Results for 'caller ID technology'

978 found
Order:
  1.  25
    Caller ID – whose privacy is it, anyway?Kenneth G. Ferguson - 2001 - Journal of Business Ethics 29 (3):227 - 237.
    Caller ID or CND (Calling Number Display) is an internationally-available telecommunication service first introduced into the United States about ten years ago. Caller ID utilizes a new form of technology which enables telephone subscribers to identify the numbers (and/or names) of callers before picking up their telephones. This service has been widely assailed as an invasion of the caller''s right to anonymity, a right which allegedly subsists as an important component of the caller''s right to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Technological Transfer and the War in the Pacific.Id Rae - 2000 - Boston Studies in the Philosophy of Science 207:173-186.
    No categories
     
    Export citation  
     
    Bookmark  
  3.  7
    The Virtual Bra Clasp.Michael Bruce - 2010-09-24 - In Fritz Allhoff, Michael Bruce & Robert M. Stewart (eds.), College Sex ‐ Philosophy for Everyone. Wiley‐Blackwell. pp. 40–50.
    This chapter contains sections titled: College Sex is Tagged: Become a Fan “That will get you slapped!” “Can I have your number?” A Short Genealogy of Stressful Situations Treating Objects like Women, MySpace Pics, and Level Jumping Black Holes Wrap It Up.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. ID as a theory of technological evolution.William Dembski - manuscript
    In Book II of the Physics Aristotle remarks, “If the ship-building art were in the wood, it would produce the same results by nature.” Aristotle is here contrasting nature and art. Nature provides the raw materials (here wood); art provides the means for fashioning those materials (here into a ship). For Aristotle, art consists in the knowledge and skill to produce an object and presupposes the imposition of form on the object from outside. On the other hand, nature consists in (...)
     
