for Journals by Title or ISSN
for Articles by Keywords
help
  Subjects -> ENGINEERING (Total: 1955 journals)
    - CHEMICAL ENGINEERING (153 journals)
    - CIVIL ENGINEERING (148 journals)
    - ELECTRICAL ENGINEERING (82 journals)
    - ENGINEERING (1111 journals)
    - ENGINEERING MECHANICS AND MATERIALS (290 journals)
    - HYDRAULIC ENGINEERING (45 journals)
    - INDUSTRIAL ENGINEERING (52 journals)
    - MECHANICAL ENGINEERING (74 journals)

ENGINEERING (1111 journals)            First | 5 6 7 8 9 10 11 12 | Last

Mathematics of Control, Signals, and Systems (MCSS)     Hybrid Journal   (Followers: 5)
Mauerwerk     Hybrid Journal  
Measurement     Hybrid Journal   (Followers: 1)
Measurement Science Review     Open Access   (Followers: 1)
Meccanica     Hybrid Journal   (Followers: 1)
Mechatronics     Hybrid Journal   (Followers: 4)
Medical and Biological Engineering and Computing     Hybrid Journal   (Followers: 2)
Medical Engineering & Physics     Hybrid Journal   (Followers: 9)
Membrane Science and Technology     Full-text available via subscription   (Followers: 2)
Membrane Technology     Full-text available via subscription   (Followers: 1)
Memetic Computing     Hybrid Journal  
Metal Powder Report     Full-text available via subscription   (Followers: 2)
Metallurgist     Hybrid Journal   (Followers: 2)
Metaphysica     Hybrid Journal   (Followers: 1)
Metascience     Hybrid Journal   (Followers: 1)
Metrologia     Full-text available via subscription   (Followers: 1)
Microelectronic Engineering     Hybrid Journal   (Followers: 4)
Microelectronics International     Hybrid Journal  
Microelectronics Journal     Hybrid Journal   (Followers: 3)
Microelectronics Reliability     Hybrid Journal   (Followers: 6)
Microfluidics and Nanofluidics     Hybrid Journal   (Followers: 9)
Micromachines     Open Access   (Followers: 1)
MNASSA : Monthly Notes of the Astronomical Society of South Africa     Full-text available via subscription   (Followers: 1)
Modelling and Simulation in Engineering     Open Access   (Followers: 4)
Modern Applied Science     Open Access   (Followers: 1)
Molecular BioSystems     Full-text available via subscription   (Followers: 1)
Molecular Engineering     Hybrid Journal  
Molecular Pharmaceutics     Full-text available via subscription   (Followers: 8)
MRS Bulletin     Full-text available via subscription   (Followers: 5)
MRS Online Proceedings     Full-text available via subscription   (Followers: 1)
Multiagent and Grid Systems     Hybrid Journal  
Multidimensional Systems and Signal Processing     Hybrid Journal  
NANO     Hybrid Journal   (Followers: 6)
Nano Letters     Full-text available via subscription   (Followers: 42)
Nano Research     Hybrid Journal   (Followers: 4)
Nano Reviews     Open Access   (Followers: 15)
Nanopages     Full-text available via subscription   (Followers: 1)
Nanoscale and Microscale Thermophysical Engineering     Hybrid Journal   (Followers: 3)
Nanoscale Systems : Mathematical Modeling, Theory and Applications     Open Access  
Nanotechnologies in Russia     Hybrid Journal   (Followers: 1)
Nanotechnology     Hybrid Journal   (Followers: 9)
Nanotechnology Magazine, IEEE     Full-text available via subscription   (Followers: 13)
Nanotechnology Reviews     Full-text available via subscription   (Followers: 4)
Natural Hazards     Hybrid Journal   (Followers: 214)
Nature Nanotechnology     Full-text available via subscription   (Followers: 44)
Naval Engineers Journal     Hybrid Journal   (Followers: 3)
NDT & E International     Hybrid Journal   (Followers: 11)
Nexo Revista Científica     Open Access  
Nigerian Journal of Technological Research     Full-text available via subscription  
Nigerian Journal of Technology     Full-text available via subscription  
NIR news     Full-text available via subscription  
Nonlinear Dynamics     Hybrid Journal   (Followers: 5)
Nonlinear Engineering : Modeling and Application     Full-text available via subscription   (Followers: 1)
Nonlinearity     Full-text available via subscription   (Followers: 2)
Nova Scientia     Open Access  
NTM Zeitschrift für Geschichte der Wissenschaften, Technik und Medizin     Hybrid Journal   (Followers: 4)
Nuclear Engineering and Design     Hybrid Journal   (Followers: 12)
Numerical Algorithms     Hybrid Journal   (Followers: 2)
Numerical Heat Transfer, Part A: Applications: An International Journal of Computation and Methodology     Hybrid Journal   (Followers: 5)
Numerical Heat Transfer, Part B: Fundamentals: An International Journal of Computation and Methodology     Hybrid Journal   (Followers: 7)
Ocean Science Journal     Hybrid Journal   (Followers: 3)
Oil and Gas Journal     Full-text available via subscription   (Followers: 11)
Online Journal for Global Engineering Education     Open Access  
Open Journal of Fluid Dynamics     Open Access   (Followers: 3)
Open Journal of Safety Science and Technology     Open Access   (Followers: 3)
Operations Research Letters     Hybrid Journal   (Followers: 4)
Optical Communications and Networking, IEEE/OSA Journal of     Hybrid Journal   (Followers: 3)
Optimization and Engineering     Hybrid Journal   (Followers: 2)
Opto-Electronics Review     Hybrid Journal   (Followers: 1)
OR Spectrum     Hybrid Journal  
Organic Electronics     Hybrid Journal   (Followers: 3)
Ozone Science & Engineering     Hybrid Journal   (Followers: 1)
Papers In Regional Science     Hybrid Journal   (Followers: 6)
Particle & Particle Systems Characterization     Hybrid Journal  
Particulate Science and Technology: An International Journal     Hybrid Journal   (Followers: 1)
Perspectives on Science     Hybrid Journal   (Followers: 4)
Pesquisa Operacional     Open Access  
Pest Management Science     Hybrid Journal   (Followers: 5)
Petroleum Science     Full-text available via subscription   (Followers: 2)
Phase Transitions: A Multinational Journal     Hybrid Journal  
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences     Full-text available via subscription   (Followers: 5)
Physica B: Condensed Matter     Hybrid Journal   (Followers: 5)
Physica C: Superconductivity     Hybrid Journal  
Physica D: Nonlinear Phenomena     Hybrid Journal   (Followers: 3)
Physics of Fluids     Hybrid Journal   (Followers: 24)
Planning News     Full-text available via subscription   (Followers: 3)
Plasma Devices and Operations     Hybrid Journal   (Followers: 3)
Plasma Science and Technology     Full-text available via subscription   (Followers: 2)
Plasmonics     Hybrid Journal  
Platinum Metals Review     Open Access   (Followers: 2)
Polar Research     Open Access   (Followers: 1)
Polar Science     Hybrid Journal   (Followers: 3)
Polímeros: Ciência e Tecnologia     Open Access   (Followers: 1)
Polish Maritime Research     Open Access  
Polymer Engineering & Science     Hybrid Journal   (Followers: 13)
Polymer International     Hybrid Journal   (Followers: 2)
Polymer Science Series A     Hybrid Journal   (Followers: 3)
Polymer Science Series B     Hybrid Journal   (Followers: 3)
Polymer Science Series C     Hybrid Journal   (Followers: 4)
Polymer-Plastics Technology and Engineering     Hybrid Journal   (Followers: 4)

