Philosophy of Computing and Information

Edited by Giuseppe Primiero (Università degli Studi di Milano)
Contents
104 found
Order:
1 — 50 / 104
Material to categorize
  1. The text-building function of names and nicknames in 'Sverris saga' and 'Boglunga sogur'.Anton Zimmerling - 1994 - In Sverrir Tómasson (ed.), The Ninth International Saga Conference. The Contemporary sagas. Akureyri, 1994. Reykjavík: Stofnun Árna Magnússonar. pp. 892-906.
    This paper explores the hypothesis that proper names serve as anchors identifying the individuals in the possible or real world. This hypothesis is tested on Old Icelandic narratives. A prominent feature of Old Icelandic sagas is that the narrative matter is not quite new. A Saga is reliable iff it refers to the events relevant for its audience and accepted as true by the whole community. I argue that proper names must be regarded as references to the background knowledge of (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  2. How Nature Moves from Zero to One.Ilexa Yardley - 2024 - Medium.Com/the-Circular-Theory.
    How nature moves from zero to one? Nothing is moving.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  3. The 27 27 Matrix.Ilexa Yardley - 2024 - Medium.Com/the-Circular-Theory.
    All the world's a stage. (A 27 27 Matrix.).
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  4. The Tanglewood Trilogy.Yardley Ilexa - 2002 - Houston, Texas: Opposite Approach Publications.
    The Tanglewood Trilogy (2002) Book One: Relative Realities, Book Two: Opposite Approach, Book Three: Partial Truth. Conservation of the Circle explains General Relativity, Complementary Opposition, and 50-50 Reality (50-50 as the constant and the norm). This gives humans the basis for everything in mathematics, science, art, and athletics (symbolic systems universally). Conservation of the Circle solves the grounding problem (where the absolute is relative because the relative is absolute) because an uber-universal circular-linear relationship (technically, pi in mathematics) is the only (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5. Reliability in Machine Learning.Thomas Grote, Konstantin Genin & Emily Sullivan - 2024 - Philosophy Compass 19 (5):e12974.
    Issues of reliability are claiming center-stage in the epistemology of machine learning. This paper unifies different branches in the literature and points to promising research directions, whilst also providing an accessible introduction to key concepts in statistics and machine learning – as far as they are concerned with reliability.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6. Chương trình máy tính bayesvl trong môi trường R: Đóng góp Việt cho khoa học thế giới.Hoàng Phương Hạnh - 2019 - Khoa Học Và Phát Triển (13/06/2019).
    Mới đây, chương trình máy tính ‘bayesvl’ chạy trên môi trường R do TS. Vương Quân Hoàng và kĩ sư Lã Việt Phương (Trung tâm Nghiên cứu Xã hội Liên ngành ISR, Đại học Phenikaa) thiết kế và phát triển chính thức được ra mắt trên CRAN - hệ thống thư viện chuẩn của R...
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Một số vấn đề an ninh thông tin trọng yếu trong kỷ nguyên AI.Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - 2024 - Trang Thông Tin Điện Tử Hội Đồng Lý Luận Trung Ương.
    Trong bối cảnh các hoạt động kinh tế và xã hội ngày càng được kết nối tốt hơn thông qua IoT, và sắp tới đây là tiềm năng tích hợp AI vào hầu như mọi mặt của đời sống ở cả thế giới thực và thế giới ảo, thì không chỉ cá nhân, mà cả doanh nghiệp và quốc gia cũng sẽ phải đối mặt với các thách thức chưa từng có tiền lệ đối với rủi ro về an ninh (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  8. The Cost of Prediction.Johannes Lenhard, Simon Stephan & Hans Hasse - manuscript
    This paper examines a looming reproducibility crisis in the core of the hard sciences. Namely, it concentrates on molecular modeling and simulation (MMS), a family of methods that predict properties of substances through computing interactions on a molecular level and that is widely popular in physics, chemistry, materials science, and engineering. The paper argues that in order to make quantitative predictions, sophisticated models are needed which have to be evaluated with complex simulation procedures that amalgamate theoretical, technological, and social factors (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  9. Medical Image Classification with Machine Learning Classifier.Destiny Agboro - forthcoming - Journal of Computer Science.
    In contemporary healthcare, medical image categorization is essential for illness prediction, diagnosis, and therapy planning. The emergence of digital imaging technology has led to a significant increase in research into the use of machine learning (ML) techniques for the categorization of images in medical data. We provide a thorough summary of recent developments in this area in this review, using knowledge from the most recent research and cutting-edge methods.We begin by discussing the unique challenges and opportunities associated with medical image (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. The Use of Machine Learning Methods for Image Classification in Medical Data.Destiny Agboro - forthcoming - International Journal of Ethics.
