Results for 'information threats'

981 found
Order:
  1.  16
    Informants a potential threat to confidentiality in small studies.Gert Helgesson - 2015 - Medicine, Health Care and Philosophy 18 (1):149-152.
    Providing proper protection of confidentiality, by preventing personal data from falling into the hands of third parties, is one of the core responsibilities of researchers towards research participants. However, even if researchers do their best in this regard, it does not guarantee that breaches of confidentiality will be avoided. This paper addresses the case of small qualitative studies, arguing that researchers cannot guarantee their informants’ confidentiality, since that confidentiality may be compromised by actions taken by the informants themselves. In order (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  11
    The information civilisation and the environmental threat.S. Zieba & A. Rodzifiska - 1999 - Dialogue and Universalism 9:165-179.
    Direct download  
     
    Export citation  
     
    Bookmark  
  3. Information Technology and Biometric Databases: Eugenics and Other Threats to Disability Rights.Jacqueline A. Laing - 2008 - Journal of Legal Technology Risk Management 3.
    Laing contends that the practice of eugenics has not disappeared. Conceptually related to the utilitarian and Social Darwinist worldview and historically evolving out of the practice of slavery, it led to some of the most spectacular human rights abuses in human history. The compulsory sterilization of and experimentation on those deemed “undesirable” and “unfit” in many technologically developed states like the US, Scandinavia, and Japan, led inexorably and most systematically to Nazi Germany with the elimination of countless millions of people (...)
     
    Export citation  
     
    Bookmark  
  4.  5
    “Treatment Pressures” and “Informal Coercion”: “Threats” in Mental Healthcare.George Szmukler - 2024 - American Journal of Bioethics 24 (12):89-91.
    Coercion in mental healthcare is a complex phenomenon with major ethical implications. A commonly accepted account of “informal coercion”—that is, coercion that falls short of legal compulsion—is t...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  33
    Processing of “unattended” threat-related information: Role of emotional content and context.Manuel G. Calvo, M. Dolores Castillo & Luis J. Fuentes - 2006 - Cognition and Emotion 20 (8):1049-1074.
  6.  35
    Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat.Yong Zhu, Yufang Zhao, Oscar Ybarra, Walter G. Stephan & Qing Yang - 2015 - Frontiers in Psychology 6.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  7.  52
    Conscious intrusion of threat information via unconscious priming in anxiety.Wen Li, Ken A. Paller & Richard E. Zinbarg - 2008 - Cognition and Emotion 22 (1):44-62.
  8.  3
    “Treatment Pressures” and “Informal Coercion”: “Threats” in Mental Healthcare.George Szmukler King’S. College London - 2024 - American Journal of Bioethics 24 (12):89-91.
    Volume 24, Issue 12, December 2024, Page 89-91.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  24
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  50
    Ever-present threats from information technology: the Cyber-Paranoia and Fear Scale.Oliver J. Mason, Caroline Stevenson & Fleur Freedman - 2014 - Frontiers in Psychology 5.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  43
    Informed consent, vulnerability and the risks of group-specific attribution.Berta M. Schrems - 2014 - Nursing Ethics 21 (7):829-843.
    People in extraordinary situations are vulnerable. As research participants, they are additionally threatened by abuse or exploitation and the possibility of harm through research. To protect people against these threats, informed consent as an instrument of self-determination has been introduced. Self-determination requires autonomous persons, who voluntarily make decisions based on their values and morals. However, in nursing research, this requirement cannot always be met. Advanced age, chronic illness, co-morbidity and frailty are reasons for dependencies. These in turn lead to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  12.  26
    Attentional Bias to Threat-Related Information Among Individuals With Dental Complaints: The Role of Pain Expectancy.Mohsen Dehghani, Somayyeh Mohammadi, Louise Sharpe & Ali Khatibi - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  10
    The Axiological Paradigm of Virtual Community Multivector Nature as a Threat to Information Culture and National Security.Svitlana Khrypko - forthcoming - Beytulhikme An International Journal of Philosophy.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  34
    Threat, safeness, and schizophrenia: Hidden issues in an evolutionary story.Paul Gilbert - 2004 - Behavioral and Brain Sciences 27 (6):858-859.
