Results for 'Healthcare Network Security Solutions'

984 found
Order:
  1.  30
    Review of Ezekiel J. Emanuel. Healthcare Guaranteed: a Simple, Secure Solution for America.1. [REVIEW]Joseph White - 2008 - American Journal of Bioethics 8 (12):67-68.
  2.  12
    Book Review: A Second Opinion: Rescuing America's Health Care, Healthcare, Guaranteed: A Simple, Secure Solution for AmericaA Second Opinion: Rescuing America's Health Care. ByRelmanArnold S. . New York: Public Affairs. 2007. 224 pp. $24.Healthcare, Guaranteed: A Simple, Secure Solution for America. ByEmanuelEzekiel J., New York: Public Affairs. 2008. 240 pp. $14.95. [REVIEW]Martin D. Merry - 2009 - Inquiry: The Journal of Health Care Organization, Provision, and Financing 46 (1):112-113.
    It is appropriate to review these two works together, since each is fundamentally addressing the issue of what the authors agree is urgently needed health care reform. However, these authors come at this issue from different perspectives, which are both individually informative and complementary when taken together.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  31
    Securing NEMO Using a Bilinear Pairing-Based 3-Party Key Exchange (3PKE-NEMO) in Heterogeneous Networks.Vikram Raju Reddicherla, Umashankar Rawat & Kumkum Garg - 2020 - Foundations of Science 25 (4):1125-1146.
    NEMO means Network Mobility which is the extension of Mipv6 and it is invented for accessing internet for the group of people when they are travelling in Vehicle as Network group. During handoff while exchanging Binding Updates between the Mobile Network Node, Correspondent Node and Home Agent, many security threats are present during those messages exchange. It may prone to several standard malicious attacks on the BU and Binding Acknowledgement. An efficient end-to-end security method is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Transparency and the Black Box Problem: Why We Do Not Trust AI.Warren J. von Eschenbach - 2021 - Philosophy and Technology 34 (4):1607-1622.
    With automation of routine decisions coupled with more intricate and complex information architecture operating this automation, concerns are increasing about the trustworthiness of these systems. These concerns are exacerbated by a class of artificial intelligence that uses deep learning, an algorithmic system of deep neural networks, which on the whole remain opaque or hidden from human comprehension. This situation is commonly referred to as the black box problem in AI. Without understanding how AI reaches its conclusions, it is an open (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  5. Intelligent Multimedia Solutions and Security in the Next Generation Mobile Information Systems-Conversion Scheme for Reducing Security Vulnerability in IPv4/IPv6 Networks. [REVIEW]Do Hyeon Lee & Jeom Goo Kim - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 564-571.
  6.  25
    Patients’ moral views on coercion in mental healthcare.Reidun Norvoll & Reidar Pedersen - 2018 - Nursing Ethics 25 (6):796-807.
    Background: Coercion in mental healthcare has led to ethical debate on its nature and use. However, few studies have explicitly explored patients’ moral evaluations of coercion. Aim: The purpose of this study is to increase understanding of patients’ moral views and considerations regarding coercion. Research design: Semi-structured focus-group and individual interviews were conducted and data were analysed through a thematic content analysis. Participants and research context: A total of 24 adult participants with various mental health problems and experiences with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  22
    Healthcare professionals under pressure in involuntary admission processes.Susanne van den Hooff, Carlo Leget & Anne Goossensen - 2015 - Nursing Philosophy 16 (4):177-186.
    The main objective of this paper is to describe how quality of care may be improved during an involuntary admission process of patients suffering from Korsakoff's syndrome. It presents an empirically grounded analysis with different perspectives on ‘doing good’ during this process. Family carers', healthcare professionals' and legal professionals' ways of understanding and ordering this problematic situation appear very different. This could prevent patients from getting the proper care they need, with risk of more suffering and quality of life (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  9
    5G Security Features, Vulnerabilities, Threats, and Data Protection in IoT and Mobile Devices: A Systematic Review.Alexandre Sousa & Manuel J. C. S. Reis - forthcoming - Evolutionary Studies in Imaginative Culture:414-427.