    Export citation  
     
    Bookmark   1 citation  
  5.  7
    Islamic ethics of technology: an objectives (Maqāṣid) approach.Amana Raquib - 2015 - Kuala Lumpur: The Other Press.
    This book approaches the question of technology from an Islamic ethical perspective. The book tries to broaden the scope of the Sharia to deal comprehensively with the ethical questions and dilemmas that arise in the midst of a postmodern technological culture due to the absence of well-defined religious-ethical ends. It looks at the maqasid as a universal ethical theory to be interpreted and applied in the global technological context. It weaves the contemporary philosophical analysis of technology within the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  6.  50
    Psychic ID: A blueprint for a modern national identity scheme.David G. W. Birch - 2008 - Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? Can we assemble a (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  7.  18
    Ioannis Motsianos and Karen S. Garnett, eds., Glass, Wax and Metal: Lighting Technologies in Late Antique, Byzantine and Medieval Times. Oxford, UK: Archaeopress, 2019. Paper. Pp. xii, 250; color and black-and-white figures. £60. ISBN: 978-1-7896-9216-7. Table of contents available online at https://www.archaeopress.com/ArchaeopressShop/Public/displayProductDetail.asp?id={54EEFB86-38D3-4155 -977B-BDA53CFE7841}. [REVIEW]B. Yelda Olcay Uçkan - 2022 - Speculum 97 (4):1238-1240.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  9
    Privacy, Propaganda, and Digital ID: Why Our Delicate Values Must Be Deliberately Defended.Matthew Tiessen - 2023 - Washington University Review of Philosophy 3:16-40.
    In this paper I explore privacy as a concept that becomes relevant and sometimes necessary under specific circumstances, but unnecessary in others. Privacy, I suggest, can be thought of as the right to be left alone and is integral to related concepts such as freedom, liberty, and independence. In light of the ongoing expansion of data-mining technologies, business models, and emerging modes of governance, I suggest that privacy is simultaneously more necessary and more at risk than ever. Privacy, in other (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  14
    Risking identity: a case study of Jamaica’s short-lived national ID system.Hopeton S. Dunn - 2020 - Journal of Information, Communication and Ethics in Society 18 (3):329-338.
    Purpose This paper aims to expose the challenges facing the attempt by Jamaica to introduce a new digital ID system without adequate regard to public consultation and the rights of citizens. Design/methodology/approach The method used is critical text analysis and policy analysis, providing background and relevant factors leading up to the legislative changes under review. Extensive literature sources were consulted and the relevant sections of the Jamaican constitution referenced and analysed. Findings The case study may have national peculiarities not applicable (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  10
    Nigeria’s Digital Identification (ID) Management Program: Ethical, Legal and Socio-Cultural concerns.Damian Eke, Ridwan Oloyede, Paschal Ochang, Favour Borokini, Mercy Adeyeye, Lebura Sorbarikor, Bamidele Wale-Oshinowo & Simisola Akintoye - 2022 - Journal of Responsible Technology 11:100039.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  5
    Nigeria's Digital Identification (ID) Management Program: Ethical, Legal and Socio-Cultural concerns.Eke Damian, Oloyede Ridwan, Ochang Paschal, Borokini Favour, Adeyeye Mercy, Sorborikor Lebura, Wale-Oshinowo Bamidele & Akintoye Simisola - forthcoming - Journal of Responsible Technology:100039.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  13
    Agriculture and modern technology: a defense.Thomas R. DeGregori - 2001 - Ames: Iowa State University Press.
    In this thought provoking work Thomas DeGregori presents the uncommon premise that technology is a human endeavour and a positive force that defines our humanity. Examining a number of revolutionary technological advances in this century, especially those in the agricultural areas, the author debunks common conventional wisdom that would dictate otherwise. For instance, the use of chemicals, including DDT and other pesticides, id often maligned as damaging the environment and the quality of life. Dr DeGregori counters this argument with (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  35
    The Austrian case: multi-card concept and the relationship between citizen ID and social security cards. [REVIEW]Georg Aichholzer & Stefan Strauß - 2010 - Identity in the Information Society 3 (1):65-85.
    National electronic identity (e-ID) card schemes and electronic identity management systems (e-IDMS) in Europe are characterised by considerable diversity. This contribution analyses the creation of a national e-IDMS in Austria with the aim of improving our understanding of the reasons behind the genesis of particular designs of national e-IDMS. It seeks to explain how the system’s specific design evolved and which factors shaped its appearance. Being part of a comparative four country study, a common theoretical framework is employed to allow (...)
    No categories
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14.  20
    Inclusion of Assistive Technologies in a Basic Package of Essential Healthcare Service.Fiachra O’Brolcháin & Bert Gordijn - 2018 - HEC Forum 30 (2):117-132.
    This paper outlines the potential and necessity of the development of assistive technologies for people with intellectual disabilities. We analyse a policy recommendation designed to determine the contents of a basic health package supplied by the state, known as the Dunning Funnel. We contend that the Dunning Funnel is a useful methodology, but is weakened by a potentially relativistic understanding of “necessity” in relation to the requirements of people with IDs. We remedy this defect by using the capabilities approach as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  18
    Managing public expectations of technological systems: A case study of a problematic government project.Aaron K. Martin & Edgar A. Whitley - 2007 - Spontaneous Generations 1 (1):67.
    In this discussion piece we address how the UK government has attempted to manage public expectations of a proposed biometric identity scheme by focussing attention on the handheld, i.e., the ID card. We suggest that this strategy of expectations management seeks to downplay the complexity and uncertainty surrounding this high-technological initiative, necessitating the selective use of expertise for the purpose of furthering government objectives. In this process, government often relegates counterexpertise, if not dismissing it outright, thereby greatly politicizing the policy (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  9
    al-Taṣawwuf al-Sunnī fī tārīkh al-Maghrib: nasaq namūdhajī lil-wasaṭīyah wa-al-iʻtidāl.Saʻīd Bin Saʻīd (ed.) - 2010 - al-Rabāṭ: al-Zaman.
    Caliphate; Māwardī, ʻAlī ibn Muḥammad, 974?-1058; political and social views.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17. Beʼur le-sefer "Derekh ha-Shem" la-Ramḥal: mi-tokh kitve ha-Ramḥal, kavanat ha-Ari, ʻEts ḥayim, kitve ha-Reʼiyah, kitve ha-Rambam, ha-Kuzari ṿe-ʻod.. be-śafah berurah u-negishah.ʻOded Daṿid - 2009 - Pardes Ḥanah: ʻOded Daṿid. Edited by Moshe Ḥayyim Luzzatto.
     
    Export citation  
     
    Bookmark  
  18. Ḳunṭres Mesibot Purim: divre Torah be-ʻinyene hilkhot deʻot ṿe-ḥovot ha-levavot.Yonatan Daṿid Daiṿid - 2016 - [Brooklyn, NY]: ha-Mosad Gur Aryeh.
     
