Results for ' cyber cafe'

769 found
Order:
  1.  8
    The non‐formal business of cyber cafés: a case‐study from India.Nimmi Rangaswamy - 2009 - Journal of Information, Communication and Ethics in Society 7 (2/3):136-145.
    PurposeThe purpose of this paper is to profile everyday management and business strategies of 30 cyber cafés in Mumbai and contextualize them in the broader and pervasive culture of non‐formal economy.Design/methodology/approachThe paper conducts an ethnographic study of open‐ended interviews of cyber café owner/managers to understand everyday patterns of managing a cyber café. The field observations and literature review aid an understanding of non‐formal economy in Mumbai.FindingsThe paper finds three important insights: business with internet technologies, even at the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  2.  12
    Quem o fez, quem o resolve e quem o corrige.Carlos Café - 2011 - Critica.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  8
    Revista Digital de Ensino de Filosofia (ReFiLo): a mensageira santa-mariense da educação filosófica no Brasil.Anderson Luis da Paixão Café, Adelmária Ione dos Santos & Isna Gabriel Sia - forthcoming - Revista Digital de Ensino de Filosofia - REFilo.
    É bastante conhecida a interrogação do filósofo Immanuel Kant a respeito da possibilidade ou não de se ensinar filosofia. Partindo-se da premissa de que não é possível dissociar a filosofia de seu ensino, este artigo se propôs a responder a seguinte questão: de que maneira a Revista Digital de Ensino de Filosofia (ReFiLo) contribui para o debate e o fortalecimento da educação filosófica no Brasil? Para responder a esta pergunta, realizou-se uma pesquisa de natureza qualitativa e quantitativa, adotando-se a pesquisa (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  16
    Formação Do Estado Democrático de Direito e as Deformações a Partir Das Fake News.Pedro Ygor Café Paes Lira, Diego Henrique Barros Melo, Paulo Ricardo Silva Lima, Ana Lydia Vasco de Albuquerque Peixoto, Antônio Tancredo P. da Silva, Anderson de Alencar Menezes & Vitor Gomes da Silva - 2023 - Logeion Filosofia da Informação 10:14-37.
    A evolução dos meios de comunicação propiciou um massivo fluxo informacional, trazendo consigo alguns entraves. O fenômeno das fake news é produto dessa mudança na sociedade, afetando de diversas formas a vida das pessoas e inclusive a possibilidade de uma escolha plena e livre de influências, sua liberdade de expressão, pensamento e informação. Nesse contexto, este evento se torna gravoso para o nosso Estado Democrático, na medida que influencia o comportamento, as escolhas políticas, a conduta social e a solidez da (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. A relev'ncia do prévio esgotamento Das inst'ncias desportivas E as sanções ao seu descumprimento.Nicholas Café de Melo Morais de Mendonça - 2015 - Revista Fides 6 (1).
    A RELEVÂNCIA DO PRÉVIO ESGOTAMENTO DAS INSTÂNCIAS DESPORTIVAS E AS SANÇÕES AO SEU DESCUMPRIMENTO.
    No categories
     
    Export citation  
     
    Bookmark  
  6.  14
    El Poder Comunista.Mario Aguiriano Café Marx - 2022 - International Journal of Žižek Studies 16 (1).
    Hablar del poder comunista significa estudiar el “poder” como potencia, que esconde, de hecho, una cuestión central que aleja a Marx y a la teoría materialista de las diferentes formas de idealismo político, viejas o nuevas, tanto como aleja a la teoría dialéctica de sus muchos enemigos. Y esta es precisamente la cuestión de la posibilidad, o de la correcta comprensión de la categoría de posibilidad, o la relación entre lo posible y lo imposible, posibilidades materiales y posibilidades meramente subjetivas. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  8. ”British philosophy past, present and future.^ Philosophers'\ I „-4>'magazine K'.Ge Moore, Defending Animal Rights & Socrates Cafe - 2001 - The Philosophers' Magazine 13:5.
    No categories
     