    The evolution of wireless communications, from the first to the fifth generation, has driven Internet of Things (IoT) advancements. IoT is transforming sectors like agriculture, healthcare, and transportation, but also presents challenges like spectrum bandwidth demand, speed requirements, and security issues. IoT environments, with embedded sensors and actuators, connect to other devices to transmit and receive data over the internet. These data are processed locally or in the cloud, enabling decision-making and automation. Various wireless technologies, including Bluetooth, Zigbee, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  80
    How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone - 2009 - Artificial Intelligence and Law 17 (1):1-30.
    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  10.  21
    GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli, Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
    Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  16
    Resilience and Protection of Health Care and Research Laboratory Workers During the SARS-CoV-2 Pandemic: Analysis and Case Study From an Austrian High Security Laboratory.Martina Loibner, Paul Barach, Stella Wolfgruber, Christine Langner, Verena Stangl, Julia Rieger, Esther Föderl-Höbenreich, Melina Hardt, Eva Kicker, Silvia Groiss, Martin Zacharias, Philipp Wurm, Gregor Gorkiewicz, Peter Regitnig & Kurt Zatloukal - 2022 - Frontiers in Psychology 13.
    The SARS-CoV-2 pandemic has highlighted the interdependency of healthcare systems and research organizations on manufacturers and suppliers of personnel protective equipment and the need for well-trained personnel who can react quickly to changing working conditions. Reports on challenges faced by research laboratory workers are rare in contrast to the lived experience of hospital health care workers. We report on experiences gained by RLWs who significantly contributed to combating the pandemic under particularly challenging conditions due to increased workload, sickness and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  28
    Gauging public opinion of AI and emotionalized AI in healthcare: findings from a nationwide survey in Japan.Peter A. Mantello, Nader Ghotbi, Manh-Tung Ho & Fuminobu Mizutani - forthcoming - AI and Society:1-15.
    With the intensifying shortage of care-providers and mounting financial burden of an aging population in Japan, artificial intelligence (AI) offers a potential solution through AI-driven robots, chatbots, smartphone apps, and other AI medical services. Yet Japanese acceptance of medical AI, especially patient care, largely depends on the degree of ‘humanness’ that can be integrated into intelligent technologies. As empathy is considered a core value in the practice of healthcare workers, artificially intelligent agents must have the ability to perceive human (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  33
    Ethical, Legal and Social Issues of Digital Phenotyping as a Future Solution for Present-Day Challenges: A Scoping Review.Ana Tomičić, Anamaria Malešević & Anto Čartolovni - 2021 - Science and Engineering Ethics 28 (1):1-25.
    Digital phenotyping represents an avenue of consideration in patients' self-management. This scoping review aims to explore the trends in the body of literature on ethical, legal, and social challenges relevant to the implementation of digital phenotyping technologies in healthcare. The study followed the PRISMA-ScR methodology :467–473, 2018. https://doi.org/10.7326/M18-0850). The review systematically identified relevant literature, characterised the discussed technology, explored its impacts and the proposed solutions to identified challenges. Overall, the literature, perhaps unsurprisingly, concentrates on technical rather than ethical, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  21
    Ethics in Health Information Technology Problems and Solutions.Sabatini Monatesti, David S. Dinhofer, Peter Bachman & Joseph P. Lyons - 2016 - Ethics in Biology, Engineering and Medicine 7 (1-2):73-89.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  95
    Identification of efficient COVID-19 diagnostic test through artificial neural networks approach − substantiated by modeling and simulation.Rabia Afrasiab, Asma Talib Qureshi, Fariha Imtiaz, Syed Fasih Ali Gardazi & Mustafa Kamal Pasha - 2021 - Journal of Intelligent Systems 30 (1):836-854.
    Soon after the first COVID-19 positive case was detected in Wuhan, China, the virus spread around the globe, and in no time, it was declared as a global pandemic by the WHO. Testing, which is the first step in identifying and diagnosing COVID-19, became the first need of the masses. Therefore, testing kits for COVID-19 were manufactured for efficiently detecting COVID-19. However, due to limited resources in the densely populated countries, testing capacity even after a year is still a limiting (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  20
    Symbiont effector‐guided mapping of proteins in plant networks to improve crop climate stress resilience.Laura Rehneke & Patrick Schäfer - 2024 - Bioessays 46 (4):2300172.
