Results for 'vulnerable road users'

990 found
Order:
  1.  12
    Crossing the street in front of an autonomous vehicle: An investigation of eye contact between drivengers and vulnerable road users.Aïsha Sahaï, Elodie Labeye, Loïc Caroux & Céline Lemercier - 2022 - Frontiers in Psychology 13.
    Communication between road users is a major key to coordinate movement and increase roadway safety. The aim of this work was to grasp how pedestrians, cyclists, and kick scooter users sought to visually communicate with drivengers when they would face autonomous vehicles. In each experiment, participants were asked to imagine themselves in described situations of encounters between a specific type of vulnerable road user and a human driver in an approaching car. The human driver state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. External Human–Machine Interfaces for Autonomous Vehicle-to-Pedestrian Communication: A Review of Empirical Work. [REVIEW]Alexandros Rouchitsas & Håkan Alm - 2019 - Frontiers in Psychology 10.
    Interaction between drivers and pedestrians is often facilitated by informal communicative cues, like hand gestures, facial expressions, and eye contact. In the near future, however, when semi- and fully autonomous vehicles are introduced into the traffic system, drivers will gradually assume the role of mere passengers, who are casually engaged in non-driving-related activities and, therefore, unavailable to participate in traffic interaction. In this novel traffic environment, advanced communication interfaces will need to be developed that inform pedestrians of the current state (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  15
    Discourse of cycling, road users and sustainability: an ecolinguistic investigation.Youzhi Sun - 2023 - Critical Discourse Studies 20 (5):581-583.
    ‘Critical Discourse Analysis is biased – and proudly of it (van Dijk, 2001, p. 96)’. The book to be reviewed below is an example demonstrative of this tenet. The author, M. Critina Caimotto, is an...
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  8
    Analysis of Implicit Communication of Motorists and Cyclists in Intersection Using Video and Trajectory Data.Meng Zhang, Mandy Dotzauer & Caroline Schießl - 2022 - Frontiers in Psychology 13.
    The interaction of automated vehicles with vulnerable road users is one of the greatest challenges in the development of automated driving functions. In order to improve efficiency and ensure the safety of mixed traffic, ADF need to understand the intention of vulnerable road users, to adapt to their driving behavior, and to show its intention. However, this communication may occur in an implicit way, meaning they may communicate with vulnerable road users (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  12
    Toward a Holistic Communication Approach to an Automated Vehicle's Communication With Pedestrians: Combining Vehicle Kinematics With External Human-Machine Interfaces for Differently Sized Automated Vehicles.Merle Lau, Meike Jipp & Michael Oehl - 2022 - Frontiers in Psychology 13.
    Future automated vehicles of different sizes will share the same space with other road users, e. g., pedestrians. For a safe interaction, successful communication needs to be ensured, in particular, with vulnerable road users, such as pedestrians. Two possible communication means exist for AVs: vehicle kinematics for implicit communication and external human-machine interfaces for explicit communication. However, the exact interplay is not sufficiently studied yet for pedestrians' interactions with AVs. Additionally, very few other studies focused (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  21
    Cyclists’ Anger As Determinant of Near Misses Involving Different Road Users.Víctor Marín Puchades, Gabriele Prati, Gianni Rondinella, Marco De Angelis, Filippo Fassina, Federico Fraboni & Luca Pietrantoni - 2017 - Frontiers in Psychology 8.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7. Unmasking user vulnerability: investigating the barriers to overcoming dark patterns in e-commerce using TISM and MICMAC analysis.Vibhav Singh, Niraj Kumar Vishvakarma & Vinod Kumar - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose E-commerce companies use dark patterns to manipulate customer decisions to survive in the crowded online market and make profit. Although some online customers are aware of the dark patterns, they cannot overcome such manipulations. Therefore, the purpose of this study is to identify and model the barriers to overcoming dark patterns using total interpretive structural modeling (TISM). Design/methodology/approach Barriers to overcoming dark patterns were identified from the extant literature and were validated by a panel of 18 domain experts. In (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  5
    e-Roads and i-Ways A Sociotechnical Look at User Acceptance of E-Books.Adriaan Van Der Weel - 2010 - Logos 21 (3-4):47-57.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  5
    Representing youth as vulnerable social media users: a social semiotic analysis of the promotional materials from The Social Dilemma.Wei Jhen Liang & Fei Victor Lim - 2024 - Semiotica 2024 (256):153-174.