    Integrating medical imaging with computing technologies, such as Artificial Intelligence (AI) and its subsets: Machine learning (ML) and Deep Learning (DL) has advanced into an essential facet of present-day medicine, signaling a pivotal role in diagnostic decision-making and treatment plans (Huang et al., 2023). The significance of medical imaging is escalated by its sustained growth within the realm of modern healthcare (Varoquaux and Cheplygina, 2022). Nevertheless, the ever-increasing volume of medical images compared to the availability of imaging experts. Biomedical experts (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  11. Comparative Analysis of Deep Learning and Naïve Bayes for Language Processing Task.Olalere Abiodun - forthcoming - International Journal of Research and Innovation in Applied Sciences.
    Text classification is one of the most important task in natural language processing, In this research, we carried out several experimental research on three (3) of the most popular Text classification NLP classifier in Convolutional Neural Network (CNN), Multinomial Naive Bayes (MNB), and Support Vector Machine (SVN). In the presence of enough training data, Deep Learning CNN work best in all parameters for evaluation with 77% accuracy, followed by SVM with accuracy of 76%, and multinomial Bayes with least performance of (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  12. Deep Learning Based Video Captioning through Encoder-Decoder Based Long Short-Term Memory (LSTM).Grimsby Chelsea - forthcoming - International Journal of Advanced Computer Science and Applications:1-6.
    This work demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate model generality over (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  13. The Content and Implications of Nativist Claims. A Philosophical Analysis.Riin Kõiv - 2021 - Dissertation, University of Tartu
    We often hear how scientists have discovered that a certain human trait – or a trait of another type of organism – is innate, genetic, heritable, inherited, naturally selected etc. All these claims have something in common: they all declare a trait to have significant organism internal (for instance genetic) causes that are present in the organism at its birth. I call claims like these “nativist claims”. Nativist claims are important. They shape our overall understanding of what we are, what (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Erroneous concepts of prominent scientists: C. F. Weizsäcker, J. A. Wheeler, S. Wolfram, S. Lloyd, J. Schmidhuber, and M. Vopson, resulting from misunderstanding of information and complexity.Mariusz Stanowski - 2024 - Journal of Information Science 1:9.
    The common use of Shannon’s information, specified for the needs of telecommunications, gives rise to many misunderstandings outside of this context. (e.g. in conceptions of such well-known theorists as C.F. Weizsäcker and J. A. Wheeler). This article shows that the terms of the general definition of information meet the structural information, and Shannon’s information is a special case of it. Similarly, complexity is misunderstood today as exemplified by the concepts of reputable computer scientists, such as S. Lloyd, S. Wolfram and (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  15. Character Comes from Practice: Longitudinal Practice-Based Ethics Training in Data Science.Louise Bezuidenhout & Emanuele Ratti - 2024 - In E. Hildt, K. Laas, C. Miller & E. Brey (eds.), Building Inclusive Ethical Cultures in STEM. Springer Verlag. pp. 181-201.
    In this chapter, we propose a non-traditional RCR training in data science that is grounded in a virtue theory framework. First, we delineate the approach in more theoretical detail by discussing how the goal of RCR training is to foster the cultivation of certain moral abilities. We specify the nature of these ‘abilities’: while the ideal is the cultivation of virtues, the limited space allowed by RCR modules can only facilitate the cultivation of superficial abilities or proto-virtues, which help students (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Computation and Physical Systems
  1. Ingenious Genes: How Gene Regulation Networks Evolve to Control Development.Roger Sansom - 2011 - MIT Press.
  2. Wide computationalism revisited: distributed mechanisms, parismony and testability.Luke Kersten - 2024 - Philosophical Explorations 27 (2):1-18.
    Recent years have seen a surge of interest in applying mechanistic thinking to computational accounts of implementation and individuation. One recent extension of this work involves so-called ‘wide’ approaches to computation, the view that computational processes spread out beyond the boundaries of the individual. These ‘mechanistic accounts of wide computation’ maintain that computational processes are wide in virtue of being part of mechanisms that extend beyond the boundary of the individual. This paper aims to further develop the mechanistic account of (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
Computers
  1. Resistance Money: A Philosophical Case for Bitcoin.Andrew M. Bailey, Bradley Rettler & Craig Warmke - 2024 - Routledge.