    There is an urgent need for novel protection strategies to sustainably secure crop production under changing climates. Studying microbial effectors, defined as microbe‐derived proteins that alter signalling inside plant cells, has advanced our understanding of plant immunity and microbial plant colonisation strategies. Our understanding of effectors in the establishment and beneficial outcome of plant symbioses is less well known. Combining functional and comparative interaction assays uncovered specific symbiont effector targets in highly interconnected plant signalling networks and revealed the potential of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  40
    Network security situation awareness forecasting based on statistical approach and neural networks.Pavol Sokol, Richard Staňa, Andrej Gajdoš & Patrik Pekarčík - 2023 - Logic Journal of the IGPL 31 (2):352-374.
    The usage of new and progressive technologies brings with it new types of security threats and security incidents. Their number is constantly growing.The current trend is to move from reactive to proactive activities. For this reason, the organization should be aware of the current security situation, including the forecasting of the future state. The main goal of organizations, especially their security operation centres, is to handle events, identify potential security incidents, and effectively forecast the (...) security situation awareness (NSSA). In this paper, we focus on increasing the efficiency of utilization of this part of cybersecurity. The paper’s main aim is to compare selected statistical models and models based on neural networks to find out which models are more suitable for NSSA forecasting. Based on the analysis provided in this paper, neural network methods prove a more accurate alternative than classical statistical prediction models in NSSA forecasting. In addition, the paper analyses the selection criteria and suitability of time series, which do not only reflect information about the total number of security events but represent a category of security event (e.g. recon scanning), port or protocol. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  64
    Dealing with Legal Conflicts in the Information Society. An Informational Understanding of Balancing Competing Interests.Massimo Durante - 2013 - Philosophy and Technology 26 (4):437-457.
    The present paper aims at addressing a crucial legal conflict in the information society: i.e., the conflict between security and civil rights, which calls for a “fine and ethical balance”. Our purpose is to understand, from the legal theory viewpoint, how a fine ethical balance can be conceived and what the conditions for this balance to be possible are. This requires us to enter in a four-stage examination, by asking: (1) What types of conflict may be dealt with by (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  29
    Conscientious refusal in healthcare: the Swedish solution.Christian Munthe - 2017 - Journal of Medical Ethics 43 (4):257-259.
    The Swedish solution to the legal handling of professional conscientious refusal in healthcare is described. No legal right to conscientious refusal for any profession or class of professional tasks exists in Sweden, regardless of the religious or moral background of the objection. The background of this can be found in strong convictions about the importance of public service provision and related civic duties, and ideals about rule of law, equality and non-discrimination. Employee's requests to change work tasks are handled (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  53
    Alokacyjne konsekwencje wprowadzenia prywatnych dodatkowych/równoległych ubezpieczeń zdrowotnych w społeczeństwach kierujących się egoizmem, altruizmem lub zawiścią – perspektywa ekonomiczna.Christoph Sowada - 2017 - Diametros 51:90-112.
    Assessing the implementation of various instruments and solutions in a healthcare system, we cannot limit ourselves to examining their impact on the fulfillment of the criteria of justice and equity alone. Another important social objective is to maximize social welfare under the conditions of the scarcity of resources. The aim of the article is to analyze the impact on social welfare of the implementation of private insurance into the existing system of public security, with a view to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  24
    IoT network security using autoencoder deep neural network and channel access algorithm.Mustafa Musa Jaber, Amer S. Elameer & Saif Mohammed Ali - 2021 - Journal of Intelligent Systems 31 (1):95-103.
    Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information retrieval, medical analysis, traffic management, etc. These applications require continuous information to perform a specific task. At the time, various intermediate attacks such as jamming, priority violation attacks, and spectrum poisoning attacks affect communication because of the open nature of wireless communication. These attacks create security and privacy issues while making data communication. Therefore, a new method autoencoder deep neural network (AENN) is developed by considering exploratory, evasion, causative, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  40
    Networking Security in the Space of the City: Event-ful Battlespaces and the Contingency of the Encounter.Caroline Croser - 2007 - Theory and Event 10 (2).
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  25
    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q -Rung Orthopair Fuzzy COPRAS Method.Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri & Muhammad Ramzan Saeed - 2022 - Complexity 2022:1-27.
    In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. This research introduces a novel decision-making method utilizing the 2-tuple linguistic complex q-rung orthopair fuzzy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  28
    Resilient infrastructure for network security.Matthew M. Williamson - 2003 - Complexity 9 (2):34-40.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Network Security-Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication.Seong-Seob Hwang, Hyoung-joo Lee & Sungzoon Cho - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 3917--73.
