Results for 'Cyber space'

1000+ found
Order:
  1.  4
    The Philosophical explanation of Cyber Space and Lévy’s Collective Intelligence. 김윤재 - 2015 - 동서철학연구(Dong Seo Cheol Hak Yeon Gu; Studies in Philosophy East-West) 76:301-323.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  21
    The Study on the Moral Psychology of Cyber Space and Information Ethics Education's Teaching Strategies of J. Rest's Four Moral Components Model.Youngseong Choi - 2014 - Journal of Ethics: The Korean Association of Ethics 1 (94):277-325.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  22
    Cybering Democracy: Public Space and the Internet (review).David Trend - 2004 - Symploke 12 (1):308-309.
  4.  48
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  4
    Semantic linking through spaces for cyber-physical-socio intelligence: A methodology.Hai Zhuge - 2011 - Artificial Intelligence 175 (5-6):988-1019.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  27
    Cyber terrorism: A case study of islamic state.Zaheema Iqbal & Khurram Iqbal - 2017 - Journal of Social Sciences and Humanities 56 (2):67-79.
    In today’s postmodern world with the latest and top notch internet technologies in the market, if it has become easy and accessible for everyone to communicate with others sitting at the other corner of the world, it has also given rise to the cybercrimes including cyber terro rism which has not only provided grave threats to the whole world but also posed a question of whether with the manipulation of cyber space, cyber terrorists can damage or (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  70
    The Phenomenology of Space in Writing Online.Max Van Manen & Catherine Adams - 2009 - Educational Philosophy and Theory 41 (1):10-21.
    In this paper we explore the phenomenon of writing online. We ask, ‘Is writing by means of online technologies affected in a manner that differs significantly from the older technologies of pen on paper, typewriter, or even the word processor in an off‐line environment?’ In writing online, the author is engaged in a spatial complexity of physical, temporal, imaginal, and virtual experience: the writing space, the space of the text, cyber space, etc. At times, these may (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  8.  54
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  6
    Democracy in an Age of Cyber-Financial Globalization: Time, Space and Embeddedness from an Asian Perspective.Eiko Ikegami - 1999 - Social Research: An International Quarterly 66 (3).
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  11
    Identitet u vremenu cyber svjetova.Dragan Ćalović - 2012 - Filozofska Istrazivanja 32 (1):19-30.
    Početkom dvadesetog stoljeća Walter Benjamin ukazao je da s razvojem tehnike reproduciranja dolazi do gubljenja elitističkog statusa autora. S ekspanzijom tiska, filma i fotografije, svakome je, kako ističe, otvorena mogućnost dobivanja uloge u nekom filmu, pisanja nekog teksta koji bi potom bio objavljen u novinama, kreativnog izražavanja putem fotografije. Pojava interneta i novih medija ponovno aktualizira Benjaminovu teoriju. Razvoj cyber svjetova i mogućnost čovjekova kreativnog izražavanja unutar njih, u tekstu su dovedeni u vezu s pitanjem identiteta. Uključivanje čovjeka u (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  41
    Diane saco, cybering democracy: Public space and the internet;jodi Dean, publicity's secret:How technoculture capitalizes on democracy. [REVIEW]Leslie Regan Shade - 2003 - Ethics and Information Technology 5 (2):129-130.
  12.  19
    Cyber-Green: idealism in the information age.Alistair S. Duff - 2015 - Journal of Information, Communication and Ethics in Society 13 (2):146-164.
    Purpose– This paper aims to retrieve relevant aspects of the work of idealist thinker T.H. Green to improve comprehension of, and policy responses to, various dilemmas facing contemporary “information societies”.Design/methodology/approach– The paper is an exercise in interdisciplinary conceptual research, seeking a new synthesis that draws upon a range of ethical, metaphysical, empirical and policy texts and ideas. It is an application of moral and political principles to post-industrial problems, part of an ongoing international effort to develop viable normative approaches to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  30
    Cyber Citizen or Cyborg Citizen: Baudrillard, Political Agency, and the Commons in Virtual Politics.Andrew Koch - 2005 - Journal of Mass Media Ethics 20 (2-3):159-175.
