Haleh Asgarinia

Haleh Asgarinia
Verified
Haleh verified their affiliation via an institutional email.
Verified
Haleh verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Postdoctoral Researcher at Maastricht University

Philosophy and Ethics: Ethics of Technology, AI, Privacy, Data Protection

About

14
Publications
646
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Introduction
Research interests: ethics of emerging technology, privacy and data protection, AI and machine learning
Current institution
Maastricht University
Current position
  • Postdoctoral Researcher

Publications

Publications (14)
Article
Full-text available
An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued...
Article
Full-text available
Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around...
Article
Full-text available
This research explores how a person with whom information has been shared and, importantly, an artificial intelligence (AI) system used to deduce information from the shared data contribute to making the disclosure context private. The study posits that private contexts are constituted by the interactions of individuals in the social context of int...
Article
Full-text available
Digital data help data scientists and epidemiologists track and predict outbreaks of disease. Mobile phone GPS data, social media data, or other forms of information updates such as the progress of epidemics are used by epidemiologists to recognize disease spread among specific groups of people. Targeting groups as potential carriers of a disease,...
Article
Full-text available
News about personal data breaches or data abusive practices, such as Cambridge Analytica, has questioned the trustworthiness of certain actors in the control of personal data. Innovations in the field of personal information management systems to address this issue have regained traction in recent years, also coinciding with the emergence of new de...
Article
Full-text available
In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphori...
Article
Full-text available
Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around...
Conference Paper
Full-text available
The widespread use of apps in response to COVID-19 raises concerns about privacy. Understanding the extent to which technology affects privacy and data protection is a core aspect of the Privacy Impact Assessment (PIA). PIA is a methodology for assessing the impacts on privacy of a technology that involves the processing of personal information, an...
Book
Bitcoin is a cryptocurrency project that refers to its currency as "bitcoin" (capitalized!). This new payment system is peer-to-peer and operates without centralized authority (like a central bank). A "Distributed Multi-Agent System" (DMAS) is a Cryptocurrency Payment System (CPS). DMAS is made up of several interacting agents that are dispersed al...
Thesis
Software piracy causes huge financial damages to software Industry. In this research, I am proposing an efficient method for neutralizing published patcher/patched files developed by crackers for software. The proposed method can be used as a powerful protective mechanism for codes which have already been generated. The idea behind this method is g...

Network

Cited By