Results for 'Database security'

1000+ found
Order:
  1.  21
    Designing databases that enhance people’s privacy without hindering organizations: Towards informational self-determination.Thomas B. Hodel-Widmer - 2006 - Ethics and Information Technology 8 (1):3-15.
    We argue that future database systems must provide autonomy for individuals for the privacy of data they manage. We propose a design for such a system, identify challenges and problems, and suggest some approaches to these. We enunciate the reasons for informational self-determination systems, which include legal, organizational and technical issues. Our main goal is to achieve a widely-accepted realistic and practical solution in order to ensure privacy for individuals in our future world, yet without hindering business and (...). (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  14
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  18
    Ethics and Health Security in the Australian COVID-19 Context: A Critical Interpretive Literature Review.Anson Fehross, Kari Pahlman & Diego S. Silva - 2024 - Journal of Bioethical Inquiry 21 (1):131-150.
    Background The concept of “health security” is often used to motivate public health responses, yet the ethical values that underpin this concept remain largely unexamined. The recent Australian responses to COVID-19 serve as an important case study by which we can analyse the pre-existing literature to see what ethical values shaped, and continue to shape, Australia’s response. Methods We conducted a critical interpretive literature review of academic and grey literatures within key databases, resulting in 2,220 sources. After screening for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  15
    Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions.Seul-Gi Choi & Sung-Bae Cho - 2020 - Logic Journal of the IGPL 28 (4):449-460.
    Relational database management system is the most popular database system. It is important to maintain data security from information leakage and data corruption. RDBMS can be attacked by an outsider or an insider. It is difficult to detect an insider attack because its patterns are constantly changing and evolving. In this paper, we propose an adaptive database intrusion detection system that can be resistant to potential insider misuse using evolutionary reinforcement learning, which combines reinforcement learning and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  42
    Coding and Consent: Moral Challenges of the Database Project in Iceland.Vilhjálmur Árnason - 2004 - Bioethics 18 (1):27-49.
    ABSTRACT A major moral problem in relation to the deCODE genetics database project in Iceland is that the heavy emphasis placed on technical security of healthcare information has precluded discussion about the issue of consent for participation in the database. On the other hand, critics who have emphasised the issue of consent have most often demanded that informed consent for participation in research be obtained. While I think that individual consent is of major significance, I argue that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  6.  3
    Coding and Consent: Moral Challenges of the Database Project in Iceland.VilhjÁlmur Rnason - 2004 - Bioethics 18 (1):27-49.
    ABSTRACT A major moral problem in relation to the deCODE genetics database project in Iceland is that the heavy emphasis placed on technical security of healthcare information has precluded discussion about the issue of consent for participation in the database. On the other hand, critics who have emphasised the issue of consent have most often demanded that informed consent for participation in research be obtained. While I think that individual consent is of major significance, I argue that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   16 citations  
  7. A Survey of Automatic Facial Micro-Expression Analysis: Databases, Methods, and Challenges.Yee-Hui Oh, John See, Anh Cat Le Ngo, Raphael C. -W. Phan & Vishnu M. Baskaran - 2018 - Frontiers in Psychology 9:336565.
    Over the last few years, automatic facial micro-expression analysis has garnered increasing attention from experts across different disciplines because of its potential applications in various fields such as clinical diagnosis, forensic investigation and security systems. Advances in computer algorithms and video acquisition technology have rendered machine analysis of facial micro-expressions possible today. Although the study of facial micro-expressions is a well-established field in psychology, it is still relatively new from the computational perspective with many interesting problems. In this survey, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  14
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  9.  25
    EU Laws on Privacy in Genomic Databases and Biobanking.David Townend - 2016 - Journal of Law, Medicine and Ethics 44 (1):128-142.
