Results for 'Internet fraud'

1000+ found
Order:
  1.  6
    Yahooism or Internet Fraud in the Nigerian Higher Education System.Peter Eshioke Egielewa - 2022 - Journal of Ethics in Higher Education 1:75-101.
    This study interrogates narrow-mindedness and laziness leading many of the Nigerian undergraduates to be tempted to cheat and fraud on Internet instead of working hard for their studies. The author proposes a contextual survey around a tendency also called “yahooism”, “yahoo-yahooism”, as most of the first attempted cybercrimes were realized by sending yahoo emails. This harmful tendency is contrasted with Prof Obiora Ike’s teaching on the value of hard work as the road to wealth. The study used the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  14
    The psychology of the internet fraud victimization of older adults: A systematic review.Yuxi Shang, Zhongxian Wu, Xiaoyu Du, Yanbin Jiang, Beibei Ma & Meihong Chi - 2022 - Frontiers in Psychology 13.
    Criminals targeting and exploiting older adults in online environments are of great concern. This study systematically retrieved and analyzed articles on the psychological characteristics of older adult victims of online fraud. First, we found that there was no evidence that older adults were more prevalent than other individuals of other ages among online fraud victims, and current researchers have focused more on why older adults are easy targets for fraud. Second, research on psychological factors of older adults' (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  3
    Proverbs 4:10–19 and the growing spate of Internet fraud amongst Nigerian youths.Favour C. Uroko - 2021 - HTS Theological Studies 77 (4):7.
    This research article examines the increasing spate of youths who engage in fraudulent Internet activities in Nigeria in the light of Proverbs 4:10–19. Nigerian youths are fast becoming impatient with their quest for wealth. This had led many of them to engage in high-level fraudulent Internet activities. It has come to a point where Internet fraudsters opened schools to teach prospecting youths how to make money fast. The circle keeps expanding on a daily basis. Their victims include (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  57
    Online Auction Fraud: Ethical Perspective.Alex Nikitkov & Darlene Bay - 2008 - Journal of Business Ethics 79 (3):235-244.
    Internet fraud is an issue that increasingly concerns regulators, consumers, firms, and business ethics researchers. In this article, we examine one common form of internet fraud, the practice of shill bidding (when a seller in an auction enters a bid on his or her own item). The significant incidence of shill bidding on eBay (in spite of the fact that it is illegal just as it is in live auctions) exemplifies the current ineffectiveness of regulatory means (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  33
    Detecting, Preventing, and Responding to “Fraudsters” in Internet Research: Ethics and Tradeoffs.Jennifer E. F. Teitcher, Walter O. Bockting, José A. Bauermeister, Chris J. Hoefer, Michael H. Miner & Robert L. Klitzman - 2015 - Journal of Law, Medicine and Ethics 43 (1):116-133.
    Internet-based health research is increasing, and often offers financial incentives but fraudulent behavior by participants can result. Specifically, eligible or ineligible individuals may enter the study multiple times and receive undeserved financial compensation. We review past experiences and approaches to this problem and propose several new strategies. Researchers can detect and prevent Internet research fraud in four broad ways: through the questionnaire/instrument ; through participants' non-questionnaire data and seeking external validation through computer information,, and 4) through study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6.  9
    Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology.Pingping Sun & Lingang Gu - 2021 - Complexity 2021:1-11.
    Based on the Internet of Things technology, this paper proposes building a cross-border e-commerce logistics supervision system and determines the evaluation index system from the overall framework design of the system, supply chain supervision process optimization, risk supervision optimization, and system order degree optimization. First of all, the framework adopts the national certification center to supervise the logistics service platform and logistics service platform to supervise the logistics participants of the secondary supervision system. Then, functions such as swarm intelligence (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  7
    Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting.Mark R. Freiermuth - 2011 - Discourse and Communication 5 (2):123-145.
    Despite the preponderance of advance fee fraud scams, many in society still fall victim to such con games. The internet has provided scammers with an opportunity to perpetrate fraud on a global scale. In particular, the 419 email scam has become a popular tool used by scammers to entice their victims. Our purpose is to establish rhetorical moves that exist in these 419 messages, and then analyze the intention of the scammers behind each move — a scam (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  18
    The Vanishing Square: Civic Learning in the Internet Age.Sheila Jasanoff - 2021 - Hastings Center Report 51 (S1):5-9.
    Nation states in the twenty‐first century confront new challenges to their political legitimacy. Borders are more porous and less secure. Infectious disease epidemics, climate change, financial fraud, terrorism, and cybersecurity all involve cross‐border flows of material, human bodies, and information that threaten to overwhelm state power and expert knowledge. Concurrently, doubts have multiplied about whether citizens, subject to manipulation through the internet, have lost the critical capacity to hold rulers accountable for their expert decisions. I argue that the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. What is Disinformation?Don Fallis - 2015 - Library Trends 63 (3):401-426.
    Prototypical instances of disinformation include deceptive advertising (in business and in politics), government propaganda, doctored photographs, forged documents, fake maps, internet frauds, fake websites, and manipulated Wikipedia entries. Disinformation can cause significant harm if people are misled by it. In order to address this critical threat to information quality, we first need to understand exactly what disinformation is. This paper surveys the various analyses of this concept that have been proposed by information scientists and philosophers (most notably, Luciano Floridi). (...)
     