    While participation in social media has become everyday practice among young people, there have been few studies examining how youth as social media users are represented in the media discourse. Focusing on the promotional materials of an award-winning and widely-viewed documentary film, The Social Dilemma, this paper examines the media depictions of youth that attract the public’s attention. Through a social semiotic analysis, we analyzed the representational, interactive, and compositional meanings in the poster and trailer to identify how young (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  14
    Improving Grey Prediction Model and Its Application in Predicting the Number of Users of a Public Road Transportation System.Hossein Baloochian & Saeed Balochian - 2020 - Journal of Intelligent Systems 30 (1):104-114.
    The recent increase in the road transportation necessitates scheduling to reduce the adverse impacts of the road transportation and evaluate the effectiveness of previous actions taken in this context. However, it is impossible to undertake the scheduling and evaluation tasks unless previous information are available to predict the future. The grey model requires a limited volume of data for estimating the behavior of an unknown system. It provides high-accuracy predictions based on few data points. Various grey prediction models (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  8
    Road Safety as a Shared Responsibility and a Public Problem in Swedish Road Safety Policy.Carolyn McAndrews - 2013 - Science, Technology, and Human Values 38 (6):749-772.
    Sweden’s road safety policy, Vision Zero, seeks to eliminate deaths and serious injuries from traffic crashes, and it recognizes that the bottleneck in improving road safety is displacing mobility as the main priority of the road transportation system. This analysis considers the theory and practice of Vision Zero, first interpreting its proposed changes to responsibility for road safety, and then examining how it has been implemented. The research methods include document analyses, field observations, and interviews with (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  31
    Is it just number of users that makes Windows PCs vulnerable?Aaron Sloman - unknown
    It is often said that the only reason why so many mischief-makers or criminals develop viruses/worms/trojan-horses that attack PCs running Windows is that there are far more PCs running Windows accessible via the internet than any other operating system.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  19
    Trading Vulnerabilities: Living with Parkinson’s Disease before and after Deep Brain Stimulation.Sara Goering, Anna Wexler & Eran Klein - 2021 - Cambridge Quarterly of Healthcare Ethics 30 (4):623-630.
    Implanted medical devices—for example, cardiac defibrillators, deep brain stimulators, and insulin pumps—offer users the possibility of regaining some control over an increasingly unruly body, the opportunity to become part “cyborg” in service of addressing pressing health needs. We recognize the value and effectiveness of such devices, but call attention to what may be less clear to potential users—that their vulnerabilities may not entirely disappear but instead shift. We explore the kinds of shifting vulnerabilities experienced by people with Parkinson’s (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  44
    “Many roads lead to Rome and the Artificial Intelligence only shows me one road”: an interview study on physician attitudes regarding the implementation of computerised clinical decision support systems.Sigrid Sterckx, Tamara Leune, Johan Decruyenaere, Wim Van Biesen & Daan Van Cauwenberge - 2022 - BMC Medical Ethics 23 (1):1-14.
    Research regarding the drivers of acceptance of clinical decision support systems by physicians is still rather limited. The literature that does exist, however, tends to focus on problems regarding the user-friendliness of CDSS. We have performed a thematic analysis of 24 interviews with physicians concerning specific clinical case vignettes, in order to explore their underlying opinions and attitudes regarding the introduction of CDSS in clinical practice, to allow a more in-depth analysis of factors underlying acceptance of CDSS. We identified three (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  30
    The Road to Wellnessville.John E. MacKinnon - 2013 - Philosophy and Literature 37 (2):486-506.
    Although Philippe Ariès’s claims that death has been replaced by illness as our main obsession, I argue that illness is being replaced by wellness, an approach to living that encourages preemptive behavior. I review various critiques of “survivalism,” a view that both insists on our vulnerability and welcomes professional intervention in personal life. The resulting sense of anxiety, critics maintain, extends even to the “minutiae of human behavior,” including diet and fitness. I follow Jackson Lears in tracing these therapeutic commitments (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  6
    The Road to Redemption.Anonymous Two - 2013 - Narrative Inquiry in Bioethics 3 (2):1-3.