    Both the European Union and the Council of Europe have a bearing on privacy in genomic databases and biobanking. In terms of legislation, the processing of personal data as it relates to the right to privacy is currently largely regulated in Europe by Directive 95/46/EC, which requires that processing be “fair and lawful” and follow a set of principles, meaning that the data be processed only for stated purposes, be sufficient for the purposes of the processing, be kept only for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  24
    Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):90-99.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  25
    Teaching & Learning Guide for: Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):152-157.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  16
    Putting names to numbers: The creation of a systematic casualty recording database for the ongoing Russian aggression within Ukraine.Emily Ward - 2023 - Journal of Global Faultlines 10 (2):238-251.
    This research aims to help create a systematic casualty recording database for the civilian casualties of the Russian aggression within Ukraine. It looks at the definitions surrounding casualty recording and human security to help create a baseline for the project. It examines the Register of the Holodomor Victims, the Bosnian Book of the Dead, the Kosovo Memorial Book, and the casualty recording of Iraq Body Count and the Bouderbala Commission, in terms of their recording systems and public databases. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  9
    Public Perspectives on Risks and Benefits of Forensic DNA Databases: An Approach to the Influence of Professional Group, Education, and Age.Susana Silva & Helena Machado - 2015 - Bulletin of Science, Technology and Society 35 (1-2):16-24.
    There is scarce knowledge about the influence of the professional group, education, and age on public perspectives on the risks and benefits of forensic DNA databases. Based on data collected through an online questionnaire applied to 628 individuals in Portugal, this research fills that gap. More than three quarters of the respondents believed that the Portuguese forensic DNA database can help fight crime more efficiently and develop a swifter and more accurate justice, whereas only approximately half thought that it (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  31
    The development of guidelines for implementing information technology to promote food security.Stephen E. Gareau - 2004 - Agriculture and Human Values 21 (4):273-285.
    Food insecurity, and its extreme form, hunger, occur whenever the accessibility to an adequate supply of nutritional and safe foods becomes restricted or unpredictable. They are recurring problems in certain regions of the US, as well as in many parts of the world. According to nation-wide surveys conducted by the US Bureau of the Census, between 1996 and 1998 an estimated 9.7% of US households were classified as food insecure (6.2% being food insecure without evidence of hunger, and 3.5% being (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15. Frederique BULLAT Lionel MALLORDY Michel SCHNEIDER Laboratoire d'lnformatique Universite Blaise Pascal Clermont-Ferrand II.Object Oriented Databases - 1996 - Esda 1996: Expert Systems and Ai; Neural Networks 7:131.
    No categories
     
    Export citation  
     
    Bookmark  
  16. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  17.  39
    Knowledge discovery and system-user partnership: On a production “adversarial partnership” approach. [REVIEW]Z. Chen - 1994 - AI and Society 8 (4):341-356.
    We examine the relationship between systems and their users from the knowledge discovery perspective. Recently knowledge discovery in databases has made important progress, but it may also bring some potential problems to database design, such as issues related to database security, because an unauthorised user may derive highly sensitive knowledge from unclassified data. In this paper we point out that there is a need for a comprehensive study on knowledge discovery in human-computer symbiosis. Borrowing terms from algorithm (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  18. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  19.  20
    Ethics of Buying DNA.Julian J. Koplin, Jack Skeggs & Christopher Gyngell - 2022 - Journal of Bioethical Inquiry 19 (3):395-406.
    DNA databases have significant commercial value. Direct-to-consumer genetic testing companies have built databanks using samples and information voluntarily provided by customers. As the price of genetic analysis falls, there is growing interest in building such databases by paying individuals for their DNA and personal data. This paper maps the ethical issues associated with private companies paying for DNA. We outline the benefits of building better genomic databases and describe possible concerns about crowding out, undue inducement, exploitation, and commodification. While certain (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  27
    The Right to Know and the Right Not to Know: Genetic Privacy and Responsibility.Ruth Chadwick, Mairi Levitt & Darren Shickle (eds.) - 2014 - Cambridge University Press.
