Results for 'Internet fraud'

1000+ found
Order:
  1.  6
    Yahooism or Internet Fraud in the Nigerian Higher Education System.Peter Eshioke Egielewa - 2022 - Journal of Ethics in Higher Education 1:75-101.
    This study interrogates narrow-mindedness and laziness leading many of the Nigerian undergraduates to be tempted to cheat and fraud on Internet instead of working hard for their studies. The author proposes a contextual survey around a tendency also called “yahooism”, “yahoo-yahooism”, as most of the first attempted cybercrimes were realized by sending yahoo emails. This harmful tendency is contrasted with Prof Obiora Ike’s teaching on the value of hard work as the road to wealth. The study used the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  14
    The psychology of the internet fraud victimization of older adults: A systematic review.Yuxi Shang, Zhongxian Wu, Xiaoyu Du, Yanbin Jiang, Beibei Ma & Meihong Chi - 2022 - Frontiers in Psychology 13.
    Criminals targeting and exploiting older adults in online environments are of great concern. This study systematically retrieved and analyzed articles on the psychological characteristics of older adult victims of online fraud. First, we found that there was no evidence that older adults were more prevalent than other individuals of other ages among online fraud victims, and current researchers have focused more on why older adults are easy targets for fraud. Second, research on psychological factors of older adults' (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  3
    Proverbs 4:10–19 and the growing spate of Internet fraud amongst Nigerian youths.Favour C. Uroko - 2021 - HTS Theological Studies 77 (4):7.
    This research article examines the increasing spate of youths who engage in fraudulent Internet activities in Nigeria in the light of Proverbs 4:10–19. Nigerian youths are fast becoming impatient with their quest for wealth. This had led many of them to engage in high-level fraudulent Internet activities. It has come to a point where Internet fraudsters opened schools to teach prospecting youths how to make money fast. The circle keeps expanding on a daily basis. Their victims include (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  33
    Online Auction Fraud: Ethical Perspective.Alex Nikitkov & Darlene Bay - 2008 - Journal of Business Ethics 79 (3):235-244.
    Internet fraud is an issue that increasingly concerns regulators, consumers, firms, and business ethics researchers. In this article, we examine one common form of internet fraud, the practice of shill bidding (when a seller in an auction enters a bid on his or her own item). The significant incidence of shill bidding on eBay (in spite of the fact that it is illegal just as it is in live auctions) exemplifies the current ineffectiveness of regulatory means (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  35
    Detecting, Preventing, and Responding to “Fraudsters” in Internet Research: Ethics and Tradeoffs.Jennifer E. F. Teitcher, Walter O. Bockting, José A. Bauermeister, Chris J. Hoefer, Michael H. Miner & Robert L. Klitzman - 2015 - Journal of Law, Medicine and Ethics 43 (1):116-133.
    Internet-based health research is increasing, and often offers financial incentives but fraudulent behavior by participants can result. Specifically, eligible or ineligible individuals may enter the study multiple times and receive undeserved financial compensation. We review past experiences and approaches to this problem and propose several new strategies. Researchers can detect and prevent Internet research fraud in four broad ways: through the questionnaire/instrument ; through participants' non-questionnaire data and seeking external validation through computer information,, and 4) through study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6.  7
    Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting.Mark R. Freiermuth - 2011 - Discourse and Communication 5 (2):123-145.
    Despite the preponderance of advance fee fraud scams, many in society still fall victim to such con games. The internet has provided scammers with an opportunity to perpetrate fraud on a global scale. In particular, the 419 email scam has become a popular tool used by scammers to entice their victims. Our purpose is to establish rhetorical moves that exist in these 419 messages, and then analyze the intention of the scammers behind each move — a scam (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  9
    Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology.Pingping Sun & Lingang Gu - 2021 - Complexity 2021:1-11.
    Based on the Internet of Things technology, this paper proposes building a cross-border e-commerce logistics supervision system and determines the evaluation index system from the overall framework design of the system, supply chain supervision process optimization, risk supervision optimization, and system order degree optimization. First of all, the framework adopts the national certification center to supervise the logistics service platform and logistics service platform to supervise the logistics participants of the secondary supervision system. Then, functions such as swarm intelligence (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  18
    The Vanishing Square: Civic Learning in the Internet Age.Sheila Jasanoff - 2021 - Hastings Center Report 51 (S1):5-9.
    Nation states in the twenty‐first century confront new challenges to their political legitimacy. Borders are more porous and less secure. Infectious disease epidemics, climate change, financial fraud, terrorism, and cybersecurity all involve cross‐border flows of material, human bodies, and information that threaten to overwhelm state power and expert knowledge. Concurrently, doubts have multiplied about whether citizens, subject to manipulation through the internet, have lost the critical capacity to hold rulers accountable for their expert decisions. I argue that the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. What is Disinformation?Don Fallis - 2015 - Library Trends 63 (3):401-426.
    Prototypical instances of disinformation include deceptive advertising (in business and in politics), government propaganda, doctored photographs, forged documents, fake maps, internet frauds, fake websites, and manipulated Wikipedia entries. Disinformation can cause significant harm if people are misled by it. In order to address this critical threat to information quality, we first need to understand exactly what disinformation is. This paper surveys the various analyses of this concept that have been proposed by information scientists and philosophers (most notably, Luciano Floridi). (...)
     
