The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological dimensions (...) of privacy and security is structured as a bibliometric analysis. Our dataset covers all articles published in IEEE Security and Privacy since its inception in 2003 to February 06, 2014. This venue was chosen not only because of its target readership, but also because a preliminary search of keywords related to ethics, privacy, and security topics in the ISI Web of Knowledge and IEEE Xplore indicated that IEEE Security and Privacy has published a preponderance of articles matching those topics. In fact, our search returned two-fold more articles for IEEE Security and Privacy than the next most prolific venue. These reasons, coupled with the fact that both academia and industry are well-represented in the authorship of articles makes IEEE Security and Privacy an excellent candidate for bibliometric analysis. Our analysis examines the ways articles in IEEE Security and Privacy relate ethics to information technology. Such articles can influence the development of law, policy and the future of information technology ethics. We employed thematic and JK-biplot analyses of content relating privacy and ethics and found eight dominant themes as well as the inter-theme relationships. Authors and institutional affiliations were examined to discern whether centers of research activity and/or authors dominated the overall field or thematic areas. Results suggest avenues for future work in critical areas, especially for closing present gaps in the coverage of ethics and information technology privacy and security themes particularly in the areas of ethics and privacy awareness. (shrink)
Since the conceptualization of unethical pro-organizational behavior ten years ago, scholarly interest in exploring this phenomenon has multiplied. Given a burgeoning body of empirical research, a review of unethical pro-organizational behavior literature is warranted. This study, therefore, systematically reviews the extant literature on unethical pro-organizational behavior and presents a comprehensive theory-based review of the past developments in this field. We classify previous studies based on their underlying theoretical perspectives and discuss the antecedents and consequences of unethical pro-organizational behavior in work (...) context. We also explicate the boundary conditions under which the influence of these antecedents gets accentuated or alleviated. Overall, this study synthesizes past knowledge to elucidate why, how, and when unethical pro-organizational behavior unfolds in the workplace. Finally, the gaps in the extant theorization are identified and an agenda for future research is proposed. (shrink)
In the domain of legal information retrieval, an important challenge is to compute similarity between two legal documents. Precedents play an important role in The Common Law system, where lawyers need to frequently refer to relevant prior cases. Measuring document similarity is one of the most crucial aspects of any document retrieval system which decides the speed, scalability and accuracy of the system. Text-based and network-based methods for computing similarity among case reports have already been proposed in prior works but (...) not without a few pitfalls. Since legal citation networks are generally highly disconnected, network based metrics are not suited for them. Till date, only a few text-based and predominant embedding based methods have been employed, for instance, TF-IDF based approaches, Word2Vec and Doc2Vec based approaches. We investigate the performance of 56 different methodologies for computing textual similarity across court case statements when applied on a dataset of Indian Supreme Court Cases. Among the 56 different methods, thirty are adaptations of existing methods and twenty-six are our proposed methods. The methods studied include models such as BERT and Law2Vec. It is observed that the more traditional methods that rely on a bag-of-words representation performs better than the more advanced context-aware methods for computing document-level similarity. Finally we nominate, via empirical validation, five of our best performing methods as appropriate for measuring similarity between case reports. Among these five, two are adaptations of existing methods and the other three are our proposed methods. (shrink)
We make a proposal for formalizing simultaneous games at the abstraction level of player’s powers, combining ideas from dynamic logic of sequential games and concurrent dynamic logic. We prove completeness for a new system of ‘concurrent game logic’ CDGL with respect to finite non-determined games. We also show how this system raises new mathematical issues, and throws light on branching quantifiers and independence-friendly evaluation games for first-order logic.
