ORCID Profile
0000-0001-7893-2973
Current Organisation
University of South Australia
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Association for Computing Machinery (ACM)
Date: 28-03-2016
Abstract: Brain-Computer Interfaces (BCIs) interpret neural activity, applying it to the control of external devices. As BCIs approach market viability, ethical implications come under consideration. This paper identifies potential privacy disruptions. BCI literature is reviewed in order to identify a BCI typology likely to support a privacy analysis. The typology describes the active, reactive, passive and hybrid types of BCI and, where possible, includes ex les that are further classified as existing, prospective or speculative. A review of privacy theory supports an analysis that juxtaposes privacy theory and BCI technologies. The analysis finds that while all four types of BCI have potential for disrupting privacy, disruptions are more likely to arise from the use of reactive, passive and hybrid BCIs. Limitations and directions for future research close the paper.
Publisher: IGI Global
Date: 2009
DOI: 10.4018/978-1-60566-010-3.CH180
Abstract: To paraphrase Winograd (1992), we bring to our communities a tacit comprehension of right and wrong that makes social responsibility an intrinsic part of our culture. Our ethics are the moral principles we use to assert social responsibility and to perpetuate safe and just societies. Moreover, the introduction of new technologies can have a profound effect on our ethical principles. The emergence of very large databases, and the associated automated data analysis tools, present yet another set of ethical challenges to consider. Socio-ethical issues have been identified as pertinent to data mining and there is a growing concern regarding the (ab)use of sensitive information (Clarke, 1999 Clifton et al., 2002 Clifton and Estivill-Castro, 2002 Gehrke, 2002). Estivill-Castro et al., discuss surveys regarding public opinion on personal privacy that show a raised level of concern about the use of private information (Estivill-Castro et al., 1999). There is some justification for this concern a 2001 survey in InfoWeek found that over 20% of companies store customer data with information about medical profile and/or customer demographics with salary and credit information, and over 15% store information about customers’ legal histories.
Publisher: Australian Journal of Information Systems
Date: 08-06-2020
Abstract: Preface to the special section of selected papers from the 8th Australasian Institute of Computer Ethics (AiCE) conference, held in Melbourne, 19-20th August, 2019.
Publisher: Australian Journal of Information Systems
Date: 08-06-2020
Abstract: Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice. Blockchain and Holochain are ex les of recently emerged technologies that were shaped by, and are now shaping of, social contexts in which economic transactions may occur. The right to be forgotten represents a compliance challenge for public and private implementations of blockchain technology. This paper describes a few of these challenges.
Publisher: Auerbach Publications
Date: 28-07-2021
Publisher: Elsevier BV
Date: 2017
Location: United Kingdom of Great Britain and Northern Ireland
No related grants have been discovered for Kirsten Wahlstrom.