2,597 research outputs found

    Disclosive ethics and information technology: disclosing facial recognition systems

    Get PDF
    This paper is an attempt to present disclosive ethics as a framework for computer and information ethics � in line with the suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful politics since information technology is an opaque technology � i.e. relatively closed to scrutiny. It presents the design of technology as a process of closure in which design and use decisions become black-boxed and progressively enclosed in increasingly complex sociotechnical networks. It further argues for a disclosive ethics that aims to disclose the nondisclosure of politics by claiming a place for ethics in every actual operation of power � as manifested in actual design and use decisions and practices. It also proposes that disclosive ethics would aim to trace and disclose the intentional and emerging enclosure of politics from the very minute technical detail through to social practices and complex social-technical networks. The paper then proceeds to do a disclosive analysis of facial recognition systems. This analysis discloses that seemingly trivial biases in recognition rates of FRSs can emerge as very significant political acts when these systems become used in practice

    El pensamiento filosófico del Dr. Sisto Terán

    Get PDF
    Fil: Introna, Ana María

    El pensamiento ético-filosófico de Rafael Virasoro

    Get PDF
    Fil: Introna, Ana María. Universidad Nacional de Cuyo. Facultad de Filosofía y Letra

    Frente a la muerte del Doctor Rafael Virasoro

    Get PDF
    Fil: Introna, Ana María. Universidad Nacional de Cuyo. Facultad de Filosofía y Letra

    Learning lessons from evaluating eGovernment: Reflective case experiences that support transformational government

    Get PDF
    Central Government strategy of e-inclusion is being manifested in the form of eGovernment. Given that it is the public purse that funds such investments, there is increasingly attention being paid to the evaluation of these investments, such that value for money and organisation learning can be realised. In this paper the authors report the findings from three interpretive in-depth organisational case studies that explore eGovernment evaluation within a UK public sector setting. The paper elicits insights to organisational and managerial aspects with the purpose of improving knowledge and understanding of eGovernment evaluation. The findings that are extrapolated from the case study analysis are presented in terms of lessons that gravitate around social factors, evaluation, adoption, ownership, prioritisation sponsorship and, responsibility. These lessons are extrapolated from the empirical enquiry to improve eGovernment evaluation practice. The paper concludes that eGovernment evaluation is an under developed area, with most work being developmental in nature and as a result calls for decision makers to engage with the eGovernment agenda and commission eGovernment evaluation exercises to improve evaluation practice such that transformational Government can realise its full potential. The paper ends by highlighting political, economic, technical and social issues as the drivers of the evaluation cycle

    Catching the flu: Syndromic surveillance, algorithmic governmentality and global health security

    Get PDF
    How do algorithms shape the imaginary and practice of security? Does their proliferation point to a shift in the political rationality of security? If so, what is the nature and extent of that shift? This article explores these questions in relation to global health security. Prompted by an epidemic of new infectious disease outbreaks – from HIV, SARS and pandemic flu, through to MERS and Ebola – many governments are making health security an integral part of their national security strategies. Algorithms are central to these developments because they underpin a number of nextgeneration syndromic surveillance systems now routinely used by governments and international organizations to rapidly detect new outbreaks globally. This article traces the origins, design and evolution of three such internet-based surveillance systems: 1) the Program for Monitoring Emerging Diseases, 2) the Global Public Health Intelligence Network, and 3) HealthMap. The article shows how the successive introduction of those three syndromic surveillance systems has propelled algorithmic technologies into the heart of global outbreak detection. This growing recourse to algorithms for the purposes of strengthening global health security, the article argues, signals a significant shift in the underlying problem, nature, and role of knowledge in contemporary security practices

    Current approaches and future perspectives on strategies for the development of personalized tissue engineering therapies

    Get PDF
    Personalized tissue engineering and regenerative medicine (TERM) therapies propose patient-oriented effective solutions, considering individual needs. Cell-based therapies, for example, may benefit from cell sources that enable easier autologous set-ups or from recent developments on IPS cells technologies towards effective personalized therapeutics. Furthermore, the customization of scaffold materials to perfectly fit a patientâ s tissue defect through rapid prototyping technologies, also known as 3D printing, is now a reality. Nevertheless, the timing to expand cells or to obtain functional in vitrotissue substitutes prior to implantation prevents advancements towards routine use upon patient´s needs. Thus, personalized therapies also anticipate the importance of creating off-the-shelf solutions to enable immediately available tissue engineered products. This paper reviews the main recent developments and future challenges to enable personalized TERM approaches and to bring these technologies closer to clinical applications.The authors wish to acknowledge the financial support of the Portuguese Foundation for Science and Technology for the post-doctoral grant (SFRH/BPD/111729/2015) and Recognize (UTAP-ICDT/CTM-BIO/0023/2014), and the project RL3 -TECT -NORTE-07-0124-FEDER-000020 co-financed by ON.2 (NSRF), through ERDF
    corecore