    The privacy concerns discussed in the 1990s in relation to the New Genetics failed to anticipate the relevant issues for individuals, families, geneticists and society. Consumers, for example, can now buy their personal genetic information and share it online. The challenges facing genetic privacy have evolved as new biotechnologies have developed, and personal privacy is increasingly challenged by the irrepressible flow of electronic data between the personal and public spheres and by surveillance for terrorism and security risks. This book (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  21.  36
    Hotspots for textual dynamics: cultural semiotic approach to digital archives.Indrek Ibrus & Maarja Ojamaa - 2021 - Semiotica 2021 (243):387-407.
    Digital cultural archives and databases are promising an era of heritage democratization and an enhancement of the role of arts in everyday cultures. It is hoped that mass digitization initiatives in many corners of the world can facilitate the secure preservation of human cultural heritage, with easy access and diverse ways for creative reuse. Understanding the dialogic processes within these increasingly vast databases necessitates a dynamic conceptualization of data they contain. The paper argues that this can be found in Juri (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  53
    SmartData: Make the data “think” for itself. [REVIEW]George J. Tomko, Donald S. Borrett, Hon C. Kwan & Greg Steffan - 2010 - Identity in the Information Society 3 (2):343-362.
    SmartData is a research program to develop web-based intelligent agents that will perform two tasks: securely store an individual’s personal and/or proprietary data, and protect the privacy and security of the data by only disclosing it in accordance with instructions authorized by the data subject. The vision consists of a web-based SmartData agent that would serve as an individual’s proxy in cyberspace to protect their personal or proprietary data. The SmartData agent (which ‘houses’ the data and its permitted uses) (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  23. How We Became Our Data: A Genealogy of the Informational Person.Colin Koopman - 2019 - Chicago, IL, USA: University of Chicago Press.
    We are now acutely aware, as if all of the sudden, that data matters enormously to how we live. How did information come to be so integral to what we can do? How did we become people who effortlessly present our lives in social media profiles and who are meticulously recorded in state surveillance dossiers and online marketing databases? What is the story behind data coming to matter so much to who we are? -/- In How We Became Our Data, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  24.  8
    Novo Coronavírus Sars-Cov-2 e o Agravamento da Insegurança Alimentar Em Países Africanos Com Histórico de Eventos Climáticos e de Conflitos Armados.Maitu Abibo Buanango, Vladmir Antero Delgado Silves Ferreira & Maria Rita Marques de Oliveira - 2020 - Simbio-Logias Revista Eletrônica de Educação Filosofia e Nutrição 12 (16):118-141.
    In times of crisis, one of the areas heavily affected has been food, as a direct consequence of the damage caused to family farming and therefore to Food and Nutrition Security (SAN). Climate change, in turn, causes widespread crises, which, due to their impact on humanity, and above all, on SAN, provide complex humanitarian crises, worsening hunger. The military conflict imposes difficulties in access to food and production. This study aimed to critically describe the panorama of climate change and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  23
    Patients’ and public views and attitudes towards the sharing of health data for research: a narrative review of the empirical evidence.Shona Kalkman, Johannes van Delden, Amitava Banerjee, Benoît Tyl, Menno Mostert & Ghislaine van Thiel - 2022 - Journal of Medical Ethics 48 (1):3-13.
    IntroductionInternational sharing of health data opens the door to the study of the so-called ‘Big Data’, which holds great promise for improving patient-centred care. Failure of recent data sharing initiatives indicates an urgent need to invest in societal trust in researchers and institutions. Key to an informed understanding of such a ‘social license’ is identifying the views patients and the public may hold with regard to data sharing for health research.MethodsWe performed a narrative review of the empirical evidence addressing patients’ (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  26. Neither opaque nor transparent: A transdisciplinary methodology to investigate datafication at the EU borders.Ana Valdivia, Claudia Aradau, Tobias Blanke & Sarah Perret - 2022 - Big Data and Society 9 (2).
