Andrew Adams

Andrew Adams
Meiji University · Centre for Business Information Ethics

BSc, MSc, LLM, PhD

About

83
Publications
27,681
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,785
Citations
Additional affiliations
April 2010 - present
Meiji University
Position
  • Professor (Full)
October 2000 - May 2010
University of Reading
Position
  • Lecturer
October 1997 - September 2000
University of St Andrews
Position
  • Research Associate

Publications

Publications (83)
Conference Paper
Shoshana Zuboff’s concept of the Big Other offers a means to understand the paradigm shifts provoked by surveillance capitalism—by social networking systems collecting user data with little government oversight or end user understanding. The Big Other’s inescapable annihilating power comes in part for how it evades legibility. In her analysis, Zubo...
Article
Full-text available
In prior work, a machine learning approach was used to develop a suggestion system for 80 privacy settings, based on a limited sample of five user preferences. Such suggestion systems may help with the user-burden of preference selection. However, such a system may also be used by a malicious provider to manipulate users' preference selections thro...
Article
Full-text available
Superhero films and episodic shows have existed since the early days of those media, but since 9/11, they have become one of the most popular and most lucrative forms of popular culture. These fantastic tales are not simple amusements but nuanced explorations of fundamental security questions. Their treatment of social issues of power, security and...
Conference Paper
Full-text available
This study deals with the social acceptance of the usage of wearable and/or implantable/insideable electronic devices for various purposes, especially for enjoying sports, in Japan as part of the cross-cultural study on cyborg ethics. Following the authors' previous work (Murata et al, 2017), qualitative study centred on semi-structured interviews...
Article
Full-text available
This study deals with young people’s attitudes towards and social acceptance of “cyborg technology” including wearables and insideables (or implantable devices) to enhance human ability in Japan as part of the international research project on cyborg ethics, taking Japanese socio-cultural characteristics surrounding cyborg technology into considera...
Article
Full-text available
The purpose of this study was to investigate how ordinary Japanese people perceive and understand data sensitivity and sensitive data. Although the concept of sensitive data is described in an article of Japan's revised personal data act, following the EU Data Protection Directive and the new data protection rule, there has been little research on...
Article
Full-text available
This study deals with young people's attitudes towards and social acceptance of "cyborg technology" including wearables and insideables (or implantable devices) to enhance human ability in Japan as part of the international research project on cyborg ethics, taking Japanese socio-cultural characteristics surrounding cyborg technology into considera...
Article
Full-text available
Purpose This paper aims to introduce a cross-cultural study of the views and implications of Snowden’s revelations about NSA/GCHQ surveillance practices, undertaken through surveys administered in eight countries. The aims and academic and social significance are explained, and justification is offered for the methods used. Design/methodology/appr...
Article
Full-text available
Purpose A survey of the attitudes of students in eight countries towards the revelations of mass surveillance by the US’ NSA and the UK’s GCHQ has been described in an introductory paper and seven country-specific papers (The People’s Republic of China and Taiwan are combined in a single paper). This paper aims to present a comparison of the result...
Article
Purpose As part of an international study of knowledge of and attitudes to Snowden’s revelations about the activities of the National Security Agency/Government Communications Headquarters, this paper aims to deal with Mexico, taking its socio-cultural and political environment surrounding privacy and state surveillance into account. Design/method...
Article
Full-text available
Purpose This study aims to map Swedish students’ attitudes towards Snowden’s revelations and their effects in the political and socio-cultural environment of Sweden. Design/methodology/approach A questionnaire was answered by 190 Swedish university students. The quantitative responses to the survey and qualitative considerations of free text answe...
Article
Full-text available
Purpose This paper aims to deal with the attitudes towards and social impact of Edward Snowden’s revelations in Japan, taking the Japanese socio-cultural and political environment surrounding privacy and state surveillance into account. Design/methodology/approach A questionnaire survey of 1,820 university students and semi-structured follow-up in...
Article
Full-text available
Purpose This study aims to investigate how Snowden’s revelations are viewed by young people in the People’s Republic of China (PRC) and Taiwan through questionnaire surveys of and follow-up interviews with university students in the two countries, taking into account the histories and current status of state surveillance in these countries and the...
Article
Full-text available
Purpose This study aims to analyse the impacts of Edward Snowden’s revelations in Spain focusing on issues of privacy and state surveillance. This research takes into consideration the Spanish context from a multidimensional perspective: social, cultural, legal and political. Design/methodology/approach The paper reviews the Spanish privacy and st...
Article
Full-text available