    The book develops a comprehensive and measured case that bitcoin is a net benefit to the world, despite its imperfections. Resistance Money is intended for all, from the clueless to the specialist, from the proponent to the die-hard skeptic, and everyone in between.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Taking It Not at Face Value: A New Taxonomy for the Beliefs Acquired from Conversational AIs.Shun Iizuka - forthcoming - Techné: Research in Philosophy and Technology.
    One of the central questions in the epistemology of conversational AIs is how to classify the beliefs acquired from them. Two promising candidates are instrument-based and testimony-based beliefs. However, the category of instrument-based beliefs faces an intrinsic problem, and a challenge arises in its application. On the other hand, relying solely on the category of testimony-based beliefs does not encompass the totality of our practice of using conversational AIs. To address these limitations, I propose a novel classification of beliefs that (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Implementing Computations
  1. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between cyber security (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  2. A Simulink-based software solution using the Infinity Computer methodology for higher order differentiation.Alberto Falcone, Alfredo Garro, Marat Mukhametzhanov & Yaroslav Sergeyev - 2021 - Applied Mathematics and Computation 409:article 125606.
    This paper is dedicated to numerical computation of higher order derivatives in Simulink. In this paper, a new module has been implemented to achieve this purpose within the Simulink-based Infinity Computer solution, recently introduced by the authors. This module offers several blocks to calculate higher order derivatives of a function given by the arithmetic operations and elementary functions. Traditionally, this can be done in Simulink using finite differences only, for which it is well-known that they can be characterized by instability (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  3. Simulation of hybrid systems under Zeno behavior using numerical infinitesimals.Alberto Falcone, Alfredo Garro, Marat Mukhametzhanov & Yaroslav Sergeyev - 2022 - Communications in Nonlinear Science and Numerical Simulation 111:article number 106443.
    This paper considers hybrid systems — dynamical systems that exhibit both continuous and discrete behavior. Usually, in these systems, interactions between the continuous and discrete dynamics occur when a pre-defined function becomes equal to zero, i.e., in the system occurs a zero-crossing (the situation where the function only “touches” zero is considered as the zero-crossing, as well). Determination of zero-crossings plays a crucial role in the correct simulation of the system in this case. However, for models of many real-life hybrid (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Computer Simulation
  1. Advances in Social Science, Education and Humanities Research. Proceedings of the International Conference Communicative Strategies of Information Society (CSIS 2018).Daria Bylieva & Tatiana Nam (eds.) - 2018
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  2. Representation of grossone-based arithmetic in Simulink for scientific computing.Alberto Falcone, Alfredo Garro, Marat Mukhametzhanov & Yaroslav Sergeyev - 2020 - Soft Computing 24:17525-17539.
    Numerical computing is a key part of the traditional computer architecture. Almost all traditional computers implement the IEEE 754-1985 binary floating point standard to represent and work with numbers. The architectural limitations of traditional computers make impossible to work with infinite and infinitesimal quantities numerically. This paper is dedicated to the Infinity Computer, a new kind of a supercomputer that allows one to perform numerical computations with finite, infinite, and infinitesimal numbers. The already available software simulator of the Infinity Computer (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Agent-Based Computational Economics: Overview and Brief History.Leigh Tesfatsion - 2023 - In Ragupathy Venkatachalam (ed.), Artificial Intelligence, Learning, and Computation in Economics and Finance. Cham: Springer. pp. 41-58.
    Scientists and engineers seek to understand how real-world systems work and could work better. Any modeling method devised for such purposes must simplify reality. Ideally, however, the modeling method should be flexible as well as logically rigorous; it should permit model simplifications to be appropriately tailored for the specific purpose at hand. Flexibility and logical rigor have been the two key goals motivating the development of Agent-based Computational Economics (ACE), a completely agent-based modeling method characterized by seven specific modeling principles. (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
Simulation and Reality
  1. Implications of computer science theory for the simulation hypothesis.David Wolpert - manuscript
    The simulation hypothesis has recently excited renewed interest, especially in the physics and philosophy communities. However, the hypothesis specifically concerns {computers} that simulate physical universes, which means that to properly investigate it we need to couple computer science theory with physics. Here I do this by exploiting the physical Church-Turing thesis. This allows me to introduce a preliminary investigation of some of the computer science theoretic aspects of the simulation hypothesis. In particular, building on Kleene's second recursion theorem, I prove (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  2. Zombies in the Basement? Ghosts in the Floorboards?Walter Barta - manuscript
    Do the hard problem of consciousness and the simulation argument potentially resolve each other? Here we will argue for four possible views: that consciousness may be possible only (a) outside of, (b) inside and/or outside of, (c) inside of, or (d) interfacing with simulations. The first two of these views have been developed at length by David Chalmers and are used as jumping off points to introduce and develop the latter two views here. If any one of these views could (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Simulation Argument
  1. The Garden of Simulated Delights.Daniel Story - 2023 - The Prindle Post.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Simulation Hypothesis
  1. Proof We Live in a Simulation.Phillip Angelos - manuscript
    Space Time Information (a thought experiment) proves that protein evolution is the result of computation: possibly due to a simulation.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Philosophy of Computation, Miscellaneous
Computers in Philosophy
  1. Faceless Gazes. Rhetoric and Politics of the Google Street View.Filippo Fimiani - 2023 - Paradigmi. Rivista di Critica Filosofica 41 (3):529-540.
