang, Shuo Cai, Jie Jin & Sichun Du - 2021 - Complexity 2021:1-21.
    In recent years, the research of chaos theory has developed from simple cognition and analysis to practical engineering application. In particular, hyperchaotic systems with more complex and changeable chaotic characteristics are more sensitive and unpredictable, so they are widely used in more fields. In this paper, two important engineering applications based on hyperchaos pseudorandom number generator and image encryption are studied. Firstly, the coupling 6D memristive hyperchaotic system and a 2D SF-SIMM discrete hyperchaotic mapping are used as the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  25
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  15
    Bringing the National Security Agency into the Classroom: Ethical Reflections on Academia-Intelligence Agency Partnerships.Kathleen M. Vogel, Sean S., Colleen S., Paul Jones, Gwendolynne Reid & Christopher Kampe - 2019 - Science and Engineering Ethics 25 (3):869-898.
    Academia-intelligence agency collaborations are on the rise for a variety of reasons. These can take many forms, one of which is in the classroom, using students to stand in for intelligence analysts. Classrooms, however, are ethically complex spaces, with students considered vulnerable populations, and become even more complex when layering multiple goals, activities, tools, and stakeholders over those traditionally present. This does not necessarily mean one must shy away from academia-intelligence agency partnerships in classrooms, but that these must be conducted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  22
    Ethics Inside the Black Box: Integrating Science and Technology Studies into Engineering and Public Policy Curricula.Christopher Lawrence, Sheila Jasanoff, Sam Weiss Evans, Keith Raffel & L. Mahadevan - 2023 - Science and Engineering Ethics 29 (4):1-31.
    There is growing need for hybrid curricula that integrate constructivist methods from Science and Technology Studies (STS) into both engineering and policy courses at the undergraduate and graduate levels. However, institutional and disciplinary barriers have made implementing such curricula difficult at many institutions. While several programs have recently been launched that mix technical training with consideration of “societal” or “ethical issues,” these programs often lack a constructivist element, leaving newly-minted practitioners entering practical fields ill-equipped to unpack the politics of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 996