    Export citation  
     
    Bookmark  
  9.  26
    Narratives from call shop users: Emotional performance of velocity.Simone Belli, Rom Harré & Lupicinio Iñiguez - 2014 - Human Affairs 24 (2):215-231.
    In recent years, the debate on emotions has been influenced by postconstructionist research, particularly the use of performativity as a key concept. According to Judith Butler (1993, 1997) the construction of emotions is a process open to constant change and redefinition. The final result of emotionlanguage “natural” development is what is known as technoscience. New ways of naming emotions have emerged within technoscience. In our research on the use of information and communication technologies (ICT) by cyber-café and call shop (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  10.  15
    Los cibercafé como lugares de prácticas trasnacionales: El caso de la maternidad a distancia.Carolina Stefoni - 2013 - Polis: Revista Latinoamericana 35.
    Los cibercafé o locutorios corresponden a un tipo de negocios que se han ido expandiendo con fuerza en sectores donde se congrega un número importante de migrantes en diversas ciudades del mundo. Estos lugares son apropiados, utilizados y significados de distintas maneras por los usuarios. Este artículo es parte de una investigación mayor sobre la formación de un enclave de migrantes en el sector de Plaza de Armas, en el centro de Santiago (Chile). El foco de atención está puesto en (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. A Continuous Act..Nico Jenkins - 2012 - Continent 2 (4):248-250.
    In this issue we include contributions from the individuals presiding at the panel All in a Jurnal's Work: A BABEL Wayzgoose, convened at the second Biennial Meeting of the BABEL Working Group. Sadly, the contributions of Daniel Remein, chief rogue at the Organism for Poetic Research as well as editor at Whiskey & Fox , were not able to appear in this version of the proceedings. From the program : 2ND BIENNUAL MEETING OF THE BABEL WORKING GROUP CONFERENCE “CRUISING IN (...)
     