    Potentialities of attention and distraction with respect to images are critically reprised by Neapolitan artist Domenico Antonio Mancini. In Landscapes (2019), Google Street View addresses painted on canvases take the place of outlying areas of Italian cities, and of canonical oil ‘vedute’ paintings, obliging the viewer to switch from aesthetic absorption to a multitasking, reflexive attention enabled by the tools of mobile devices and the operative agency between the displayed and depicted images. Attracted by the ephemeral, geo-localized vistas displayed on (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Databases
See also: Social Media
Big Data
  1. Wearable Technologies for Healthy Ageing: Prospects, Challenges, and Ethical Considerations.Stefano Canali, Agara Ferretti, Viola Schiaffonati & Alessandro Blasimme - 2024 - Journal of Frailty and Aging 2024:1-8.
    Digital technologies hold promise to modernize healthcare. Such opportunity should be leveraged also to address the needs of rapidly ageing populations. Against this backdrop, this paper examines the use of wearable devices for promoting healthy ageing. Previous work has assessed the prospects of digital technologies for health promotion and disease prevention in older adults. However, to our knowledge, ours is one of the first attempts to specifically address the use of wearables for healthy ageing, and to offer ethical insights for (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Data Privacy
  1. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  2. Free Internet Access as a Human Right.Merten Reglitz - 2024 - Cambridge: Cambridge University Press.
    "Merten Reglitz makes a case for a new human right to free Internet access, arguing it is crucial for protecting and advancing fundamental moral interests. He examines the risks the Internet poses to our most important rights if it is not safeguarded by public institutions"--.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  1. The Mind’s Eye: Cognitive and Applied Aspects of Eye Movement Research.H. Deubel & J. R. In Hyönä (eds.) - 2003
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  2. Pretenders to the Throne: A commentary on Alice Dreger's ‘The controversy surrounding The Man Who Would Be Queen: A case history of the politics of science, identity, and sex in the internet age’.Talia Mae Bettcher - 2008 - Archives of Sexual Behavior 7 (3):430-33.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  3. A Web of Our Own Making: The Nature of Digital Antón Barba-Kay (review). [REVIEW]Matthew Stripling - 2024 - Review of Metaphysics 77 (3):537-538.
    BARBA-KAY, Antón. A Web of Our Own Making: The Nature of Digital Formation. Cambridge: Cambridge University Press, 2023. x + 295 pp. Cloth, $29.99—This is a truly remarkable book, brimming with extensive research, penetrating insight, and poetic beauty. The book’s main theme is the cultural revolution caused by digital technology. As the book shows, we have always been shaped by our tools. With new ways of doing come new ways of being human. In this way, the digital revolution is continuous (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Using Social Influence Technique as a Tool to Reduce the Diffusion of Responsibility on the Internet.Jakub Kuś & Agata Kocimska-Bortnowska - forthcoming - Polish Psychological Bulletin:252-261.
    Diffusion of responsibility is a well-known effect widely studied in a real-life setting. It can occur in a situation in which the more people observe a crisis event, the less likely it is that someone will react and provide real assistance. These days of a galloping digital revolution a question is to be raised as to whether the same effect can be observed in the online space of communication. In order to investigate this phenomenon we designed a study aimed at (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
Software
  1. Do modo de existência das entidades de software.Eder Fabiano Souza Costa - 2022 - Cadernos PET-Filosofia (Parana) 21 (1).
