Results for 'Cyber spiritualism'

1000+ found
Order:
  1. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  2.  5
    The Spiritualist.F. G. D. & Spiritualist - 1857
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  23
    Cheques or dating scams? Online fraud themes in hip-hop songs across popular music apps.Suleman Lazarus, Olaigbe Olaigbe, Ayo Adeduntan, Tochukwu Dibiana, Edward & Uzoma OKolorie, Geoffrey - 2023 - Journal of Economic Criminology 2:1-17.
    How do hip-hop songs produced from 2017 to 2023 depict and rationalize online fraud? This study examines the depiction of online fraudsters in thirty-three Nigerian hip-hop songs on nine popular streaming platforms such as Spotify, Deezer, iTunes, SoundCloud, Apple Music, and YouTube. Using a directed approach to qualitative content analysis, we coded lyrics based on the moral disengagement mechanism and core themes derived from existing literature. Our findings shed light on how songs (a) justify the fraudulent actions of online fraudsters, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  72
    A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  5. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  6. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. What Nigerian hip-hop lyrics have to say about the country’s Yahoo Boys.Suleman Lazarus - 2019 - The Conversation.
    The article is based on lyrics from 2007 to 2017 involving 18 hip-hop artists. All the songs I studied were by male singers apart from one entitled, “Maga no need pay,” which involved seven multiple artists. In all the songs, the glamorization of cybercrime and cybercriminals was one of the most significant themes. The implications are discussed.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  9.  33
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  10.  39
    Reviving Spiritualism with Monads: Francisque Bouillier's Impossible Mission.Delphine Antoine-Mahut - 2015 - British Journal for the History of Philosophy 23 (6):1106-1127.
    This paper studies Francisque Bouillier’s contribution to cousinian Spiritualism, from his first text on the History of Cartesian Philosophy from 1839 to the publication of Du principe vital et de l’âme pensante, a work which was likewise considerably amended as a result of the polemics it gave rise to. The paper is concerned with the reception of Leibniz in a double sense. In a positive sense, Bouillier managed to reintegrate in the caricature of the Cartesian soul conceived by the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11.  26
    Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  16
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  86
    Afro cyber resistance: South African Internet art.Tabita Rezaire - 2014 - Technoetic Arts 12 (2):185-196.
    Looking at the digital–cultural–political means of resistance and media activism on the Internet, this article explores Internet art practices in South Africa as a manifestation of cultural dissent towards western hegemony online. Confronting the unilateral flow of online information, Afro Cyber Resistance is a socially engaged gesture aiming to challenge the representation of the African body and culture through online project. Talking as examples the WikiAfrica project, Cuss Group’s intervention Video Party 4 (VP4) and VIRUS SS 16 by artiste (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14.  27
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  8
    Spiritualist Pamphlets.Arthur Conan Doyle - 2009 - Cambridge Scholars Press.
    This volume contains three of Conan Doyle's shorter Spiritualist works, one a record of family seances and the other two in defence of the evidence for the religion.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  12
    Cyber Teaming and Role Specialization in a Cyber Security Defense Competition.Norbou Buchler, Claire Genevieve La Fleur, Blaine Hoffman, Prashanth Rajivan, Laura Marusich & Lewis Lightner - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  29
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  18
    Cyber-animism: the art of being alive in hybrid society.V. I. Arshinov, O. A. Grimov & V. V. Chekletsov - forthcoming - Philosophical Problems of IT and Cyberspace.
    The boundaries of social acceptance and models of convergence of human and non-human actors of digital reality are defined. The constructive creative possibilities of convergent processes in distributed neural networks are analyzed from the point of view of possible scenarios for building “friendly” human-dimensional symbioses of natural and artificial intelligence. A comprehensive analysis of new management challenges related to the development of cyber-physical and cybersocial systems is carried out. A model of social organizations and organizational behavior in the conditions (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  52
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Spiritualism, its relation to the world's great religions and philosophies: also, to the revelations of science: lecture.W. J. Colville - 1902 - Manchester: Two Worlds Publishing Co..
    No categories
     
    Export citation  
     
    Bookmark  
  21.  13
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  31
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  48
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  26
    Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  37
    Bergson and the spiritualist origins of the ideology of creativity in philosophy.Giuseppe Bianco - 2020 - British Journal for the History of Philosophy 28 (5):1031-1052.
    Henri Bergson (1859–1940), the most prominent member of nineteenth-century French spiritualism, is the first philosopher who explicitly defined philosophy as a practice which consists in posing problems anew and in creating concepts. In this article, I will try to reconstruct the progressive importance acquired by the terms ‘problem’ and ‘concept’ in nineteenth-century French philosophy and how they combined in Bergson’s theories about creativity, invention and novelty. I will argue that Bergson’s conception of philosophy as a creative intellectual practice was (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  16
    Spiritualism and the material performance of cameraless photography: Notes on and around a séance with Eusapia Palladino.Nicoletta Leonardi - 2022 - Philosophy of Photography 13 (1):75-97.
    This article examines the cameraless negatives revealing the imprints of four fingers obtained in Turin in February 1907 during the second of two séances with renowned medium Eusapia Palladino organized by physiologists Alberto Aggazzotti, Carlo Foà and Amedeo Hertlizka. By looking at the material and performative components of the séance, it presents spiritualist cameraless photography as a productive tool for rethinking and reframing the photographic medium from a cross-disciplinary perspective questioning medium specific histories and dominant genealogies.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Cosmic Spiritualism among the Pythagoreans, Stoics, Jews, and Early Christians.Phillip Sidney Horky - 2019 - In Cosmos in the Ancient World. New York: Cambridge University Press. pp. 270-94.
    This paper traces how the dualism of body and soul, cosmic and human, is bridged in philosophical and religious traditions through appeal to the notion of ‘breath’ (πνεῦμα). It pursues this project by way of a genealogy of pneumatic cosmology and anthropology, covering a wide range of sources, including the Pythagoreans of the fifth century BCE (in particular, Philolaus of Croton); the Stoics of the third and second centuries BCE (especially Posidonius); the Jews writing in Hellenistic Alexandria in the first (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  6
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  8
    Contested spiritualism: Ravaisson’s French Philosophy in the Nineteenth Century.Marie Louise Krogh - forthcoming - British Journal for the History of Philosophy:1-8.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  42
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I will (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31. Spiritualism Exposed or the Inner Circle.A. J. BAILLIE - 1957
    No categories
     