    Export citation  
     
    Bookmark   25 citations  
  10.  14
    Introduction: A sociosemiotic exploration of identity and discourse. Le Cheng, Ning Ye & David Machin - 2020 - Semiotica 2020 (236-237):395-404.
    Among the categories of the telecom and internet frauds, the online romance scam is of particular concern for its sharp rise of victim numbers and the huge amount of cost. A social semiotic approach could be used to investigate the victim identity of the online romance scam from the aspects of the (re)construction and interpretation of discursive practices. The range of papers in this section shows that the study of text, context and the way that people use semiotic resources (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  98
    Ethical issues connected with multi-level marketing schemes.Daryl Koehn - 2001 - Journal of Business Ethics 29 (1-2):153 - 160.
    Multi-level marketing (MLM) schemes are one of the fastest growing types of business. However, little has been written about the ethics of MLMs. This oversight is somewhat surprising, especially because some prominent MLMs have been accused of being pyramid schemes. Pyramid schemes were the number one type of internet fraud in 1996, and the fourth most common form of internet fraud in 1997 (National Consumers League, 1997). This paper examines the nature of MLMs and their similarities (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12.  47
    The Nature of and Conditions for Online Trust.Daryl Koehn - 2003 - Journal of Business Ethics 43 (1/2):3 - 19.
    As use of the Internet has increased, many issues of trust have arisen. Users wonder: will may privacy be protected if I provide information to this Internet vendor? Will my credit card remain secure? Should I trust that this party will deliver the goods? Will the goods be as described? These questions are not merely academic. A recent Boston Consulting Group study revealed that one out of ten consumers have ordered and paid for items online that never were (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  13.  20
    Legislation on Cybercrime in Lithuania: Development and Legal Gaps in Comparison with Convention on Cybercrime.Darius Sauliūnas - 2010 - Jurisprudencija: Mokslo darbu žurnalas 122 (4):203-219.
    The Convention on Cybercrime (the Convention) adopted in the framework of the Council of Europe is the main international legislative tool in the fight against cybercrime. It is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. Lithuania is among its signatory states, therefore, the provisions of the Convention have become binding on its legislator, obliging it to take (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  22
    Plagiarism in five universities in Mozambique: Magnitude, detection techniques, and control measures: Magnitude, detection techniques, and control measuresa.Peter E. Coughlin - 2015 - International Journal for Educational Integrity 11 (1).
    Hugely facilitated by the Internet, plagiarism by students threatens educational quality and professional ethics worldwide. Plagiarism reduces learning and is correlated with increased fraud and inefficiency on the job, thus lessening competitiveness and hampering development.In this context, the present research examines 48 licenciatura theses and 102 masters theses from five of Mozambique’s largest universities. Of the 150 theses, 75% contained significant plagiarism (>100 word equivalents) and 39%, very much (>500 word equivalents). Significant plagiarism was detected in both licenciatura (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  62