    In lieu of an abstract, here is a brief excerpt of the content:The Road to RedemptionAnonymous TwoI “am Dr X.* and I am a trained and board certified neonatologist with some years of experience in a high volume NICU with complex pathologies. I have been dismissed from the care of your baby by the fetal surgeon who is not trained in what he’s attempting to do,” that was how I felt when I left the operating room (OR), after performing (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  99
    Institutional Opacity, Epistemic Vulnerability, and Institutional Testimonial Justice.Carel Havi & Ian James Kidd - 2021 - International Journal of Philosophical Studies 29 (4):473-496.
    ABSTRACT This paper offers an account of institutional testimonial justice and describes one way that it breaks down, which we call institutional opacity. An institution is opaque when it becomes resistant to epistemic evaluation and understanding by its agents and users. When one cannot understand the inner workings of an institution, it becomes difficult to know how to comport oneself testimonially. We offer an account of an institutional ethos to explain what it means for an institution to be testimonially (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  4
    Predictive Probability Models of Road Traffic Human Deaths with Demographic Factors in Ghana.Christian Akrong Hesse, Dominic Buer Boyetey & Albert Ayi Ashiagbor - 2022 - Complexity 2022:1-10.
    Road traffic carnages are global concerns and seemingly on the rise in Ghana. Several risk factors have been studied as associated with road traffic fatalities. However, inadequate road traffic fatality data and inconsistent probability outcomes for RTF remain major challenges. The objective of this study was to illustrate and estimate probability models that can predict road traffic fatalities. We relied on 66,159 recorded casualties who were involved in road traffic accidents in Ghana from 2015 to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  13
    How web tracking changes user agency in the age of Big Data: The used user.Sylvia E. Peacock - 2014 - Big Data and Society 1 (2).
    Big Data enhances the possibilities for storing personal data extracted from social media and web search on an unprecedented scale. This paper draws on the political economy of information which explains why the online industry fails to self-regulate, resulting in increasingly insidious web-tracking technologies. Content analysis of historical blogs and request for comments on HTTP cookies published by the Internet Engineering Task Force illustrates how cookie technology was introduced in the mid-1990s, amid stark warnings about increased system vulnerabilities and deceptive (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  20.  11
    Theology of Resilience Amidst Vulnerability in the Book of Ruth1.Alicia Besa Panganiban - 2020 - Feminist Theology 28 (2):182-197.
    This article explores Ruth’s theology of resilience amidst vulnerability: a resilience rooted in ḥesed. Ḥesed is a powerful social force that could address current issues for those both in privileged positions and in vulnerable situations. A re-reading of Ruth offers modern theologians and serious students of the Bible pathways towards building resilience amidst vulnerability, and in caring for those in vulnerable positions. The text at hand offers a pathway to be true to one’s core values and character, even (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  26
    A Rough Road Map to Reflexivity in Qualitative Research into Emotions.Petya Fitzpatrick & Rebecca E. Olson - 2015 - Emotion Review 7 (1):49-54.
    In qualitative research into emotions, researchers and participants share emotion-laden interactions. Few demonstrate how the analytic value of emotions may be harnessed. In this article we provide an account of our emotional experiences conducting research with two groups: adults living with cystic fibrosis and spouse caregivers of cancer patients. We describe our emotion work during research interviews, and discuss its methodological and theoretical implications. Reflections depict competing emotion norms in qualitative research. Experiences of vulnerability and involuntary “emotional callusing” illustrate the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  30
    Ethics of sleep tracking: techno-ethical particularities of consumer-led sleep-tracking with a focus on medicalization, vulnerability, and relationality.Nadia Primc, Jonathan Hunger, Robert Ranisch, Eva Kuhn & Regina Müller - 2023 - Ethics and Information Technology 25 (1):1-12.
    Consumer-targeted sleep tracking applications (STA) that run on mobile devices (e.g., smartphones) promise to be useful tools for the individual user. Assisted by built-in and/or external sensors, these apps can analyze sleep data and generate assessment reports for the user on their sleep duration and quality. However, STA also raise ethical questions, for example, on the autonomy of the sleeping person, or potential effects on third parties. Nevertheless, a specific ethical analysis of the use of these technologies is still missing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  42
    Struggling Between Strength and Vulnerability, a Patients’ Counter Story.G. J. Teunissen, M. A. Visse & T. A. Abma - 2015 - Health Care Analysis 23 (3):288-305.
