scholarly journals Information management and exponencial learning in Society 5.0: foundations for an integrated system

2021 ◽  
Author(s):  
Dalbert Marques Oliveira ◽  
Patrícia Miranda Pereira

Humanity uses the information to reduce discomfort, effort, and errors. With this in mind, headphones were invented, so that the music could be heard without disturbing others; home appliances were created to reduce the effort in washing dishes or clothes, and calculating machines were developed so that human distraction would not cause an accident in calculating the weight that a bridge could support. But the information has hardly changed the certainties and doubts about which university course to take, what the individual's daily life will be like in the academic path, which includes when and what to study, what to eat and what to do in their free time. Is there a hobby that the individual could enjoy, but does not know? There is greater access to information, but many times instead of navigating this information, the individual sinks in the middle of it. In addition, teachers and students remain stuck in the curriculum, with the same menu being provided for carnivores, vegetarians or lactose intolerants. If before, students were beaten with wood in their hands and were attacked psychologically, having to learn the same as everyone else, nowadays only hands are no longer suffering from wood, at least in theory. Reducing mistakes in choosing a higher education course and the whole life that governs the academic path, can be a dream for many individuals, and software that collects enough information to learn about the individual and guide him/her on the beginning of their academic path could be an extremely useful compass. Knowing which university course to take, which discipline, among the electives, to choose, knowing the right time to get up according to the circadian cycle, what to do throughout the day, what and when to eat, are all informational outputs that utopian software could provide so as to contribute to the individual's success. But would such informational management drastically reduce the hassles, efforts, and mistakes to be made, or would it negatively affect the individual's life due to lack of experience with failure? Is the information learned from failure really necessary for success? This article starts from a brief history about information in education, analyses information management in Society 5.0, in the era of exponential technologies, and the construction of competence matrices. The goal is to start a debate about the delegation and trust in software, the management of personal information for individual success.

Author(s):  
William Bülow ◽  
Misse Wester

As information technology is becoming an integral part of modern society, there is a growing concern that too much data containing personal information is stored by different actors in society and that this could potentially be harmful for the individual. The aim of this contribution is to show how the extended use of ICT can affect the individual’s right to privacy and how the public perceives risks to privacy. Three points are raised in this chapter: first, if privacy is important from a philosophical perspective, how is this demonstrated by empirical evidence? Do individuals trust the different actors that control their personal information, and is there a consensus that privacy can and should be compromised in order to reach another value? Second, if compromises in privacy are warranted by increased safety, is this increased security supported by empirical evidence? Third, the authors will argue that privacy can indeed be a means to increase the safety of citizens and that the moral burden of ensuring and protecting privacy is a matter for policy makers, not individuals. In conclusion, the authors suggest that more nuanced discussion on the concepts of privacy and safety should be acknowledged and the importance of privacy must be seen as an important objective in the development and structure of ICT uses.


Author(s):  
Tatiana-Eleni Sinodinou

The present chapter explores privacy issues posed by the use of RFID systems and applications. The existing legal framework for data protection is analyzed in order to discover how general privacy safeguarding principles should be applied in the case of RFIDs, with special focus on the main areas which are going to experience widespread use of such applications. The structure of the chapter is based on a chronological order which follows the consecutive phases of contact and interaction between the individual and the RFID tag. The implementation of a tag to a product or in the human body establishes the first point of contact of the individual with the RFID tag. This stage of data processing is examined in the first part of the chapter. In more particular, this part deals with the application of general principles of fair processing, such as information transparency, the debate about the necessity to require the prior consent of the individual (possible opt-in and opt-out solutions) and the precondition of a clearly defined purpose of the data processing. The symbiosis of the person with the tag is examined in the second part. Indeed, privacy concerns are equally significant during the phase of processing of personal information, even if processing is conducted lawfully, either based on the legal ground of the individual’s consent or justified on another legal basis. The requirement of data quality and the obligation to secure the RFID system against unauthorized interceptions or alterations of data by third parties constitute essential guarantees of fair data processing. Privacy protection in the activation phase of the tag is also ensured by the obligation to inform the tagged individual every time a reading takes place and by the right to verify the accuracy of the tag data, whether stored from the beginning or added at a later date. Finally, the last part of the chapter examines the legal regime of separation between the person and the tag. This phase refers to the termination of the processing either by act of the data subject or by act of the RFID system controller. The focus is given to the exercise of the right to object to the processing of personal data through RFID devices. In this context practical solutions, such as the “tag kill” or “tag sleep” command should be taken into consideration in order to the make the exercise of the right to object feasible.