    Export citation  
     
    Bookmark  
  12.  21
    Ethik-Cafés in der geriatrischen Langzeitpflege: halten sie, was sie versprechen?: Über ihre wahrgenommene Wirkung beim Personal und die Effekte auf verschiedene Berufsgruppen.Marcel Maier & Sandra Kälin - 2016 - Ethik in der Medizin 28 (1):43-55.
    ZusammenfassungEthik-Cafés in der geriatrischen Langzeitpflege dienen auch der ethischen Weiterbildung und sollen den Beteiligten in ungezwungener Atmosphäre einen offenen Diskurs über moralische Fragen mit Bezug zum Arbeitsalltag ermöglichen. In der Literatur werden ihnen diverse Eigenschaften wie Verbesserung der Analysefähigkeit und der Kommunikation, Erhöhung der ethischen Sensibilität und der Entscheidungskompetenz und weitere zugeschrieben. Diese Eigenschaften resultieren vorwiegend aus theoriegeleiteten Modellen. Gegenstand dieser Studie ist die empirische Untersuchung der Wirksamkeit von Ethik-Cafés innerhalb der Pflegezentren Mattenhof-Irchelpark, Zürich. Des Weiteren geht die Studie der (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  16
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  15.  7
    Au café jusqu’au bout de la nuit.Florian Bonnefoi - forthcoming - Temporalités.
    Des mesures d’urgence limitant l’ouverture des établissements accueillant du public en soirée ont été prises lors de la pandémie de la Covid-19, puis pérennisées. La crise devient une opportunité pour le gouvernement égyptien de légiférer sur la nuit. Cette volonté est réitérée en 2022 dans le contexte de la crise de l’énergie. Les cafés populaires, _ahâwî baladî_, font partie des établissements ciblés par ce qui apparaît comme une tentative de reprise en main de l’espace public. Café et période nocturne sont (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  33
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  17.  22
    Cafe Conversations: Participatory Philosophy in Public Spaces.Michael Picard (ed.) - 2024 - Oakville, Ontario, Canada: Rocks' Mills Press. Translated by Michael Picard.
    This collection of essays is the first to look closely at the phenomena of philosophy in a cafe. Since the tradition of philosophical dialogue in coffee-houses was revived in Paris in the 1990s, public venues for participatory philosophy have sprung up in numerous countries, taking many forms, all seeking to stimulate intellectual interest as well as meaningful democratic community engagement. Some of the earliest discussion series continue to this day. The simple activity of reasoning together in a cafe (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  9
    Café Noir.Brook J. Sadler - 2011-03-04 - In Fritz Allhoff, Scott F. Parker & Michael W. Austin (eds.), Coffee. Wiley‐Blackwell. pp. 100–112.
    This chapter contains sections titled: Coffee or Tea? The American Coffeehouse Individual Choice, Social Meaning.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  26
    Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  29
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  27
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  26
    Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  52
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  6
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  3
    Das Café der toten Philosophen: ein philosophischer Briefwechsel für Kinder und Erwachsene.Vittorio Hösle - 1996
    A series of letters between a professor of philosophy and an eleven-year-old girl.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  31
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  13
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  17
    Ethik-Cafés im Sozial- und Gesundheitswesen: Sich über aktuelle Lebensfragen ethisch verständigen und austauschen.Manfred Baumann & Carola Fromm - 2023 - Springer Berlin Heidelberg.
    Seit über zehn Jahren moderieren die Autor*innen mit hohem Zuspruch das Ethik-Café in Einrichtungen des Sozial- und Gesundheitswesens. Menschen aus unterschiedlichen Berufen, Patient*innen, An- und Zugehörige sowie ethisch Interessierte haben im Ethik-Café die Möglichkeit, aus ihrer persönlichen und beruflichen Perspektive ethische Fragestellungen zu diskutieren, die für ihren Alltag relevant sind. Ethik-Cafés sind niederschwellig, multiprofessionell, interdisziplinär. Die Teilnehmer*innen profitieren von dieser Perspektivenvielfalt. Das Buch stellt die Konzeption sowie deren Evaluation, die theoretischen und methodischen Voraussetzungen und in vielen Beispielen die praktische Umsetzung (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  3
    Café Babel.Laurence Marie - 2022 - Labyrinthe 12:133-134.
    « _Parla la tua mente_ », « _Alza tu voz_ » « _Speak your mind_ »… Traduction pour les non-babéliens : « Déliez vos langues » avec « Café Babel », le premier média de la « euro-génération ». Tout commence à l’Institut d’études politiques de Strasbourg où des étudiants en séjour Erasmus se retrouvent après la classe pour débattre sur l’Europe. De discussions en polémiques, quatre d’entre eux ont alors l’idée de créer un organe de parole où étendre leur (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  10
    The Cafe Of The Bards: A Chapter From Today’s Ministrelsy Tradition In The City Of Van.Abdulselam Arvas - 2009 - Journal of Turkish Studies 4:179-196.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  11
    Café philosophique 21 october 2006 philosophy as a matter of taste.David Large - forthcoming - Philosophy.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  6
    Death cafés as a strategy to foster compassionate communities: Contributions for death and grief literacy.Carlos Laranjeira, Maria Anjos Dixe, Ana Querido & Jennifer Moran Stritch - 2022 - Frontiers in Psychology 13.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  43
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I will (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  33
    Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37. Café noir : anxiety, existence, and the coffeehouse.Brook J. Sadler - 2011 - In Scott F. Parker & Michael W. Austin (eds.), Coffee - Philosophy for Everyone: Grounds for Debate. Wiley-Blackwell.
    No categories
     
