351 resources related to Human Rights
- Topics related to Human Rights
- IEEE Organizations related to Human Rights
- Conferences related to Human Rights
- Periodicals related to Human Rights
- Most published Xplore authors for Human Rights
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE
2020 IEEE 18th International Conference on Industrial Informatics (INDIN)
INDIN focuses on recent developments, deployments, technology trends, and research results in Industrial Informatics-related fields from both industry and academia
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation
The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...
Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
The IEEE Computational Intelligence Magazine (CIM) publishes peer-reviewed articles that present emerging novel discoveries, important insights, or tutorial surveys in all areas of computational intelligence design and applications.
Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.
Engineering for Human Rights: Opportunities, Risks and Responsibilities, 08/01/2012
Engineers have a tradition of contributing in practical and meaningful ways to development, but seldom within the explicit framework of human rights. This webinar will explore what it means to adopt a human rights-based approach to engineering: the roles and responsibilities of engineers when designing and implementing projects, the opportunities to contribute to human rights through research and teaching, and ...
2013 IEEE Security and Privacy Workshops, 2013
We draw an ethical analogy between Internet freedom efforts and humanitarian aid work. This parallel motivates a number of ethical questions relating to anonymity and censorship-circumvention research.
IEEE Internet Computing, 2012
The Internet is an artifact, but its uses represent emergent properties of large numbers of users discovering ways in which to interact and share information that couldn't necessarily have been predicted from the basic Internet design. The net has become a vital part of our society, but whether access to it should be a "human right" is controversial. There can ...
Second International Conference on the Digital Society, 2008
It is widely recognized that ICT both affect and are affected by the socio- political environment into which it is introduced and functioning. Because of the neutrality of technology, ICT can act as a magnifier and multiplier of the inherent tendencies and characteristics of the spaces in which it is implemented and either support or undermine those values. ICT can ...
2017 9th International Conference on Cyber Conflict (CyCon), 2017
Whilst the political dust on mass surveillance is slowly settling down, what has become apparent is the uncertainty regarding the interpretation and application of the right to privacy norms under Article 17 of the International Covenant on Civil and Political Rights 1966 in the context of cyberspace. Despite the world-wide condemnation of these practices by, inter alia, the United Nations ...
GHTC 2012 Jim Fruchterman Keynote
Lightning Talks - Internet Inclusion: Global Connect Stakeholders Advancing Solutions, Washington DC, 2016
Social Implications: Perils & Promises of AI - IEEE AI & Ethics Summit 2016
Bias in the Age of the Algorithm | IEEE TechEthics Virtual Panel
Benefits and Challenges of Raising Children in an AI World: IEEE TechEthics Virtual Panel
Navigating the (Mis)Perceptions of Autonomous Vehicles | IEEE TechEthics Public Forum
From Mimicry to Mastery: Creating Machines that Augment Human Skill
Symbiotic Mobile Robot Autonomy in Human Environments
Mapping Human to Robot Motion with Functional Anthropomorphism for Teleoperation and Telemanipulation with Robot Arm Hand Systems
Rebooting Computing: HCI: What does the future hold for the human experience
One Giant Leap: The Moon Landing's Impact on Humanity | IEEE TechEthics Virtual Panel
Ethical Considerations 200 Years After Frankenstein: IEEE TechEthics Virtual Panel
Human-Robot Interaction Socially Assistive Robotics
Human-Guided Video Data Collection in Marine Environnment
IEEE 125th Anniversary Media Event: Embracing Human Technology Interactions
Panel Discussion: RegionaI Issues and Developments Related to Internet Governance, Cybersecurity and Privacy - ETAP Tel Aviv 2015
Shaping the Future Workforce: Transformative Impacts of Emerging Technologies | IEEE TechEthics Public Forum
IEEE Themes - Learning about human behavior from mobile phone data
Robotics History: Narratives and Networks Oral Histories: Sara Kiesler
Engineering for Human Rights: Opportunities, Risks and Responsibilities
Engineers have a tradition of contributing in practical and meaningful ways to development, but seldom within the explicit framework of human rights. This webinar will explore what it means to adopt a human rights-based approach to engineering: the roles and responsibilities of engineers when designing and implementing projects, the opportunities to contribute to human rights through research and teaching, and the potential risks that engineering and technology pose to human rights, and how to manage such risks.