Hegel's Value ◽  
2021 ◽  
pp. 222-275
Author(s):  
Dean Moyar

This chapter utilizes the structure of life and valid inference to analyze the internal structure of Civil Society and the State as well as the relationship between the two institutional spheres. The chapter unpacks the passage from the Logic in which Hegel describes the State as a totality of inferences with the three terms of individuals, their needs, and the government. It is shown that the “system of needs” itself forms a quasi-living institutional system of estates centered on the division of labor. This system’s inadequacy motivates the role of the “police” and corporation as ethical agencies, forms of the Good, within Civil Society. While the move to the State overcomes the individualism of “needs,” the right of the individual remains in the dynamics of “settling one’s own account” in receiving from the State a return on one’s duty to the State. Hegel treats the State proper as a constitution consisting of three powers of government that form a totality of inferential relations that has the full structure of a living organism. The executive power is examined in detail as the particularizing element in the system.


2021 ◽  
Author(s):  
◽  
Mark Prebble

<p>This thesis considers how best to administer redistribution policies. It focuses particularly on the information needed to assess relative circumstances, the implications of the government collecting such information, and processes by which the appropriate information may be assembled and assessed. In New Zealand, as with many other OECD nations, the Government's redistribution policies are administered through a range of different agencies, with duplication in some areas and gaps in others. An integrated approach to redistribution systems may offer a means to improve equity and efficiency. Part One discusses the assessment of relative well-being, and adopts the choice set as the intellectual device for this purpose. The time period for the assessment of income is examined in detail, with the conclusion that a long period should be used except where the individual is constrained to operate under a short time horizon. A new concept of "bankability" is developed as a means of identifying those operating under such constraints. Part Two uses the philosophical foundations of the value of privacy to develop a new statement of the right to privacy, such that everyone should be protected against the requirement to divulge information, unless that information is the "business" of another party. A view on the business of the state depends on one's ideology of the state. Since it is generally accepted in New Zealand in the late twentieth century that the state has a role in redistribution, the state has some right to collect information for that purpose. However, the rights of the state are moderated by the existence of a common law tradition of respect for individuals. A set of criteria for evaluating redistribution systems is devised in Part Three. These criteria, which include consideration of the information to be collected, individual control over personal information, and administrative simplicity, are then used to identify significant weaknesses in the systems currently used in New Zealand. The main problems identified are the collection of inadequate information, duplication, and complex institutional structures; the main virtue of the current systems is that information provided is only used for the purpose for which it was provided. An alternative approach is outlined which would address the problems while retaining the current protection of privacy interests. This thesis is a mix of inter-disciplinary academic enquiry and policy development. Part One is an amalgam of economic and philosophical approaches, Part Two involves philosophy and politics, and Part Three applies the theoretical considerations to issues of public administration.</p>


2021 ◽  
Author(s):  
Dalbert Marques Oliveira

Technological artifacts, physical and digital, have occupied an increasing space in society. Through these artifacts, individuals’ access, store and share information, which may be spread across different equipment. On the other hand, through human-computer interaction, individuals use and appropriate this equipment, creating an ecology of artifacts that appears to be able to expand the physical and mental capacities of its users. In turn, the aforementioned expansion of capabilities seems to contribute to changes in the informational behavior of users of artifact ecologies during practices such as personal information management, the passage from information to knowledge, and the management of personal knowledge. However, there seems to be little literature relating concepts such as human-computer interaction through the use or appropriation of an artifact ecology, with informational behavior, and the aforementioned management of information and personal knowledge. This scarcity reduces the information available, the understanding of these relationships, and their action on the individual. That said, this work will start from a brief systematic review of the literature, to learn about recent works developed on the subject investigated. Afterward, the recovered literature will be confronted with each other, to find relationships between the concepts. The results obtained from this confrontation will contribute to informing other investigations related to the appropriation of artifact ecologies, for information management practices and personal knowledge.