    The ethical commitment to democracy requires creating the public space for a rational discourse among real alternatives by the population. In this article, I argue that the Internet fails in this task on 2 fronts. Inspired by the work of Jean Baudrillard, the work argues that the Internet reinforces a structure of passive political agents through its 1-way form of communication. The Internet is designed to deliver political text, not engage the public in dialogue about the direction of collective (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  10
    Youtube: A New Space for Birth?Robyn Longhurst - 2009 - Feminist Review 93 (1):46-63.
    Birth, in many societies, is considered to be a private affair. Although health and medical professionals usually assist, the only other people who share the birth process with mothers are their nearest and dearest. With the rise of information communication technologies, however, birth is no longer an exclusively private event. Some women are now sharing their birthing experiences with millions of viewers who are part of the online video ‘community’ YouTube Broadcast Yourself. Searching the word ‘birth’ on YouTube results in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  68
    The phenomenology of space in writing online.Catherine Adams Max van Manen - 2009 - Educational Philosophy and Theory 41 (1):10-21.
    In this paper we explore the phenomenon of writing online. We ask, 'Is writing by means of online technologies affected in a manner that differs significantly from the older technologies of pen on paper, typewriter, or even the word processor in an off-line environment?' In writing online, the author is engaged in a spatial complexity of physical, temporal, imaginal, and virtual experience: the writing space, the space of the text, cyber space, etc. At times, these may (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  22
    A Stoic Cyber Meta-Ontology - Applying Stoicism to Modern Ontology Design.David Ormrod - 2021 - Journal of the British Society for Phenomenology 52 (1):48-65.
    ABSTRACT The concept of concrete and abstract entities relates to an ontological specification problem, described by Plato’s Sophist concept of the Gods and Giants and their interpretation of metaphysical reality. Developing an ontology without considering the full metaphysical implications leaves conceptual gaps in the creation of events, change in states and management of thoughts, plans and deceptions. This paper seeks to resolve conceptual gaps in the field of cyberspace representation, enabling both ontological interoperability and the development of more complex artificial (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. Jordanians’ Perceptions and Attitudes Toward the Amended Cyber Crime Law in Jordan: A Visual and Multimodal Analysis.Aseel Zibin, Abdel Rahman Mitib Altakhaineh, Amal Abuanzeh & Ahmad Ali Kabbaha - forthcoming - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique:1-17.
    This study examines the visual [monomodal] and multimodal metaphorical representations of Jordanians’ perceptions and attitudes toward the amended Cyber Crime Law in Jordan as depicted by Jordanian activists and image creators online. It adopts Forceville’s theory of Multimodal Metaphor [ 1, 2 ] as its theoretical framework. Twenty visual and multimodal depictions were collected from online platforms and were analysed to identify metaphorical representations. The results reveal a higher frequency of use of multimodal metaphors over monomodal ones, which can (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  32
    Imagining gay paradise: Bali, Bangkok, and cyber-Singapore.Gary Atkins - 2012 - London: Eurospan [distributor].
    Collectively, Atkins examines their pursuit of sexual justice, the ideologies of manhood they challenged, the different types of gay spaces they created (geographic, architectural, online), and political obstacles they have encountered.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Beyond Discourse? Using Deleuze and Guattari's schizoanalysis to explore affective assemblages, heterosexually striated space, and lines of flight online and at school.Jessica Ringrose - 2011 - Educational Philosophy and Theory 43 (6):598-618.
    This paper explores how Deleuze and Guattari's philosophical concepts extend and elaborate discursive and psychoanalytic interpretations of qualitative research findings. Analyzing data from a UK research project exploring young people's engagements with Social Networking Sites (SNSs), Deleuze and Guattari's schizoanalytic method is drawn upon to consider complex desire-flows in the social. In particular the notion of ‘affective assemblages’ is developed to explore the relationships between school and online spaces and subjective interfacing with these spaces. The paper suggests online space (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  20.  6
    Virtual Religious Conflict: From Cyberspace to Reality.Awaludin Pimay & Agus Riyadi - 2023 - HTS Theological Studies 79 (1):6.
    Freedom of expression on social media is sometimes carried out unethically and often undermines religious symbols, resulting in friction and destructive actions. This research was conducted with the aim of knowing the polarisation of religious conflict in cyberspace and the process of diffusion of religious conflict from the virtual world to the real world. This type of research is descriptive qualitative. This research was conducted in Central Java, namely, in the cities of Solo and Semarang. The results of the study (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  46
    Business ethics: principles and practices.Daniel Albuquerque - 2010 - New York: Oxford University Press.