We draw an ethical analogy between Internet freedom efforts and humanitarian aid work. This parallel motivates a number of ethical questions relating to anonymity and censorship-circumvention research.
The Internet is an artifact, but its uses represent emergent properties of large numbers of users discovering ways in which to interact and share information that couldn't necessarily have been predicted from the basic Internet design. The net has become a vital part of our society, but whether access to it should be a "human right" is controversial. There can be no question, however, that it has become a critical tool for research, business, education, government, and social interaction.
It is widely recognized that ICT both affect and are affected by the socio- political environment into which it is introduced and functioning. Because of the neutrality of technology, ICT can act as a magnifier and multiplier of the inherent tendencies and characteristics of the spaces in which it is implemented and either support or undermine those values. ICT can be considered not only as a mean of exchanging and disseminating information but can also be a tool to enhance human rights. There is however always an important risk that inappropriate use of ICT could undermine those rights, disenfranchise particular socio-economic groups and attack the fundamental institutions of democracy. The aim of this paper is to discuss existing international regulatory mechanisms related to human rights in the context of the digital society. There are ongoing efforts to introduce new mechanisms to regulate the digital society, and this contribution seeks to highlight current strengths and limitations of existing international regulations governing human rights issues.
Whilst the political dust on mass surveillance is slowly settling down, what has become apparent is the uncertainty regarding the interpretation and application of the right to privacy norms under Article 17 of the International Covenant on Civil and Political Rights 1966 in the context of cyberspace. Despite the world-wide condemnation of these practices by, inter alia, the United Nations and international human rights organisations, little consensus has been reached on how to bring them in line with international human rights law. This paper proposes that the most pragmatic solution is updating Article 17 by replacing General Comment No.16. There are many issues that require attention. The paper focuses on two fundamental aspects of this process, namely the development of more detailed understanding of what is meant by the right to privacy in the 21st century, and the challenge posed by foreign cyber surveillance to the principle of extraterritorial application of human rights treaties. To that end, the paper identifies that the `effective control' test, developed by international human rights courts and bodies adopted to determine jurisdiction, is unsuitable in the context of state- sponsored cyber surveillance. The paper considers a number of suggestions made by legal scholars, which hinge on the control of communications, rather than the physical control over areas or individuals. Such a `virtual control' approach seems in line with the jurisprudence of the European Court of Human Rights, according to which extraterritorial obligations may arise when states exercise authority and control over an individual's human rights, despite not having physical control over that individual. The paper argues that the `virtual control' test, understood as a remote control over the individual's right to privacy of communications, may help to close the normative gap that state intelligence agencies keenly exploit at the moment.
Bangladesh is one of the most densely populated and least developed counties in the world. She has been suffering much due to poverty, mal administration, corruption, scarcity of natural resources, natural calamities etc.; but working with many initiatives for attaining the Millennium Development Goals by 2015 for Bangladesh. Consequently, the state of human rights to the people of Bangladesh is still very vulnerable compared to some other countries in the world. In order to protect these rights, meanwhile, the Government of Bangladesh has passed some important national and international laws and policies including the Right to Information Act, 2009; the National Human Rights Commission Act, 2008 etc. Some international legal foundations and efforts such as the Earth Summit Conference, Johannesburg Conference, Rio Declaration etc; have been been made in this regard. But due to some practical constraints and reasons in the administration such as lack of daily basis transparency and accountability, non coordination, corrupt mentality, lack of enforcement and implementation, insufficient technical and research knowledge, inadequate penal provision, bureaucratic mentality, ignorance of civil society's initiatives and opinions and over all weak judiciary etc., are responsible for it. But it is still hopeful that we implement the theory of the Digital Bangladesh applying the Information and Communication Technology Law and Policy, we could easily do justice to the people of Bangladesh. But we need to come back to the way of the prophet including the kahlifa Hazra Omar (R.). The study will provide an overview of the role of ICT Law and Policy safeguarding the human rights to the people of Bangladesh based on the primary and secondary sources consisting of at least 25 people in the different criteria such as the university lecturers and students from Bangladesh and abroad, local students, foreigners, common people, workers etc; in the Melaka City, Malaysia.