    No categories
     
    Export citation  
     
    Bookmark  
  26. Responsibility and the recursion problem.Ben Davies - 2021 - Ratio 35 (2):112-122.
    A considerable literature has emerged around the idea of using ‘personal responsibility’ as an allocation criterion in healthcare distribution, where a person's being suitably responsible for their health needs may justify additional conditions on receiving healthcare, and perhaps even limiting access entirely, sometimes known as ‘responsibilisation’. This discussion focuses most prominently, but not exclusively, on ‘luck egalitarianism’, the view that deviations from equality are justified only by suitably free choices. A superficially separate issue in distributive justice concerns the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  26
    Security dilemma’ of pakistan in the context of afghanistan: A regional trilateral solution.Syed Shuja Uddin - 2016 - Journal of Social Sciences and Humanities 55 (2):89-100.
    Three inevitable realities instigate this study. Primarily, the goal of security in the region will most likely be accomplished just if as a minimum some level of cooperation is achieved between the major countries of the region. Second, Afghanistan cannot advance economically or enhance its security and administration independently without some cooperation from India and Pakistan. Third, although many strategists view the idea of Pak-India cooperation with distrust, there are many common grounds where both can gain considerable (...), governance, and economic advantages. Most of the existing studies are focused on the assumptions that how peace in the region will come. First view is about involvement of USA and European countries on one side and stake holders in Afghanistan on the other. Some believe in a trilateral pattern i.e. Western World, Afghan stake holders and Pakistan. Many also highlight the importance of support from neighboring countries like Iran, the Central Asian Republics, and China. This study highlights the significance of a trilateral solution in Afghanistan and the steps forward from this particular aspect. The possible answer to security dilemma of Pakistan in the context of Afghanistan is a solution within the region. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  12
    Book Review: Achieving Safe and Reliable Healthcare: Strategies and Solutions[REVIEW]Susan L. Abend - 2005 - Inquiry: The Journal of Health Care Organization, Provision, and Financing 42 (2):193-194.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  64
    Freedom-costs of canonical individualism: Enforced euthanasia tolerance in belgium and the problem of european liberalism.Corinna Delkeskamp-Hayes - 2006 - Journal of Medicine and Philosophy 31 (4):333 – 362.
    Belgium's policy of not permitting Catholic hospitals to refuse euthanasia services rests on ethical presuppositions concerning the secular justification of political power which reveal the paradoxical character of European liberalism: In endorsing freedom as a value (rather than as a side constraint), liberalism prioritizes first-order intentions, thus discouraging lasting moral commitments and the authority of moral communities in supporting such commitments. The state itself is thus transformed into a moral community of its own. Alternative policies (such as an explicit moral (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  64
    Power of Attorney for Research: The Need for a Clear Legal Mechanism.Ann M. Heesters, Daniel Z. Buchman, Kyle W. Anstey, Jennifer A. H. Bell, Barbara J. Russell & Linda Wright - 2017 - Public Health Ethics 10 (1).
    A recent article in this journal described practical and conceptual difficulties faced by public health researchers studying scabies outbreaks in British residential care facilities. Their study population was elderly, decisionally incapacitated residents, many of whom lacked a legally appropriate decision-maker for healthcare decisions. The researchers reported difficulties securing Research Ethics Committee approval. As practicing healthcare ethicists working in a large Canadian research hospital, we are familiar with this challenge and welcomed the authors’ invitation to join the discussion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  15
    Medical Assistance in Dying for Persons Suffering Solely from Mental Illness in Canada.Chloe Eunice Panganiban & Srushhti Trivedi - 2025 - Voices in Bioethics 11.
    Photo ID 71252867© Stepan Popov| Dreamstime.com Abstract While Medical Assistance in Dying (MAiD) has been legalized in Canada since 2016, it still excludes eligibility for persons who have mental illness as a sole underlying medical condition. This temporary exclusion was set to expire on March 17th, 2024, but was set 3 years further back by the Government of Canada to March 17th, 2027. This paper presents a critical appraisal of the case of MAiD for individuals with mental illness as the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Citizen Science and Social Innovation: Mutual Relations, Barriers, Needs, and Development Factors.Andrzej Klimczuk, Egle Butkeviciene & Minela Kerla (eds.) - 2022 - Lausanne: Frontiers Media.