    Currently, patients are expected to take control over their health and their life and act as independent users and consumers. Simultaneously, health care policy demands patients are expected to self manage their disease. This article critically questions whether this is a realistic expectation. The paper presents the auto-ethnographic narrative of the first author, which spans a period of 27 years, from 1985 to 2012. In total nine episodes were extracted from various notes, conversations and discussions in an iterative process. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  2
    Is safety in the eye of the beholder? Discrepancies between self-reported and proxied data on road safety behaviors—A systematic review.Sergio A. Useche, Mireia Faus & Francisco Alonso - 2022 - Frontiers in Psychology 13.
    Recent studies have problematized on the lack of agreement between self-reported and proxied data in the field of road safety-related behaviors. Overall, and although these studies are still scarce, most of them suggest that the way we perceive our own road behavior is systematically different from the perspective from which we perceive others' behavior, and vice versa. The aim of this review paper was to target the number and type of studies that have researched the behavioral perceptions of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  33
    A willingness to be vulnerable: norm psychology and human–robot relationships.Stephen A. Setman - 2021 - Ethics and Information Technology 23 (4):815-824.
    Should we welcome social robots into interpersonal relationships? In this paper I show that an adequate answer to this question must take three factors into consideration: (1) the psychological vulnerability that characterizes ordinary interpersonal relationships, (2) the normative significance that humans attach to other people’s attitudes in such relationships, and (3) the tendency of humans to anthropomorphize and “mentalize” artificial agents, often beyond their actual capacities. I argue that we should welcome social robots into interpersonal relationships only if they are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  45
    Two ethical concerns about the use of persuasive technology for vulnerable people.Naomi Jacobs - 2019 - Bioethics 34 (5):519-526.
    Persuasive technologies for health‐related behaviour change give rise to ethical concerns. As of yet, no study has explicitly attended to ethical concerns arising with the design and use of these technologies for vulnerable people. This is striking because these technologies are designed to help people change their attitudes or behaviours, which is particularly valuable for vulnerable people. Vulnerability is a complex concept that is both an ontological condition of our humanity and highly context‐specific. Using the Mackenzie, Rogers and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  27.  13
    Digitally Scaffolded Vulnerability: Facebook’s Recommender System as an Affective Scaffold and a Tool for Mind Invasion.Giacomo Figà-Talamanca - forthcoming - Topoi.
    I aim to illustrate how the recommender systems of digital platforms create a particularly problematic kind of vulnerability in their users. Specifically, through theories of scaffolded cognition and scaffolded affectivity, I argue that a digital platform’s recommender system is a cognitive and affective artifact that fulfills different functions for the platform’s users and its designers. While it acts as a content provider and facilitator of cognitive, affective and decision-making processes for users, it also provides a continuous and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28. Responding to vulnerability: The case of injection drug use.Elizabeth Ben-Ishai - 2012 - International Journal of Feminist Approaches to Bioethics 5 (2):39-63.
    This article examines the case of Insite, North America’s only supervised injection facility, to consider the relationship between dependence, relational autonomy, and vulnerability. At state-funded Insite, users inject illicit drugs under medical supervision. By conceiving of Insite as a health-care facility and addiction as disease, advocates evoke a shared sense of vulnerability among the nonusing public and users, garnering considerable support for the site. Through Insite, the state responds to vulnerability by reshaping the meaning of dependence and conferring (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  29.  6
    Unsettling Perception: Screening Surveillance and the Body in Red Road.Liz Watkins - 2015 - Paragraph 38 (1):101-117.
    The association of colour, sensation and the body, which is noted by Jacqueline Lichtenstein and Merleau-Ponty through their insights on colour as the disturbing of structure and form, offers a way in which to foreground a series of questions about embodiment and the discourse of vision. An analysis of the chromatics of Red Road, which features a female protagonist who works as a surveillance officer in a CCTV control room, offers a way to echo and disrupt the ‘mechanisms and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  4
    Construct Validity and Test–Retest Reliability of the Automated Vehicle User Perception Survey.Justin Mason, Sherrilene Classen, James Wersal & Virginia Sisiopiku - 2021 - Frontiers in Psychology 12:626791.