    In 2020, the European Union announced the award of the contract for the biometric part of the new database for border control, the Entry Exit System, to two companies: IDEMIA and Sopra Steria. Both companies had been previously involved in the development of databases for border and migration management. While there has been a growing amount of publicly available documents that show what kind of technologies are being implemented, for how much money, and by whom, there has been limited (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Neutrosophic Crisp Set Theory.A. A. Salama & Florentin Smarandache - 2015 - Columbus, OH, USA: Educational Publishers.
    In this book the authors introduce and study the following notions: Neutrosophic Crisp Points, Neutrosophic Crisp Relations, Neutrosophic Crisp Sets, Neutrosophic Set Generated by (Characteristic Function), alpha-cut Level for Neutrosophic Sets, Neutrosophic Crisp Continuous Function, Neutrosophic Crisp Compact Spaces, Neutrosophic Crisp Nearly Open Sets, Neutrosophic Crisp Ideals, Neutrosophic Crisp Filter, Neutrosophic Crisp Local Functions, Neutrosophic Crisp Sets via Neutrosophic Crisp Ideals, Neutrosophic Crisp L-Openness and Neutrosophic Crisp L-Continuity, Neutrosophic Topological Region, Neutrosophic Closed Set and Neutrosophic Continuous Function, etc. They compute (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  28.  18
    Can Blockchain Solve the Dilemma in the Ethics of Genomic Biobanks?Valérie Racine - 2021 - Science and Engineering Ethics 27 (3):1-14.
    In discussions on the ethics of genome collections and biobanks, the main worry about whether we are permitted to collect and use individuals’ genomic and genetic data is the potential for the violation of individuals’ right to informational privacy. Yet, if we do not permit these endeavors, we risk giving up on the future benefits of biomedical research. In this paper, I describe a private venture in blockchain genomics that seeks to provide an apt solution to concerns about potential privacy (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  88
    Fraud, Enforcement Action, and the Role of Corporate Governance: Evidence from China.Chunxin Jia, Shujun Ding, Yuanshun Li & Zhenyu Wu - 2009 - Journal of Business Ethics 90 (4):561-576.
    We examine enforcement action in China’s emerging markets by focusing on the agents that impose this action and the role played by supervisory boards. Using newly available databases, we find that supervisory boards play an active role when Chinese listed companies face enforcement action. Listed firms with larger supervisory boards are more likely to have more severe sanctions imposed upon them by the China Security Regulatory Commission, and listed companies that face more severe enforcement actions have more supervisory board (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  30.  23
    If you build it, they will come: unintended future uses of organised health data collections.Kieran C. O’Doherty, Emily Christofides, Jeffery Yen, Heidi Beate Bentzen, Wylie Burke, Nina Hallowell, Barbara A. Koenig & Donald J. Willison - 2016 - BMC Medical Ethics 17 (1):54.
    Health research increasingly relies on organized collections of health data and biological samples. There are many types of sample and data collections that are used for health research, though these are collected for many purposes, not all of which are health-related. These collections exist under different jurisdictional and regulatory arrangements and include: 1) Population biobanks, cohort studies, and genome databases 2) Clinical and public health data 3) Direct-to-consumer genetic testing 4) Social media 5) Fitness trackers, health apps, and biometric data (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  31.  24
    Privacy of medical records: IT implications of HIPAA.David Baumer, Julia Brande Earp & Fay Cobb Payton - 2000 - Acm Sigcas Computers and Society 30 (4):40-47.
    Increasingly, medical records are being stored in computer databases that allow for efficiencies in providing treatment and in the processing of clinical and financial services. Computerization of medical records has also diminished patient privacy and, in particular, has increased the potential for misuse, especially in the form of nonconsensual secondary use of personally identifiable records. Organizations that store and use medical records have had to establish security measures, prompted partially by an inconsistent patchwork of legal standards that vary from (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  32.  16
    Retten til privathed i det danske sundhedsvæsen.Hanne Pihl Bjerre & Katrine Juel Vang - 2014 - Etikk I Praksis - Nordic Journal of Applied Ethics 1 (1):52-66.