In the human rights domain, there is need to filter, efficiently classify and prioritize the types of violation endured by victims in order to provide the necessary rehabilitation and support. However, the domain is dominated by unstructured data either from victims' accounts, doctors'/professionals' reports or available on line. Manual classification still prevails in this domain which is extremely time consuming and slow. This is a problem for non- government operated charities. To this end we have explored the application of the co-training algorithm in order to improve the performance of a semi- supervised learning algorithm by incorporating large amounts of unlabeled data into the training data set. However, it remains challenging to apply co- training on the data without two independent and self sufficient views. This paper puts forth a method of randomly dividing the available features to apply matrix factorization so as to discover latent features underlying the interactions between different kinds of entities present in a single view dataset. These labeled views balance the biased information in the dataset, but still satisfy the co-training assumptions. Alongside, the views are constrained such that pairs of labeled views create weak classifiers which in turn increase the prediction accuracy when combined. In the majority of cases, any classification tries to connect a single class to each sample or object. However, in the human rights domain, a victim can be subjected to more than one type of violation or abuse. This is multi-label classification where a sample can be assigned to more than one class. This paper aims to address all these aspects by bringing together a semi supervised classification model that relies on the effectiveness of matrix collaborative filtering in order to classify stories narrated by victims into one or more types of human rights abuses. Experimental results demonstrate the efficiency of this approach when applied on real-world stories from different victims.
This paper is about the conceptual design of the IT support for human rights watching, police transparency and police performance evaluation. Firstly we understand that human rights are rights that humans have by the fact of being human, and which are neither created nor can be abrogated by any governmental institution. These include cultural, economic, and political rights, such as right to life, liberty, education and equality before law, and right of association, belief, free speech, information, religion, movement, and nationality. Secondly, of course, we know that transparency means that something can be seen through. When we talk about transparency in police stations, we mean that citizens must be able to "see through" its workings. A police that is not transparent is more prone to corruption and undue influence because there is no public oversight of decision making. Thirdly we mention that individual performance evaluation is generally not well developed in police departments. The most common practice consists of an annual or semiannual subjective rating form filled out by police supervisors, where persons are rated with respect to global categories such as initiative and appearance. Many departments make no effort to assess performance at all. The self-protectiveness of the police subculture and the fact that little concrete depends on the evaluations mean that many departments have abandoned them, or they have become empty rituals, where almost everyone's performance is rated as satisfactory. This paper presents an environment that facilities police performance evaluation. From a Software Engineering point of view, this paper reports a very specific and innovative software development project oriented both to support human right watching activities, to improve police transparency, to evaluate police performance and to prepare police stations for ISO 9001:2008 certification.
Emergencies are conflicts between emergency power and emergency power nullification under abnormal state. To properly balance interest boundary between them is the key to legislation. Limitations on human rights in emergencies are means but not the objective; and protection of human rights is the logic precondition and ultimate objective of legislation. The Emergency Response Law establishes human right concept, proportional principle, rule of law, principle of protection of human rights, but lacks principle of minimum standards, principle of constitution reservation and right-relief principle, which shall be legislated and improved.
Data Protection (DP) and Universal Human Rights are extremely relevant to biometrics, where inherently private data is used for authentication purposes. In this context this paper stresses that there are significant challenges beyond biometric authentication. For example, it has been shown in the existing literature that medical information of a skin disease from a fingerprint, symptoms of diabetes on the retina, or diseases affecting one's walk can be extracted from biometric recordings. We address the derived privacy challenges in biometrics by a careful review of relevant aspects of the universal human rights from UN documents and the EU General Data Protection Regulation (GDPR) with a first identification and enumeration of relevant attributes. From the derived privacy sensitive attributes and respective requirements, de-identification approaches to protection of soft biometrics in face and fingerprints are explored. In consideration of these techniques, there is the question of what constitutes legal and moral biometric signal processing presently in the state-of-the-art, as well as motivation for further work towards fulfilling the criteria.
No standards are currently tagged "Human Rights"
Siri - ML Research Scientist (Private Learning)
Product Manager, Machine Learning and Personalization
NPI Safety & Sustainability Program Manager
Research Associate - Nanophotonics
University of British Columbia
System Security Program Manager, AppleCare Support