    There is evidence that people with schizophrenia have difficulties in some (recently evolved) competencies for processing social information. However, a case can be made that vulnerabilities can also lie in (previously evolved) threat and safeness processing systems. Evolutionary models may need to consider interactions between genetic sensitivities, early experiences of threat/safeness, and later cognitive vulnerabilities. Psychological treatments must address issues of experienced threat and safeness before working on more cognitive competencies.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  15.  83
    Assessing Information and Best Practices for Public Health Emergency Legal Preparedness.Clifford M. Rees, Daniel O'Brien, Peter A. Briss, Joan Miles, Poki Namkung & Patrick M. Libbey - 2008 - Journal of Law, Medicine and Ethics 36 (s1):42-46.
    Information is the fourth core element of public health legal preparedness and of legal preparedness for public health emergencies specifically. Clearly, the creation, transmittal, and application of information are vital to all public health endeavors. The critical significance of information grows exponentially as the complexity and scale of public threats increase.Only a small body of organized information on public health law existed before the 21st century: a series of landmark books published beginning in 1926 by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  16. Resilience and posttraumatic stress disorder (PTSD): The threat to physical integrity as a study model of the dynamics of the information integration.L. Decleire - 2000 - Consciousness and Cognition 9 (2):S95 - S95.
  17. The threat of comprehensive overstimulation in modern societies.Gregory J. Robson - 2017 - Ethics and Information Technology 19 (1):69-80.
    Members of modern, digital societies experience a tremendous number and diversity of stimuli from sources such as computers, televisions, other electronic media, and various forms of advertising. In this paper, I argue that the presence of a wide range of stimulating items in modern societies poses a special risk to the welfare of members of modern societies. By considering the set of modern stimuli in a more comprehensive way than normative theorists have done so far—as part of a complex system (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  3
    Peer threat evaluations shape one’s own threat perceptions and feelings of distress.Lisa Espinosa, Erik C. Nook, Martin Asperholm, Therese Collins, Juliet Y. Davidow & Andreas Olsson - forthcoming - Cognition and Emotion.
    We are continuously exposed to what others think and feel about content online. How do others’ evaluations shared in this medium influence our own beliefs and emotional responses? In two pre-registered studies, we investigated the social transmission of threat and safety evaluations in a paradigm that mimicked online social media platforms. In Study 1 (N = 103), participants viewed images and indicated how distressed they made them feel. Participants then categorised these images as threatening or safe for others to see, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. Information Privacy for Technology Users With Intellectual and Developmental Disabilities: Why Does It Matter?Maxine Perrin, Rawad Mcheimech, Johanna Lake, Yves Lachapelle, Jeffrey W. Jutai, Amélie Gauthier-Beaupré, Crislee Dignard, Virginie Cobigo & Hajer Chalghoumi - 2019 - Ethics and Behavior 29 (3):201-217.
    This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities (IDD) related to their information privacy when using information technology (IT). Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, but (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  26
    Unconscious processing of coarse visual information during anticipatory threat.Maria Lojowska, Manon Mulckhuyse, Erno J. Hermans & Karin Roelofs - 2019 - Consciousness and Cognition 70:50-56.
  21.  51
    What’s Wrong with Argumentum ad Baculum? Reasons, Threats, and Logical Norms.Robert H. Kimball - 2006 - Argumentation 20 (1):89-100.
    A dialogue-based analysis of informal fallacies does not provide a fully adequate explanation of our intuitions about what is wrong with ad baculum and of when it is admissible and when it is not. The dialogue-based analysis explains well why mild, benign threats can be legitimate in some situations, such as cooperative bargaining and negotiation, but does not satisfactorily account for what is objectionable about more malicious uses of threats to coerce and to intimidate. I propose an alternative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  22.  26
    Anxiety-related threat bias in recognition memory: the moderating effect of list composition and semantic-similarity effects.Corey N. White, Roger Ratcliff & Michael W. Vasey - 2016 - Cognition and Emotion 30 (8).