  First | 5 6 7 8 9 10 11 12 | Last

Journal Cover Science and Engineering Ethics
   Journal TOC RSS feeds Export to Zotero [7 followers]  Follow    
   Hybrid Journal Hybrid journal (It can contain Open Access articles)
     ISSN (Print) 1471-5546 - ISSN (Online) 1353-3452
     Published by Springer-Verlag Homepage  [2209 journals]   [SJR: 0.269]   [H-I: 22]
  • Standards of Scientific Conduct: Disciplinary Differences
    • Abstract: Teaching of responsible conduct of research is largely predicated on the assumption that there are accepted standards of conduct that can be taught. However there is little evidence of consensus in the scientific community about such standards, at least for the practices of authorship, collaboration, and data management. To assess whether such differences in standards are based on disciplinary differences, a survey, described previously, addressing standards, practices, and perceptions about teaching and learning was distributed in November 2010 to US faculty from 50 graduate programs for the biomedical disciplines of microbiology, neuroscience, nursing, and psychology. Despite evidence of statistically significant differences across the four disciplines, actual differences were quite small. Stricter measures of effect size indicated practically significant disciplinary differences for fewer than 10 % of the questions. This suggests that the variation in individual standards of practice within each discipline is at least as great as variation due to differences among disciplines. Therefore, the need for discipline-specific training may not be as important as sometimes thought.
      PubDate: 2014-09-26
       