    Export citation  
     
    Bookmark   25 citations  
  10.  98
    Ethical issues connected with multi-level marketing schemes.Daryl Koehn - 2001 - Journal of Business Ethics 29 (1-2):153 - 160.
    Multi-level marketing (MLM) schemes are one of the fastest growing types of business. However, little has been written about the ethics of MLMs. This oversight is somewhat surprising, especially because some prominent MLMs have been accused of being pyramid schemes. Pyramid schemes were the number one type of internet fraud in 1996, and the fourth most common form of internet fraud in 1997 (National Consumers League, 1997). This paper examines the nature of MLMs and their similarities (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  11.  14
    Introduction: A sociosemiotic exploration of identity and discourse. Le Cheng, Ning Ye & David Machin - 2020 - Semiotica 2020 (236-237):395-404.
    Among the categories of the telecom and internet frauds, the online romance scam is of particular concern for its sharp rise of victim numbers and the huge amount of cost. A social semiotic approach could be used to investigate the victim identity of the online romance scam from the aspects of the (re)construction and interpretation of discursive practices. The range of papers in this section shows that the study of text, context and the way that people use semiotic resources (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  47
    The Nature of and Conditions for Online Trust.Daryl Koehn - 2003 - Journal of Business Ethics 43 (1/2):3 - 19.
    As use of the Internet has increased, many issues of trust have arisen. Users wonder: will may privacy be protected if I provide information to this Internet vendor? Will my credit card remain secure? Should I trust that this party will deliver the goods? Will the goods be as described? These questions are not merely academic. A recent Boston Consulting Group study revealed that one out of ten consumers have ordered and paid for items online that never were (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  13.  22
    Plagiarism in five universities in Mozambique: Magnitude, detection techniques, and control measures: Magnitude, detection techniques, and control measuresa.Peter E. Coughlin - 2015 - International Journal for Educational Integrity 11 (1).
    Hugely facilitated by the Internet, plagiarism by students threatens educational quality and professional ethics worldwide. Plagiarism reduces learning and is correlated with increased fraud and inefficiency on the job, thus lessening competitiveness and hampering development.In this context, the present research examines 48 licenciatura theses and 102 masters theses from five of Mozambique’s largest universities. Of the 150 theses, 75% contained significant plagiarism (>100 word equivalents) and 39%, very much (>500 word equivalents). Significant plagiarism was detected in both licenciatura (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  20
    Legislation on Cybercrime in Lithuania: Development and Legal Gaps in Comparison with Convention on Cybercrime.Darius Sauliūnas - 2010 - Jurisprudencija: Mokslo darbu žurnalas 122 (4):203-219.
    The Convention on Cybercrime (the Convention) adopted in the framework of the Council of Europe is the main international legislative tool in the fight against cybercrime. It is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. Lithuania is among its signatory states, therefore, the provisions of the Convention have become binding on its legislator, obliging it to take (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  19
    Your urgent assistance is requested: The intersection of 419 spam and new networks of imagination.Matthew Zook - 2007 - Ethics, Place and Environment 10 (1):65 – 88.
    This article introduces a series of measures of the geographical manifestation of a subset of unsolicited commercial email, i.e. spam, used to perpetrate 'advanced fee fraud'. Known as '419 spam', this activity has strong historic ties to Nigeria, where similar frauds were operated via physical letters and faxes during the 1970s and 1980s. This article's analysis reveals that 419 spam operates via a globally dispersed network that nevertheless contains a clear agglomeration of activity in West Africa. Building upon theories (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  60
    Between the summits: What americans think about media ethics.Tom Cooper - 2008 - Journal of Mass Media Ethics 23 (1):15 – 27.
    An inventory of major studies between 1986 and 2006 indicates the public has continuing and in some cases increasing concerns about specific ethical practices in the mass media industries. While some concerns such as deception, invasion of privacy, advertising saturation, and excessive violence apply to multiple channels of communication, others are medium specific. For example, the public's primary anxieties about the Internet include fraud, spam, and the availability of pornography to children, while the primary concerns about telephone have (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  17.  64
    The Dissemination of Scientific Fake News.Emmanuel J. Genot & Erik J. Olsson - 2021 - In Sven Bernecker, Amy K. Flowerree & Thomas Grundmann (eds.), The Epistemology of Fake News. New York, NY: Oxford University Press.
    Fake news can originate from an ordinary person carelessly posting what turns out to be false information or from the intentional actions of fake news factory workers, but broadly speaking it can also originate from scientific fraud. In the latter case, the article can be retracted upon discovery of the fraud. A case study shows, however, that such fake science can be visible in Google even after the article was retracted, in fact more visible than the retraction notice. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  54
    Profiling and the rule of law.Mireille Hildebrandt - 2008 - Identity in the Information Society 1 (1):55-70.
    Both corporate and global governance seem to demand increasingly sophisticated means for identification. Supposedly justified by an appeal to security threats, fraud and abuse, citizens are screened, located, detected and their data stored, aggregated and analysed. At the same time potential customers are profiled to detect their habits and preferences in order to provide for targeted services. Both industry and the European Commission are investing huge sums of money into what they call Ambient Intelligence and the creation of an (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  19.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Plagiarism and Profit. Ethical and Moral Issues of Scientific Writing and Academic Publishing in the 21st Century.Martin A. M. Gansinger & Ayman Kole - 2017 - In Martin A. M. Gansinger & Ayman Kole (eds.), Mapping Media Responsibility. Contemporary Aspects of Morals, Ethics and Social Discourse. Hamburg: Anchor. pp. 14-49.
    The purpose of this article is to provide viewpoints and discussion of a variety of potentially problematic aspects and mechanisms regarding academic publishing in relation to economical and ethical issues. Starting with the establishment of wide-scale internet access in the beginning of the 21st century, a considerable increase of plagiarism and more sophisticated forms of academic fraud, expanded infrastructure of academic publication channels and forms, combined with strong tendencies of concentration in terms of research disciplines and outlets have (...)
     