    The Dissemination of Scientific Fake News.Emmanuel J. Genot & Erik J. Olsson - 2021 - In Sven Bernecker, Amy K. Flowerree & Thomas Grundmann (eds.), The Epistemology of Fake News. New York, NY: Oxford University Press.
    Fake news can originate from an ordinary person carelessly posting what turns out to be false information or from the intentional actions of fake news factory workers, but broadly speaking it can also originate from scientific fraud. In the latter case, the article can be retracted upon discovery of the fraud. A case study shows, however, that such fake science can be visible in Google even after the article was retracted, in fact more visible than the retraction notice. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  16.  27
    Machine learning in human creativity: status and perspectives.Mirko Farina, Andrea Lavazza, Giuseppe Sartori & Witold Pedrycz - forthcoming - AI and Society:1-13.
    As we write this research paper, we notice an explosion in popularity of machine learning in numerous fields (ranging from governance, education, and management to criminal justice, fraud detection, and internet of things). In this contribution, rather than focusing on any of those fields, which have been well-reviewed already, we decided to concentrate on a series of more recent applications of deep learning models and technologies that have only recently gained significant track in the relevant literature. These applications (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  19
    Your urgent assistance is requested: The intersection of 419 spam and new networks of imagination.Matthew Zook - 2007 - Ethics, Place and Environment 10 (1):65 – 88.
    This article introduces a series of measures of the geographical manifestation of a subset of unsolicited commercial email, i.e. spam, used to perpetrate 'advanced fee fraud'. Known as '419 spam', this activity has strong historic ties to Nigeria, where similar frauds were operated via physical letters and faxes during the 1970s and 1980s. This article's analysis reveals that 419 spam operates via a globally dispersed network that nevertheless contains a clear agglomeration of activity in West Africa. Building upon theories (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. Plagiarism and Profit. Ethical and Moral Issues of Scientific Writing and Academic Publishing in the 21st Century.Martin A. M. Gansinger & Ayman Kole - 2017 - In Martin A. M. Gansinger & Ayman Kole (eds.), Mapping Media Responsibility. Contemporary Aspects of Morals, Ethics and Social Discourse. Hamburg: Anchor. pp. 14-49.
    The purpose of this article is to provide viewpoints and discussion of a variety of potentially problematic aspects and mechanisms regarding academic publishing in relation to economical and ethical issues. Starting with the establishment of wide-scale internet access in the beginning of the 21st century, a considerable increase of plagiarism and more sophisticated forms of academic fraud, expanded infrastructure of academic publication channels and forms, combined with strong tendencies of concentration in terms of research disciplines and outlets have (...)
     