  • Biosecurity and Open-Source Biology: The Promise and Peril of Distributed
           Synthetic Biological Technologies
    • Abstract: In this article, we raise ethical concerns about the potential misuse of open-source biology (OSB): biological research and development that progresses through an organisational model of radical openness, deskilling, and innovation. We compare this organisational structure to that of the open-source software model, and detail salient ethical implications of this model. We demonstrate that OSB, in virtue of its commitment to openness, may be resistant to governance attempts.
      PubDate: 2014-09-24
       
  • Design and Development of a Course in Professionalism and Ethics for CDIO
           Curriculum in China
    • Abstract: At Shantou University (STU) in 2008, a stand-alone engineering ethics course was first included within a Conceive–Design–Implement–Operate (CDIO) curriculum to address the scarcity of engineering ethics education in China. The philosophy of the course design is to help students to develop an in-depth understanding of social sustainability and to fulfill the obligations of engineers in the twenty-first century within the context of CDIO engineering practices. To guarantee the necessary cooperation of the relevant parties, we have taken advantage of the top-down support from the STU administration. Three themes corresponding to contemporary issues in China were chosen as the course content: engineers’ social obligations, intellectual property and engineering safety criteria. Some popular pedagogies are used for ethics instruction such as case studies and group discussions through role-playing. To impart the diverse expertise of the practical professional practice, team teaching is adopted by interdisciplinary instructors with strong qualifications and industrial backgrounds. Although the assessment of the effectiveness of the course in enhancing students’ sense of ethics is limited to assignment reports and class discussions, our endeavor is seen as positive and will continue to sustain the CDIO reform initiatives of STU.
      PubDate: 2014-09-18
       
  • Fake Journals: Their Features and Some Viable Ways to Distinguishing Them
    • Abstract: In this paper, we aim to discuss the fake journals and their advertisement and publication techniques. These types of journals mostly start and continue their activities by using the name of some indexed journals and establishing fake websites. The fake journals and publishers, while asking the authors for a significant amount of money for publishing their papers, have no peer-review process, publish the papers without any revision on the fake sites, and put the scientific reputation and prestige of the researchers in jeopardy. In the rest of the paper, we present some viable techniques in order for researchers and students to identify these journals.
      PubDate: 2014-09-18
       
  • ‘Standing on the Shoulders of Giants’: Recontextualization in
           Writing from Sources
    • Abstract: Despite calls for more research into the writing expertise of senior scientists, the literature reveals surprisingly little about the writing strategies of successful scientist writers. The present paper addresses the gap in the literature by reporting a study that investigated the note-taking strategies of an expert writer, a Chinese professor of biochemistry. Primarily based on interview data, the paper describes the expert’s recontextualization (Linell, Text 18:143–157, 1998) strategies at three levels: ‘accumulating writing materials’ by modifying source texts, composing from ‘collections’ of cut-and-pasted chunks in drafting a review article, and adopting reusable citations in sources as a ‘map’. It is emphasized that through repeatedly revising his paper in light of his rhetorical intentions in a new context of meaning, the expert writer would maximally recontextualize the source-based text segments and citations in the paper, averting transgressive intertextuality (Chandrasoma et al., J Lang Identity Educ 3:171–193, 2004) as a result. The paper ends by highlighting the pedagogical implications of the study for English for Professional Academic Purposes (EPAP).
      PubDate: 2014-09-16
       
  • Second-Guessing Scientists and Engineers: Post Hoc Criticism and the
           Reform of Practice in Green Chemistry and Engineering
    • Abstract: The article examines and extends work bringing together engineering ethics and Science and Technology Studies, which had built upon Diane Vaughan’s analysis of the Challenger shuttle accident as a test case. Reconsidering the use of her term “normalization of deviance,” the article argues for a middle path between moralizing against and excusing away engineering practices contributing to engineering disaster. To explore an illustrative pedagogical case and to suggest avenues for constructive research developing this middle path, it examines the emergence of green chemistry and green engineering. Green chemistry began when Paul Anastas and John Warner developed a set of new rules for chemical synthesis that sought to learn from missed opportunities to avoid environmental damage in the twentieth century, an approach that was soon extended to engineering as well. Examination of tacit assumptions about historical counterfactuals in recent, interdisciplinary discussions of green chemistry illuminate competing views about the field’s prospects. An integrated perspective is sought, addressing how both technical practice within chemistry and engineering and the influence of a wider “social movement” can play a role in remedying environmental problems.
      PubDate: 2014-09-14
       