2021 ◽  
Vol 4 (2) ◽  
pp. 145-157
Author(s):  
Lesya Chesnokova

The article examines the individual’s right to information privacy as an opportunity to have a non-public area of life. It is argued that a person, being a vulnerable creature, feels the need for secrecy, closeness and opacity of his or her personality. The right to information privacy does not mean complete concealment of private life, but the possibility of regulating access, when individuals can choose whom, when and to what extent to reveal the details of their lives. This presupposes both a person who feels him or herself to be an autonomous person and a society that respects his or her rights and freedoms. There is a duty of restraint and tact, which prohibits violating someone else’s privacy. As one of the aspects of privacy, in addition to the inviolability of the body and home, the human right to information protection is recognized. The theoretical foundation of the right to privacy is the philosophy of liberalism, which protects the individual from unwanted interference from the state and society. The need for private space has evolved in human history along with the growth of individualism. Currently, the right to information privacy is gaining special relevance in connection with the development of digital technologies that allow collecting, storing and processing large amounts of data. As a result, a person, on the one hand, does not know who, when and for what purpose collects his or her data, and, on the other hand, he or she often voluntarily, in connection with the need for social recognition, leaves information about him or herself on social networks. As a result of such actions, the loss of control over personal information can lead to undesirable consequences.


Author(s):  
Oleh M. Omelchuk ◽  
Mariia P. Muzyka ◽  
Mykola O. Stefanchuk ◽  
Iryna P. Storozhuk ◽  
Inna A. Valevska

The rapid spread of the Internet and communication technologies raises the issue of access to information, especially access to information via the Internet. The amount of information on the network is constantly increasing, and at the same time more and more efforts are being made to limit users' access to it to some extent. The more restrictions state bodies create in this area, the more efforts are made to circumvent or violate these prohibitions. Free access to information in a democratic society should be the rule, and restriction of this right – the exception. These restrictions should be clearly defined by law and applied only in cases where legitimate and vital interests, such as national security and privacy, need to be respected. The main purpose of this study is to consider the legal and socio-philosophical aspects of access to information. Restricting access to documents as media has been practiced since ancient times. The study highlights the existing inconsistencies and lags in the implementation of the principles of exercise of the right to information in Ukraine at the level of laws and subordinate legislation. The study classifies information according to the nature of restrictions (exercise) of constitutional rights and freedoms in the information sphere. It was discovered that the legislation of Ukraine does not systematise the list of confidential information in a single regulation in contrast to the Russian Federation and provides the main types of confidential personal information. It was found that restrictions on any freedoms and human rights, including in the information space, can be established with the help of various regulators, the dominant among which are the following levels of implementation: legal (legislative); moral self-consciousness of society; autonomy of the person. Features and spheres of action of regulators of restriction of freedoms and human rights are described. To restrict access to information, various methods are used to protect it from unauthorised receipt, which can be divided into two groups: formal and informal