    Export citation  
     
    Bookmark  
  20.  41
    The Dissemination of Fake Science : On the Ranking of Retracted Articles in Google.Emmanuel Genot & Erik J. Olsson - 2021 - In Sven Bernecker, Amy K. Flowerree & Thomas Grundmann (eds.), The Epistemology of Fake News. New York, NY: Oxford University Press.
    Fake news can originate from an ordinary person carelessly posting what turns out to be false information orfrom the intentional actions of fake news factory workers,but broadly speaking it can also originate from scientific fraud. In the latter case, the article can be retracted upon discovery of the fraud. A case study shows, however, that such fake sciencecan be visible in Google even after the article was retracted, in fact more visible thanthe retraction notice. We hypothesize that the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  54
    Profiling and the rule of law.Mireille Hildebrandt - 2008 - Identity in the Information Society 1 (1):55-70.
    Both corporate and global governance seem to demand increasingly sophisticated means for identification. Supposedly justified by an appeal to security threats, fraud and abuse, citizens are screened, located, detected and their data stored, aggregated and analysed. At the same time potential customers are profiled to detect their habits and preferences in order to provide for targeted services. Both industry and the European Commission are investing huge sums of money into what they call Ambient Intelligence and the creation of an (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  22.  60
    Between the summits: What americans think about media ethics.Tom Cooper - 2008 - Journal of Mass Media Ethics 23 (1):15 – 27.
    An inventory of major studies between 1986 and 2006 indicates the public has continuing and in some cases increasing concerns about specific ethical practices in the mass media industries. While some concerns such as deception, invasion of privacy, advertising saturation, and excessive violence apply to multiple channels of communication, others are medium specific. For example, the public's primary anxieties about the Internet include fraud, spam, and the availability of pornography to children, while the primary concerns about telephone have (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  23.  18
    Toward a digital civil society: digital ethics through communication education.Sophia Kaitatzi-Whitlock - 2021 - Journal of Information, Communication and Ethics in Society 19 (2):187-206.
    Purpose In the face of the enormous rise in digital fraud and criminality, resulting in diverse afflictions to millions of user-victims, emanating from users’ horizontal interactive and transactive exchanges on the internet, but due significantly to internet’s deregulation and anonymity, this study aims to showcase the need for a socially grounded self-regulation. It holds, that this is feasible and that it can be achieved through large scale, comprehensive digital communication education programs. Design/methodology/approach The composite methodology of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  8
    Bedeviled: A Shadow History of Demons in Science.Oren Harman - 2022 - Common Knowledge 28 (3):447-449.
    Poreskoro, with three cat and four dog heads and a snake with a forked tongue as his tail, is responsible for epidemics of contagious diseases in Romany folklore. The Pishachas of Vedic mythology lurk in charnel houses and graveyards, waiting for humans to infect with madness. In Christian demonology, Pythius is known as the ruler of the eighth circle of the Inferno, bestowing heinous and unspeakable tortures on those who have committed fraud. Demons are the stuff of legends, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  6
    The discourse of digital deceptions and ‘419’ emails.Innocent Chiluwa - 2009 - Discourse Studies 11 (6):635-660.
    This study applies a computer-mediated discourse analysis to the study of discourse structures and functions of ‘419’ emails — the Nigerian term for online/financial fraud. The hoax mails are in the form of online lottery winning announcements, and email ‘business proposals’ involving money transfers/claims of dormant bank accounts overseas. Data comprise 68 email samples collected from the researcher’s inboxes and colleagues’ and students’ mail boxes between January 2008 and March 2009 in Ota, Nigeria. The study reveals that the writers (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  10
    The Risky Promises and Promising Risks of New Information Technologies for Education.Thomas A. Callister & Nicholas C. Burbules - 1999 - Bulletin of Science, Technology and Society 19 (2):105-112.
    Most discussions of the potential of new information technologies (IT) for education have taken one of two forms: enthusiastic proclamations of the revolutionary impact that IT can have for teaching and learning in school and nonschool settings, or dire warnings of the terrible fraud being perpetrated on society about the educational potential of IT. This essay attempts to avoid exaggerated optimism and pessimism about IT and education, while avoiding the trite oversimplification that technology is “neutral” and can be used (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  28.  73