    Formålet med nærværende oversigtsartikel er at undersøge den stigende digitalisering og deling af personlige informationer i sundhedsvæsenet, samt hvilke etiske udfordringer denne udvikling har for den enkelte borger. Mere præcis vil vi rammesætte denne diskussion i en dansk kontekst eksemplificeret ved Det Fælles Medicinkort. Det Fælles Medicinkort er en obligatorisk database for danske borgere indeholdende informationer om patienters medicinske historie to år tilbage. Denne database kan tilgås af en bred vifte af sundhedsprofessionelle i Danmark.På trods af lovede sundhedsmæssige (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  57
    Ethical concerns on sharing genomic data including patients’ family members.Kyoko Takashima, Yuichi Maru, Seiichi Mori, Hiroyuki Mano, Tetsuo Noda & Kaori Muto - 2018 - BMC Medical Ethics 19 (1):61.
    Platforms for sharing genomic and phenotype data have been developed to promote genomic research, while maximizing the utility of existing datasets and minimizing the burden on participants. The value of genomic analysis of trios or family members has increased, especially in rare diseases and cancers. This article aims to argue the necessity of protection when sharing data from both patients and family members. Sharing patients’ and family members’ data collectively raises an ethical tension between the value of datasets and the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  34.  77
    Large Gatherings? No, Thank You. Devaluation of Crowded Social Scenes During the COVID-19 Pandemic.Claudia Massaccesi, Emilio Chiappini, Riccardo Paracampo & Sebastian Korb - 2021 - Frontiers in Psychology 12.
    In most European countries, the first wave of the COVID-19 pandemic led to the imposition of physical distancing rules, resulting in a drastic and sudden reduction of real-life social interactions. Even people not directly affected by the virus itself were impacted in their physical and/or mental health, as well as in their financial security, by governmental lockdown measures. We investigated whether the combination of these events had changed people's appraisal of social scenes by testing 241 participants recruited mainly in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  8
    Segurança Alimentar e Nutricional Em Tempos de Covid-19: Impactos Na África, América Latina e Portugal.Maitu Abibo Buanango, Lilian Fernanda Galesi-Pacheco, Yudi Paulina Garcia Ramirez, Cristina Amaro da Costa, Jaqueline Sgarbi Santos, Ana Pinto de Loura & Carla Maria Vieira - 2020 - Simbio-Logias Revista Eletrônica de Educação Filosofia e Nutrição 12 (16):100-117.
    Economic and sanitary crises have great repercussions on access to food and the health of the population. In this context, austerity policies can have devastating effects on social rights. The purpose of this essay is to reflect on the impact of various types of crises on the Human Right to Adequate Food and Nutrition (DHANA) and on Food and Nutritional Security (SAN) of vulnerable populations and to identify of public policies, programs and actions developed based on the relief of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  19
    Social and Ethical Issues in the Use of Familial Searching in Forensic Investigations: Insights from Family and Kinship Studies.Erica Haimes - 2006 - Journal of Law, Medicine and Ethics 34 (2):263-276.
    Since its origins in the mid-1980s, DNA profiling has become the most powerful tool for identification in contemporary society. Practitioners have deployed it to determine parentage, verify claims to identity in various civil contexts, identify bodies in wars and mass disasters, and infer the identity of individuals who have left biological traces at crime scenes. Thus DNA profiling can be used to implicate or exonerate individuals from participation in particular social relations and activities; this affords it a growing importance in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  37.  10
    Toward agent-based LSB image steganography system.Budoor Salem Edhah & Fatmah Abdulrahman Baothman - 2021 - Journal of Intelligent Systems 30 (1):903-919.
    In a digital communication environment, information security is mandatory. Three essential parameters used in the design process of a steganography algorithm are Payload, security, and fidelity. However, several methods are implemented in information hiding, such as Least Significant Bit (LBS), Discrete Wavelet Transform, Masking, and Discrete Cosine Transform. The paper aims to investigate novel steganography techniques based on agent technology. It proposes a Framework of Steganography based on agent for secret communication using LSB. The most common image steganography (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  5
    Stream your brain! Speculative economy of the IoT and its pan-kinetic dataveillance.Sungyong Ahn - 2021 - Big Data and Society 8 (2).