Author(s):  
IDELTRUDES MENEZES BARRETO ◽  
DIMAS PEREIRA DUARTE JUNIOR ◽  
GIDELMO DOS SANTOS FONSECA

RESUMO                                                                    Este artigo objetiva analisar como o acesso as informações genéticas pode afetar diretamente o direito à privacidade, através de análise em leis e documentos que proíbem o acesso a tais informações. Tal informação deve ser feita de forma cautelosa e sigilosa, o seu uso demasiado poderá acarretar danos irreparáveis a pessoas avaliadas, e como consequência surgir à discriminação.O direito à privacidade abarcado no art. 5º do nosso texto Constitucional possui um caráter positivo dando ao indivíduo o controle de suas informações pessoais, podendo não somente impedir a sua utilização, como também definir quais as informações poderão ser utilizadas.Palavras-chave: Dados Genéticos; Direito à Privacidade; Discriminação; Informações Genéticas; Proteção.ACCESS TO WORKER'S GENETIC INFORMATION AND CONSTITUTIONAL LAW PRIVACY ABSTRACTThis article aims to analyze how access to genetic information can directly affect the right to privacy, through analysis of laws and documents that prohibit access to such information. Such information must be made in a cautious and confidential manner, its use too much may cause irreparable damage to people evaluated, and as a consequence, discrimination may arise.The right to privacy covered in art. 5 of our Constitutional text, it has a positive character giving the individual control of his personal information, which can not only prevent its use, but also define which information can be used.Keywords: Genetic data. Right to Privacy; Discrimination; Genetic Information; Protection


2018 ◽  
Vol 31 (3/4) ◽  
pp. 170-190 ◽  
Author(s):  
Marianne Kolding ◽  
Martin Sundblad ◽  
Jan Alexa ◽  
Merlin Stone ◽  
Eleni Aravopoulou ◽  
...  

Purpose The purpose of this paper is to explore very recent data about how large organizations are dealing with a shortage of information and communications technology (ICT) specialists, in terms of its implications for information management. Design/methodology/approach This paper is based on qualitative interview-based research with 11 large European companies, with an estimated ICT workforce of around 400,000 (about 14 per cent of ICT professionals in Europe), covering hiring, retention and upskilling of ICT staff, and expectations concerning graduates from European universities. These data are combined with International Data Corporation (IDC) analyst reports on the demand for different categories of ICT products and services, and data from the authors’ consulting work. Findings Larger organizations expect hiring to be a challenge, with strong competition for talent, whether from existing users or from the many rapidly digitalizing companies – digitalizing their organizations; their products and services; and their relationships with customer, suppliers and business partners. Upskilling and retraining workforces is seen by large organizations as a better approach than hiring, allowing them to create the right skills balance and retain their workers better. However, softer skills, such as communication and problem solving, are seen as just as important. ICT workers will benefit from a lifelong approach to learning, acquiring new skills and adapting existing skills. Many ICT companies have created academies for developing employee skills and certifications related to their own technologies, while the education sector has been working on creating curricula (alone or sometimes in partnerships with vendors) to improve graduate employability. Research limitations/implications The research is based on a small sample of large companies. The situation may be different in other companies and smaller organizations. Practical implications Organizations can cope with the skills shortage by anticipating and working with the market forces rather than trying to oppose them. Social implications ICT employees will show the way for employees in other sectors where skills are scarce, by demonstrating how to reinvent themselves as the skills needed change. Originality/value This paper demonstrates that employers have changed their expectations of universities. They expect less that graduates will be ICT-employment ready, and more that they will have the skills to make and keep themselves employment ready. This has significant implications for university course design.


Author(s):  
Lesya Chesnokova ◽  

The article considers the right for privacy and secrecy as an opportunity to have a life sphere hidden from the government, society and other individuals. The study is based on a holistic approach including logical, hermeneutical and comparative methods. The historical process of the origin of publicness triggered the development of legal guarantees, personal freedom, and political involvement. This was accompanied by the occurrence of the sphere of privacy where an actor is protected from state and public interventions. Whereas the public sphere is associated with openness, transparency, total accessibility, the private sphere is connoted with darkness, opacity, and closedness. The need for privacy and secrecy is determined by the human vulnerability. One of the critical components of privacy is the right of an individual for control his personal information. To protect one’s own private sphere, one puts on a social mask when speaking in public. In an intimate relationship, unlike in a public one, he voluntarily waives protection by allowing those closest to him access to personal information. The restricted private sphere is sometimes a source of apprehension and a desire to penetrate other people’s secrets, both from the totalitarian state, which seeks to suppress and unify the individual, and from curious members of society. For the purpose of retaining the social world, a person in the course of socialisation learns to respect other’s privacy, behaving discreetly and tactfully. The right for privacy and secrecy is related with freedom, dignity, and the autonomy of personality.


Sign in / Sign up

Export Citation Format

Share Document