    A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space Transition (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  29.  88
    Ethical issues in electronic comemrce.Bette Ann Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  30.  19
    Forum internet et courrier des lecteurs : L'expression publique des opinions : Paroles publiques: Communiquer dans la cité.Michel Marcoccia & Marianne Doury - 2007 - Hermes 47:41.
    S'inscrivant dans une perspective d'analyse interactionnelle des discours argumentatifs, l'étude comparée des forums interner comme dispositifs de discussion argumentative et du courrier des lecteurs d'un quotidien se développe selon trois axes: la dimension dialogale, la mise en scène de soi et les procédés argumentatifs. Elle montre que ces deux dispositifs constituent des espaces d'expression politique citoyenne, mais que seul le forum peut permettre une discussion argumentative horizontale entre citoyens.As part of an interactional perspective of discourse analysis argumentative, comparative study of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  68
    When Doublespeak Goes Viral: A Speech Act Analysis of Internet Trolling.Andrew Morgan - 2023 - Erkenntnis 88 (8):3397-3417.
    In this paper I survey a range of trolling behaviors and analyze a particular species that stands out. After a brief discussion of some of the inherent challenges in studying internet speech, I describe a few examples of behaviors commonly described as ‘trolling’ in order to identify what they have in common. I argue that most of these behaviors already have well-researched offline counterparts. In contrast, in the second half of the paper I argue that so-called ‘subcultural trolling’ calls (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  65
    Corporate Fraud and Managers’ Behavior: Evidence from the Press.Jeffrey Cohen, Yuan Ding, Cédric Lesage & Hervé Stolowy - 2010 - Journal of Business Ethics 95 (S2):271-315.
    Based on evidence from press articles covering 39 corporate fraud cases that went public during the period 1992-2005, the objective of this article is to examine the role of managers' behavior in the commitment of the fraud. This study integrates the fraud triangle (FT) and the theory of planned behavior (TPB) to gain a better understanding of fraud cases. The results of the analysis suggest that personality traits appear to be a major fraud-risk factor. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  33.  64
    Research ethics and lessons from Hwanggate: what can we learn from the Korean cloning fraud?R. Saunders & J. Savulescu - 2008 - Journal of Medical Ethics 34 (3):214-221.
    In this review of the Korean cloning scandal involving Woo-Suk Hwang, the nature of the disaster is documented and reasons why it occurred are suggested. The general problems it raises for scientific research are highlighted and six possible ways of improving practice are offered in the light of this case: better education of science students; independent monitoring and validation; guidelines for tissue donation for research; fostering of debate about ethically contentious research in science journals; development of an international code of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  34. On fraud.Liam Kofi Bright - 2017 - Philosophical Studies 174 (2):291-310.
    Preferably scientific investigations would promote true rather than false beliefs. The phenomenon of fraud represents a standing challenge to this veritistic ideal. When scientists publish fraudulent results they knowingly enter falsehoods into the information stream of science. Recognition of this challenge has prompted calls for scientists to more consciously adopt the veritistic ideal in their own work. In this paper I argue against such promotion of the veritistic ideal. It turns out that a sincere desire on the part of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  35.  9
    Les avocats chinois, promoteurs d'un réseau juridique virtuel : Société civile et internet en chine et asie orientale.Anna Zyw - 2009 - Hermès: La Revue Cognition, communication, politique 55 (3):65.
    De nos jours, les avocats et les juristes chinois sont très friands d'Internet. Pourtant, leur utilisation de la Toile n'a pas encore été l'objet de recherches. Cet article veut apporter un regard nouveau sur le lien entre avocats, internautes et société civile chinoise. Les juristes ont trouvé en Internet, en particulier sur les blogs, un lieu d'information et d'échange où ils peuvent se dédier aux sujets qui les intéressent . Les multiples démarches qu'ils ont initiées au sein du (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36. Consumo sentimental y sexual de masas en Internet: pornografía en la red.Yolanda Alba - 2009 - Critica: La Reflexion Calmada Desenreda Nudos 59 (959):73-76.
    Nuestra sociedad está siendo testigo de la creciente expansión de la industria del sexo convirtiéndose en un negocio transnacional de dimensión exagerada. La prostitución, la pornografía y la trata de mujeres con fines de explotación sexual (o más exactamente el sistema prostitucional), no paran de desarrollarse a través de formas diferentes, cada vez más toleradas y extendidas: turismo sexual, servicios de compañía, compra de esposas por catálogo procedentes de los países asiáticos, pornografía en Internet, pederastia, etc.
     
