Are Neuroethicists Confident That the Neural Device Industry Incorporate Ethical Concerns into the Design Process? Is Everything for Sale Even Highly Sensitive Data?

2021 ◽  
Vol 13 (1) ◽  
pp. 57-60
Author(s):  
Eman Sharawy
2018 ◽  
Vol 4 ◽  
Author(s):  
Sebastiano A. Piccolo ◽  
Sune Lehmann ◽  
Anja Maier

Design processes require the joint effort of many people to collaborate and work on multiple activities. Effective techniques to analyse and model design processes are important for understanding organisational dynamics, for improving collaboration, and for planning robust design processes, reducing the risk of rework and delays. Although there has been much progress in modelling and understanding design processes, little is known about the interplay between people and the activities they perform and its influence on design process robustness. To analyse this interplay, we model a large-scale design process of a biomass power plant with $100+$ people and ${\sim}150$ activities as a bipartite network. Observing that some people act as bridges between activities organised to form nearly independent modules, in order to evaluate process fragility, we simulate random failures and targeted attacks to people and activities. We find that our process is more vulnerable to attacks to people rather than activities. These findings show how the allocation of people to activities can obscure an inherent fragility, making the process highly sensitive and dependent on specific people. More generally, we show that the behaviour of robustness is determined by the degree distributions, the heterogeneity of which can be leveraged to improve robustness and resilience to cascading failures. Overall, we show that it is important to carefully plan the assignment of people to activities.


2020 ◽  
Vol 22 (2) ◽  
pp. 34-51
Author(s):  
Manar Abu Talib ◽  
Areej Alsaafin ◽  
Selma Manel Medjden

Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introduced to evaluate software quality in various fields. The banking sector is one of the most critical sectors, as it deals with highly sensitive data; it therefore requires an accurate and effective assessment of software quality. In this article, two pieces of banking software are compared: one open source and one closed source. A new quality in use model, inspired by ISO/IEC 25010, is used to ensure concise results in the comparison. The results obtained show the great potential of OSS, especially in the banking field.


Author(s):  
George Leal Jamil ◽  
Alexis Rocha da Silva

Users' personal, highly sensitive data such as photos and voice recordings are kept indefinitely by the companies that collect it. Users can neither delete nor restrict the purposes for which it is used. Learning how to machine learning that protects privacy, we can make a huge difference in solving many social issues like curing disease, etc. Deep neural networks are susceptible to various inference attacks as they remember information about their training data. In this chapter, the authors introduce differential privacy, which ensures that different kinds of statistical analysis don't compromise privacy and federated learning, training a machine learning model on a data to which we do not have access to.


Author(s):  
Manar Abu Talib ◽  
Areej Alsaafin ◽  
Selma Manel Medjden

Open source software (OSS) has recently become very important due to the rapid expansion of the software industry. In order to determine whether the quality of the software can achieve the intended purposes, the components of OSS need to be assessed as they are in closed source (conventional) software. Several quality in-use models have been introduced to evaluate software quality in various fields. The banking sector is one of the most critical sectors, as it deals with highly sensitive data; it therefore requires an accurate and effective assessment of software quality. In this article, two pieces of banking software are compared: one open source and one closed source. A new quality in use model, inspired by ISO/IEC 25010, is used to ensure concise results in the comparison. The results obtained show the great potential of OSS, especially in the banking field.


Proceedings ◽  
2019 ◽  
Vol 21 (1) ◽  
pp. 17
Author(s):  
Alberto Pedrouzo-Ulloa ◽  
Miguel Masciopinto ◽  
Juan Ramón Troncoso-Pastoriza ◽  
Fernando Pérez-González

Photoresponse Non-Uniformity (PRNU) is becoming particularly relevant within digital media forensics, as a means to effectively determine the source camera of a given image. Most of the practical applications in digital media forensics involve dealing with highly sensitive data whose content must be protected. In this context, several secure frameworks have been proposed to perform PRNU-based camera attribution while preserving the privacy of both the testing images and the PRNU fingerprint. The two most recent and relevant ones, independently proposed in 2018, are (a) Mohanty et al.’s, who combine the use of a trusted environment (ARM TrustZone) to compute the PRNU fingerprint, with the Boneh-Goh-Nissim (BGN) cryptosystem to perform the matching, and (b) Pedrouzo-Ulloa et al.’s, who propose a more flexible solution which can be fully implemented on a general purpose architecture and does not require access to a trusted environment. In this work, we revisit the existing frameworks and propose a general formulation for PRNU matching based on lattice cryptosystems which improves on the BGN-based solution in terms of efficiency, flexibility and privacy.


2008 ◽  
Vol 2008 ◽  
pp. 1-9
Author(s):  
Nicolas Anciaux ◽  
Morgane Berthelot ◽  
Laurent Braconnier ◽  
Luc Bouganim ◽  
Martine De la Blache ◽  
...  

