Results for ' computer security'

1000+ found
Order:
  1.  85
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  2.  19
    Computer security for the people.Jay Bloombecker - 1985 - Acm Sigcas Computers and Society 14 (1, 2, 3, 4):12-15.
  3.  11
    Computer Security Incident Response Team Effectiveness: A Needs Assessment.Rick Van der Kleij, Geert Kleinhuis & Heather Young - 2017 - Frontiers in Psychology 8.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  4.  15
    Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed With Functional MRI.C. Brock Kirwan, Daniel K. Bjornn, Bonnie Brinton Anderson, Anthony Vance, David Eargle & Jeffrey L. Jenkins - 2020 - Frontiers in Psychology 11.
    Computer users are often the last line of defense in computer security. However, with repeated exposures to system messages and computer security warnings, neural and behavioral responses show evidence of habituation. Habituation has been demonstrated at a neural level as repetition suppression where responses are attenuated with subsequent repetitions. In the brain, repetition suppression to visual stimuli has been demonstrated in multiple cortical areas, including the occipital lobe and medial temporal lobe. Prior research into the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  10
    Testimony on computer security before the U.S. senate Subcommittee on oversight of government management of the commmittee on governmental affairs.Susan Hubbell Nycum - 1984 - Acm Sigcas Computers and Society 13 (4, 1-3):2-4.
  6. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  7.  13
    Vulnerabilities and responsibilities: dealing with monsters in computer security.W. Pieters & L. Consoli - 2009 - Journal of Information, Communication and Ethics in Society 7 (4):243-257.
    PurposeThe purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.Design/methodology/approachVulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  8. Part VII. Towards renewed political life and citizenship: 19. electronic voting and computer security.Stephan Brunessaux - 2010 - In Bernard Reber & Claire Brossaud (eds.), Digital cognitive technologies: epistemology and the knowledge economy. Hoboken, NJ: Wiley.
     
    Export citation  
     
    Bookmark  
  9.  13
    Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.Zahid Maqbool, Palvi Aggarwal, V. S. Chandrasekhar Pammi & Varun Dutt - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  14
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  28
    Biological models of security for virus propagation in computer networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. Computational Intelligence Approaches and Methods for Security Engineering-Development of an Attack Packet Generator Applying an NP to the Intelligent APS.Wankyung Kim & Wooyoung Soh - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4252--709.
  13.  70
    Computer Ethics and Professional Responsibility.Terrell Ward Bynum & Simon Rogerson (eds.) - 1998 - Wiley-Blackwell.
    This clear and accessible textbook and its associated website offer a state of the art introduction to the burgeoning field of computer ethics and professional responsibility. Includes discussion of hot topics such as the history of computing; the social context of computing; methods of ethical analysis; professional responsibility and codes of ethics; computer security, risks and liabilities; computer crime, viruses and hacking; data protection and privacy; intellectual property and the “open source” movement; global ethics and the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  14. Special Session on Computational Intelligence Approaches and Methods for Security Engineering-Adaptable Designated Group Signature.Chunbo Ma & Jianhua Li - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4113--1053.
     
    Export citation  
     
    Bookmark  
  15. Hybrid Information Technology Using Computational Intelligence-Security Intelligence: Web Contents Security System for Semantic Web.Nam-Deok Cho, Eun-ser Lee & Hyun-gun Park - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4252--819.
     
    Export citation  
     
    Bookmark  
  16. Workshop on Security Issues on Grid/Distributed Computing Systems (SIGDCS 2006)-Towards Reliable and Trustworthy Cooperation in Grid: A Pre-evaluating Set Based Trust Model.Xiangli Qu, Jingwei Zhong & Xuejun Yang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3984--224.
     
    Export citation  
     
    Bookmark  
  17.  18
    Context-aware security management system for pervasive computing environment.Seon-Ho Park, Young-Ju Han & Tai-Myoung Chung - 2007 - In D. C. Richardson B. Kokinov (ed.), Modeling and Using Context. Springer. pp. 384--396.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Special Session on Computational Intelligence Approaches and Methods for Security Engineering-A Study on the Improvement of Military Logistics System Using RFID.Mingyun Kang, Minseong Ju, Taihoon Kim, Geuk Leek & Kyung Sung - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 1098-1102.
    No categories
     