    O presente artigo discute alguns conceitos de linguagem de programação, buscando abrir uma discussão ontológica sobre os seres técnicos. Partindo de uma breve análise histórica e de conceitos da filosofia do séc. XX, problematiza-se as noções de abstrato e concreto dessas entidades, fazendo uma análise do dualismo hardware-software a partir da concepção hegemônica do hilemorfismo aristotélico e usando de exemplos de linguagem computacional para discutir uma certa ontologia desses seres. Fundamenta-se em Gilbert Simondon uma hipótese segundo a qual o computador (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Ethics and Information Technology.Göran Collste (ed.) - 1998 - Delhi: New Academic Publishers.
    The Ethical Issues Underlying The Computer-Ization And Information Technology Are The Subject Of The Essays Collected In This Book. Computer Ethics And Information Ethics Are New Branches Of Applied Ethics.In This Book Different Applications Of Information Technology (It) Are Assessed From An Ethical Perspective. How Eill The Global Information Infrastructure Affect ConditionsFor Democracy? Is It Possible To Maintain Values Like Autonomy And Privacy In TheComputerized Society? What Ethical Principles Are Needed And What Virtues ShouldBe Promoted Among The Professionals Involved? How (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  3. Exploring Open-Source Software Ecosystems for Hardware Development.J. C. Mariscal-Melgar, Pieter Hijma, Martin Häuer, Martin Schott, Julian Stirling, Timm Wille, Manuel Moritz & Tobias Redlich - 2024 - In Manuel Moritz, Tobias Redlich, Sonja Buxbaum-Conradi & Jens P. Wulfsberg (eds.), Global collaboration, local production: Fab City als Modell für Kreislaufwirtschaft und nachhaltige Entwicklung. Springer Fachmedien Wiesbaden. pp. 187-199.
    Open-Source Hardware (OSH) and software ecosystems enable a collaborative development and manufacturing of physical artifacts. As we move towards new paradigms of production and consumption – libre software toolchains for hardware development warrant special attention. This chapter explores libre software, OSH, and software ecosystems to exemplify, illustrate, and provide food for thought to the curious reader to understand current trends in the Open-Source Hardware movement.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  4. Towards a Realist Metaphysics of Software Maintenance.Keith Begley - 2024 - In Mark Thomas Young & Mark Coeckelbergh (eds.), Maintenance and Philosophy of Technology: Keeping Things Going. New York: Routledge. pp. 162–183.
    This chapter discusses the nature of software maintenance in light of software’s ontological status. A realist view of software need not commit us to the otiose position that software maintenance is impossible. Many philosophers and computer scientists have been concerned with drawing attention to software’s dual nature, its being both symbolic and physical, abstract and concrete. There are strong connections to be found between this topic and recent investigations in the philosophy of linguistics, particularly the metaphysics of words. It is (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Ethical and Legal Aspects of Computing: A Professional Perspective from Software Engineering.Gerard O'Regan - 2024 - Springer Nature Switzerland.
    This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering. The author gained exposure to these aspects of computing while working as a software engineer at Motorola in Ireland, where he coordinated the patent programme and worked with several software suppliers. Topics and features: Presents a broad overview of ethics and the law Includes key learning topics, summaries, and review questions in each chapter, (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6. Trust, artificial intelligence and software practitioners: an interdisciplinary agenda.Sarah Pink, Emma Quilty, John Grundy & Rashina Hoda - forthcoming - AI and Society:1-14.
    Trust and trustworthiness are central concepts in contemporary discussions about the ethics of and qualities associated with artificial intelligence (AI) and the relationships between people, organisations and AI. In this article we develop an interdisciplinary approach, using socio-technical software engineering and design anthropological approaches, to investigate how trust and trustworthiness concepts are articulated and performed by AI software practitioners. We examine how trust and trustworthiness are defined in relation to AI across these disciplines, and investigate how AI, trust and trustworthiness (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  1. A Clearer Understanding of Infinity.Ilexa Yardley - 2024 - Medium.Com/the-Circular-Theory.
  2. Etica dell’educazione e dell’informazione: accesso alla conoscenza, design, reciprocità.Leonardo Manna - 2024 - Nuova Secondaria 6 (2).
    The article examines education in the information age, proposing an informational perspective. By analyzing the epistemology of informational learning, I offer a framework for understanding how individuals acquire knowledge, highlighting the role of design and models in active and constructive learning. Following this, the paper presents the UDL and ODDE educational models, outlining their key features and potential contributions. I then showcase the practical application of these models through case studies focusing on the use of AI to develop personalized learning (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
Conceptions of Information
  1. Stanford Encyclopaedia of Philosophy.Luciano Floridi (ed.) - 2008
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  2. Conservation of a Circle.Ilexa Yardley - 2024 - Medium.Com/the-Circular-Theory.
1 — 50 / 104