    Individuals with high anxiety show bias for threatening information, but it is unclear whether this bias affects memory. Recognition memory studies have shown biases for recognising and rejecting threatening items in anxiety, prompting the need to identify moderating factors of this effect. This study focuses on the role of semantic similarity: the use of many semantically related threatening words could increase familiarity for those items and obscure anxiety-related differences in memory. To test this, two recognition memory experiments varied the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  37
    The impact of threat of shock on the framing effect and temporal discounting: executive functions unperturbed by acute stress?Oliver J. Robinson, Rebecca L. Bond & Jonathan P. Roiser - 2015 - Frontiers in Psychology 6:153123.
    Anxiety and stress-related disorders constitute a large global health burden, but are still poorly understood. Prior work has demonstrated clear impacts of stress upon basic cognitive function: biasing attention toward unexpected and potentially threatening information and instantiating a negative affective bias. However, the impact that these changes have on higher-order, executive, decision-making processes is unclear. In this study, we examined the impact of a translational within-subjects stress induction (threat of unpredictable shock) on two well-established executive decision-making biases: the framing (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  24.  53
    Chinese Buddhism and the Threat of Atheism in Seventeenth-Century Europe.Thierry Meynard - 2011 - Buddhist-Christian Studies 31:3-23.
    In lieu of an abstract, here is a brief excerpt of the content:Chinese Buddhism and the Threat of Atheism in Seventeenth-Century EuropeThierry MeynardWhen the Europeans first came to Asia, they met with the multiform presence of Buddhism. They gradually came to understand that a common religious tradition connected the different brands of Buddhism found in Sri Lanka, Thailand, Japan, and China. I propose here to examine a presentation of Buddhism written in Guangzhou by the Italian Jesuit Prospero Intorcetta (1626-1696) around (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  18
    Threat Upon Entry: Effect of Coworker Ostracism on Newcomers’ Proactive Behaviors During Organizational Socialization.Pan Liu, Yihua Zhang, Yan Ji & Shaoxue Wu - 2021 - Frontiers in Psychology 12.
    Extant literature has underlined the importance of newcomer proactive socialization to the organization. However, the effect of coworker ostracism on newcomers’ proactive behaviors has not been noticed. Drawing on the conservation of resources theory, we proposed a model exploring how coworker ostracism impacted newcomers’ proactive behaviors via the mediation of psychological availability. Through an empirical study with a sample of 263 newcomers and three waves of longitudinal data, we found that coworker ostracism had a negative effect on newcomers’ information (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  32
    Genetic Information in the Age of Genohype.Péter Kakuk - 2006 - Medicine, Health Care and Philosophy 9 (3):325-337.
    We will analyse the representations and conceptualisation of genetics and genetic information in bioethical discourse. Genetics and genetic information is widely believed to be revolutionizing medicine and is sometimes misconceived as having a high predictive value compared to traditional diagnostics. We will attempt to present the inherent limitations of genetic information within its health care context. We␣will also argue against the exceptional treatment of genetic information that seems to govern bioethical reflection and regulatory approaches. And finally, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  41
    Threat and benign interpretation bias might not be a unidimensional construct.Shari A. Steinman, Sam Portnow, Amber L. Billingsley, Diheng Zhang & Bethany A. Teachman - 2019 - Cognition and Emotion 34 (4):783-792.
    The tendency for individuals to interpret ambiguous information in a threatening way is theorised to maintain anxiety disorders. Recent findings suggest that positive and negative interpretation bi...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  16
    A multinomial modelling approach to face identity recognition during instructed threat.Nina R. Arnold, Hernán González Cruz, Sabine Schellhaas & Florian Bublatzky - 2021 - Cognition and Emotion 35 (7):1302-1319.
    To organise future behaviour, it is important to remember both the central and contextual aspects of a situation. We examined the impact of contextual threat or safety, learned through verbal instructions, on face identity recognition. In two studies (N = 140), 72 face–context compounds were presented each once within an encoding session, and an unexpected item/source recognition task was performed afterwards (including 24 new faces). Hierarchical multinomial processing tree modelling served to estimate individual parameters of item (face identity) and source (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  32
    Adult Attachment Style: Biases in Threat-Related and Social Information Processing.Jamieson Graham, Stinson Raewyn & Evans Ian - 2015 - Frontiers in Human Neuroscience 9.
