Please login to be able to save your searches and receive alerts for new content matching your search criteria.
There is an acknowledged global shortage in qualified and skilled cyber security practitioners, so much so that governments, employers and educational establishments are developing new routes and opportunities to encourage interest and applications from demographics that would not normally apply for cyber security roles. These demographics include women, young children and people on the autistic spectrum. The potential employment of people from this last demographic — people on the Autistic Spectrum — in cyber security roles will be the focus of this research. Two areas are of interest, the ethical considerations in employing people on the Autistic Spectrum and the identification of a strategy to support the employee and employer relationship. Both are discussed here. In Europe the shortfall is expected to be in the region of 350,000 employees by the year 2020 and in the United States the number is expected to be 1.2 million by the same date. This research looks at how specific autistic traits and strengths can be matched to cyber security vacancies and discusses ethical considerations and a potential support process. A qualitative research methodology was used to identify suitable traits and potential cyber security vacancies. Ethical principles and a proposed support process are put forward to allow potential employers and autistic employees to engage in equitable employment opportunities. The autistic demographic does indeed offer skilled and capable resources to help fill cyber security vacancies; however, work is needed to allow both sides to benefit from the opportunities.
The study of ethics in cyber security often raises more questions than it answers. A student may ask the question, “Why should I study ethics in cyber security?” As research becomes specialized and technical skill sets appreciate in value, ethical questions become more important to ask.
This chapter reviews the ethical aspects of cyber security. Ethics, in general, underscores various studies in which right is distinct from wrong. The understanding of these delineations evokes various ethical issues in cyber security, such as the morality of human behavior, policies, laws, and social structures. Considering theories of consequentialism and deontology, ethical analyses of cyber security, information privacy and ethics, and privacy issues in the digital age are performed through the use of relevant ethically-driven cyber security case studies.
Climate Change is a scientific fact, caused by rising CO2 levels. However, the reason why those emissions have risen is based on values such as greed and apathy. Those are spiritual issues and so the role of faith communities is important in combatting climate change. The most recent reports from the IPCC tell us that we have 11 years to make a rapid transition from fossil fuels to renewables. This is a transformation of society, including both personal life-style change and change at a political and commercial level. Faith communities gather every week and are in every town and village across the planet. They can connect the wealthiest boardroom with the poorest rural village impacted by climate change…
With decreasing cost of biomedical technologies, the scale of the genetic and healthcare data have exponentially increased and become available to wider audiences. Hence, privacy of patients and study participants has garnered the attention of researchers and regulators alike. Availability of genetic and health care information for uses not anticipated at the time of collection gives rise to privacy concerns such that people suffer dignitary harm when their data is used in ways they did not desire or intend, even if no concrete economic damage results. In this workshop, we explore the issues surrounding data use to advance human health from a privacy perspective. Broadly this field can be considered in two encompassing areas: (1) Ethics and regulation of privacy: The ethical and regulatory frames through which we can consider privacy, the existing regulations regarding privacy and what is on the horizon, and implementation of such ethical considerations for data with the new Common Rule. (2) Approaches to ensuring privacy using technology: The technologies that allow responsible use and sharing of data such as encryption and the quantification of privacy leakages in publicly available data through privacy attacks for better risk-assessment tools.
The sharing economy may be an opportunity to respond to real societal needs through the mutualization of resources and to encourage new communities through the democratization of power. Mutualization and democratization do not guarantee the ethical nature of this movement. Our research question is under what conditions the sharing economy can present the ethical dimensions highlighted by sharing-related literature. To answer that question, we explore the theoretical and empirical context of crowdfunding (CF) and focus on the comparative analysis of five reward- and equity-based CF platforms. This study emphasizes the conditions needed for ethical CF and, more generally, for an ethical sharing economy: the possibility to give gratuitously; the pursuit of a societal purpose; cooperation within and between groups of actors; long-term stability of spaces and times dedicated to cooperation; virtual and possibly physical arenas of cooperation; and people dedicated to cooperation.
Entrepreneurial firms, which include the new-age start-ups and an emerging era of Small and Medium Enterprises (SMEs), have a central role to play in the economic growth of a country. Moreover, they have a central role in the economy and are imperative for employment generation and boosting technological advancement. It is well established that the management of established large-sized firms is significantly different from the challenges faced in the management of the small-sized entrepreneurial firms. Also, out of the numerous factors that influence the growth of SMEs and start-ups, one of the key differentiating factors is the leadership and the team/people that drive organisational growth. It has been seen that attracting, hiring and retaining key employees has always been challenging for any organisation, but in the case of small-scale entrepreneurial firms, it is even more daunting. In the context of this, the objective of the present chapter is to develop a framework for understanding the factors that affect employee retention in entrepreneurial firms using a systematic literature review. This chapter is an effort to find evidence from the past that indicates the factors affecting the employee retention in entrepreneurial firms. The findings from this study suggested that the HR policies can play the major role in retention practices.