    Business Ethics is designed to serve as a textbook for first year students of MBA and diploma students of management courses. The book provides a deep insight into the crucial role played by ethical choices in managerial decision making within an organization as well as the impact of such decisions on the world at large. Starting with a broad overview of the meaning and scope of ethics and the development of ethical thought, the book puts forward the applications of ethical (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  16
    Kriza demokracije u globalnom medijapolisu.Dragan Ćalović & Zoran Jevtović - 2010 - Filozofska Istrazivanja 30 (4):605-615.
    Ako je u antičkom polisu Platona brinulo što se građani samodovoljno oslanjaju na vlastita uvjerenja o vrlinama, ne tragajući za znanjem, današnjeg žitelja globalnog pseudopolisa opčinjavaju simulirane informacije, slike i uvjerenja koja nezamislivim bujanjem kreiraju društvenu svijest. U sjenci masmedijskih pećina uočavaju se obrisi transformirane demokracije koja je sve izloženija silovitim naletima megakorporativnih interesa, dominantnih geopolitičkih utjecaja, kulturnog determinizma i redefiniranog vjerskog fundamentalizma. Usamljenom pojedincu na Agori sve je teže formirati i sačuvati vlastito mišljenje, ideje i vrijednosti. Infoprostor je pokriven (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  49
    Plectic architecture: towards a theory of the post-digital in architecture.Neil Spiller - 2009 - Technoetic Arts 7 (2):95-104.
    My research is centred upon how architecture is invigorated by cyberspace, the blurred boundary between the virtual and the actual, and how the different parameters of these spaces can be used to inform one another. My early experience in practice was that buildings are limited by the inert materials used to construct them and by the unimaginative ideas of what a building should look like and be. My research draws upon a variety of different disciplines to inform one architecture. The (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  14
    If I cannot move heaven, I will raise hell.Francesco Garibaldo & Emilio Rebecchi - 2023 - AI and Society 38 (5):1945-1948.
    Freud puts the verse of Virgil as an epigraph to his book on the interpretation of dreams. It is the exclamation of Juno who, after having tried in every way to defeat Aeneas, witnesses his landing on the coast of Lazio and the birth of Rome. She cannot give a reason for her defeat and then:_she sought the earth: and summoned Allecto, the grief-bringer, from the house of the Fatal Furies, from the infernal shadows: in whose mind are sad wars, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  36
    Logic, art and transdisciplinarity: A new logic for the new reality.Joseph E. Brenner - 2003 - Technoetic Arts 1 (3):169-180.
    The philosophical logic of Stéphane Lupasco, based on the principles of dynamic opposition and a law of the included middle, offers a needed alternative to the still quasi-exclusive application of classical, binary logic to post-classical natural and social sciences, art theory and political and social action. The system of Lupasco, extended by Basarab Nicolescu by the principle of levels of reality, is grounded in the major discoveries in quantum physics, biology, mathematics and systems science of the twentieth century. It leads (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  26.  7
    Cinema and the Digital Revolution: The Representations of Digital Culture in Films.Hasan Gürkan & Başak Gezmen - forthcoming - Evolutionary Studies in Imaginative Culture:1-15.
    This article examines popular cinema’s interactions with digital culture, focusing on cinema and social structure. A product of technological and social developments, digital culture has introduced the creation of cyberspace, the emergence and spread of social media, and the formation of virtual communities. This article focuses on a specific period (1980 – 2010) to examine the evolution in cinema of portrayals of digital culture. The analysis includes four influential films: WarGames (1983, by John Badham), Perfect Blue (1997, by Satoshi Kon), (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and harness (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  11
    The Development of E-Culture and Differentiation of the Modern Social Sciences and Humanities.Liudmila Baeva - 2018 - Russian Journal of Philosophical Sciences 6:83-99.
    The article is devoted to the study of electronic culture as a new phenomenon of the information age, as a special sphere of human activity associated with the creation of digital objects, the simulations of objects of “living” culture, virtual spaces and processes. The concept of “electronic culture” is explained in comparison with relative (but not identical) to it terms, such as cyber culture, Internet culture, online culture, digital culture, etc. The purpose of this study is to identify the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. So who am I really? Personal identity in the age of the Internet.Albert Borgmann - 2013 - AI and Society 28 (1):15-20.
