|
1-10 of 12 reviews |
Date Reviewed | |
|
Faking it and breaking it: responsible AI is needed now Trim M. ACM SIGCAS Computers and Society 51(3): 7-9, 2022. Type: Article
The paper’s title is catchy and promising. However, readers will find themselves immersed in another trendy cry that criticizes artificial intelligence (AI) evolution while at the same time promoting it, because the paper is just nonsense. I...
|
Aug 16 2023 |
|
|
Digital alienation as the foundation of online privacy concerns Dainow B. ACM SIGCAS Computers and Society 45(3): 109-117, 2015. Type: Article
The issue of digital alienation, or alienation online, is discussed in this paper, specifically in terms of the Marxist concept of alienation, historically based on the realm of the factory, where labor activity is “coerced i...
|
Aug 1 2016 |
|
|
Between insanity and love Asai R. ACM SIGCAS Computers and Society 45(3): 154-158, 2015. Type: Article
The premise of this paper is that humans can have legitimate feelings of love or sexual desire for nonorganic objects, specifically robots or graphical constructions such as avatars. This claim, according to the authors, is justified b...
|
Feb 9 2016 |
|
|
The NSA and Edward Snowden: surveillance in the 21st century Verble J. ACM SIGCAS Computers and Society 44(3): 14-20, 2014. Type: Article
There have been many works about surveillance issues in the modern Information Age, especially connected to privacy in a world of ever-growing information technology (IT) use in tracing an individual, group, or organization. They are n...
|
Nov 30 2015 |
|
|
A synthesized definition of computer ethics Hall B. ACM SIGCAS Computers and Society 44(3): 21-35, 2014. Type: Article
“This paper presents details of a content analysis study that analyzed definitions of computer ethics,” because consensus is lacking on the meaning of the term. The research began with 30 “explicit definit...
|
Dec 30 2014 |
|
|
Cloudsweeper and data-centric security Snyder P., Kanich C. ACM SIGCAS Computers and Society 44(2): 8-10, 2014. Type: Article
Internet users want their data on the Internet--for example, emails and Facebook data--to be well protected against malicious attacks. Current technologies either use end-to-end encryption for all data in the user&...
|
Nov 20 2014 |
|
|
The error of futurism: prediction and computer ethics Horner D. ACM SIGCAS Computers and Society 32(7): 42004. Type: Article
Computer ethics seeks to reduce the unintended or undesirable consequences of technology through accurate prediction. In this paper, Horner argues that predictive modeling does not provide any protection against future risk. Rather, he...
|
Apr 30 2004 |
|
|
Resolving Webuser on the fly Parthasarathy P., Krishnaiah M. ACM SIGCAS Computers and Society 32(2): 4-9, 2002. Type: Article
This work is difficult to summarize because of a lack of clarity in the presentation. The irrelevant title, abstract, and first sections give no concrete hints, and then the paper leaps into the algorithms used by a prototype implemen...
|
Oct 14 2002 |
|
|
Imagination, truth and possible consequentialism Artz J. ACM SIGCAS Computers and Society 31(3): 32-34, 2001. Type: Article
In this short essay, the author develops the argument that in an age of rapid change, history provides poor guidelines, and imagination is the way to outline potential futures and provide a choice for action. He goes on to provide a cl...
|
Jul 2 2002 |
|
|
Beyond numbers and demographics: "experience-near" explorations of the digital divide Adams R. ACM SIGCAS Computers and Society 31(3): 5-8, 2001. Type: Article
The focus of the September 2001 issue of Computers and Society, the newsletter of the ACM’s special interest group on computers and society, is the digital divide. It contains three papers on this topic, which were als...
|
Jun 26 2002 |
|
|
|
|
|
|
|
|