We discuss a simple logic to describe one of our favourite games from childhood, hide and seek, and show how a simple addition of an equality constant to describe the winning condition of the seeker makes our logic undecidable. There are certain decidable fragments of first-order logic which behave in a similar fashion and we add a new modal variant to that class of logics. We also discuss the relative expressive power of the proposed logic in comparison to the standard (...) modal counterparts. (shrink)
The purpose of the paper is to explore the potential for using fuzzy logic to analyse economic decision?making under Keynesian uncertainty, and in particular in circumstances where variety of opinion is important. Fuzzy logic is shown to apply where expectations may differ because the nature of the subject matter impedes any ?crisp? way of describing the underlying variables. The particular case of the speculative demand for money is considered, since it explicitly reflects variety of opinion as to whether interest rates (...) are ?high? or ?low? (shrink)
When formal literacy instruction begins, around the age of 5 or 6, children from families low in socioeconomic status tend to be less prepared than children from families of higher SES. The goal of our study is to explore one route through which SES may influence children's early literacy skills: informal conversations about letters. The study builds on previous studies of parent–child conversations that show how U. S. parents and their young children talk about writing and provide preliminary evidence about (...) similarities and differences in parent–child conversations as a function of SES. Focusing on parents and children aged three to five, we conducted five separate analyses of these conversations, asking whether and how family SES influences the previously established patterns. Although we found talk about letters in both upper and lower SES families, there were differences in the nature of these conversations. The proportion of letter talk utterances that were questions was lower in lower SES families and, of all the letter names that lower SES families talked about, more of them were uttered in isolation rather than in sequences. Lower SES families were especially likely to associate letters with the child's name, and they placed more emphasis on sequences in alphabetic order. We found no SES differences in the factors that influenced use of particular letter names, but there were SES differences in two-letter sequences. Focusing on the alphabet and on associations between the child's name and the letters within it may help to interest the child in literacy activities, but they many not be very informative about the relationship between letters and words in general. Understanding the patterns in parent–child conversations about letters is an important first step for exploring their contribution to children's early literacy skills and school readiness. (shrink)
An intellectual biography of Max Weber which uses his most famous work, The Protestant Ethic and the Spirit of Capitalism as its starting point, with wider reference to the social, political, and religious thought of the time.
In today's world the need for cultivating non-violence is becoming more pronounced. Gandhi extrapolated an ideal society based on truth and nonviolence. The Bombay Chronicle in its issue of 5th April, 1930, reported "...For the first time a nation is asked by its leader to win freedom by itself accepting all the suffering and sacrifice involved. Mahatma Gandhi's success does not, therefore, merely mean the freedom of India. It will also constitute the most important contribution that any country yet made (...) towards the elimination of force as an arbiter between one nation and another..." For him, two cardinal principles of life, non-violence and truth, were the essence of sociopolitical good. "Satyagraha" was Gandhi's gift to the world. The word was coined by him in South Africa. In the West it was known as passive resistance. Satyagraha signified pure soul-force. Truth or Love is the very substance of the soul. To quote Gandhi in this context: "Non-violence as supreme dharma is the proof of this power of Love. Nonviolence is a dormant state. In the working state, it is Love, ruled by Love, the world goes on.... we are alive solely because of Love....we are all ourselves the proof of this..." In a centrifugal world, Gandhi's views expressed on non-violence and love are guidance to the world today more than at any other time. (shrink)
This paper presents an attempt to bridge the gap between logical and cognitive treatments of strategic reasoning in games. There have been extensive formal debates about the merits of the principle of backward induction among game theorists and logicians. Experimental economists and psychologists have shown that human subjects, perhaps due to their bounded resources, do not always follow the backward induction strategy, leading to unexpected outcomes. Recently, based on an eye-tracking study, it has turned out that even human subjects who (...) produce the outwardly correct ‘backward induction answer’ use a different internal reasoning strategy to achieve it. The paper presents a formal language to represent different strategies on a finer-grained level than was possible before. The language and its semantics help to precisely distinguish different cognitive reasoning strategies, that can then be tested on the basis of computational cognitive models and experiments with human subjects. The syntactic framework of the formal system provides a generic way of constructing computational cognitive models of the participants of the Marble Drop game. (shrink)