    Export citation  
     
    Bookmark  
  21.  31
    Machine learning in human creativity: status and perspectives.Mirko Farina, Andrea Lavazza, Giuseppe Sartori & Witold Pedrycz - forthcoming - AI and Society:1-13.
    As we write this research paper, we notice an explosion in popularity of machine learning in numerous fields (ranging from governance, education, and management to criminal justice, fraud detection, and internet of things). In this contribution, rather than focusing on any of those fields, which have been well-reviewed already, we decided to concentrate on a series of more recent applications of deep learning models and technologies that have only recently gained significant track in the relevant literature. These applications (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  6
    The discourse of digital deceptions and ‘419’ emails.Innocent Chiluwa - 2009 - Discourse Studies 11 (6):635-660.
    This study applies a computer-mediated discourse analysis to the study of discourse structures and functions of ‘419’ emails — the Nigerian term for online/financial fraud. The hoax mails are in the form of online lottery winning announcements, and email ‘business proposals’ involving money transfers/claims of dormant bank accounts overseas. Data comprise 68 email samples collected from the researcher’s inboxes and colleagues’ and students’ mail boxes between January 2008 and March 2009 in Ota, Nigeria. The study reveals that the writers (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  41
    The Dissemination of Fake Science : On the Ranking of Retracted Articles in Google.Emmanuel Genot & Erik J. Olsson - 2021 - In Sven Bernecker, Amy K. Flowerree & Thomas Grundmann (eds.), The Epistemology of Fake News. New York, NY: Oxford University Press.
    Fake news can originate from an ordinary person carelessly posting what turns out to be false information orfrom the intentional actions of fake news factory workers,but broadly speaking it can also originate from scientific fraud. In the latter case, the article can be retracted upon discovery of the fraud. A case study shows, however, that such fake sciencecan be visible in Google even after the article was retracted, in fact more visible thanthe retraction notice. We hypothesize that the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  11
    Bedeviled: A Shadow History of Demons in Science.Oren Harman - 2022 - Common Knowledge 28 (3):447-449.
    Poreskoro, with three cat and four dog heads and a snake with a forked tongue as his tail, is responsible for epidemics of contagious diseases in Romany folklore. The Pishachas of Vedic mythology lurk in charnel houses and graveyards, waiting for humans to infect with madness. In Christian demonology, Pythius is known as the ruler of the eighth circle of the Inferno, bestowing heinous and unspeakable tortures on those who have committed fraud. Demons are the stuff of legends, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  10
    The Risky Promises and Promising Risks of New Information Technologies for Education.Thomas A. Callister & Nicholas C. Burbules - 1999 - Bulletin of Science, Technology and Society 19 (2):105-112.
    Most discussions of the potential of new information technologies (IT) for education have taken one of two forms: enthusiastic proclamations of the revolutionary impact that IT can have for teaching and learning in school and nonschool settings, or dire warnings of the terrible fraud being perpetrated on society about the educational potential of IT. This essay attempts to avoid exaggerated optimism and pessimism about IT and education, while avoiding the trite oversimplification that technology is “neutral” and can be used (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  18
    Toward a digital civil society: digital ethics through communication education.Sophia Kaitatzi-Whitlock - 2021 - Journal of Information, Communication and Ethics in Society 19 (2):187-206.
    Purpose In the face of the enormous rise in digital fraud and criminality, resulting in diverse afflictions to millions of user-victims, emanating from users’ horizontal interactive and transactive exchanges on the internet, but due significantly to internet’s deregulation and anonymity, this study aims to showcase the need for a socially grounded self-regulation. It holds, that this is feasible and that it can be achieved through large scale, comprehensive digital communication education programs. Design/methodology/approach The composite methodology of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  28.  88
