
Haleh Asgarinia- Doctor of Philosophy
- Postdoctoral Researcher at Maastricht University
Haleh Asgarinia
- Doctor of Philosophy
- Postdoctoral Researcher at Maastricht University
Philosophy and Ethics: Ethics of Technology, AI, Privacy, Data Protection
About
14
Publications
646
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Introduction
Research interests: ethics of emerging technology, privacy and data protection, AI and machine learning
Skills and Expertise
Current institution
Publications
Publications (14)
An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued...
Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around...
This research explores how a person with whom information has been shared and, importantly, an artificial intelligence (AI) system used to deduce information from the shared data contribute to making the disclosure context private. The study posits that private contexts are constituted by the interactions of individuals in the social context of int...
Digital data help data scientists and epidemiologists track and predict outbreaks of disease. Mobile phone GPS data, social media data, or other forms of information updates such as the progress of epidemics are used by epidemiologists to recognize disease spread among specific groups of people. Targeting groups as potential carriers of a disease,...
News about personal data breaches or data abusive practices, such as Cambridge Analytica, has questioned the trustworthiness of certain actors in the control of personal data. Innovations in the field of personal information management systems to address this issue have regained traction in recent years, also coinciding with the emergence of new de...
In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphori...
Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around...
The widespread use of apps in response to COVID-19 raises concerns about privacy. Understanding the extent to which technology affects privacy and data protection is a core aspect of the Privacy Impact Assessment (PIA). PIA is a methodology for assessing the impacts on privacy of a technology that involves the processing of personal information, an...
Bitcoin is a cryptocurrency project that refers to its currency as "bitcoin" (capitalized!). This new payment system is peer-to-peer and operates without centralized authority (like a central bank). A "Distributed Multi-Agent System" (DMAS) is a Cryptocurrency Payment System (CPS). DMAS is made up of several interacting agents that are dispersed al...
Software piracy causes huge financial damages to software Industry. In this research, I am proposing an efficient method for neutralizing published patcher/patched files developed by crackers for software. The proposed method can be used as a powerful protective mechanism for codes which have already been generated. The idea behind this method is g...