    Export citation  
     
    Bookmark  
  37. Using the Internet to empower patients and to develop partnerships with clinicians.Keith A. Bauer - 2001 - American Journal of Bioethics 1 (2):1-11.
     
    Export citation  
     
    Bookmark   2 citations  
  38.  17
    Fraud and misconduct in research: detection, investigation, and organizational response.Nachman Ben-Yehuda - 2017 - Ann Arbor: University of Michigan Press. Edited by Amalya Lumerman Oliver.
    Introduction -- Fraud in research : frequency patterns -- An organizational approach to research fraud -- Fraud, lies, deceptions, fabrications, and falsifications -- Deviance in scientific research : norms, hot spots, control -- Concluding discussion.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  4
    Thinking on the Internet, by Hubert Dreyfus.Kit Barton - 2003 - Journal of the British Society for Phenomenology 34 (3):333-335.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Election campaigns on the internet: A comparison between France and quebec.Frederick Bastien & Fabienne Greffet - 2009 - Hermès: La Revue Cognition, communication, politique 54 (2):211-219.
     
    Export citation  
     
    Bookmark  
  41.  9
    Diálogo Entre Os Direitos Humanos À Internet e À Democracia: Por Uma Democracia Digital.Caio Victor Nunes Marques & Armando Albuquerque de Oliveira - 2017 - Revista Brasileira de Filosofia do Direito 3 (2):149.
    O presente artigo tem como objetivo fazer um diálogo entre os direitos humanos à democracia e à internet, dando ênfase ao surgimento da democracia digital, como forma de participação política dos cidadãos. Assim, parte-se do seguinte questionamento: é possível haver participação política dos cidadãos através da relação entre democracia e internet? Tem-se como hipótese que a internet se trata de uma ferramenta capaz de viabilizar a participação política dos cidadãos. Para averiguá-la, são utilizadas as técnicas de pesquisa (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  7
    Neutralidad en Internet y cumplimiento normativo penal.Jesús Iván Mora González - forthcoming - Anales de la Cátedra Francisco Suárez.
    El artículo 270.2 del Código penal español hace responsables a los prestadores de servicios intermediarios cuando existe una facilitación activa y no neutral de un comportamiento infractor en las obras protegidas por copyright. Ello se ha traducido en un mecanismo incierto que fomenta la colaboración acrítica con los titulares del copyright sin ponderar de forma adecuada la creatividad social a través del uso transformativo de la obra. Este artículo propone un análisis de la autoría como signo distintivo con la finalidad (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  14
    Cliqueo, luego existo. Filosofía, internet y demarquía.Eugenio Moya - 2019 - Anuario Filosófico 52 (3).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Some information is too dangerous to be on the internet.Vincent C. Müller - 2006 - Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category includes information the use of (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  45.  18
    Reactions to Problematic Internet Use Among Adolescents: Inappropriate Physical and Mental Health Perspectives.Cheng-Min Chao, Kai-Yun Kao & Tai-Kuei Yu - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Trust and Community on the Internet.Michael Baurmann, Bernd Lahno, Uwe Matzat & Anton Leist (eds.) - 2004 - Lucius & Lucius (Analyse und Kritik 26(1).
     
    Export citation  
     
    Bookmark  
  47. Applying Evidence-Based Profiling to Disaggregated Fraud Offenders.Maria Krambia-Kapardis & Andreas Kapardis - 2016 - In Jean-Loup Richet, David Weisstub & Michel Dion (eds.), Financial Crimes: Psychological, Technological, and Ethical Issues. Cham: Springer Verlag.
    No categories
     
    Export citation  
     
    Bookmark  
  48.  26
    A New Measurement of Internet Addiction Using Diagnostic Classification Models.Dongbo Tu, Xuliang Gao, Daxun Wang & Yan Cai - 2017 - Frontiers in Psychology 8.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Like moths attracted to flames : management hubris and financial reporting fraud.Michel Magnan, Denis Cormier & Pascale Lapointe-Antunes - 2013 - In Ronald J. Burke (ed.), Human frailties: wrong choices on the drive to success. Burlington: Gower Publishing.
     
    Export citation  
     
    Bookmark  
  50.  6
    Haeckel’s Embryos: Images, Evolution, and Fraud by Nick Hopwood.Jessica Riskin - 2020 - Common Knowledge 26 (1):187a-187.
1 — 50 / 1000