    It is now a common belief that the truths of our lives are hidden in the databases streamed from our interactions in smart environments. In this current hype of big data, the Internet of Things has been suggested as the idea to embed small sensors and actuators everywhere to unfold the truths beneath the surfaces of everything. However, remaining the technology that promises more than it can provide thus far, more important for the IoT’s actual expansion to various social domains (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  60
    Transforming a traditional commons-based seed system through collaborative networks of farmer seed-cooperatives and public breeding programs: the case of sorghum in Mali.Fred Rattunde, Eva Weltzien, Mamourou Sidibé, Abdoulaye Diallo, Bocar Diallo, Kirsten vom Brocke, Baloua Nebié, Aboubacar Touré, Yalaly Traoré, Amadou Sidibé, Chiaka Diallo, Soriba Diakité, Alhousseïni Bretaudeau & Anja Christinck - 2020 - Agriculture and Human Values 38 (2):561-578.
    Malian farmers’ traditional system for managing seed of sorghum, an indigenous crop of vital importance for food security and survival, can be conceptualized as a commons. Although this system maintains a wide range of varieties and helps ensure access to seed, its ability to create and widely disseminate new varieties to meet evolving opportunities and challenges is limited. A network of farmer groups, public breeding programs, and development organizations collaborating in decentralized creation and dissemination of sorghum varieties in Mali (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  10
    Ethics of Quantum Technologies: A Scoping Review.Steven Umbrello - forthcoming - International Journal of Applied Philosophy.
    The rapid development of quantum technologies, such as quantum computing, quantum internet, and quantum sensing, has led to a growing awareness of the ethical issues surrounding these technologies. This literature review aims to analyze the existing research on these ethical issues using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) literature review approach. The literature search was conducted using the following databases: Scopus ArXiv, and IEEE Xplore, and the search terms used were “quantum computing,” “quantum internet,” “quantum sensing,” (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  29
    Mobile identities, technology and the socio-spatial relations of air travel.Monika Codourey - 2008 - Technoetic Arts 6 (1):99-111.
    The remarkable growth in the application of information and communications technologies indicates a great shift toward a globally integrated society. The urban metropolises are turning into intersections of transit and migration of goods, capital, services, cultures, knowledge and especially people. Moreover the flow of bodies, information and money is changing the rules of what defines national territory, space and identity. Social realities with specific qualities are appearing, implying a new spatial correlation between the local and the global. International airports and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  42.  7
    Basic Resources in Bioethics.Mary Carrington Coutts - 1991 - Kennedy Institute of Ethics Journal 1 (1):75-90.
    In lieu of an abstract, here is a brief excerpt of the content:Basic Resources in Bioethics*Mary Carrington Coutts (bio)OrganizationsKennedy Institute of Ethics Georgetown University Washington, DC 20057 National Reference Center for Bioethics Literature 800-MED-ETHX or 202-687-3885The Hastings Center 255 Elm Road Briarcliff Manor, NY 10510 914-762-8500Society for Health and Human Values 6728 Old McLean Village Drive McLean, VA 22101 703-556-9222NOTE: There are numerous organizations in the United States and abroad that deal with bioethical issues. For a more comprehensive listing of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  43.  19
    “Giving something back”: a systematic review and ethical enquiry into public views on the use of patient data for research in the United Kingdom and the Republic of Ireland.Jessica Stockdale, Jackie Cassell & Elizabeth Ford - 2019 - Wellcome Open Research 3 (6).
    Background: Use of patients’ medical data for secondary purposes such as health research, audit, and service planning is well established in the UK. However, the governance environment, as well as public understanding about this work, have lagged behind. We aimed to systematically review the literature on UK and Irish public views of patient data used in research, critically analysing such views though an established biomedical ethics framework, to draw out potential strategies for future good practice guidance and inform ethical and (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44. The Political Economy of Terrorism.Walter Enders & Todd Sandler - 2011 - Cambridge University Press.