Purpose As part of an international study of knowledge of and attitudes to Snowden’s revelations about the activities of the National Security Agency/Government Communications Headquarters, this paper aims to deal with Germany, taking its socio-cultural and political environment surrounding privacy and state surveillance into account. Design/metho...
Article
Full-text available
Purpose This paper aims to present the baseline English survey used in the other papers in this special issue. Design/methodology/approach The survey includes yes/no, Likert scale and free text responses, which were analysed quantitatively and qualitatively. Findings Respondents to the survey expressed divergent views of whether they would emulat...
Article
Full-text available
Purpose This study aims to test the attitudes towards and social consequences of Edward Snowden’s revelations in New Zealand, taking into account New Zealand’s socio-cultural and political environment especially as regards privacy and state surveillance. Design/methodology/approach A questionnaire survey of 66 university students and semi-structur...
Conference Paper
Full-text available
This study deals with young people’s attitudes towards and social acceptance of “cyborg technology” including wearables and insideables (or implantable devices) to enhance human ability in Japan as part of the international research project on cyborg ethics, taking Japanese socio-cultural characteristics surrounding cyborg technology into considera...
Article
This study investigates the attitudes towards and social impacts of Edward Snowden's revelations in Japan through a questionnaire survey and follow-up interviews with Japanese youngsters as part of an international cross-cultural analyses. The survey results showed striking contrasts with ones in other countries reflecting the Japanese socio-cultur...
Article
Full-text available
The series of revelations made by Edward Snowden revelations starting on 5th June 2013 exposed a true picture of state surveillance or, more precisely, surveillance conducted by an industrial-government complex in the democratic nations. His revelations have attracted heavy doses of both praise and censure; whereas some have positively evaluated hi...
Article
This study investigates the attitudes towards and social impacts of Edward Snowden's revelations in Spain through a questionnaire survey answered by students in two Spanish universities (Universitat Rovira i Virgili and Burgos University). It is part of the worldwide cross-cultural analyses about privacy perceptions in young people. The survey resu...
Article
This study analyses the perceptions about Edward Snowden's revelations in Mexico. A questionnaire survey was developed and applied to students in a Mexican University (Autonomous University of San Luis Potosí). This Study is part of a global research about privacy perceptions by young people in different countries.
Article
This study investigates the attitudes towards and social impacts of Edward Snowden's revelations in Germany through a questionnaire survey with German youngsters as part of the worldwide cross-cultural analyses. However due to Snowden's revelations a continuing discussion about privacy, safety, security and data protection was unleashed in Germany....
Article
This study investigates the attitudes towards and social impacts of Edward Snowden's revelations in New Zealand through a questionnaire survey and follow-up interviews with New Zealand youngsters as part of the worldwide cross-cultural analyses. The survey results showed striking contrasts with those in other countries reflecting New Zealand's soci...
Article
This study investigates how Snowden's revelations are viewed by young people in the People's Republic of China (PRC) and the Republic of China (Taiwan) through questionnaire surveys of and follow-up interviews with university students in those countries. Considering the history of state surveillance in both countries and the current complicated and...
Article
Full-text available
Education, especially higher education, is considered vital for maintaining national and individual competitiveness in the global knowledge economy. Following the introduction of its “Free Education Policy” as early as 1947, Sri Lanka is now the best performer in basic education in the South Asian region, with a remarkable record in terms of high l...
Article
Full-text available
Many online services assume that they each account will only be accessed by one person, ever. This is even enshrined in the terms and conditions for some. However, our identities are bound up with others in various ways, in both life and death, legally and socially. A basic classification system for multiple ownership of accounts is proposed, based...
Article
Full-text available
The purpose of this paper is to explore the implementation of online learning in distance educational delivery at Yellow Fields University (pseudonymous) in Sri Lanka. The implementation of online distance education at the University included the use of blended learning. The policy initiative to introduce online components to distance education in...
Article
Full-text available
Social Network Sites (SNS) have become a very common part of life for a majority of regular Internet users. The implications of this usage for the privacy of users is a topic of significant concern socially and legally, and with respect to multiple parties: their connections, unconnected other users of the site, other ordinary Internet users, platf...
Article
Full-text available
Massive open online courses (MOOCs) are a recent addition to the range of online learning options. Since 2008, MOOCs have been run by a variety of public and elite universities, especially in North America. Many academics have taken interest in MOOCs recognising the potential to deliver education around the globe on an unprecedented scale; some of...