Electronic health record (EHR) projects have been launched in most developed countries to increase the quality of healthcare while decreasing its cost. The benefits provided by centralizing the healthcare information in database systems are unquestionable in terms of information quality, availability, and protection against failure. Yet, patients are reluctant to give to a distant server the control over highly sensitive data (e.g., data revealing a severe or shameful disease). This paper capitalizes on a new hardware portable device, associating the security of a smart card to the storage capacity of a USB key, to give back to the patient the control over his medical data. This paper shows how this device can complement a traditional EHR server to (1) protect and share highly sensitive data among trusted parties and (2) provide a seamless access to the data even in disconnected mode. The proposed architecture is experimented in the context of a medicosocial network providing medical care and social services at home for elderly people.


REVISTARQUIS ◽  
2016 ◽  
Vol 5 (1) ◽  
Author(s):  
Santiago Barrantes

Presentación El proyecto académico TEATRO PARA LA VIDA obtuvo una mención honorífica del Concurso de Diseño Arquitectónico (Exponer[NOS]) organizado por la Asociación de Estudiantes de Arquitectura (AEDA) de la Universidad de Costa Rica en mayo del 2016. Este proyecto fue realizado en el Taller de Diseño 9 (2015) de la opción ARKHTEK, esta opción parte de una metodología pedagógica, planteando el proceso de diseño y el desarrollo del proyecto arquitectónico en cuatro etapas: prediseño, investigación, diseño, reajuste y presentación. TEATRO PARA LA VIDA es una buena respuesta de ese proceso. Este proyecto está lleno de una alta sensibilidad en el tratamiento de sus espacios, en el uso de sus materiales y en una relación con el contexto de un profundo respeto.PresentationThe project “TEATRO PARA LA VIDA” won honorable mention in the Architectural Design Competition (Exponer[NOS]) organized by the Association of Students of Architecture (AEDA) of the University of Costa Rica in May of 2016. This project was designed in Level 9 Design Workshop organized by ARKHTEK, which utilizes a design process divided into four phases: predesign, research, design and presentation. “TEATRO PARA LA VIDA” is a good example of this process, with a highly sensitive treatment of space, use of materials and respectful relationship with its context.


2018 ◽  
Vol 44 (9) ◽  
pp. 589-592 ◽  
Author(s):  
Quinn Grundy ◽  
Katrina Hutchison ◽  
Jane Johnson ◽  
Brette Blakely ◽  
Robyn Clay-Wlliams ◽  
...  

Despite concerns about the relationships between health professionals and the medical device industry, the issue has received relatively little attention. Prevalence data are lacking; however, qualitative and survey research suggest device industry representatives, who are commonly present in clinical settings, play a key role in these relationships. Representatives, who are technical product specialists and not necessarily medically trained, may attend surgeries on a daily basis and be available to health professionals 24 hours a day, 7 days a week, to provide advice. However, device representatives have a dual role: functioning as commissioned sales representatives at the same time as providing advice on approaches to treatment. This duality raises the concern that clinical decision-making may be unduly influenced by commercial imperatives. In this paper, we identify three key ethical concerns raised by the relationship between device representatives and health professionals: (1) impacts on healthcare costs, (2) the outsourcing of expertise and (3) issues of accountability and informed consent. These ethical concerns can be addressed in part through clarifying the boundary between the support and sales aspects of the roles of device representatives and developing clear guidelines for device representatives providing support in clinical spaces. We suggest several policy options including hospital provision of expert support, formalising clinician conduct to eschew receipt of meals and payments from industry and establishing device registries.


An ever-increasing usage of internet from simple data transmission to highly sensitive data storage has given rise to the need to establish techniques for securing such transactions. Cryptography has been widely used in recent decades to provide protection for the Internet data, although mainly used in the diplomatic and military societies. These regularities have made randomness in data processing a key element for security. The generation of random numbers is a subject which continues to interest the researchers since several decades. Chaos theory is one such approach to demonstrate the randomness of the data in Cryptosystems. Chaotic circuits have been used in this paper to produce different multiple keys to be used for both text and voice encryption. The significant difference in the initial constraints of chaotic circuits is seen to produce entirely different keys and cipher text.


1990 ◽  
Vol 140 ◽  
pp. 255-256
Author(s):  
A.M. Magalhães ◽  
N. Loiseau ◽  
C.V. Rodrigues ◽  
V. Piirola

The present status of an ongoing observational program to study the magnetic field structure of the SMC by means of optical polarimetry is presented. Being the SMC more distant than the LMC, the observed optical polarization would mainly originate in the distorted outer layers in the front side of the SMC. Highly sensitive data obtained up to now show a magnetic field aligned with the HI bridge connecting the SMC with the LMC, revealing one of the few detected intergalactic magnetic fields associated with interacting galaxies.


Sign in / Sign up

Export Citation Format

Share Document