    Ethical issues in electronic comemrce.Bette Ann Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  29.  74
    A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space Transition (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30. “Paintings Can Be Forged, But Not Feeling”: Vietnamese Art—Market, Fraud, and Value.Quan-Hoang Vuong, Manh-Tung Ho, Hong-Kong T. Nguyen, Thu-Trang Vuong & Ho Manh Toan - 2018 - Arts 7 (4):62.
    A work of Vietnamese art crossed a million-dollar mark in the international art market in early 2017. The event was reluctantly seen as a sign of maturity from the Vietnamese art amidst the many existing problems. Even though the Vietnamese media has discussed the issues enthusiastically, there is a lack of literature from the Vietnamese academics examining the subject, and even rarer in from the market perspective. This paper aims to contribute an insightful perspective on the Vietnamese art market, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. On fraud.Liam Kofi Bright - 2017 - Philosophical Studies 174 (2):291-310.
    Preferably scientific investigations would promote true rather than false beliefs. The phenomenon of fraud represents a standing challenge to this veritistic ideal. When scientists publish fraudulent results they knowingly enter falsehoods into the information stream of science. Recognition of this challenge has prompted calls for scientists to more consciously adopt the veritistic ideal in their own work. In this paper I argue against such promotion of the veritistic ideal. It turns out that a sincere desire on the part of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  32.  1
    Reasons for the Emergence and Increase of Social Movements in the Context of Internet Studies.Evgeniy Tsurkan - 2022 - Sociology of Power 34 (3-4):210-226.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  54
    Corporate Fraud and Managers’ Behavior: Evidence from the Press.Jeffrey Cohen, Yuan Ding, Cédric Lesage & Hervé Stolowy - 2010 - Journal of Business Ethics 95 (S2):271-315.
    Based on evidence from press articles covering 39 corporate fraud cases that went public during the period 1992-2005, the objective of this article is to examine the role of managers' behavior in the commitment of the fraud. This study integrates the fraud triangle (FT) and the theory of planned behavior (TPB) to gain a better understanding of fraud cases. The results of the analysis suggest that personality traits appear to be a major fraud-risk factor. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  34.  7
    Fraud and misconduct in medical research.Stephen Lock & Frank O. Wells (eds.) - 1993 - London: BMJ.
    A review of fraud in medical research in Britain, Europe, the USA and Australia. It includes a history of known cases of fraud since 1974 and discusses ways for detecting and dealing with fraud that have been devised by government agencies, pharmaceutical companies, academic institutions and scientific publications (especially medical journals).
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  35.  5
    Comentário a “Mind, beliefs and internet social media: a Peircean perspective”.Daniel Melo Ribeiro - 2024 - Trans/Form/Ação 47 (2):e02400148.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  72
    Fraud, Enforcement Action, and the Role of Corporate Governance: Evidence from China.Chunxin Jia, Shujun Ding, Yuanshun Li & Zhenyu Wu - 2009 - Journal of Business Ethics 90 (4):561-576.
    We examine enforcement action in China’s emerging markets by focusing on the agents that impose this action and the role played by supervisory boards. Using newly available databases, we find that supervisory boards play an active role when Chinese listed companies face enforcement action. Listed firms with larger supervisory boards are more likely to have more severe sanctions imposed upon them by the China Security Regulatory Commission, and listed companies that face more severe enforcement actions have more supervisory board meetings. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  37. Using the Internet to empower patients and to develop partnerships with clinicians.Keith A. Bauer - 2001 - American Journal of Bioethics 1 (2):1-11.
     