    The Political Economy of Terrorism presents a widely accessible political economy approach to the study of terrorism. It applies economic methodology – theoretical and empirical – combined with political analysis and realities to the study of domestic and transnational terrorism. In so doing, the book provides both a qualitative and quantitative investigation of terrorism in a balanced up-to-date presentation that informs students, policy makers, researchers and the general reader of the current state of knowledge. Included are historical aspects, a discussion (...)
     
    Export citation  
     
    Bookmark   2 citations  
  45. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. ESG in Focus: The Australian Evidence.Jeremy Galbreath - 2013 - Journal of Business Ethics 118 (3):529-541.
    Addressing ESG issues has become a point of interest for investors, shareholders, and governments as a risk management concern, while for firms it has become an emerging part of competitive strategy. In this study, a database from an independent ratings agency is used to examine, longitudinally, how Australian Securities Exchange (ASX) 300 firms are responding to ESG issues. Following institutional theory predictions, ASX300 firms are improving ESG performance over the 2002–2009 timeframe. Furthermore, over this timeframe, performance on the governance (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  14
    Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq.Jawad Kadhim Mezaal, Nabeel Salih Ali, Ahmed Hazim Alhilali & Thamer Alameri - 2022 - Journal of Intelligent Systems 31 (1):726-738.
    Crimes are increasing in our society as a serious worldwide issue. Fast reporting of crimes is a significantly important area in anticrime. This problem is visible in Iraq as people avoid information-sharing due to the lack of trust in the security system despite some contact lines between citizens and police in Iraq. Furthermore, there has been a little empirical study in this field. We proposed a multi-approach for crime reporting and police control to address these issues. First, this study (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  20
    Found Your DNA on the Web: Reconciling Privacy and Progress.Amy Gutmann & James W. Wagner - 2013 - Hastings Center Report 43 (3):15-18.
    An article by Melissa Gymrek and colleagues, published this January in Science, described how the researchers used surname inferences from commercial genealogy databases and Internet searches to deduce the identity of nearly fifty research participants whose supposedly private data were stored in large, publicly available datasets. This news comes just months after the Presidential Commission for the Study of Bioethical Issues published a report that expressed serious concerns about personal privacy and security in whole genome sequencing. The bioethics commission (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  14
    Predicting inmates misconduct using the SHAP approach.Fábio M. Oliveira, Marcelo S. Balbino, Luis E. Zarate, Fawn Ngo, Ramakrishna Govindu, Anurag Agarwal & Cristiane N. Nobre - forthcoming - Artificial Intelligence and Law:1-27.
    Internal misconduct is a universal problem in prisons and affects the maintenance of social order. Consequently, correctional institutions often develop rehabilitation programs to reduce the likelihood of inmates committing internal offenses and criminal recidivism after release. Therefore, it is necessary to identify the profile of each offender, both for the appropriate indication of a rehabilitation program and the level of internal security to which he must be submitted. In this context, this work aims to discover the most significant characteristics (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  9
    Fear of Cancer Recurrence, Health Anxiety, Worry, and Uncertainty: A Scoping Review About Their Conceptualization and Measurement Within Breast Cancer Survivorship Research.Christine Maheu, Mina Singh, Wing Lam Tock, Asli Eyrenci, Jacqueline Galica, Maude Hébert, Francesca Frati & Tania Estapé - 2021 - Frontiers in Psychology 12.
    Objective:Fear of Cancer Recurrence (FCR), Health Anxiety (HA), worry, and uncertainty in illness are psychological concerns commonly faced by cancer patients. In survivorship research, these similar, yet different constructs are frequently used interchangeably and multiple instruments are used in to measure them. The lack of clear and consistent conceptualization and measurement can lead to diverse or contradictory interpretations. The purpose of this scoping review was to review, compare, and analyze the current conceptualization and measurements used for FCR, HA, worry, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000