    Fully automated vehicles (AVs) hold promise toward providing numerous societal benefits including reducing road fatalities. However, we are uncertain about how individuals’ perceptions will influence their ability to accept and adopt AVs. The 28-item Automated Vehicle User Perception Survey (AVUPS) is a visual analog scale that was previously constructed, with established face and content validity, to assess individuals’ perceptions of AVs. In this study, we examined construct validity, via exploratory factor analysis and subsequent Mokken scale analyses. Next, internal consistency (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  7
    Guidelines as governance: Critical reflections from a documentary analysis of guidelines to support user involvement in research.Susanne Stuhlfauth, Ingrid Ruud Knutsen & Ingrid Christina Foss - 2021 - Nursing Inquiry 28 (1):e12378.
    Although guidelines to regulate user involvement in research have been advocated and implemented for several years, literature still describes the process as challenging. In this qualitative study, we take a critical view on guidelines that are developed to regulate and govern the collaboration process of user involvement in research. We adapt a social constructivist view of guidelines and our aim is to explore how guidelines construct the perception of users and researchers and thus the process of involvement. Twenty‐two guidelines (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. Taxonomy based models for reasoning : making inferences from electronic road sign information.B. Cambon-De-Lavalette, C. Tijus, C. Leproux & Olivier Bauer - 2005 - Foundations of Science.
    Taxonomy Based modeling was applied to describe drivers' mental models of variable message signs (VMS's) displayed on expressways. Progress in road telematics has made it possible to introduce variable message signs (VMS's). Sensors embedded in the carriageway every 500m record certain variables (speed, flow rate, etc.) that are transformed in real time into 'driving times' to a given destination if road conditions do not change. VMS systems are auto-regulative Man-Machine (AMMI) systems which incorporate a model of the user: (...)
     
    Export citation  
     
    Bookmark  
  33.  20
    Farmers and researchers: The road to partnership. [REVIEW]Deborah Merrill-Sands & Marie-Hélène Collion - 1994 - Agriculture and Human Values 11 (2-3):26-37.
    User participation is a critical ingredient for relevant technology development, whether in agriculture or industry. This has long been recognized in private sector R&D firms. In most public sector agricultural research organizations in developing countries, however, systematic involvement of farmers, especially poor farmers, in research has been weak. These farmers are rarely powerful or well organized enough to bring pressure to bear on government agencies to respond to their needs and priorities. Farmer-responsive research methods, such as on-farm research, farming systems (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  44
    Recognition as a valued human being: Perspectives of mental health service users.Kristin Ådnøy Eriksen, Bengt Sundfør, Bengt Karlsson, Maj-Britt Råholm & Maria Arman - 2012 - Nursing Ethics 19 (3):357-368.
    The acknowledgement of basic human vulnerability in relationships between mental health service users and professionals working in community-based mental health services (in Norway) was a starting point. The purpose was to explore how users of these services describe and make sense of their meetings with other people. The research is collaborative, with researcher and person with experienced-based knowledge cooperating through the research process. Data is derived from 19 interviews with 11 people who depend on mental health services for (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  61
    Taxonomy based models for reasoning: Making inferences from electronic road sign information. [REVIEW]Brigitte Cambon de Lavalette, Charles Tijus, Christine Leproux & Olivier Bauer - 2005 - Foundations of Science 10 (1):25-45.
    Taxonomy Based modeling was applied to describe drivers’ mental models of variable message signs (VMS’s) displayed on expressways. Progress in road telematics has made it possible to introduce variable message signs (VMS’s). Sensors embedded in the carriageway every 500m record certain variables (speed, flow rate, etc.) that are transformed in real time into “driving times” to a given destination if road conditions do not change. VMS systems are auto-regulative Man-Machine (AMMI) systems which incorporate a model of the user: (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  25
    Giving voice to vulnerable people: the value of shadowing for phenomenological healthcare research. [REVIEW]Hanneke van der Meide, Carlo Leget & Gert Olthuis - 2013 - Medicine, Health Care and Philosophy 16 (4):731-737.