    Export citation  
     
    Bookmark   2 citations  
  38.  4
    Thinking on the Internet, by Hubert Dreyfus.Kit Barton - 2003 - Journal of the British Society for Phenomenology 34 (3):333-335.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39. Election campaigns on the internet: A comparison between France and quebec.Frederick Bastien & Fabienne Greffet - 2009 - Hermès: La Revue Cognition, communication, politique 54 (2):211-219.
     
    Export citation  
     
    Bookmark  
  40.  14
    Les campagnes électorales sur Internet : une comparaison entre France et Québec.Frédérick Bastien & Fabienne Greffet - 2009 - Hermès: La Revue Cognition, communication, politique 54 (2):211-219.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  7
    Les campagnes électorales sur Internet : une comparaison entre France et Québec.Frédérick Bastien & Fabienne Greffet - 2009 - Hermes 54.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  36
    The Dilemma of Internet Pornography.William Beaver - 2000 - Business and Society Review 105 (3):373-382.
  43. Business Ethics on the Internet: 3.N. Ben Fairweather, S. Dixon & E. K. Trezise - 1998 - Business Ethics-Oxford- 7:212-219.
     
    Export citation  
     
    Bookmark  
  44.  7
    Using the Internet for reflective journals in elementary teacher preparation.L. Bennett & J. Pye - 2002 - Journal of Social Studies Research 26 (1):40-50.
    Direct download  
     
    Export citation  
     
    Bookmark  
  45.  15
    L’art contemporain, Internet et le musée.Christine Bernier - 2011 - Hermès: La Revue Cognition, communication, politique 61 (3):, [ p.].
    Cet article explore l’utilisation que font certains musées des avancées technologiques et communicationnelles les plus actuelles. En prenant appui sur des théories et des exemples tirés principalement du contexte nord-américain, il s’agit d’examiner la présentation d’une œuvre d’art contemporain, No Woman, No Cry, de Chris Ofili, sélectionnée par la Tate Britain dans le Google Art Project. L’étude de ce cas récent montre comment l’institution muséale reconduit, sur le Web, les principes de pratiques qu’elle applique, depuis longtemps, dans les salles d’exposition (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  8
    L’art contemporain, Internet et le musée.Christine Bernier - 2011 - Hermes 61:, [ p.].
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  48.  33
    Los mecanismos de lo político en las redes sociales de Internet.Luis César Torres Nabel - 2013 - Aposta 58:1 - 27.
    El artículo propone una serie de mecanismos sociales que operan en acontecimientos políticos en las redes sociales de Internet. Dichos mecanismos son: el contagio social, las cascadas de información y la información desregulada. Con estos elementos y valiéndose de un buen número de hechos contemporáneos que le han dando interés al fenómeno político de las redes sociales, se analiza el impacto de las mismas bajo parámetros claros que sirvan para dar explicaciones desde las ciencias sociales.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  51
    Limitaciones de la metáfora de la inmersión en la comprensión de novela e Internet como espacios virtuales análogos.Enrique Ferrari Nieto - 2011 - Revista de Filosofía (Madrid) 36 (2):157-178.
    The first studies in Philosophy that studied digital technology did not specify the characteristics of its various technical applications or instruments. They looked at the virtual reality and used the metaphor of immersion to study the set of all technological developments, as had been done before with the novel. Thus, Internet is misunderstood by many experts as virtuality (next to Baudrillard), rather than linking its hypertext system closer to other theories like those proposed by Deleuze and Guattari or Bourriaud.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  50.  45
    Global Democratic Transformation and the Internet.Carol C. Gould - 2006 - Social Philosophy Today 22:73-88.
    This paper begins with two cases pertaining to the internet in an effort to identify some of the difficult normative issues and some of the new directions in using the Internet to facilitate democratic participation, particularly in transnational contexts. Can the Internet be used in ways that advance democracy globally both within nation-states that lack it and in newly transnational ways? Can it contribute to strengthening not only democratic procedures of majority rule, periodic elections, and representation, but (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000