    Social innovations are usually understood as new ideas, initiatives, or solutions that make it possible to meet the challenges of societies in fields such as social security, education, employment, culture, health, environment, housing, and economic development. On the one hand, many citizen science activities serve to achieve scientific as well as social and educational goals. Thus, these actions are opening an arena for introducing social innovations. On the other hand, some social innovations are further developed, adapted, or altered (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. An Introduction to Interdisciplinary Research. 2nd Revised Edition.Machiel Keestra, Anne Uilhoorn & Jelle Zandveld - 2022 - Amsterdam, Nederland: Amsterdam University Press.
    [This book replaces the - discontinued - first edition of 'Introduction to Interdisciplinary Research' (2016, by Menken & Keestra)] We are increasingly realizing that, as a result of technological developments and globalization, problems are becoming so complex that they can only be solved through cooperation between scientists from different disciplines. Healthcare, climate change, food security, globalization, and quality of life are just a few examples of issues that require scientists to work across disciplines. In many cases, extra-academic stakeholders (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  39
    Patient confidentiality and telephone consultations: time for a password.D. K. Sokol & J. Car - 2006 - Journal of Medical Ethics 32 (12):688-689.
    Although telephone consultations are widely used in the delivery of healthcare, they are vulnerable to breaches of patient confidentiality. Current guidelines on telephone consultations do not address adequately the issue of confidentiality. In this paper, we propose a solution to the problem: a password system to control access to patient information. Authorised persons will be offered the option of selecting a password which they will use to validate their request for information over the telephone. This simple yet stringent method (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  35. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   35 citations  
  36. Digital Inheritance in Web3: A Case Study of Soulbound Tokens and the Social Recovery Pallet within the Polkadot and Kusama Ecosystems.Justin Goldston, Tomer Jordi Chaffer, Justyna Osowska & Charles von Goins Ii - manuscript
    In recent years discussions centered around digital inheritance have increased among social media users and across blockchain ecosystems. As a result digital assets such as social media content cryptocurrencies and non-fungible tokens have become increasingly valuable and widespread, leading to the need for clear and secure mechanisms for transferring these assets upon the testators death or incapacitation. This study proposes a framework for digital inheritance using soulbound tokens and the social recovery pallet as a use case in the Polkadot and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  33
    Patient Privacy.Orhan Onder, Ilhan Ilkilic & Cuneyt Kucur (eds.) - 2020 - İstanbul, Türkiye: ISAR Publications.
    The sense of shame is part of human nature. What, then, is the role and significance of such a particular sensation, one that causes mental anxiety in a sick person’s weakest and the most vulnerable state? We know from historical documents going back as far as ancient Greece and Egypt that respecting patient privacy should be regarded as a moral duty for physicians in charge of treatment. However much today’s healthcare may have changed compared to centuries past, we note (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  18
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  19
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. A feeling for the algorithm: Diversity, expertise and artificial intelligence.Catherine Stinson & Sofie Vlaad - 2024 - Big Data and Society 11 (1).
    Diversity is often announced as a solution to ethical problems in artificial intelligence (AI), but what exactly is meant by diversity and how it can solve those problems is seldom spelled out. This lack of clarity is one hurdle to motivating diversity in AI. Another hurdle is that while the most common perceptions about what diversity is are too weak to do the work set out for them, stronger notions of diversity are often defended on normative grounds that fail to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  51
    Worldwide Testing and Test Security Issues: Ethical Challenges and Solutions.David F. Foster - 2010 - Ethics and Behavior 20 (3-4):207-228.
    As psychology ethics begins to become more standardized and formalized globally (e.g., Gauthier, 2007) there are still educational, political, and psychological areas that require significant discussion. For example, test security has become a global issue, as psychological tests and even college entrance and graduate school admission tests have found their way online.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  23
    The COVID-19 Pandemic and Ethics in Mexico Through a Gender Lens.Amaranta Manrique De Lara & María De Jesús Medina Arellano - 2020 - Journal of Bioethical Inquiry 17 (4):613-617.
