Results for 'cyber semiotics'

995 found
Order:
  1.  10
    Can Computers Create Meanings? A Cyber/Bio/Semiotic Perspective.N. Katherine Hayles - 2019 - Critical Inquiry 46 (1):32-55.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  27
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  11
    When Lines Get Crossed: Cyberphobia, Cyber-philia and technoerotica in Tetsuo: The Iron Man.Sid Sondergard - 1999 - Semiotics 23:213.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  5. Susanna Välimäki.Semiotic Essence - 2003 - In Eero Tarasti, Paul Forsell & Richard Littlefield (eds.), Musical Semiotics Revisited. International Semiotics Institute. pp. 15--147.
     
    Export citation  
     
    Bookmark  
  6. Abraham, Nicolas. Rhythms: On the Work, Translation, and Psychoanalysis. Translated by Benjamin Thigpen and Nicholas T. Rand. Stanford: Stanford University Press, 1995. xii & 169 pp. Cloth $35.00; paper $12.95. Adams, EM Religion and Cultural Freedom. Philadelphia: Temple Univer-sity Press, 1993. xiii & 193 pp. Cloth $39.95. [REVIEW]Transcendental Semiotics - 1996 - Man and World 29:445-468.
     
    Export citation  
     
    Bookmark  
  7.  5
    Diseño y validación de un modelo de análisis de sitios web.Erlantz Velasco, Oihane Korres Alonso & Visitación Pereda Herrero - 2022 - Logos: Revista de Lingüística, Filosofía y Literatura 32 (1):70-91.
    In the context of a larger project whose purpose was to comparatively analyze the associations of returnees in different autonomous communities, the need arose to specifically analyze the websites of these groups from a semiotic, discursive and communicational approach. The project required the creation of an analysis model based on a bibliographic review that would allow studying the sites in a comprehensive manner and that would take into account the new communicational paradigms. After exploring analysis models based on obsolete paradigms, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  9. Semiotic Systems, Computers, and the Mind: How Cognition Could Be Computing.William J. Rapaport - 2012 - International Journal of Signs and Semiotic Systems 2 (1):32-71.
    In this reply to James H. Fetzer’s “Minds and Machines: Limits to Simulations of Thought and Action”, I argue that computationalism should not be the view that (human) cognition is computation, but that it should be the view that cognition (simpliciter) is computable. It follows that computationalism can be true even if (human) cognition is not the result of computations in the brain. I also argue that, if semiotic systems are systems that interpret signs, then both humans and computers are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  10.  33
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  11.  26
    Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  16
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  86
    Afro cyber resistance: South African Internet art.Tabita Rezaire - 2014 - Technoetic Arts 12 (2):185-196.
    Looking at the digital–cultural–political means of resistance and media activism on the Internet, this article explores Internet art practices in South Africa as a manifestation of cultural dissent towards western hegemony online. Confronting the unilateral flow of online information, Afro Cyber Resistance is a socially engaged gesture aiming to challenge the representation of the African body and culture through online project. Talking as examples the WikiAfrica project, Cuss Group’s intervention Video Party 4 (VP4) and VIRUS SS 16 by artiste (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14.  24
    Machiavellian Apparatus of Cyberbullying: Its Triggers Igniting Fury With Legal Impacts.Anne Wagner & Wei Yu - 2021 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (4):945-963.
    Young netizens are an emerging generator of online content, engaging in an increasing number of online flaming interactions. This shortened communication mode has incorporated power amplifiers, enabling the inclusion of both verbal and non-verbal triggers, thereby initiating abuses akin to cyberbullying. Cyberbullying has emerged as an extremely unstable hot issue, which is difficult to regulate upstream, severely impacting inexperienced young netizens. This Machiavellian apparatus proves to be sophisticated, given its powerful nature, and results in its victims being ensnared in a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  12
    Cyber Teaming and Role Specialization in a Cyber Security Defense Competition.Norbou Buchler, Claire Genevieve La Fleur, Blaine Hoffman, Prashanth Rajivan, Laura Marusich & Lewis Lightner - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  19
    Cyber-animism: the art of being alive in hybrid society.V. I. Arshinov, O. A. Grimov & V. V. Chekletsov - forthcoming - Philosophical Problems of IT and Cyberspace.
    The boundaries of social acceptance and models of convergence of human and non-human actors of digital reality are defined. The constructive creative possibilities of convergent processes in distributed neural networks are analyzed from the point of view of possible scenarios for building “friendly” human-dimensional symbioses of natural and artificial intelligence. A comprehensive analysis of new management challenges related to the development of cyber-physical and cybersocial systems is carried out. A model of social organizations and organizational behavior in the conditions (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  29
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Semiotics and Narrative.Thomas Sebeok (ed.) - 1991 - Berlin: Mouton de Gruyter.