    Export citation  
     
    Bookmark  
  19.  98
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  10
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  14
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  42
    Precision Security: Integrating Video Surveillance with Surrounding Environment Changes.Wenfeng Wang, Xi Chen, Guiwei Zhang, Jing Qian, Peng Wei, Boqian Wu & Hongwei Zheng - 2018 - Complexity 2018:1-10.
    Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. This article presents a brain-inspired computing of attention value of surrounding environment changes with a processes-based cognition model by introducing a ratio valueλof EC-implications within considered periods. Theoretical models for computation of warning level of EC-implications to the universal video recognition efficiency are further established. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  3
    Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism.Stefan Helmreich - 2000 - Science, Technology, and Human Values 25 (4):472-491.
    This article analyzes computer security rhetoric, particularly in the United States, arguing that dominant cultural understandings of immunology, sexuality, legality, citizenship, and capitalism powerfully shape the way computer viruses are construed and combated. Drawing on popular and technical handbooks, articles, and Web sites, as well as on e-mail interviews with security professionals, the author explores how discussions of computer viruses lean on analogies from immunology and in the process often encode popular anxieties about AIDS. (...) security rhetoric about compromised networks also uses language reminiscent of that used to describe the “bodies” of nation-states under military threat from without and within. Such language portrays viruses using images of foreignness, illegality, and otherness. The security response to viruses advocates the virtues of the flexible and adaptive response—a rhetoric that depends on evolutionary language but also on the ideological idiom of advanced capitalism. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  78
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  33
    Wide Computation: A Mechanistic Account.Luke Kersten - 2020 - Dissertation, University of Edinburgh
    This Ph.D. thesis explores a novel way of thinking about computation in cognitive science. It argues for what I call ‘the mechanistic account of wide computationalism’, or simply wide mechanistic computation. The key claim is that some cognitive and perceptual abilities are produced by or are the result of computational mechanisms that are, in part, located outside the individual; that computational systems, the ones that form the proper units of analysis in cognitive science, are particular types of functional mechanisms that, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  20
    A Clonal Selection Optimization System for Multiparty Secure Computing.Minyu Shi, Yongting Zhang, Huanhuan Wang, Junfeng Hu & Xiang Wu - 2021 - Complexity 2021:1-14.
    The innovation of the deep learning modeling scheme plays an important role in promoting the research of complex problems handled with artificial intelligence in smart cities and the development of the next generation of information technology. With the widespread use of smart interactive devices and systems, the exponential growth of data volume and the complex modeling requirements increase the difficulty of deep learning modeling, and the classical centralized deep learning modeling scheme has encountered bottlenecks in the improvement of model performance (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  77
    A Simple Model of Secure Public Communication.Hannu Vartiainen - 2009 - Theory and Decision 67 (1):101-122.
    Public communication is secure if a hostile third-party cannot decode the messages exchanged by the communicating parties. In Nash equilibrium, communication by computationally unbounded players cannot be secure. We assume complexity averse players, and show that a simple, secure, and costless communication protocol becomes available as the marginal complexity cost tends to zero.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Invited Sessions-Information Engineering and Applications in Ubiquotous Computing Environments-General Drawing of the Integrated Framework for Security Governance.Heejun Park, Sangkyun Kim & Hong Joo Lee - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 1234-1241.
     
    Export citation  
     
    Bookmark  
  30.  15
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  9
    Computer Ethics.Philip Brey - 2009 - In Jan Kyrre Berg Olsen Friis, Stig Andur Pedersen & Vincent F. Hendricks (eds.), A Companion to the Philosophy of Technology. Oxford, UK: Wiley-Blackwell. pp. 406–411.
    This chapter contains sections titled: Approaches in Computer Ethics Topics in Computer Ethics Moral Responsibility Other Topics References and Further Reading.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-A Model of XML Access Control with Dual-Level Security Views.Wei Sun, Da-xin Liu & Tong Wang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3842--799.
     