    Export citation  
     
    Bookmark  
  19.  39
    Are New Technologies the Enemy of Privacy?Amitai Etzioni - 2007 - Knowledge, Technology & Policy 20 (2):115-119.
  20. Shut Ner le-ʻEzra.Shemuʼel Daṿid - unknown - [ʻAfulah: Sh. Daṿid.
    -- -- ḥeleḳ 3. Midot ṿe-hanhagot. Shut ha-minhag ka-halakhah.
     
    Export citation  
     
    Bookmark  
  21.  16
    How Perceived Corporate Social Responsibility Raises Employees’ Creative Behaviors Based on Appraisal Theory of Emotion: The Serial Mediation Model.Said Id Bouichou, Lei Wang & Salman Zulfiqar - 2022 - Frontiers in Psychology 13.
    This study examines the micro-level consequences of perceived corporate social responsibility and hypothesizes that perceived CSR affects the perception-emotion-attitude-behavior sequence. We hypothesized that perceived CSR affects organizational pride, affects affective commitment, and enhances the employees’ creative behaviors by using the lens of appraisal theory of emotion. This study also hypothesizes that the association of perceived CSR and employee creative behaviors is serially mediated by OP and AC. The time-lagged data were collected from employees of only those companies participating in CSR (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  29
    On Self-Driving Cars as a Technological Sublime.Julia M. Hildebrand - 2019 - Techné: Research in Philosophy and Technology 23 (2):153-173.
    Driverless automobility presents a “technological sublime” encompassing both promises and perils. The light side of the emerging transportation future lies, for instance, in the newly gained freedom from driving. The dark side of this sublime includes ethical challenges and potential harm resulting from the required socio-technical transformations of mobility. This article explores contemporary visions for the self-driving car future through the lens of the sublime and some of its theoretical variations, such as the natural, technological, electrical, and digital sublime. Nissan’s (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  9
    Establishing Common Ground Using Low Technology Communication Aids in Intermediary Mediated Police Investigative Interviews of Witnesses with an Intellectual Disability.Tina Pereira - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (2):517-546.
    Establishing common ground in police investigative interviews is essential in preventing misperceptions and miscommunications, to enable a witness’s best evidence to be collected. However eliciting a consistent account of an allegation from individuals with an Intellectual Disability (ID) is dependent on the skill of the interviewing police officer and the communicative competence of a witness with ID. Acknowledging the specialist nature of this process, the Youth Justice and Criminal Evidence Act in England and Wales allows trained intermediaries to facilitate communication (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  11
    Numerical abstractness and elementary arithmetic.Jamie Id Campbell & Arron Ws Metcalfe - 2009 - Behavioral and Brain Sciences 32 (3-4):330 - 331.
    Like number representation, basic arithmetic seems to be a natural candidate for abstract instantiation in the brain. To investigate this, researchers have examined effects of numeral format on elementary arithmetic (e.g., 4+5 vs. four+five). Different numeral formats often recruit distinct processes for arithmetic, reinforcing the conclusion that number processing is not necessarily abstracted away from numeral format.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Imre Shimshon: raʻayonot ṿe-yesodot mi-Torato shel... Rabi Shimshon Daṿid Pinḳus.Shimshon Daṿid Pinḳus - 2001 - Yerushalayim: Malkhut Vaḳsberger.
     
    Export citation  
     
    Bookmark  
  26. Liḳuṭ le-ʻidud ṿe-ḥizuḳ: ʻetsah maʻaśit ha-meḥazeḳet meʼod u-mekhaṿenet be-derekh ha-limud.Daṿid Elbom (ed.) - 1995 - Yerushalayim: [Ḥ. Mo. L.].
     
    Export citation  
     
    Bookmark  
  27. Sefer Derekh ʻaliyah: berur sugyot ba-Gemara u-Midrash be-ḳinyene Torah ṿa-ʻavodah.Daṿid Tsevi Eliʼakh - 2010 - Yerushalayim: Mekhon "Moreshet ha-yeshivot,".
     
    Export citation  
     
    Bookmark  
  28. Sefer Kaf zekhut.Daṿid Ḳog'ah - 1993 - Yerushalayim: D. Ḳog'ah.
     
    Export citation  
     
    Bookmark  
  29. Śiḥot ḥokhmah u-musar.Daṿid Ḳronglas - 1997 - Yerushala[yi]m: Yotse le-or be-siyuʻa ḳevutsat talmidaṿ.
     