    Phenomenological healthcare research should include the lived experiences of a broad group of healthcare users. In this paper it is shown how shadowing can give a voice to people in vulnerable situations who are often excluded from interview studies. Shadowing is an observational method in which the researcher observes an individual during a relatively long time. Central aspects of the method are the focus on meaning expressed by the whole body, and an extended stay of the researcher in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  37.  6
    Taxonomy Based Models for Reasoning: Making Inferences from Electronic Road Sign Information.Brigitte Lavalette, Charles Tijus, Christine Leproux & Olivier Bauer - 2005 - Foundations of Science 10 (1):25-45.
    Taxonomy Based modeling was applied to describe drivers’ mental models of variable message signs (VMS’s) displayed on expressways. Progress in road telematics has made it possible to introduce variable message signs (VMS’s). Sensors embedded in the carriageway every 500m record certain variables (speed, flow rate, etc.) that are transformed in real time into “driving times” to a given destination if road conditions do not change.VMS systems are auto-regulative Man-Machine (AMMI) systems which incorporate a model of the user: if (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  6
    Persons and Groups: Protection of Research Participants with Vulnerabilities as a Process.Paweł Łuków - 2022 - In Tomas Zima & David N. Weisstub (eds.), Medical Research Ethics: Challenges in the 21st Century. Springer Verlag. pp. 49-63.
    Conceptualisations of vulnerability of research participants in the international standards of ethics of research involving humans underwent a shift from a group-membership (categorical) to an individual-oriented (analytic) approach to vulnerability. However, the categorical view has not been jettisoned completely, and so its role needs to be examined or explained. It is argued in this chapter that a restricted use of the categorical approach can be justified if protection of vulnerable research participants is seen against the background of the dynamics (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  13
    Research ethics in practice: An analysis of ethical issues encountered in qualitative health research with mental health service users and relatives.Sarah Potthoff, Christin Hempeler, Jakov Gather, Astrid Gieselmann, Jochen Vollmann & Matthé Scholten - 2023 - Medicine, Health Care and Philosophy 26 (4):517-527.
    The ethics review of qualitative health research poses various challenges that are due to a mismatch between the current practice of ethics review and the nature of qualitative methodology. The process of obtaining ethics approval for a study by a research ethics committee before the start of a research study has been described as “procedural ethics” and the identification and handling of ethical issues by researchers during the research process as “ethics in practice.” While some authors dispute and other authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  19
    Legal and ethical implications of applications based on agreement technologies: the case of auction-based road intersections.José-Antonio Santos, Alberto Fernández, Mar Moreno-Rebato, Holger Billhardt, José-A. Rodríguez-García & Sascha Ossowski - 2020 - Artificial Intelligence and Law 28 (4):385-414.
    Agreement technologies refer to a novel paradigm for the construction of distributed intelligent systems, where autonomous software agents negotiate to reach agreements on behalf of their human users. Smart Cities are a key application domain for agreement technologies. While several proofs of concept and prototypes exist, such systems are still far from ready for being deployed in the real-world. In this paper we focus on a novel method for managing elements of smart road infrastructures of the future, namely (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  31
    Facebook’s emotional contagion study and the ethical problem of co-opted identity in mediated environments where users lack control.Evan Selinger & Woodrow Hartzog - 2016 - Research Ethics 12 (1):35-43.
    We argue a main but underappreciated reason why the Facebook emotional contagion experiment is ethically problematic is that it co-opted user data in a way that violated identity-based norms and exploited the vulnerability of those disclosing on social media who are unable to control how personal information is presented in this technologically mediated environment.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  8
    Demanding Quality: Worker/consumer Coalitions and “High Road” Strategies in the Care Sector.Nancy Folbre - 2006 - Politics and Society 34 (1):11-32.
    Paid care services such as child care, elder care, teaching, and nursing are vulnerable to competitive pressures that often generate low-pay/low-quality outcomes. Both workers and consumers suffer as a result. This article develops an economic analysis of the “care sector” that emphasizes the potential to build political coalitions that could push for a high-pay/high-quality alternative.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  43.  11
    Between Protest and Counter-Expertise: User Knowledge, Activism, and the Making of Urban Cycling Networks in the Netherlands Since the 1970sZwischen Protest und Gegenexpertise: Nutzererlebnis, Aktivismus und das Entstehen der städtischen Radwegenetze in den Niederlanden seit 1970.Henk-Jan Dekker - 2022 - NTM Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin 30 (3):281-309.