    In Mexico, significant ethical and social issues have been raised by the COVID-19 pandemic. Some of the most pressing issues are the extent of restrictive measures, the reciprocal duties to healthcare workers, the allocation of scarce resources, and the need for research. While policy and ethical frameworks are being developed to face these problems, the gender perspective has been largely overlooked in most of the issues at stake. Domestic violence is the most prevalent form of violence against women, which (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  89
    Medical tourism: Crossing borders to access health care.Harriet Hutson Gray & Susan Cartier Poland - 2008 - Kennedy Institute of Ethics Journal 18 (2):pp. 193-201.
    In lieu of an abstract, here is a brief excerpt of the content:Medical Tourism:Crossing Borders to Access Health CareHarriet Hutson Gray (bio) and Susan Cartier Poland (bio)Traveling abroad for one's health has a long history for the upper social classes who sought spas, mineral baths, innovative therapies, and the fair climate of the Mediterranean as destinations to improve their health. The newest trend in the first decade of the twenty-first century has the middle class traveling from developed countries to those (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  44.  54
    Investigations into Information Semantics and Ethics of Computing.Gordana Dodig-Crnkovic - 2005 - Dissertation, Mälardalen
    The recent development of the research field of Computing and Philosophy has triggered investigations into the theoretical foundations of computing and information. This thesis consists of two parts which are the result of studies in two areas of Philosophy of Computing and Philosophy of Information regarding the production of meaning and the value system with applications. The first part develops a unified dual-aspect theory of information and computation, in which information is characterized as structure, and computation is the information dynamics. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  45.  26
    Battlefield Triage.Christopher Bobier & Daniel Hurst - 2024 - Voices in Bioethics 10.
    Photo ID 222412412 © US Navy Medicine | Dreamstime.com ABSTRACT In a non-military setting, the answer is clear: it would be unethical to treat someone based on non-medical considerations such as nationality. We argue that Battlefield Triage is a moral tragedy, meaning that it is a situation in which there is no morally blameless decision and that the demands of justice cannot be satisfied. INTRODUCTION Medical resources in an austere environment without quick recourse for resupply or casualty evacuation are often (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data.Georgy Ishmaev - 2020 - Philosophy and Technology 33 (3):411-432.
    This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest present solutions aimed at reorganizing data flows in the Internet of Things architectures, enabling the secure and decentralized exchange of data between network participants. However, as this paper argues, the promised benefits are counterbalanced by a significant shift towards the propertization of private data, underlying these proposals. Considering (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  25
    Decentralising the Self – Ethical Considerations in Utilizing Decentralised Web Technology for Direct Brain Interfaces.David M. Lyreskog, Hazem Zohny, Sebastian Porsdam Mann, Ilina Singh & Julian Savulescu - 2024 - Science and Engineering Ethics 30 (4):1-14.
    The rapidly advancing field of brain-computer (BCI) and brain-to-brain interfaces (BBI) is stimulating interest across various sectors including medicine, entertainment, research, and military. The developers of large-scale brain-computer networks, sometimes dubbed ‘Mindplexes’ or ‘Cloudminds’, aim to enhance cognitive functions by distributing them across expansive networks. A key technical challenge is the efficient transmission and storage of information. One proposed solution is employing blockchain technology over Web 3.0 to create decentralised cognitive entities. This paper explores the potential of a decentralised web (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48. Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  44
    Discourse Ethics and International Law.Edward Demenchonok - 2005 - Dialogue and Universalism 15 (11-12):57-84.
    This essay combines information on the recent ISUD Sixth World Congress Humanity at the Turning Point: Rethinking Nature, Culture, and Freedom and some reflections inspired by presentations and discussions at the congress. It is focused on the presentation of one of the keynote speakers, Karl-Otto Apel, entitled “Discourse Ethics, Democracy, and International Law: Toward a Globalization of Practical Reason”. Apel argued that the transcendental-pragmatic foundation of morality serves as the ultimate basis for the universal conception of law, e.g., of human (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50. An Interview with Lance Olsen.Ben Segal - 2012 - Continent 2 (1):40-43.
    continent. 2.1 (2012): 40–43. Lance Olsen is a professor of Writing and Literature at the University of Utah, Chair of the FC2 Board of directors, and, most importantly, author or editor of over twenty books of and about innovative literature. He is one of the true champions of prose as a viable contemporary art form. He has just published Architectures of Possibility (written with Trevor Dodge), a book that—as Olsen's works often do—exceeds the usual boundaries of its genre as it (...)
     
    Export citation  
     
    Bookmark  
1 — 50 / 984