    This article offers a historical perspective on the emergence of narrative as a major area of research, with a sampling of the range of possible approaches. Key early figures, including Propp, Levi-Strauss, the French structuralists (Greimas in particular), and the linguist Labov are discussed. It aims to provide a framework in which some key concepts can be examined, in particular the term narrativity, which regards narrative as a semiotic structure that transcends the verbal domain. The work of Metz in cinema (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  52
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  40
    A semiotic theory of theology and philosophy.Robert S. Corrington - 2000 - New York, NY: Cambridge University Press.
    The concern of this work is with developing an alternative to standard categories in theology and philosophy, especially in terms of how they deal with nature. Avoiding the polemics of much contemporary reflection on nature, it shows how we are connected to nature through the unconscious and its unique way of reading and processing signs. Spinoza's key distinction between natura naturans and natura naturata serves as the governing framework for the treatise. Suggestions are made for a post-Christian way of understanding (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  23
    Apocalypse Now!: From Freud, Through Lacan, to Stiegler’s Psychoanalytic ‘Survival Project.Mark Featherstone - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (2):409-431.
    The objective of this article is to explore the value of psychoanalysis in the early twenty-first century through reference to Freud, Lacan, and Stiegler’s work on computational madness. In the first section of the article I consider the original objectives of psychoanalysis through reference to what I call Freud’s ‘normalisation project’, before exploring the critique of this discourse concerned with the defence of oedipal law through a discussion of the post-modern ‘individualisation project’ set out by Deleuze and Guattari and others. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  67
    Cyberbullying in Nigeria: Examining the Adequacy of Legal Responses.Adejoke O. Adediran - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (4):965-984.
    Cyberbullying has been defined as the “process of using the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person.” The word “cyberbullying” is often used interchangeably with “cyber stalking” and in fact the Cybercrimes Act 2015 of Nigeria, uses the word “cyber stalking” which it defines as any course of conduct directed at a specific person that would cause a reasonable person to feel fear. By the provisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  13
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  25
    A semiotic interpretation of genre: Judgments as an example. Le Cheng - 2010 - Semiotica 2010 (182):89-113.
    Genre has been a critical issue in discourse analysis as well as in other disciplines. Based on a literature review of the concept of genre and taking judgments as one type of genre in legal settings, the present study provides a corpus-based insight into the nature of genre. The literature review per se reveals that genre has one typical feature of a sign, that is, being subject to multiple and alternative interpretations; in other words, genre as a sign may have (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  25.  31
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  48
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  26
    Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  6
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  43
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I will (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  21
    Le cyber-terrorisme.Maura Conway - 2009 - Cités 39 (3):81.
    Après le 11 septembre 2001, un ressort essentiel des politiques américaines de renforcement de la « sécurité nationale » a pris la forme d’une insistance quasi paranoïaque sur les menaces potentiellement catastrophiques constituées par le cyber-terrorisme. Un grand nombre de commentateurs politiques, militaires ou économiques, ainsi que d’universitaires et de journalistes, ont envahi..
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  33
    Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  32.  17
    Legal Recognition of Electronic Signature in Commercial Transactions: A Comparison Between the Jordanian Electronic Transactions Law of 2015 and the United Arab Emirates Electronic Transactions and Trust Services Law of 2021.Mohammad Saeed Abdallah Alsheyab - 2023 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (3):1281-1291.
    Electronic commercial transactions have become a vital part of digital economies around the world. However, the countries need to upgrade their policy frameworks and related legal provisions amid a fragile cyber security environment. The authentication of electronic signatures is a complex phenomenon that needs attention for authentication and recognition. This research presents a comparative analysis of the two countries Jordan and the United Arab Emirates. This study analyzes the related legal statutes to figure out differences and compatibility with reference (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  22
    A Semiotic Framework Kelly A. Parker.Normative Judgment In Jazz - 2012 - In Cornelis De Waal & Krzysztof Piotr Skowroński (eds.), The normative thought of Charles S. Peirce. New York: Fordham University Press.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  16
    The Cyber and the Subjective.Steve Jones - 1999 - In Ian Parker & Ángel J. Gordo-López (eds.), Cyberpsychology. New York: Routledge. pp. 221.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  24