Article
Full-text available
http://openeducationeuropa.eu/en/download/file/fid/26956
Chapter
Security always involves making judgements in which the possibilities of harm to someone’s interests are assessed with respect to possible actions that can be taken to reduce the likelihood of that harm occurring, and/or reducing, the intensity of the harm when it occurs. Where the beneficiary of the reduction in risk is also the party footing the...
Article
Full-text available
Communal Internet access facilities or telecentres are considered a good way to provide connectivity to people who do not possess home connectivity. Attempts are underway to utilize telecentres as eLearning centres providing access to learning materials to students who would otherwise not be able to take up eLearning. This paper reports on the find...
Article
This article is a report on the Asian Privacy Scholars Network (APSN) 2nd International Conference: Privacy in the Social Networked World, Meiji University, Tokyo on 19-20 November 2012. The Conference involved researchers from ten countries, and was hosted by the Centre for Business Information Ethics at Meiji University, Tokyo. APSN is an associa...
Article
Full-text available
Massive open online courses (MOOCs) are a recent addition to the range of online learning options. Since 2008, MOOCs have been run by a variety of public and elite universities, especially in North America. Many academics have taken interest in MOOCs recognising the potential to deliver education around the globe on an unprecedented scale; some of...
Article
This article examines Japan’s proposed ID card and data matching system, called 'My Number'. Any businesses operating in Japan will be very likely to find themselves dealing with aspects of the ‘My Number’ system if they seek to do any work on behalf of agencies at any level of the Japanese government, and will consequently have to comply with this...
Article
Full-text available
The current state of the art and direction of research in computer vision aimed at automating the analysis of CCTV images is presented. This includes low level identification of objects within the field of view of cameras, following those objects over time and between cameras, and the interpretation of those objects’ appearance and movements with r...
Article
workpackage 1 of the project: copyright and IPR. When the project was initiated, there was, in the internet community, a great deal of interest in the area of “Intellectual Property Protection ” — so-called IPP. There was a strong view at the time, boosted by the U.S.’s Digital Millenium Copyright Act, that this would be done by cryptographic-based...
Article
Full-text available
Student cheating on university assessments from entrance exams to finals and from contract cheating on coursework to requesting exam answers using a mobile phone during the exam, has received more and more attention of late. As connection to the Internet becomes ubiquitous and computing and communications technology more embedded in our environment...
Article
Full-text available
Semi-structured interviews with university students in the UK and Japan, undertaken in 2009 and 2010, are analysed with respect to the revealed attitudes to privacy, self-revelation and revelation by/of others on SNS.
Article
Full-text available
In 2003, Japan enacted its first private-sector data protection legislation, complementing the concurrent update of the public-sector regulations. The publicly stated goal of the Japanese government was to support trade with Europe by providing suitably strong protection to qualify for European data-export approval. In this paper we examine the int...
Article
Full-text available
We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as Benedict (1946). In this paper we distinguish between information privacy and physical privacy. As we show, there is good evidence for social norms of limits on the sharing and u...
Article
Full-text available
It is over a decade since the signing of the World Intellectual Property Organization's "Internet treaties". These treaties' "anti-circumvention" rules ban the creation, distribution or use of tools that bypass Technological Protection Measures (TPMs) even for otherwise legal purposes. However, while these legal changes have not stopped the widespr...
Article
Full-text available
We present a conceptual architecture for a Group Support System (GSS) to facilitate Multi-Organisational Collaborative Groups (MOCGs) initiated by local government and including external organisations of various types. Multi-Organisational Collaborative Groups (MOCGs) consist of individuals from several organisations which have agreed to work toget...
Conference Paper
Full-text available
Almost every shopping website now posts its privacy policy online. Although the recognition of the right to privacy is inevitably affected by socio-cultural circumstances, there has been very little examination of the recognition of online privacy policies from a cross-cultural perspective. We analysed the results of a survey that investigated youn...
Article
Full-text available
Customer-Driven Development is a technique from the software development method called extreme Programming (XP) where customers (most importantly including end users of all levels) are closely involved in the software design and redesign process. This method of producing software suitable for customers has been adapted to help in the production of...
Article
Full-text available
interests, confidence in accuracy and reliability of information, vulnerability, and reciprocity, among other
Conference Paper
Full-text available