    Export citation  
     
    Bookmark  
  38.  9
    #WeareUnited, cyber-nationalism during times of a national crisis: The case of a terrorist attack on a school in Pakistan.Fauzia Janjua & Salma Kalim - 2019 - Discourse and Communication 13 (1):68-94.
    Seeing language as a social practice and national identities as a product of discourse, the study intends to analyze discursive practices employed on social media to create the discourses of sameness and difference in times of national crisis. Following the discourse historical approach, I have illustrated how argumentative strategies and topos have been strategically employed to draw boundaries between Us and Them. In this exploration of exclusionary rhetoric, I have also underlined the use of images, memes and hashtags in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  26
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  42
    At the Existentialist Café: Freedom, Being, and Apricot Cocktails with Jean-Paul Sartre, Simone de Beauvoir, Albert Camus, Martin Heidegger, Maurice Merleau-Ponty and Others.Sarah Bakewell - 2016 - New York: Other Press.
    Named one of the Ten Best Books of 2016 by the New York Times, a spirited account of a major intellectual movement of the twentieth century and the revolutionary thinkers who came to shape it, by the best-selling author of How to Live Sarah Bakewell. Paris, 1933: three contemporaries meet over apricot cocktails at the Bec-de-Gaz bar on the rue Montparnasse. They are the young Jean-Paul Sartre, Simone de Beauvoir, and longtime friend Raymond Aron, a fellow philosopher who raves to (...)
  41.  86
    Afro cyber resistance: South African Internet art.Tabita Rezaire - 2014 - Technoetic Arts 12 (2):185-196.
    Looking at the digital–cultural–political means of resistance and media activism on the Internet, this article explores Internet art practices in South Africa as a manifestation of cultural dissent towards western hegemony online. Confronting the unilateral flow of online information, Afro Cyber Resistance is a socially engaged gesture aiming to challenge the representation of the African body and culture through online project. Talking as examples the WikiAfrica project, Cuss Group’s intervention Video Party 4 (VP4) and VIRUS SS 16 by artiste (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  42.  7
    Cyber Inclusion vs Isolation.Zhanna Vavilova - 2023 - Dialogue and Universalism 33 (1):77-90.
    Recent restrictions of movement during the pandemic have forced people worldwide, even neo-luddites, to turn to communicating online. The virtualization of social processes that we are witnessing today, suggests constant rethinking of the role of the Internet for humanity so that we could optimize conditions of our existence that seem to be irreversibly transformed by technology, and integrate every individual with a unique set of features in the life of society. The author deals with the notions of cyberinclusion, virtual ghetto, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  4
    Um café com Sêneca: um guia estoica para a arte do viver, de David Fideler.Aldo Dinucci - 2023 - Cadernos de Ética E Filosofia Política 42 (2):134-136.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. Armchair Cyber Travelers: A Kansas City-Cairo Discussion Group.Safia El-Wakil & Daniel J. Martin - 2002 - Kairos (Université de Toulouse-Le Mirail. Faculté de philosophie) 7:24.
    No categories
     
    Export citation  
     
    Bookmark  
  45. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  8
    Cyber Terrorism And Cyber Law - Duties Of Service Providers.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    The year 2017 has dawned in a new era. This is an era where cyber terrorism and cyber extremism are increasingly going to be significant factors in our day-to-day lives. Whether we like it or not, today social media platforms are infiltrated with cyber terrorists and cyber extremists. In addition, Cyber radicalization as a phenomenon is constantly on the rise.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  86
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  18
    Philosophy cafés & pubs.Bryn Williams - 1998 - Philosophy Now 21:10-11.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  13
    Cyber(Body)Parts: Prosthetic Consciousness.Robert Rawdon Wilson - 1995 - Body and Society 1 (3-4):239-259.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  86
    Hume – cyber-Hume – enactive Hume. Interview with Tom Froese.Tom Froese, Karolina Karmaza, Przemysław Nowakowski & Witold Wachowski - 2011 - Avant: Trends in Interdisciplinary Studies 2 (1):75-77.
    David Hume; Enactivism; Cognitive Science; Phenomenology; Philosophy of mind.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 769