    Export citation  
     
    Bookmark  
  33.  16
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert Van Der Torre - 2009 - Studia Logica 92 (3):395 - 436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language (both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34. Brain to computer communication: Ethical perspectives on interaction models. [REVIEW]Guglielmo Tamburrini - 2009 - Neuroethics 2 (3):137-149.
    Brain Computer Interfaces (BCIs) enable one to control peripheral ICT and robotic devices by processing brain activity on-line. The potential usefulness of BCI systems, initially demonstrated in rehabilitation medicine, is now being explored in education, entertainment, intensive workflow monitoring, security, and training. Ethical issues arising in connection with these investigations are triaged taking into account technological imminence and pervasiveness of BCI technologies. By focussing on imminent technological developments, ethical reflection is informatively grounded into realistic protocols of brain-to-computer (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  35.  15
    The (Big) Data-security assemblage: Knowledge and critique.Tobias Blanke & Claudia Aradau - 2015 - Big Data and Society 2 (2).
    The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security practices are deployed in a digital age and with what political effects. While critical scholars have drawn attention to the social, political and legal challenges to these practices, the debates in computer and information science have received less analytical attention. This paper proposes to take seriously the critical knowledge developed in information and computer science and reinterpret their debates to develop a critical (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  36. Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  58
    The Computer Ethics Dilemma.Marina Dedyulina - 2008 - Proceedings of the Xxii World Congress of Philosophy 48:87-95.
    New technology develops with little attention to its impact upon human values. In particular, let us do what we can in this era of “the computer revolution” to see that computer technology advances human values. True enough, we could argue endlessly over the meanings of terms like “privacy,” “health,” “security,” “fairness,” or “ownership.” Philosophers do it all the time – and ought to. But people understand such values well enough to desire and even to treasure them. We (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  10
    The Future of Brain-Computer Interfaces: Blockchaining Your Way into a Cloudmind.Melanie Swan - 2016 - Journal of Evolution and Technology 26 (2):60-81.
    The aim of this paper is to explore the development of brain-computer interfacing and cloudminds as possible future scenarios. I describe potential applications such as selling unused brain processing cycles and the blockchaining of personality functions. The possibility of ubiquitous brain-computer interfaces that are continuously connected to the Internet suggests interesting options for our future selves. Questions about what it is to be human; the nature of our current existence and interaction with reality; and how things might be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Computers, Mathematics Education, and the Alternative Epistemology of the Calculus in the Yuktibhāṣā.C. K. Raju - 2001 - Philosophy East and West 51 (3):325 - 362.
    Current formal mathematics, being divorced from the empirical, is entirely a social construct, so that mathematical theorems are no more secure than the cultural belief in two-valued logic, incorrectly regarded as universal. Computer technology, by enhancing the ability to calculate, has put pressure on this social construct, since proof-oriented formal mathematics is awkward for computation, while computational mathematics is regarded as epistemo-logically insecure. Historically, a similar epistemological fissure between computational/practical Indian mathematics and formal/spiritual Western mathematics persisted for centuries, during (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  73
    Computer Ethics: A Global Perspective.Giannis Stamatellos - 2007 - Jones & Bartlett.
    The rapid advancement of information technology in modern societies affects the way we live, communicate, work, and entertain. Computers and computer networks formulate an information age in which traditional ethical questions are re-examined and new questions arise concerning moral standards for human behavior. Computer Ethics: A Global Perspective presents a clear and concise introduction to the ethical and social issues sparked by our ever-growing information society at the local and global level. Designed for use as a main text (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  29
    Politics of prediction: Security and the time/space of governmentality in the age of big data.Tobias Blanke & Claudia Aradau - 2017 - European Journal of Social Theory 20 (3):373-391.
    From ‘connecting the dots’ and finding ‘the needle in the haystack’ to predictive policing and data mining for counterinsurgency, security professionals have increasingly adopted the language and methods of computing for the purposes of prediction. Digital devices and big data appear to offer answers to a wide array of problems of (in)security by promising insights into unknown futures. This article investigates the transformation of prediction today by placing it within governmental apparatuses of discipline, biopower and big data. Unlike (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  43.  38
    Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures.John D’Arcy & Anat Hovav - 2008 - Journal of Business Ethics 89 (S1):59-71.
    Research from the fields of criminology and social psychology suggests that the deterrent effect of security countermeasures is not uniform across individuals. In this study, we examine whether certain individual characteristics (i. e., computer self-efficacy) or work arrangement (i. e., virtual status) moderate the influence of security policies, security education, training, and awareness (SETA) program, and computer monitoring on information systems misuse. The results suggest that computer savvy individuals are less deterred by SETA programs (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Computers, mathematics education, and the alternative epistemology of the calculus in the.C. K. Raju - 2001 - Philosophy East and West 51 (3):325-362.
    Current formal mathematics, being divorced from the empirical, is entirely a social construct, so that mathematical theorems are no more secure than the cultural belief in two-valued logic, incorrectly regarded as universal. Computer technology, by enhancing the ability to calculate, has put pressure on this social construct, since proof-oriented formal mathematics is awkward for computation, while computational mathematics is regarded as epistemo-logically insecure. Historically, a similar epistemological fissure between computational/practical Indian mathematics and formal/spiritual Western mathematics persisted for centuries, during (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  45.  37
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information society, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  56
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  31
    Intentionalism and computational psychology.Alan Zaitchik - 1980 - Grazer Philosophische Studien 10 (1):149-166.
    Intentionalism must be distinguished from computational psychology. The former is a mentalist-realist metatheoretical stance vis-a-vis the latter, which is a research programme devoted to the construction of informationally-characterized simulation models for human behavior, perception, cognition, etc. Intentionalism has its attractive aspects, but unfortunately it is plagued by severe conceptual difficulties. Recent attempts to justify the intentionalist interpretation of computational models, by J.A. Fodor and by C. Graves, J.J. Katz et al., fail to secure a conceptually adequate and genuinely intentional sense (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49.  12
    Toward a computational hermeneutics.Ronald L. Breiger, Robin Wagner-Pacifici & John W. Mohr - 2015 - Big Data and Society 2 (2).
    We describe some of the ways that the field of content analysis is being transformed in an Era of Big Data. We argue that content analysis, from its beginning, has been concerned with extracting the main meanings of a text and mapping those meanings onto the space of a textual corpus. In contrast, we suggest that the emergence of new styles of text mining tools is creating an opportunity to develop a different kind of content analysis that we describe as (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  50. Computers, Surveillance and Privacy: Book Review. [REVIEW]Douglas Kellner - unknown
    Computers and new information technologies have greatly increased the power of surveillance by government and large corporate entities. The state is a repository of a growing array of data bases that provide it with information on its citizens. Corporations also now possess increasing power to accumulate information on potential consumers. This power to collect information is significant and can be instrumental in securing loans, insurance, and credit; increases the power of law enforcement agencies; makes possible surveillance of workers and the (...)
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000