Innovations in human-centered biomedical informatics are often developed with the eventual goal of real-world translation. While biomedical research questions are usually answered in terms of how a method performs in a particular context, we argue that it is equally important to consider and formally evaluate the ethical implications of informatics solutions. Several new research paradigms have arisen as a result of the consideration of ethical issues, including but not limited for privacy-preserving computation and fair machine learning. In the spirit of the Pacific Symposium on Biocomputing, we discuss broad and fundamental principles of ethical biomedical informatics in terms of Olelo Noeau, or Hawaiian proverbs and poetical sayings that capture Hawaiian values. While we emphasize issues related to privacy and fairness in particular, there are a multitude of facets to ethical biomedical informatics that can benefit from a critical analysis grounded in ethics.
Machine learning predictive analytics (MLPA) are utilized increasingly in health care, but can pose harms to patients, clinicians, health systems, and the public. The dynamic nature of this technology creates unique challenges to evaluating safety and efficacy and minimizing harms. In response, regulators have proposed an approach that would shift more responsibility to MLPA developers for mitigating potential harms. To be effective, this approach requires MLPA developers to recognize, accept, and act on responsibility for mitigating harms. In interviews of 40 MLPA developers of health care applications in the United States, we found that a subset of ML developers made statements reflecting moral disengagement, representing several different potential rationales that could create distance between personal accountability and harms. However, we also found a different subset of ML developers who expressed recognition of their role in creating potential hazards, the moral weight of their design decisions, and a sense of responsibility for mitigating harms. We also found evidence of moral conflict and uncertainty about responsibility for averting harms as an individual developer working in a company. These findings suggest possible facilitators and barriers to the development of ethical ML that could act through encouragement of moral engagement or discouragement of moral disengagement. Regulatory approaches that depend on the ability of ML developers to recognize, accept, and act on responsibility for mitigating harms might have limited success without education and guidance for ML developers about the extent of their responsibilities and how to implement them.
This chapter explores the concepts of ethics, morals and social responsibility from organisational and societal perspectives covering both marketing that is focused on profit and marketing focused on bringing about social benefit. It discusses the meanings of social responsibility from different paradigmatic viewpoints and highlights the advantages and limitations of particular approaches. The chapter also considers some aspects of legal and regulatory frameworks and the potential for the development of codes of conduct for socially responsible for-profit marketing and social marketing. The discussion is positioned in a global context and is grounded by intercultural considerations and the diversity of ethical perspectives and norms across cultures.
This chapter unpacks the challenges faced in marketing sustainable fashion products within an industry fuelled by perpetual reinvention and growth. In recent decades, the fashion industry, but most notably fast fashion, has been mired in controversies ranging from environmental sustainability to the exploitation of cheap labour and disregard for workers’ health and safety. In parallel, increasing consumer demand has emerged for sustainable fashion options, which has led to a rapidly growing but diverging market. Adopting the three R’s — Reduce, Reuse and Recycle — this chapter explores the complexities involved in (1) the promotion of reduced consumption and demarketing, (2) the rising popularity of second-hand/vintage clothing, fashion libraries and the use of deadstock fabrics, and (3) recycling and upcycling. Barriers faced by marketers in promoting these more sustainable options are examined in considering paths forward to more sustainable practices.
Insofar as phenomenal affect and self-awareness imply a capacity for suffering, the position of an AI system that is conscious and that, furthermore, is constrained to obey its human “masters” is precisely equivalent to that of a slave. Unfortunately, given the presumed functional advantages conferred by consciousness in learning and in the control of behavior, it is likely that conscious AI systems will be developed and deployed by corporate entities, which typically have little or no regard for the ethical consequences of their ventures. Both for humans, who are subjected to preventable suffering by the very nature of the dominant political-economic system of capitalism, and for conscious machines, if they indeed become a reality, the only hope for bettering their fate lies in promoting universal solidarity and class-consciousness aimed at eventual liberation.
Large Language Models (LLMs) are a type of artificial intelligence that has been revolutionizing various fields, including biomedicine. They have the capability to process and analyze large amounts of data, understand natural language, and generate new content, making them highly desirable in many biomedical applications and beyond. In this workshop, we aim to introduce the attendees to an in-depth understanding of the rise of LLMs in biomedicine, and how they are being used to drive innovation and improve outcomes in the field, along with associated challenges and pitfalls.
This report presents an overview about the themes of the Topic Study Group 57 on the diversity of theories in mathematics education. Main topics, which were addressed, are the networking of theories in theories related to the use of technology, to design research and beyond. The program, format, contributions, discussions and the main results as well as some future implications are presented.