    The Internet has become a field of dragon teeth for a person’s identity. It has made it possible for your identity to be mistaken by a credit agency, spied on by the government, foolishly exposed by yourself, pilloried by an enemy, pounded by a bully, or stolen by a criminal. These harms to one’s integrity could be inflicted in the past, but information technology has multiplied and aggravated such injuries. They have not gone unnoticed and are widely bemoaned and discussed. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  38
    Fundamental Problem of Digital Interaction.Yukiko Okamoto - 2008 - Proceedings of the Xxii World Congress of Philosophy 35:37-42.
    The promised open space of cyber-interaction has its dark side hidden behind its brilliant rhetoric. The danger emerges within the very center of developing this technology (cyber-evolution). That is a more fundamental danger than this dark side seems to have. The possible replacement of our primary reality with virtual reality might erode the significance of our existential reality. This means also that the virtual reality might lose its own ground to be constructed. In order to clarify this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31. Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  7
    A corpus-based insight into genre: The case of WIPO domain name arbitration decisions.Laura Martínez Escudero - 2011 - Discourse and Communication 5 (4):375-392.
    To prevent domains from cyber-piracy, the WIPO offers private and confidential procedures tasked to address the legitimate use of a domain name. WIPO domain name arbitration consists of an alternative dispute resolution process in which one or more panelists make a binding decision over the legitimacy of a domain. This article investigates the structure of the discourse of this professional genre. Following Maley, this study focuses, first, on spotting the generic moves of WIPO domain name arbitration decisions. Second, the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Mad Speculation and Absolute Inhumanism: Lovecraft, Ligotti, and the Weirding of Philosophy.Ben Woodard - 2011 - Continent 1 (1):3-13.
    continent. 1.1 : 3-13. / 0/ – Introduction I want to propose, as a trajectory into the philosophically weird, an absurd theoretical claim and pursue it, or perhaps more accurately, construct it as I point to it, collecting the ground work behind me like the Perpetual Train from China Mieville's Iron Council which puts down track as it moves reclaiming it along the way. The strange trajectory is the following: Kant's critical philosophy and much of continental philosophy which has followed, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  16
    Transcultural political communication from the perspective of proximization theory: A comparative analysis on the corpuses of the Sino–US trade war.Guoliang Zhang, Yingfei He, Danyang Zhang & Lijuan Chen - 2020 - Discourse and Communication 14 (4):341-361.
    Previous studies have shown the operational potential in political discourse analysis from the proximization perspective. This study adopts a cross-disciplinary approach to analyze political communication across transcultural contexts, especially in the cyber discourse space. Based on the spatial–temporal–axiological model, we compare the journalistic discourses on two social media platforms by China Xinhua News Agency, an official speaker for China worldwide. The corpuses are constructed with microblogs on Weibo in Chinese and Twitter in English containing key words of Sino–US (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  39
    The Limits of Deterrence Theory in Cyberspace.Mariarosaria Taddeo - 2018 - Philosophy and Technology 31 (3):339-355.
    In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterrence, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  36.  21
    Guidance systems: from autonomous directives to legal sensor-bilities.Simon M. Taylor & Marc De Leeuw - 2021 - AI and Society 36 (2):521-534.
    The design of collaborative robotics, such as driver-assisted operations, engineer a potential automation of decision-making predicated on unobtrusive data gathering of human users. This form of ‘somatic surveillance’ increasingly relies on behavioural biometrics and sensory algorithms to verify the physiology of bodies in cabin interiors. Such processes secure cyber-physical space, but also register user capabilities for control that yield data as insured risk. In this technical re-formation of human–machine interactions for control and communication ‘a dissonance of attribution’ :7684, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37. New Technologies and the Law in War and Peace.William H. Boothby (ed.) - 2018 - Cambridge University Press.
    Policymakers, legislators, scientists, thinkers, military strategists, academics, and all those interested in understanding the future want to know how twenty-first century scientific advance should be regulated in war and peace. This book tries to provide some of the answers. Part I summarises some important elements of the relevant law. In Part II, individual chapters are devoted to cyber capabilities, highly automated and autonomous systems, human enhancement technologies, human degradation techniques, the regulation of nanomaterials, novel naval technologies, outer space, (...)