  30.  15
    From Information Exposure to Protective Behaviors: Investigating the Underlying Mechanism in COVID-19 Outbreak Using Social Amplification Theory and Extended Parallel Process Model.Shuguang Zhao & Xuan Wu - 2021 - Frontiers in Psychology 12.
    Ever since the outbreak of the coronavirus disease, people have been flooded with vast amounts of information related to the virus and its social consequences. This paper draws on social amplification theory and the extended parallel process model and assesses the following: how two amplification stations—news media and peoples’ personal networks—influence the risk-related perceptions of people and how these risk-related perceptions impact people’s health-protective behaviors. This study surveyed 1,946 participants. The results indicate that peoples’ exposure to news media significantly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  48
    Subconscious detection of threat as reflected by an enhanced response bias.Sabine Windmann & Thomas Krüger - 1998 - Consciousness and Cognition 7 (4):603-633.
    Neurobiological and cognitive models of unconscious information processing suggest that subconscious threat detection can lead to cognitive misinterpretations and false alarms, while conscious processing is assumed to be perceptually and conceptually accurate and unambiguous. Furthermore, clinical theories suggest that pathological anxiety results from a crude preattentive warning system predominating over more sophisticated and controlled modes of processing. We investigated the hypothesis that subconscious detection of threat in a cognitive task is reflected by enhanced ''false signal'' detection rather than by (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  32.  32
    Genetic information, social justice, and risk-sharing institutions.Martin O'Neill - 2021 - Journal of Medical Ethics 47 (7):482-483.
    Under conditions with a low level of available genetic information, mutualistic private insurance markets will often create broadly just outcomes, even if by accident rather than by design. Normatively acceptable outcomes of this kind would come under threat if insurers were to have increased access to genetic information with substantial predictive content.1 As the availability of relevant individual genetic information grows, mutualistic forms of market-based insurance face a dilemma between either sacrificing individuals’ interests in genetic privacy, or (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  51
    The bioterrorism threat and dual-use biotechnological research: An israeli perspective.David Friedman, Bracha Rager-Zisman, Eitan Bibi & Alex Keynan - 2008 - Science and Engineering Ethics 16 (1):85-97.
    Israel has a long history of concern with chemical and biological threats, since several hostile states in the Middle East are likely to possess such weapons. The Twin-Tower terrorist attacks and Anthrax envelope scares of 2001 were a watershed for public perceptions of the threat of unconventional terror in general and of biological terror in particular. New advances in biotechnology will only increase the ability of terrorists to exploit the burgeoning availability of related information to develop ever-more destructive (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. The Epistemic Threat of Deepfakes.Don Fallis - 2020 - Philosophy and Technology 34 (4):623-643.
    Deepfakes are realistic videos created using new machine learning techniques rather than traditional photographic means. They tend to depict people saying and doing things that they did not actually say or do. In the news media and the blogosphere, the worry has been raised that, as a result of deepfakes, we are heading toward an “infopocalypse” where we cannot tell what is real from what is not. Several philosophers have now issued similar warnings. In this paper, I offer an analysis (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   32 citations  
  35.  19
    The Information Revolution in the Post-Industrial Society: Dangers in Political Processes.Olga Kravchuk, Nataliia Shoturma, Ganna Grabina, Iryna Myloserdna, Vitalii Vedenieiev & Anastasiia Shtelmashenko - 2022 - Postmodern Openings 13 (4):113-126.
    The relevance of the study lies in the fact that the information and computer revolution has made it possible to create and include in the system of social circulation such information flows, which are currently sufficient to ensure the most rational use of nature, demographic, economic, industrial, agricultural and spiritual and cultural development of mankind. The phenomenon of the information revolution is the result of two parallel processes that can develop throughout history: an increase in the role (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. New Threats to Free Thought.Jonathan Ranch - forthcoming - Ethics, Information, and Technology: Readings.
  37.  22
    Scare Tactics: Arguments That Appeal to Fear and Threats.Douglas Walton - 2000 - Dordrecht, Netherland: Springer.