    Export citation  
     
    Bookmark  
  30. Ḥayim she-yesh bahem: pirḳe ḥayim... me-hekhal ḥasidim she-yadʻu li-ḥeyot.Barukh ben Daṿid Lev - 2000 - Ḥatsor ha-Gelilit: B. ben D. Lev.
     
    Export citation  
     
    Bookmark  
  31. Sefer zikaron: Ner Yaʼir: kolel genuzot me-ḥakhme Teman mi-kit. y., ḥidushe Torah ṿa-halakhah me-ḥakhme dorenu.Daṿid ben Yosef Leṿi, Yaʼir Leṿi & Shelomoh Midani (eds.) - 1996 - Bene Beraḳ: Sh. Midani.
     
    Export citation  
     
    Bookmark  
  32. Sefer ʻIr miḳlaṭ.ḥibro Daṿid Lida - 1988 - In P. Lowy, Ẓevi Hirsch Friedman & David ben Aryeh Leib (eds.), Sefer Or ha-yashar ṿeha-ṭov. Bruḳlin, N.Y.: P.E. Laṿi.
     
    Export citation  
     
    Bookmark  
  33. ʻAl ha-Ḥayim ṿe-ʻal ha-maṿet: ha-Ṭaʼu la-ratsyonalim: ʻeḳronot hityaḥasut le-ʻatsmenu, la-zulat ṿela-ʻolam ʻal pi ha-ḳosmosofyah = About life and death.Mishḳah Ben-Daṿid - 2019 - [Tel-Aviv]: Tekhelet.
    No categories
     
    Export citation  
     
    Bookmark  
  34. Sefer Divre musar: 73 śiḥot meyusadim ʻal beʼurim mi-gedole baʻale ha-musar...: ʻal maʼamarim ba-Talmud.Daṿid Ben-Abu - 1999 - Bene Beraḳ: Makhon le-hotsaʼat kitve rabotenu she-ʻa. y. Mosad Torah ṿa-ḥesed "Bet Yosef".
    kerekh 1. Maʼamarim mi-masekhtot Berakhot ṿe-Shabat -- kerekh 2. Maʼamarim mi-masekhtot ʻEruvin, Pesaḥim, R.h. ṿe-Yoma -- kerekh 3. Masekhtot Sukah, Betsah, Taʻanit, Megilah, Moʻed ḳaṭan ṿa-Ḥagigah.
     
    Export citation  
     
    Bookmark  
  35. Sefer Divre musar: 73 śiḥot meyusadim ʻal beʼurim mi-gedole baʻale ha-musar...: ʻal maʼamarim ba-Talmud.Daṿid Ben-Abu - 1999 - Bene Beraḳ: Makhon le-hotsaʼat kitve rabotenu she-ʻa. y. Mosad Torah ṿa-ḥesed "Bet Yosef".
    kerekh 1. Maʼamarim mi-masekhtot Berakhot ṿe-Shabat -- kerekh 2. Maʼamarim mi-masekhtot ʻEruvin, Pesaḥim, R.h. ṿe-Yoma -- kerekh 3. Masekhtot Sukah, Betsah, Taʻanit, Megilah, Moʻed ḳaṭan ṿa-Ḥagigah.
     
    Export citation  
     
    Bookmark  
  36. Sefer Shulḥan ha-levavot: u-vo sheloshim simanim shel halakhot ʻal mitsṿot ha-teluyot ba-levavot ṿe-tiḳun ha-midot meluḳaṭ mi-divre ha-rishonim.Elʻazar Daṿid ben Yiśraʼel Gliḳ - 2003 - Yerushalayim: Mekhon "Banim u-vene banim".
     
    Export citation  
     
    Bookmark  
  37. Ḳunṭres She-targilenu be-toratekha: maʼamre ḥizuḳ be-ʻinyene Torah ṿa-ʻamalah.Doron Daṿid ben Shemuʼel Yehoshuʻa Gold - 1998 - Yerushalayim: Mekhon Tifʼeret Avraham.
     
    Export citation  
     
    Bookmark  
  38. Sefer Bene ḥayil: yakhil divre ḥizuḳ be-ʻinyan 48 devarim sheha-Torah niḳnet bahem: asupat śiḥot ṿe-ʻedim.Doron Daṿid ben Shemuʼel Yehoshuʻa Gold - 2006 - Bene-Beraḳ: Mekhon "Mishnat Rabi ʻAḳiva".
     