  • Victor Frankenstein’s Institutional Review Board Proposal, 1790
    • Abstract: To show how the case of Mary Shelley’s Victor Frankenstein brings light to the ethical and moral issues raised in Institutional Review Board (IRB) protocols, we nest an imaginary IRB proposal dated August 1790 by Victor Frankenstein within a discussion of the importance and function of the IRB. Considering the world of science as would have appeared in 1790 when Victor was a student at Ingolstadt, we offer a schematic overview of a fecund moment when advances in comparative anatomy, medical experimentation and theories of life involving animalcules and animal electricity sparked intensive debates about the basic principles of life and the relationship between body and soul. Constructing an IRB application based upon myriad speculations circulating up to 1790, we imagine how Victor would have drawn upon his contemporaries’ scientific work to justify the feasibility of his project, as well as how he might have outlined the ethical implications of his plan to animate life from “dead” tissues. In Mary Shelley’s Frankenstein, Victor failed to consider his creature’s autonomy, vulnerability, and welfare. In this IRB proposal, we show Victor facing those issues of justice and emphasize how the novel can be an important component in courses or workshops on research ethics. Had Victor Frankenstein had to submit an IRB proposal tragedy may have been averted, for he would have been compelled to consider the consequences of his experiment and acknowledge, if not fulfill, his concomitant responsibilities to the creature that he abandoned and left to fend for itself.
      PubDate: 2014-09-14
       
  • The Struggle Between Liberties and
           Authorities
    in the Information Age
    • Abstract: The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have long debated how to strike an ethically sound balance between security measures and individual rights. I argue that such a balance can only be reached once individual rights are clearly defined, and that such a definition cannot prescind from an analysis of individual well-being in the information age. Hence, I propose an analysis of individual well-being which rests on the capability approach, and I then identify a set of rights that individuals should claim for themselves. Finally, I consider a criterion for balancing the proposed set of individual rights with cyber-security measures in the information age.
      PubDate: 2014-09-11
       
  • The Principles of Fair Allocation of Peer-Review: How Much Should a
           Researcher be Expected to Contribute'
    • Abstract: There seems to be reluctance amongst scientists to invest some of their own time in the peer-review of manuscripts. As a result, journal editors often struggle to secure reviewers for a given manuscript in a timely manner. Here, two simple principles are proposed, which could fairly allocate the contribution of individual researchers to the peer-review process.
      PubDate: 2014-09-07
       
  • Considering the Human Implications of New and Emerging Technologies in the
           Area of Human Security
    • PubDate: 2014-09-01
       
  • Critical Theory as an Approach to the Ethics of Information Security
    • Abstract: Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic medical records the paper demonstrates that a critical lens can highlight issues that traditional ethical theories tend to overlook. These are often linked to collective issues such as social and organisational structures, which philosophical ethics with its typical focus on the individual does not tend to emphasise. The paper suggests that this insight can help in developing ways of researching and innovating responsibly in the area of information security.
      PubDate: 2014-09-01
       
  • Evolution of Different Dual-use Concepts in International and National Law
           and Its Implications on Research Ethics and Governance
    • Abstract: This paper provides an overview of the various dual-use concepts applied in national and international non-proliferation and anti-terrorism legislation, such as the Biological and Toxin Weapons Convention, the Chemical Weapons Convention and United Nations Security Council Resolution 1540, and national export control legislation and in relevant codes of conduct. While there is a vast literature covering dual-use concepts in particular with regard to life sciences, this is the first paper that incorporates into such discussion the United Nations Security Council Resolution 1540. In addition, recent developments such as the extension of dual-use export control legislation in the area of human rights protection are also identified and reviewed. The discussion of dual-use concepts is hereby undertaken in the context of human- and/or national-security-based approaches to security. This paper discusses four main concepts of dual use as applied today in international and national law: civilian versus military, peaceful versus non-peaceful, legitimate versus illegitimate and benevolent versus malevolent. In addition, the usage of the term to describe positive technology spin-offs between civilian and military applications is also briefly addressed. Attention is also given to the roles civil society and research ethics may play in the governance of dual-use sciences and technologies.
      PubDate: 2014-09-01
       
  • Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing
           Vulnerabilities
    • Abstract: Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.
      PubDate: 2014-09-01
       
  • Assessing Security Technology’s Impact: Old Tools for New Problems
    • Abstract: The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.
      PubDate: 2014-09-01
       
  • From Sniffer Dogs to Emerging Sniffer Devices for Airport Security: An
           Opportunity to Rethink Privacy Implications'
    • Abstract: Dogs are known for their incredible ability to detect odours, extracting them from a “complex” environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices—generally known as “chemical sniffers” or “electronic noses”—able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.
      PubDate: 2014-09-01
       
  • Chemical and Biological Weapons in the ‘New Wars’
    • Abstract: The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being ‘tended to’ in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.
      PubDate: 2014-09-01
       
  • Protecting Human Health and Security in Digital Europe: How to Deal with
           the “Privacy Paradox”'
    • Abstract: This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals’ motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the “privacy paradox”). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals’ well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled “e-democracy” as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.
      PubDate: 2014-09-01
       
  • On the Spot Ethical Decision-Making in CBRN (Chemical, Biological,
           Radiological or Nuclear Event) Response
    • Abstract: First responders to chemical, biological, radiological, or nuclear (CBRN) events face decisions having significant human consequences. Some operational decisions are supported by standard operating procedures, yet these may not suffice for ethical decisions. Responders will be forced to weigh their options, factoring-in contextual peculiarities; they will require guidance on how they can approach novel (indeed unique) ethical problems: they need strategies for “on the spot” ethical decision making. The primary aim of this paper is to examine how first responders should approach on the spot ethical decision-making amid the stress and uncertainty of a CBRN event. Drawing on the long-term professional CBRN experience of one of the authors, this paper sets out a series of practical ethical dilemmas potentially arising in the context of a large-scale chemical incident. We propose a broadly consequentialist approach to on the spot ethical decision-making, but one which incorporates ethical values and rights as “side-constraints”.
      PubDate: 2014-09-01
       
  • Social Media in Disaster Risk Reduction and Crisis Management
    • Abstract: This paper reviews the actual and potential use of social media in emergency, disaster and crisis situations. This is a field that has generated intense interest. It is characterised by a burgeoning but small and very recent literature. In the emergencies field, social media (blogs, messaging, sites such as Facebook, wikis and so on) are used in seven different ways: listening to public debate, monitoring situations, extending emergency response and management, crowd-sourcing and collaborative development, creating social cohesion, furthering causes (including charitable donation) and enhancing research. Appreciation of the positive side of social media is balanced by their potential for negative developments, such as disseminating rumours, undermining authority and promoting terrorist acts. This leads to an examination of the ethics of social media usage in crisis situations. Despite some clearly identifiable risks, for example regarding the violation of privacy, it appears that public consensus on ethics will tend to override unscrupulous attempts to subvert the media. Moreover, social media are a robust means of exposing corruption and malpractice. In synthesis, the widespread adoption and use of social media by members of the public throughout the world heralds a new age in which it is imperative that emergency managers adapt their working practices to the challenge and potential of this development. At the same time, they must heed the ethical warnings and ensure that social media are not abused or misused when crises and emergencies occur.
      PubDate: 2014-09-01
       
  • Responsibility Practices and Unmanned Military Technologies
    • Abstract: The prospect of increasingly autonomous military robots has raised concerns about the obfuscation of human responsibility. This papers argues that whether or not and to what extent human actors are and will be considered to be responsible for the behavior of robotic systems is and will be the outcome of ongoing negotiations between the various human actors involved. These negotiations are about what technologies should do and mean, but they are also about how responsibility should be interpreted and how it can be best assigned or ascribed. The notion of responsibility practices, as the paper shows, provides a conceptual tool to examine these negotiations as well as the interplay between technological development and the ascription of responsibility. To illustrate the dynamics of responsibility practices the paper explores how the introduction of unmanned aerial vehicles has led to (re)negotiations about responsibility practices, focusing particularly on negotiations within the US Armed Forces.
      PubDate: 2014-09-01
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2014