One of the main tasks of the mathematical knowledge management community must surely be to enhance access to mathematics on digital systems. In this paper we present a spectrum of approaches to solving the various problems inherent in this task, arguing that a variety of approaches is both necessary and useful. The main ideas presented are about th...
Article
Full-text available
Transreal arithmetic is a total arithmetic that contains real arithmetic, but which has no arithmetical exceptions. It allows the specification of the Universal Perspex Machine which unifies geometry with the Turing Machine. Here we axiomatise the algebraic structure of transreal arithmetic so that it provides a total arithmetic on any appropriate...
Conference Paper
Full-text available
Conference Paper
Full-text available
We present an overview of the current situation and recent and ex- pected future developments in areas of copyright law and economics relevant to Mathematical Knowledge Management.
Article
Pair Programming is a technique from the software development method eXtreme Programming (XP) whereby two programmers work closely together to develop a piece of software. A similar approach has been used to develop a set of Assessment Learning Objects (ALO). Three members of academic staff have developed a set of ALOs for a total of three differen...
Conference Paper
Full-text available
One of the main tasks of the mathematical knowledge management com-munity must surely be to enhance access to mathematics on digital systems. In this paper we present a spectrum of approaches to solving the various problems inherent in this task, arguing that a variety of approaches is both necessary and useful. The main ideas presented are about t...
Article
Full-text available
Rippling is a method of controlling rewriting of the terms in an induction step of an inductive proof, to ensure that a position is reached whereby the induction hypothesis can be applied. Rippling was developed primarily by the Mathematical Reasoning Group at the University of Edinburgh. The primary implementations are in the two proof planning s...
Article
Full-text available
We consider the utility of digital look up tables, as adjuncts/helpers to computer algebra systems. The requirements for dealing with logical side conditions raised by such tables are considered and proposals for using theorem proving technology as black box aids are considered. In addition, the use of real number theorem proving libraries to suppo...
Conference Paper
Full-text available
We describe an interface between version 6 of the Maple computer algebra system with the PVS automated theorem prover. The interface is designed to allow Maple users access to the robust and checkable proof environment of PVS. We also extend this environment by the provision of a library of proof strategies for use in real analysis. We demonstrate...
Article
Full-text available
. In [2] we presented a Denite Integral Table Lookup (the DITLU) for parametric functions, including a minimal prototype implementation demonstrating its capabilities. In this paper we present a possible application of a DITLU, which would extend its utility for a modest investment of eort. The naive algorithm for indenite integration of rational f...
Article
Full-text available
rule). This is also the case for NJ and LJ as defined in this formalisation. This is due to the particular nature of the logics in question, and does not necessarily generalise to other logics. In particular, a formalisation of linear logic would not work in this fashion, and a more complex variable-referencing mechanism would be required. See Sect...
Conference Paper
Full-text available
We present a verifiable symbolic definite integral table lookup: a system which matches a query, comprising a definite integral with parameters and side conditions, against an entry in a verifiable table and uses a call to a library of facts about the reals in the theorem prover PVS to aid in the transformation of the table entry into an answer. Ou...
Article
Full-text available
. A formalisation of the implicational fragments of two sequent calculi and a sequent-style presentation of natural deduction in Coq is presented. The systems presented are all typed lambda calculi. Based on this formalisation, some general comments on the feasibility of performing metatheoretic proofs about typed lambda calculi in a proof assistan...
Article
Full-text available
ALF [AGNvS94] is a structure editor for one of Martin-Löf's monomorphic type theories. It has been designed as an interactive environment for theorem proving and program development. Formulation of Natural Deduction via the Curry-Howard Isomorphism is a simple matter, and meta-theoretic proofs about Natural Deduction (e.g. normalisation proofs) are...
Article
Full-text available
Isabelle [Pau94] is a generic theorem proving environment. It is written in ML, and is part of the LCF [GMW79] family of tactic-based theorem provers. The core system uses a metalogic consisting of the implicational/universal fragment of an intuitionistic higher-order logic with equality. Within this system, a large number object logics can be repr...
Article
Full-text available
We assess the current state of research in the application of computer aided formal reasoning to computer algebra, and argue that embedded verification support allows users to enjoy its benefits without wrestling with technicalities. We illustrate this claim by considering symbolic definite integration, and present a verifiable symbolic definite in...
Article
SEQUELTar93, Tar95] is an environment built in and on top of Lisp to facilit-ate the programming of theorem provers. It uses an ASCII representation of single conclusion sequentzen rules involving typed expressions. A general method of coding SEQUEL frameworks for proving properties of sequent calculus systems is presen-ted, together with some idea...
Article
Full-text available

Network