    Around 1970, high numbers of traffic casualties among cyclists led to the creation of numerous local protest movements in the Netherlands. While activists employed protest strategies, their main interest lie in the way they exemplify a highly successful instance of “lay expertise”; the idea that users of a technology have a fundamentally different and valuable perspective on a technology than experts or system-builders. Specifically, cyclists claimed to be more knowledgeable about cycling conditions and safety than the state-employed engineers and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  8
    Between Protest and Counter-Expertise: User Knowledge, Activism, and the Making of Urban Cycling Networks in the Netherlands Since the 1970s.Henk-Jan Dekker - 2022 - NTM Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin 30 (3):281-309.
    Around 1970, high numbers of traffic casualties among cyclists led to the creation of numerous local protest movements in the Netherlands. While activists employed protest strategies, their main interest lie in the way they exemplify a highly successful instance of “lay expertise”; the idea that users of a technology have a fundamentally different and valuable perspective on a technology than experts or system-builders. Specifically, cyclists claimed to be more knowledgeable about cycling conditions and safety than the state-employed engineers and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  9
    EEG-Based Index for Timely Detecting User’s Drowsiness Occurrence in Automotive Applications.Gianluca Di Flumeri, Vincenzo Ronca, Andrea Giorgi, Alessia Vozzi, Pietro Aricò, Nicolina Sciaraffa, Hong Zeng, Guojun Dai, Wanzeng Kong, Fabio Babiloni & Gianluca Borghini - 2022 - Frontiers in Human Neuroscience 16.
    Human errors are widely considered among the major causes of road accidents. Furthermore, it is estimated that more than 90% of vehicle crashes causing fatal and permanent injuries are directly related to mental tiredness, fatigue, and drowsiness of the drivers. In particular, driving drowsiness is recognized as a crucial aspect in the context of road safety, since drowsy drivers can suddenly lose control of the car. Moreover, the driving drowsiness episodes mostly appear suddenly without any prior behavioral evidence. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  3
    Bild und Gedanke: Hermann Schweppenhäuser zum Gedenken.Gerhard Schweppenhäuser & Hermann Schweppenhäuser (eds.) - 2017 - [Wiesbaden]: Springer VS.
    Die Beiträge des Bandes loten Tiefe und Wirkung der Schriften des Philosophen Hermann Schweppenhäuser aus. Schweppenhäuser (1928-2015) gehörte zum engsten Kreis um Adorno und Horkheimer, führte die kritische Theorie als dialektische Philosophie weiter und verband sie mit dem Denkstil Walter Benjamins, dessen Schriften er mit Rolf Tiedemann herausgegeben hat. Schweppenhäuser hinterlässt ein vielfältiges philosophisches und schriftstellerisches Werk: Abhandlungen, Essays, Aphorismen und Handbuchartikel, lyrische Formen und kurze Prosa. Die Autorinnen und Autoren geben in diesem Gedenkbuch Resonanz davon, wie sich ihnen die (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  8
    In part, this 'Declaration of Dresden Against Coerced Psychiatric Treatment'stated.on Coercive Treatment Users’Views - 2011 - In Thomas W. Kallert, Juan E. Mezzich & John Monahan (eds.), Coercive treatment in psychiatry: clinical, legal and ethical aspects. Hoboken, NJ: Wiley-Blackwell.
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. Challenges of ethical and legal responsibilities when technologies' uses and users change: social networking sites, decision-making capacity and dementia. [REVIEW]Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne - 2012 - Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49. The man with a conscience.Charles Roads - 1912 - Philadelphia: Westminster Press.
    No categories
     
    Export citation  
     
    Bookmark  
  50.  3
    Theodor W. Adorno: An Introduction.Gerhard Schweppenhäuser (ed.) - 2009 - Durham [NC]: Duke University Press.
    Theodor W. Adorno was one of the twentieth century’s most important thinkers. In light of two pivotal developments—the rise of fascism, which culminated in the Holocaust, and the standardization of popular culture as a commodity indispensable to contemporary capitalism—Adorno sought to evaluate and synthesize the essential insights of Western philosophy by revisiting the ethical and sociological arguments of his predecessors: Kant, Nietzsche, Hegel, and Marx. This book, first published in Germany in 1996, provides a succinct introduction to Adorno’s challenging and (...)
1 — 50 / 990