Philip Pettit's narrative of the eclipse of republican by liberal liberty in late eighteenth-century Britain adds colour and plausibility to his analytical contrast between republican and liberal liberty. The narrative supports his argument that republicanism and liberalism can be helpfully contrasted in terms of non-domination and non- interference conceptions of liberty. While the narrative has not been scrutinized in the literature, it is in fact flawed. The flaws raise new questions about how stringent a value liberty as non-domination is and (...) what motivated the value. The flaws also raise new questions about the significance of liberty as non-interference within the very strand of liberalism that Pettit focuses upon. Finally, the article casts doubt on some aspects of Quentin Skinner's interpretation of republican liberty. (shrink)
In a Common Law system, legal practitioners need frequent access to prior case documents that discuss relevant legal issues. Case documents are generally very lengthy, containing complex sentence structures, and reading them fully is a strenuous task even for legal practitioners. Having a concise overview of these documents can relieve legal practitioners from the task of reading the complete case statements. Legal catchphrases are phrases that provide a concise overview of the contents of a case document, and automated generation of (...) catchphrases is a challenging problem in legal analytics. In this paper, we propose a novel supervised neural sequence tagging model for the extraction of catchphrases from legal case documents. Specifically, we show that incorporating document-specific information along with a sequence tagging model can enhance the performance of catchphrase extraction. We perform experiments over a set of Indian Supreme Court case documents, for which the gold-standard catchphrases are obtained from a popular legal information system. The performance of our proposed method is compared with that of several existing supervised and unsupervised methods, and our proposed method is empirically shown to be superior to all baselines. (shrink)
In this technology-driven Digital Age, Management Education is primarily engaged in development of skills and techno-economic competence of students with dominant thrust on sharpening their rational faculties and quantitative ability. Deeper questions and nobler qualittative issues like Spirituality, Corporate Social Responsibility and Ethics are naturally assigned low priority in the rush for money, career, fame, power and position both at the individual and organizational levels. The present paper engages in a Qualitative Research by conducting Focus group Interviews among Participants at (...) the Undergraduate level who had taken up Management Education. After content analysis of the responses the authors highlight their observations on the existing gaps in prevailing management education leading to failure of the present system in charging the students with a deeper Meaning of Work and a higher Purpose of Life. The paper then delves into exploration in pertinent tenets of Classical Indian Wisdom to enrich the spectrum of Management education with insights on Humanistic Philosophy, Holistic Learning, Enlightened CSR and Ethics, and Inspirational Leadership towards creating a better and more humane future for modern organizations. (shrink)
The Transforming growth factor beta (TGF‐β) family of secreted proteins regulates a variety of key events in normal development and physiology. In mammals, this family, represented by 33 ligands, including TGF‐β, activins, nodal, bone morphogenetic proteins (BMPs), and growth and differentiation factors (GDFs), regulate biological processes as diverse as cell proliferation, differentiation, apoptosis, metabolism, homeostasis, immune response, wound repair, and endocrine functions. In Drosophila, only 7 members of this family are present, with 4 TGF‐β/BMP and 3 TGF‐β/activin ligands. Studies in (...) the fly have illustrated the role of TGF‐β/BMP ligands during embryogenesis and organ patterning, while the TGF‐β/activin ligands have been implicated in the control of wing growth and neuronal functions. In this review, we focus on the emerging roles of Drosophila TGF‐β/activins in inter‐organ communication via long‐distance regulation, especially in systemic lipid and carbohydrate homeostasis, and discuss findings relevant to metabolic diseases in humans. -/- . (shrink)