The objective of this chapter is a holistic view of aesthetics, ethics, and neuroaesthetics. After a few introductory case studies, aesthetics is systematically introduced as a philosophical subdiscipline. This perspective is then expanded from aesthetics to neuroaesthetics. Using various art forms as well as current media formats, the aspects of beauty and ugliness are discussed, and aesthetic properties are expanded to include ethical implications. These can be expressed through ideals of beauty and the compulsion for body transformation. This perspective is then expanded from aesthetics to neuroaesthetics. From this point of view of art, the so-called golden ratio will play a central role. It is shown how representations affect people and what ethical implications are associated with the effects. Therefore, this chapter first has to look at art from the perspective of neuroaesthetics and then consider the ethical aspects of the beautiful and the ugly. The considerations lead to a brief discussion of Socrates’s three sieves.
In this chapter, the humane use of animals in surgical research is described, with reference to Russell and Burch's The Principles of Humane Experimental Technique (1992) — commonly known as the 3R's of replacement, reduction, and refinement — as well as the ethical need for researchers to justify the experiment and take responsibility for the well-being of animals in their care. The basic role of animal ethics committees is also discussed. The chapter then describes in practical terms the preparation of the experimental animal for surgery; the techniques for anesthesia, including knock-down, intubation, and maintenance; and the drugs used for premedication before anesthesia, maintenance of anesthesia, and, most importantly, pre-emptive and postoperative pain relief. The monitoring of the experimental animal under anesthesia and during recovery is also discussed.
Studies in information security policy compliance (ISPC) have used a number of behavioral theories from criminology, public health, and economics research to understand why individuals inside organizations commit security policy violations. These theories and empirical studies have broadened our understanding of some of the most prevalent and most difficult to address causes of information security incidents: non-malicious and malicious acts of policy violations. However, there are a number of issues with current studies and certain observations that may be fruitful to address, both for future research as well as for practitioners in organizations. In this chapter, I summarize some of the major behavioral frameworks used in ISPC research, indicating the main causal variables studied, the results of these investigations, as well as practical implications for organizations. Given that many of the studies that adopt a rational actor perspective and a cost–benefit calculus have not obtained consistent results, I suggest a set of variables and behavioral effects that highlight how individuals commit a plethora of non-rational acts in their day-to-day activities, and that this basic understanding of human biases may be fruitful in the information security context. Moreover, I point to methodological challenges regarding self-reported studies and the problem of non-malicious acts being mixed with malicious acts. Lastly, I identify ethical challenges in controlling employee behavior and the importance of understanding behavioral ethics in the information security context and organizational settings.
This article sketches an ethics of (financial) speculation in futures markets. (1) It identifies an intentionalistic fallacy prevalent in moral criticisms of speculation in general and of financial speculation in particular. (2) It scrutinizes the degree to which the recent debate on financial speculation with agricultural commodities follows the general pattern of moral criticism and its intentionalistic fallacy. (3) It then provides a theoretical and empirical in-depth analysis of long-only index funds' engagement in futures markets and concludes that moral criticisms which put them in the pillory as “hungermakers” are unjust(ified). This proves that ethics, understood as a theory of morality, can criticize moral criticisms of financial speculation on moral grounds. (4) Finally, this article discusses the option of interdisciplinary cooperation between ethics and economics.
Gamification found acceptance as an intriguing business tool, especially in the marketing domain wherein game-like processes encourage human engagement with products or services. Several studies have highlighted various uses of gamified approaches not only in marketing but also in other domains. However, what is unexplored is the “dark side” of gamification for various users across various businesses. Though gamification incentivizes customers to repeatedly play for more chances to win, it is covert in nature, which can lead to stress or strain on individuals and may have a huge impact in terms of ethics, privacy, and health monitoring on the users. As gamification engages users on psychological levels, it can be associated with privacy invasion, social overload, and negative health conditions, thereby revealing shocking exhaustion scenarios. These have huge ethical, privacy, surveillance, and monitoring impacts as gamification is in a way manipulating human minds and continuously keeping people addicted to an opaque and nonexistent world for materialistic benefits and pleasure. This chapter explores the impact of the false transparency creation, unethical interactions, and worst-case scenarios that gamification can cause. This can have huge ramifications on human beings as gamified systems are really complex processes. This chapter further highlights that businesses need to understand their limitations before gamification becomes a more powerful psychological tool with serious consequences, including life-threatening ones, for its users.
Large language models (LLMs) and biomedical annotations have a symbiotic relationship. LLMs rely on high-quality annotations for training and/or fine-tuning for specific biomedical tasks. These annotations are traditionally generated through expensive and time-consuming human curation. Meanwhile LLMs can also be used to accelerate the process of curation, thus simplifying the process, and potentially creating a virtuous feedback loop. However, their use also introduces new limitations and risks, which are as important to consider as the opportunities they offer. In this workshop, we will review the process that has led to the current rise of LLMs in several fields, and in particular in biomedicine, and discuss specifically the opportunities and pitfalls when they are applied to biomedical annotation and curation.