    Export citation  
     
    Bookmark  
  39. Sefer Hegyon libi: yakhil osef mamre musar u-veʼurim be-inyne midot, hashḳafah ṿe-derekh erets she-nidpesu be-sefer "Orḥot musar" she-yatsa le-or bi-shenat 661 uve-sefer "Hegyon libi" she-yatsa le-or bi-shenat 664.Doron Daṿid ben Shemuʼel Yehoshuʻa Gold - 2013 - Bene Beraḳ: [Doron Gold]. Edited by Doron Daṿid ben Shemuʼel Yehoshuʻa Gold.
     
    Export citation  
     
    Bookmark  
  40. Sefer Shivḥu geʼulim: maʼamre musar u-veʼurim be-ʻinyene ḥag ha-Pesaḥ ṿi-yeme Sefirat ha-ʻOmer.Doron Daṿid ben Shemuʼel Yehoshuʻa Gold - 2016 - Bene Beraḳ: [Doron Daṿid ben Shemuʼel Yehoshuʻa Gold].
     
    Export citation  
     
    Bookmark  
  41. Ḳunṭres Dai le-ʻolam Ani Ṿe-Atah: Li-Yeme Ha-Sefirah Ṿe-33 Ba-ʻomer...: Be-Maʻaśeh de-Rashbi... Ṿe-Limudim Musariyim.Doron Daṿid ben Shemuʼel Yehoshuʻa Gold - 2004 - Bene-Beraḳ: Doron Daṿid Ben ShemuʼEl Yehoshuʻa Gold.
     
    Export citation  
     
    Bookmark  
  42. Sefer Ḳol ha-ḳore.Daṿid Mordecai ben Ḥayim Rubinfein - 1912 - Yerushala[y]im: Yotsʼe ḥalatsaṿ.
     
    Export citation  
     
    Bookmark  
  43. Sheʼelot u-teshuvot Sheraga be-ṭohorah: ʻal 4 ḥelḳe Shulḥan ʻarukh.Shemuʼel Daṿid Friedman - 1995 - Bruḳlin, N.Y.: Sh. D. ha-Kohen Friedman. Edited by Abraham David ben Asher Anschel Wahrmann.
     
    Export citation  
     
    Bookmark  
  44. Rabot banot ʻaśu ḥayil: bo niḳbetsu halakhot ṿe-dinim, hanhagot, maʻaśiyot, shirim u-tefilot be-khol ha-ḳashur le-vat Yiśraʼel.Daṿid Gavriʼel - 2004 - Yerushalayim: Midreshet Raḥel.
     
    Export citation  
     
    Bookmark  
  45. Sheʼelot u-teshuvot: ba-nośʼim kibud av ṿa-em, berakhot, dine birkat ha-reaḥ, avedah u-metsiʼah, Shabat, ben adam la-ḥavero, berakhot, hashkamat ha-boḳer, avedah u-metsiʼah.Daṿid Gavriʼel - 1997 - Ḥolon: Yeshivat "ʻAṭeret ḥakhamim".
     
    Export citation  
     
    Bookmark  
  46. Sefer Zohore ḥamah.Daṿid Ḳaḳun - 1989 - Migdal ha-ʻEmeḳ: D. Ḳaḳun.
     
    Export citation  
     
    Bookmark  
  47. Li-lemod min ha-hisṭoryah: "le-havin mah ḳarah u-maduʻa ḳarah".Daṿid Shaḥar - 1994 - Reḥovot: ʻIdan.
     
    Export citation  
     
    Bookmark  
  48. Sefer Halakhah le-maʻaśeh: yiḥud ṿe-gidre ḳedushah.Eliʻezer Daṿid Shapira - 2010 - Bene Beraḳ: Eliʻezer Daṿid Shapira.
     
    Export citation  
     
    Bookmark  
  49.  2
    Spoznaja, prva vrijednost Islama: prilog spoznajnoj teoriji u Islamu.Rešid Hafizović - 2017 - Sarajevo: Naučnoistraživački institut "Ibn Sina".
  50.  2
    Znakovi šiijske duhovnosti: studija.Rešid Hafizović - 1997 - Sarajevo: Bosanska knj..
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 978