The feature selection process is very important in the field of pattern recognition, which selects the informative features so as to reduce the curse of dimensionality, thus improving the overall classification accuracy. In this paper, a new feature selection approach named Memory-Based Histogram-Oriented Multi-objective Genetic Algorithm is introduced to identify the informative feature subset to be used for a pattern classification problem. The proposed M-HMOGA approach is applied to two recently used feature sets, namely Mojette transform and Regional Weighted Run (...) Length features. The experimentations are carried out on Bangla, Devanagari, and Roman numeral datasets, which are the three most popular scripts used in the Indian subcontinent. In-house Bangla and Devanagari script datasets and Competition on Handwritten Digit Recognition 2013 Roman numeral dataset are used for evaluating our model. Moreover, as proof of robustness, we have applied an innovative approach of using different datasets for training and testing. We have used in-house Bangla and Devanagari script datasets for training the model, and the trained model is then tested on Indian Statistical Institute numeral datasets. For Roman numerals, we have used the HDRC 2013 dataset for training and the Modified National Institute of Standards and Technology dataset for testing. Comparison of the results obtained by the proposed model with existing HMOGA and MOGA techniques clearly indicates the superiority of M-HMOGA over both of its ancestors. Moreover, use of K-nearest neighbor as well as multi-layer perceptron as classifiers speaks for the classifier-independent nature of M-HMOGA. The proposed M-HMOGA model uses only about 45–50% of the total feature set in order to achieve around 1% increase when the same datasets are partitioned for training-testing and a 2–3% increase in the classification ability while using only 35–45% features when different datasets are used for training-testing with respect to the situation when all the features are used for classification. (shrink)
India’s energy demand is predicted to rise by 135% within a span of 20 years. Coping up with surging energy demands requires several reforms in both renewable and non-renewable sectors. Factors such as rising population, reduction in the cost of renewable energy technology and their effect on the nation’s GDP, can make policy making a herculean task and the justification for such policies, quite opaque to the public. Artificial Intelligence technology can help decision makers to quickly draw conclusions from voluminous (...) datasets under different heads. However, AI results need to be post-processed so that they are easily understood by the layperson. This paper focuses on using Sankey diagrams as a post-processing tool for AI systems. Policy formulation often requires an overall assessment of energy sources, production pathways, end used destinations and wastage encountered—these can be easily visualized with a Sankey diagram. For this work, a Sankey protocol was written out in a form where a prompt asks the user to supply information through a spreadsheet interfaced with a customized mobile app—a first anywhere in the subcontinent. India’s mobile sector is vibrant, and the paper presents a enabling the user to have a handle on the dynamics of energy distribution locally. The app gives an instant feel of the apportioned energy across grids, the projected changes for the next decade, the efficiency and feasibility of each sector and lastly a telling visual representation showing the main strengths and weaknesses in the energy sector. (shrink)
Word searching or keyword spotting is an important research problem in the domain of document image processing. The solution to the said problem for handwritten documents is more challenging than for printed ones. In this work, a two-stage word searching schema is introduced. In the first stage, all the irrelevant words with respect to a search word are filtered out from the document page image. This is carried out using a zonal feature vector, called pre-selection feature vector, along with a (...) rule-based binary classification method. In the next step, a holistic word recognition paradigm is used to confirm a pre-selected word as search word. To accomplish this, a modified histogram of oriented gradients-based feature descriptor is combined with a topological feature vector. This method is experimented on a QUWI English database, which is freely available through the International Conference on Document Analysis and Recognition 2015 competition entitled “Writer Identification and Gender Classification.” This technique not only provides good retrieval performance in terms of recall, precision, and F-measure scores, but it also outperforms some state-of-the-art methods. (shrink)
Student support services are the cardinal features of the Open and Distance Learning System. In India, the Indira Gandhi National Open University, 13 state open universities and over 200 Distance Education Institutes attached to conventional universities and private/autonomous institutes offering programmes through the distance mode have all created adequate provisions for learner support services and the systems, rules, regulations and norms have been put in place. However, it is significant that a learner in the ODL system remains away from the (...) teacher and the peer group. Thus, the learner feels isolated and needs the empathy of all the functionaries concerned. It has been our experience at IGNOU that more often than not the functionaries fail to realize the value of a learner and the learner fails to understand the value attributed to him by the ODL system. Without such realization the rules and regulations lose their significance. Hence, inculcation of values is of paramount importance in the functioning of the ODL system. In this article we have discussed about ‘inculcation of values’ among the ‘learners’ as well as the ‘functionaries’ for developing ‘best practices’ in learner support services in the ODL system. The inputs are based primarily on direct experiences of the authors. (shrink)