    No categories
     
    Export citation  
     
    Bookmark  
  38.  9
    Features of Social Interactions in the Age of Real Virtuality from a Sociological Perspective.Krešimir Peračković, Matea Milak & Luka Strmotić Kuhar - 2023 - Filozofska Istrazivanja 43 (2):235-251.
    The aim of this paper is primarily to consider some basic concepts and their meanings related to contemporary social interactions, starting from the classical sociological concepts of social relationship and social interaction, and to see what is changing and what remains the same in the age of networking and “moving” to virtual space. In other words, we want to re-examine their form and content in an age without the necessity of the spatial dimension for a relationship, in which new (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  49
    E. M. Forster’s ‘The Machine Stops’: humans, technology and dialogue.Ana Cristina Zimmermann & W. John Morgan - 2019 - AI and Society 34 (1):37-45.
    The article explores E.M. Forster’s story The Machine Stops as an example of dystopian literature and its possible associations with the use of technology and with today’s cyber culture. Dystopian societies are often characterized by dehumanization and Forster’s novel raises questions about how we live in time and space; and how we establish relationships with the Other and with the world through technology. We suggest that the fear of technology depicted in dystopian literature indicates a fear that machines (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  18
    Discourses of celebrities on Instagram: digital femininity, self-representation and hate speech.Soudeh Ghaffari - 2022 - Critical Discourse Studies 19 (2):161-178.
    ABSTRACT Social media has given way to information and prosumption-oriented discursive fields wherein individuals construct their own social identities. Although interactivity, multimodality, user-centeredness and accessibility are the unique aspects of digital media but the fact that digital media as effective spaces for representing extreme self/other representation while being anonymous and free from following social norms, can cause dysfunctional social behaviours such as cyber hate. Mirroring the normative notions of femininity, masculinity and gender stereotype allows groups and individuals to connect (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  78
    A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using (...) Transition Theory of cybercrime, data were generated on yahoo boys and those involved in yahoo plus. The clampdown on Internet fraudsters by the Economic and Financial Crimes Commission (EFCC), in-group conflict among yahoo boys over social recognition, reduced victimisation and delayed success, and mass media enlightenment were reported factors influencing the fusion of spiritual elements in cyber crime. The methods used include ase or mayehun (incontrovertible order), charmed or magical rings (oruka-ere) and incisions made around the wrist, which are used to surf the net, while ijapa (tortoise) is used to navigate profitable sites. Unsuspecting victims fall under the spell of the ase via phone conversation where spiritual orders are made to the victims without their objecting. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  42.  7
    Subject-Object of the Educational Process in the Realities of Contemporaneity, or IP Aliases → ∞.Tigran Marinosyan - 2018 - Russian Journal of Philosophical Sciences 6:7-30.
    The educational doctrine of The Great Didactic as one of the “grand narratives” suffered its complete setback as a result of events that took place in Paris in 1968. Students stopped believing in the correctness of the entrenched education system with its goals and ideals, and from the inside they “blew up” the “walls” of universities, which continued to follow the traditional teaching methods and content of the learning process. According to the author of this study, the ideological explosion inside (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43. A Continuous Act..Nico Jenkins - 2012 - Continent 2 (4):248-250.
    In this issue we include contributions from the individuals presiding at the panel All in a Jurnal's Work: A BABEL Wayzgoose, convened at the second Biennial Meeting of the BABEL Working Group. Sadly, the contributions of Daniel Remein, chief rogue at the Organism for Poetic Research as well as editor at Whiskey & Fox , were not able to appear in this version of the proceedings. From the program : 2ND BIENNUAL MEETING OF THE BABEL WORKING GROUP CONFERENCE “CRUISING IN (...)
     
    Export citation  
     
    Bookmark  
  44.  59
    The Artificialization of Mind and World.Mohammad Yaqub Chaudhary - 2020 - Zygon 55 (2):361-381.