    Export citation  
     
    Bookmark  
  32.  20
    Le cyber-terrorisme.Maura Conway - 2009 - Cités 39 (3):81.
    Après le 11 septembre 2001, un ressort essentiel des politiques américaines de renforcement de la « sécurité nationale » a pris la forme d’une insistance quasi paranoïaque sur les menaces potentiellement catastrophiques constituées par le cyber-terrorisme. Un grand nombre de commentateurs politiques, militaires ou économiques, ainsi que d’universitaires et de journalistes, ont envahi..
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  33
    Experimental Method and the Spiritualist Soul: The Case of Victor Cousin.Delphine Antoine-Mahut - 2019 - Perspectives on Science 27 (5):680-703.
    Spiritualism designates a philosophy that lays claim to the separation of mind and body and the ontological and epistemological primacy of the former. In France, it is associated with the names of Victor Cousin and René Descartes, or more precisely with what Cousin made of Descartes as the founding father of a brittle rational psychology, closed off from the positive sciences, and as a critic in respect to the empiricist legacy of the idéologues. Moreover, by considering merely the end (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  34.  32
    Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  16
    The Cyber and the Subjective.Steve Jones - 1999 - In Ian Parker & Ángel J. Gordo-López (eds.), Cyberpsychology. New York: Routledge. pp. 221.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Mesmerism, spiritualism, etc., historically and scientifically considered.William B. Carpenter - 1877 - Revue Philosophique de la France Et de l'Etranger 4:440-443.
     
    Export citation  
     
    Bookmark   3 citations  
  38.  26
    'Cyberation' and Just War Doctrine: A Response to Randall Dipert.Colonel James Cook - 2010 - Journal of Military Ethics 9 (4):411-423.
    In this essay, I reject the suggestion that the just war tradition (JWT) does not apply to cyberwarfare (CW). That is not to say CW will not include grey areas defying easy analysis in terms of the JWT. But analogously ambiguous cases have long existed in warfare without undercutting the JWT's broad relevance. That some aspects of CW are unique is likewise no threat to the JWT's applicability. The special character of CW remains similar enough to other kinds of warfare; (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  16
    The Spiritualist Movement: Speaking with the Dead in America and Around the World edited by Christopher M. Moreman.Alan Gauld - 2014 - Journal of Scientific Exploration 28 (4).
    The Spiritualist Movement is divided into three hardback volumes (handsomely produced) which between them contain 43 chapters on assorted aspects of the subject, the boundaries of which are generously interpreted. Most of the chapters are between 15 and 25 pages in length. The topics covered can be relatively narrow or relatively broad, and not all of them will be of keen interest to every reader. The contributors (who range from Ph.D. candidates to emeritus professors) are of varied academic backgrounds and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  20
    Le cyber-communisme ou le dépassement du capitalisme dans le Cyberespace.Richard Barbrook - 2001 - Multitudes 2 (2):186-199.
    Richard Barbrook demonstrate that Americans are very good at doing the contrary of what they are supposed to abide by, i.e. capitalist commodification, and engage instead in a digital economy based on exchange, sharing and the free gift labor, idea, and practices. The tone may be ironic, or downwar facetious, but that should not detract from the issue at stake : the cyberage end of the line for a ’cognitive’ capitalism that will prove unable to surmount the « irresoluble contradictions (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  8
    Cyber Terrorism And Cyber Law - Duties Of Service Providers.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    The year 2017 has dawned in a new era. This is an era where cyber terrorism and cyber extremism are increasingly going to be significant factors in our day-to-day lives. Whether we like it or not, today social media platforms are infiltrated with cyber terrorists and cyber extremists. In addition, Cyber radicalization as a phenomenon is constantly on the rise.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  86
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  25
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  6
    Cyber Inclusion vs Isolation.Zhanna Vavilova - 2023 - Dialogue and Universalism 33 (1):77-90.
    Recent restrictions of movement during the pandemic have forced people worldwide, even neo-luddites, to turn to communicating online. The virtualization of social processes that we are witnessing today, suggests constant rethinking of the role of the Internet for humanity so that we could optimize conditions of our existence that seem to be irreversibly transformed by technology, and integrate every individual with a unique set of features in the life of society. The author deals with the notions of cyberinclusion, virtual ghetto, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  40
    Cyber-Marx: Cycles and Circuits of Struggle in High-Technology Capitalism.Enda Brophy - 2001 - Acm Sigcas Computers and Society 31 (1):22-23.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  46. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Spiritualism și fideism în filosofia contemporană.Gh Vlăduţescu - 1973 - [București],: Editura politică.
    No categories
     
    Export citation  
     
    Bookmark  
  48.  11
    Cyber(Body)Parts: Prosthetic Consciousness.Robert Rawdon Wilson - 1995 - Body and Society 1 (3-4):239-259.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Cyber security norms in the Euro-Atlantic region: NATO and the EU as norm entrepreneurs and norm diffusers.Joe Burton - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000