    Medical Semiotics.Eugen Baer - 1988 - University Press of Amer.
  37.  26
    'Cyberation' and Just War Doctrine: A Response to Randall Dipert.Colonel James Cook - 2010 - Journal of Military Ethics 9 (4):411-423.
    In this essay, I reject the suggestion that the just war tradition (JWT) does not apply to cyberwarfare (CW). That is not to say CW will not include grey areas defying easy analysis in terms of the JWT. But analogously ambiguous cases have long existed in warfare without undercutting the JWT's broad relevance. That some aspects of CW are unique is likewise no threat to the JWT's applicability. The special character of CW remains similar enough to other kinds of warfare; (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  21
    Pre-crime, Post-criminology, and the Captivity of Ultramodern Desire.Bruce A. Arrigo, Brian Sellers & Jo Sostakas - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (2):497-514.
    This article further elaborates on the “pre-crime society” thesis as developed and examined by Arrigo and Sellers. Specifically, the article focuses on the ultramodern era of digital inter-connectivity and argues that productive psychic desire is held clinically captive. Ultra-modernity is populated by cyber-forms of human relating and of economic exchange that nurture hyper-securitization. We discuss how the maintenance of hyper-securitization supports a pre-crime society, and how hyper-securitization’s object of desire consists of sign-optics. We argue that the co-constitutive forces of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  20
    Le cyber-communisme ou le dépassement du capitalisme dans le Cyberespace.Richard Barbrook - 2001 - Multitudes 2 (2):186-199.
    Richard Barbrook demonstrate that Americans are very good at doing the contrary of what they are supposed to abide by, i.e. capitalist commodification, and engage instead in a digital economy based on exchange, sharing and the free gift labor, idea, and practices. The tone may be ironic, or downwar facetious, but that should not detract from the issue at stake : the cyberage end of the line for a ’cognitive’ capitalism that will prove unable to surmount the « irresoluble contradictions (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  8
    Cyber Terrorism And Cyber Law - Duties Of Service Providers.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    The year 2017 has dawned in a new era. This is an era where cyber terrorism and cyber extremism are increasingly going to be significant factors in our day-to-day lives. Whether we like it or not, today social media platforms are infiltrated with cyber terrorists and cyber extremists. In addition, Cyber radicalization as a phenomenon is constantly on the rise.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  28
    Balancing Asymmetries in Domain Name Arbitration Practices.Laura Martínez Escudero - 2012 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 25 (3):297-316.
    As an alternative dispute resolution procedure, Domain Name Arbitration addresses not only contentions regarding the ownership of web pages, but also infringements of the Intellectual Property law such as cyber squatting or Internet piracy. In this spirit, panelists of the World Intellectual Property Organization enact law in accordance with what the involved parties provide them as burden of proof. Following this line of thought, we can assume that one party may remain unrepresented when it is not able to accomplish (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  86
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  26
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  6
    Cyber Inclusion vs Isolation.Zhanna Vavilova - 2023 - Dialogue and Universalism 33 (1):77-90.
    Recent restrictions of movement during the pandemic have forced people worldwide, even neo-luddites, to turn to communicating online. The virtualization of social processes that we are witnessing today, suggests constant rethinking of the role of the Internet for humanity so that we could optimize conditions of our existence that seem to be irreversibly transformed by technology, and integrate every individual with a unique set of features in the life of society. The author deals with the notions of cyberinclusion, virtual ghetto, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  74
    Semiotics and the Philosophy of Language.Umberto Eco - 1986 - Advances in Semiotic.
    "Eco wittily and enchantingly develops themes often touched on in his previous works, but he delves deeper into their complex nature... this collection can be read with pleasure by those unversed in semiotic theory." —Times Literary Supplement.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   97 citations  
  46.  40
    Cyber-Marx: Cycles and Circuits of Struggle in High-Technology Capitalism.Enda Brophy - 2001 - Acm Sigcas Computers and Society 31 (1):22-23.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  47. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  13
    Cyber(Body)Parts: Prosthetic Consciousness.Robert Rawdon Wilson - 1995 - Body and Society 1 (3-4):239-259.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  2
    Sports semiotics.Arthur Asa Berger - 2023 - Leiden: Brill.
    Sports Semiotics' applies semiotics (and other disciplines, secondarily) to analyse the social, cultural, economic and psychological significance of sports. It includes a primer on semiotic theory, sections on the analysis of wrestling by Roland Barthes in his book 'Mythologies', as well as sections on football and the sacred, the Super Bowl, and the semiotics of televised baseball.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 995