    The rapid advancement of artificial intelligence (AI) has led to renewed ambitions of developing artificial general intelligence. Alongside this has been a resurgence in the development of virtual and augmented reality (V/AR) technologies, which are viewed as “disruptive” technologies and the computing platforms of the future. V/AR effectively bring the digital world of machines, robots, and artificial agents to our senses while entailing the transposition of human activity and presence into the digital world of artificial agents and machine forms of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  10
    Cyberspace othering and marginalisation in the context of Saudi Arabian culture: A socio-pragmatic perspective.Anna Danielewicz-Betz - 2013 - Lodz Papers in Pragmatics 9 (2):275-299.
    This paper is about “othering” in cyberspace. The roots of othering of non-Muslims in Saudi Arabia are seen in the perception of umma as special and superior, therefore automatically categorising “non-believers” as “other”. The in-group and out-group demarcation strategies and consequent marginalisation are considered from both perspectives as bilateral and mutually exclusive. The focus is placed on othering e-space, where marginalised voices can be heard via virtual communication. The effects of virtual reality on real life interaction and resulting involvement (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  20
    Moist art as telematic dance: Connecting wet and dry bodies.Ivani Santana - 2015 - Technoetic Arts 13 (1-2):187-201.
    Assuming that the contemporary world is inevitably set in the context of moistmedia (Ascott 2000), this article discusses some artistic proposals that specifically seek to explore the relationship between dry technology and the wet human body, as in the case of telematic dance. This article is grounded in Clark’s (2003) concept of the ‘extended mind’ and ‘cognitive artefact’; Noë’s (2004; 2012) ‘activism’ theory; and Gallagher’s (2005) ideas surrounding ‘body image’ and ‘body schema’. My discussion of ‘moistmedia’ is focused on Ascott’s (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  47.  6
    Voices and Numbers: Spiritual aspects of IT Humanities.S. A. Kolesnikov - forthcoming - Vox Philosophical journal.
    The article examines the situation of the presence of virtual voices in modern reality. The voices of virtual assistants model a new relationship between voice and face, with anonymity and depersonalization being a priority. The closeness of the face from the voice peculiar to virtual assistants, the detachment of the voice from the facial "accompaniment", the fundamental possibility of the existence of a voice without a face — all this gives the voice as an anthropological and cultural phenomenon of modernity (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  7
    Ethics for Indian Cybertariats - LAG Neutrality Challenges and Solutions.Na Vijayashankar - 2016 - International Review of Information Ethics 25.
    The growth of Cybertariats as a new class of workers who represent an integration of the Cyber Society work with existence in Physical space has opened up new challenges in the management of the work force. The key concerns or issues are those which arise in the world of Cybertariats because of the “LAG neutrality” namely the “Location Neutrality”, “Age Neutrality” and “Gender Neutrality” of a Cybertariat worker.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  2
    Abschreckung im Weltraum. Verstärkte Abschreckung durch hochflexible Weltraumfähigkeiten.Christoph Müller, Wolfgang Jung, Charles Ben, Andreas Ohndorf & Dirk Zimper - 2024 - In Antje Nötzold, Enrico Fels, Andrea Rotter & Moritz Brake (eds.), Strategischer Wettbewerb im Weltraum: Politik, Recht, Sicherheit und Wirtschaft im All. Springer Fachmedien Wiesbaden. pp. 717-730.
    Nicht zuletzt der Krieg in der Ukraine zeigt die herausragende Bedeutung des Weltraumes für unsere Gesellschaft sowie die militärische Operationsführung im Allgemeinen. Bereits in 2019 wurde durch die NATO dieser Bedeutung Rechnung getragen, in dem der Weltraum als fünfte Dimension neben Luft, Land, See und Cyber anerkannt wurde. Die für den Weltraum notwendige Infrastruktur wird gemeinhin als kritisch betrachtet und fällt damit auch unter die Abschreckungssystematik der NATO. Der Beitrag diskutiert die Abschreckungspolitik der NATO im Kontext Weltraum entlang der (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  20
    Cooperation creates results: third prize: 2007 Schubmehl-Prein Essay contest.Maria Lee - 2008 - Acm Sigcas Computers and Society 38 (1):24-27.
    Cyberspace is the non-physical space by which the whole world is connected. Cyberspace is made possible by the inventions of the computer and the internet. With this interconnectivity comes danger and fear as well. In this non-physical space, people never know what could be happening on the other end. Someone at this moment could be trying to get into the nation's computer infrastructure to plan an attack against America. However, the organization of the government, cooperation with other countries, (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000