    Scare Tactics, the first book on the subject, provides a theory of the structure of reasoning used in fear and threat appeal argumentation. Such arguments come under the heading of the argumentum ad baculum, the `argument to the stick/club', traditionally treated as a fallacy in the logic textbooks. The new dialectical theory is based on case studies of many interesting examples of the use of these arguments in advertising, public relations, politics, international negotiations, and everyday argumentation on all kinds of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  38.  18
    Attention-driven bias for threat-related stimuli in implicit memory. Preliminary results from the Posner cueing paradigm.Agata Sobków, Paweł Matusz & Jakub Traczyk - 2010 - Polish Psychological Bulletin 41 (4):163-171.
    Attention-driven bias for threat-related stimuli in implicit memory. Preliminary results from the Posner cueing paradigm An implicit memory advantage for angry faces was investigated in this experiment by means of an additional cueing task. Participants were to assess the orientation of a triangle's peak, which side of presentation was cued informatively by angry and neutral face stimuli, after which they immediately completed an unexpected "old-new" task on a set of the previously presented faces and new, distractor-faces. Surprisingly, the RTs were (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  91
    COVID-19 and Singularity: Can the Philippines Survive Another Existential Threat?Robert James M. Boyles, Mark Anthony Dacela, Tyrone Renzo Evangelista & Jon Carlos Rodriguez - 2022 - Asia-Pacific Social Science Review 22 (2):181–195.
    In general, existential threats are those that may potentially result in the extinction of the entire human species, if not significantly endanger its living population. Among the said threats include, but not limited to, pandemics and the impacts of a technological singularity. As regards pandemics, significant work has already been done on how to mitigate, if not prevent, the aftereffects of this type of disaster. For one, certain problem areas on how to properly manage pandemic responses have already (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  18
    Worry, Perceived Threat and Media Communication as Predictors of Self-Protective Behaviors During the COVID-19 Outbreak in Europe.Martina Vacondio, Giulia Priolo, Stephan Dickert & Nicolao Bonini - 2021 - Frontiers in Psychology 12.
    Efforts to contain the spread of the coronavirus emphasize the central role of citizens’ compliance with self-protective behaviors. Understanding the processes underlying the decision to self-protect is, therefore, essential for effective risk communication during the COVID-19 pandemic. In the present study, we investigate the determinants of perceived threat and engagement in self-protective measures in the United Kingdom, Italy, and Austria during the first wave of the pandemic. The type of disease and the type of numerical information regarding the disease (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  73
    Threats to Neurosurgical Patients Posed by the Personal Identity Debate.Sabine Müller, Merlin Bittlinger & Henrik Walter - 2017 - Neuroethics 10 (2):299-310.
    Decisions about brain surgery pose existential challenges because they are often decisions about life or death, and sometimes about possible personality changes. Therefore they require rigorous neuroethical consideration. However, we doubt whether metaphysical interpretations of ambiguous statements of patients are useful for deriving ethical and legal conclusions. Particularly, we question the application of psychological theories of personal identity on neuroethical issues for several reasons. First, even the putative “standard view” on personal identity is contentious. Second, diverse accounts of personal identity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  42.  23
    Context learning for threat detection.Akos Szekely, Suparna Rajaram & Aprajita Mohanty - 2017 - Cognition and Emotion 31 (8):1525-1542.
    It is hypothesised that threatening stimuli are detected better due to their salience or physical properties. However, these stimuli are typically embedded in a rich context, motivating the question whether threat detection is facilitated via learning of contexts in which threat stimuli appear. To address this question, we presented threatening face targets in new or old spatial configurations consisting of schematic faces and found that detection of threatening targets was faster in old configurations. This indicates that individuals are able to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  46
    Information and friend segregation for online social networks: a user study.Javed Ahmed, Serena Villata & Guido Governatori - 2019 - AI and Society 34 (4):753-766.
    Online social networks captured the attention of the masses by offering attractive means of sharing personal information and developing social relationships. People expose personal information about their lives on OSNs. This may result in undesirable consequences of users’ personal information leakage to an unwanted audience and raises privacy concerns. The issue of privacy has received a significant attention in both the research literature and the mainstream media. In this paper, we present results of an empirical study that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. RFID: The next serious threat to privacy. [REVIEW]Vance Lockton & Richard S. Rosenberg - 2005 - Ethics and Information Technology 7 (4):221-231.
    Radio Frequency Identification, or RFID, is a technology which has been receiving considerable attention as of late. It is a fairly simple technology involving radio wave communication between a microchip and an electronic reader, in which an identification number stored on the chip is transmitted and processed; it can frequently be found in inventory tracking and access control systems. In this paper, we examine the current uses of RFID, as well as identifying potential future uses of the technology, including item-level (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  45.  67
    Misalignment Between Research Hypotheses and Statistical Hypotheses: A Threat to Evidence-Based Medicine?Insa Lawler & Georg Zimmermann - 2019 - Topoi 40 (2):307-318.
    Evidence-based medicine frequently uses statistical hypothesis testing. In this paradigm, data can only disconfirm a research hypothesis’ competitors: One tests the negation of a statistical hypothesis that is supposed to correspond to the research hypothesis. In practice, these hypotheses are often misaligned. For instance, directional research hypotheses are often paired with non-directional statistical hypotheses. Prima facie, one cannot gain proper evidence for one’s research hypothesis employing a misaligned statistical hypothesis. This paper sheds lights on the nature of and the reasons (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  9
    Untrusted under threat: on the superior bond between trustworthiness and threat in face-context integration.Simone Mattavelli, Matteo Masi & Marco Brambilla - 2022 - Cognition and Emotion 36 (7):1273-1286.
    The face is a powerful source to make inferences about one’s trustworthiness. Recent studies demonstrated that facial trustworthiness is influenced by the level of threat conveyed by the visual scene in which faces are embedded: untrustworthy-looking faces are more likely judged as untrustworthy when shown in threatening scenes. Here, we explore whether this face-context congruency effect is specific to the negative pole of the threat-trust domain. Experiment 1 (N = 89) focused on the differential impact of positive vs. negative face-context (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  32
    Trust and The Acquisition and Use of Public Health Information.Stephen Holland, Jamie Cawthra, Tamara Schloemer & Peter Schröder-Bäck - 2021 - Health Care Analysis 30 (1):1-17.
    Information is clearly vital to public health, but the acquisition and use of public health data elicit serious privacy concerns. One strategy for navigating this dilemma is to build 'trust' in institutions responsible for health information, thereby reducing privacy concerns and increasing willingness to contribute personal data. This strategy, as currently presented in public health literature, has serious shortcomings. But it can be augmented by appealing to the philosophical analysis of the concept of trust. Philosophers distinguish trust and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48. The Kasky-Nike Threat to Corporate Social Reporting.Thomas W. Dunfee - 2007 - Business Ethics Quarterly 17 (1):5-32.
    In the recent case of Nike v. Kasky both sides argued that their standard for distinguishing commercial speech from political speechwould create the better policy for ensuring accurate and complete disclosure of social information by corporations. Using insights frominformation economics, we argue that neither standard will achieve the policy goal of optimal truthful disclosure. Instead, we argue that the appropriate standard is one of optimal truthful disclosure—balancing the value of speech against the costs of misinformation. Specifically, we argue that (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  49.  44
    From Information Search to the Loss of Personality: The Phenomenon of Dataism.D. L. Kobelieva & N. M. Nikolaienko - 2021 - Anthropological Measurements of Philosophical Research 20:100-112.
    Purpose. The research is devoted to the analysis of the urgent problem of the information society: the overload of a person with information and, as a result, the impossibility of adequate formation and development of the personality; as well as the problem of "digitization" of human existence and the formation of a new reality of dataism. Theoretical basis. A lot of modern scientific works are devoted to the analysis of the information society, its problems and features. The (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Informed consent and routinisation.Thomas Ploug & Soren Holm - 2013 - Journal of Medical Ethics 39 (4):214-218.
    This article introduces the notion of ‘routinisation’ into discussions of informed consent. It is argued that the routinisation of informed consent poses a threat to the protection of the personal autonomy of a patient through the negotiation of informed consent. On the basis of a large survey, we provide evidence of the routinisation of informed consent in various types of interaction on the internet; among these, the routinisation of consent to the exchange of health related information. We also provide (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   20 citations  
1 — 50 / 981