Results for 'internet protocols'

1000+ found
Order:
  1.  16
    The Internet of Futures Past: Values Trajectories of Networking Protocol Projects.Britt Paris - 2021 - Science, Technology, and Human Values 46 (5):1021-1047.
    The Internet was conceptualized as a technology that would be capable of bringing about a better future, but recent literature in science and technology studies and adjacent fields provides numerous examples of how this pervasive sociotechnical system has been shaped and used to dystopic ends. This article examines different future imaginaries present in Future Internet Architecture projects funded by the National Science Foundation from 2006 to 2016, whose goal was to incorporate social values while building new protocols (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  36
    Internet-based crowdsourcing and research ethics: the case for IRB review.Mark A. Graber & Abraham Graber - 2013 - Journal of Medical Ethics 39 (2):115-118.
    The recent success of Foldit in determining the structure of the Mason-Pfizer monkey virus (M-PMV) retroviral protease is suggestive of the power-solving potential of internet-facilitated game-like crowdsourcing. This research model is highly novel, however, and thus, deserves careful consideration of potential ethical issues. In this paper, we will demonstrate that the crowdsourcing model of research has the potential to cause harm to participants, manipulates the participant into continued participation, and uses participants as experimental subjects. We conclude that protocols (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  13
    Engaging Values Despite Neutrality: Challenges and Approaches to Values Reflection during the Design of Internet Infrastructure.Katie Shilton - 2018 - Science, Technology, and Human Values 43 (2):247-269.
    Internet protocol development is a social process, and resulting protocols are shaped by their developers’ politics and values. This article argues that the work of protocol development poses barriers to developers’ reflection upon values and politics in protocol design. A participant observation of a team developing internet protocols revealed that difficulties defining the stakeholders in an infrastructure and tensions between local and global viewpoints both complicated values reflection. Further, Internet architects tended to equate a core (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  5. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  6.  17
    Blockchain technology, foundations, protocols and aesthetic considerations.Marie Molins - 2021 - Technoetic Arts 19 (3):349-364.
    This article aims to outline the fundamental concepts that characterize blockchain technology in order to allow for a better understanding of how it is structured within the protocols which govern the internet, but also to portray the devices which allow its re-appropriation by capitalist culture. The theoretical foundations of this article are supported by a medio-archaeological position that allows us to acquire a technical look at the blockchain, but also to weave historical and aesthetic parallels in order to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  17
    Ethical issues and practical barriers in internet-based suicide prevention research: a review and investigator survey.Eleanor Bailey, Charlotte Mühlmann, Simon Rice, Maja Nedeljkovic, Mario Alvarez-Jimenez, Lasse Sander, Alison L. Calear, Philip J. Batterham & Jo Robinson - 2020 - BMC Medical Ethics 21 (1):1-16.
    Background People who are at elevated risk of suicide stand to benefit from internet-based interventions; however, research in this area is likely impacted by a range of ethical and practical challenges. The aim of this study was to examine the ethical issues and practical barriers associated with clinical studies of internet-based interventions for suicide prevention. Method This was a mixed-methods study involving two phases. First, a systematic search was conducted to identify studies evaluating internet-based interventions for people (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  22
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol.Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García & Carmen Benavides - 2019 - Complexity 2019:1-11.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  3
    Ethical considerations when preparing a clinical research protocol.Evan G. DeRenzo - 2020 - San Diego, CA: Academic Press, imprint Elsevier. Edited by Eric A. Singer & Joel Moss.
    Ethical Considerations When Preparing a Clinical Research Protocol, Second Edition, provides a foundation for improving skills in the understanding of ethical requirements in the design and conduct of clinical research. It includes practical information on ethical principles in clinical research, how to design appropriate research studies, how to consent and assent documents, how to get protocols approved, special populations, confidentiality issues, and the reporting of adverse events. The book's valuable appendix includes a listing of web resources about research ethics, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  63
    Merging Theoretical Models and Therapy Approaches in the Context of Internet Gaming Disorder: A Personal Perspective.Kimberly S. Young & Matthias Brand - 2017 - Frontiers in Psychology 8:289710.
    Although it is not yet officially recognized as a clinical entity which is diagnosable, Internet Gaming Disorder (IGD) has been included in section III for further study in the DSM-5 by the American Psychiatric Association (APA, 2013). This is important because there is increasing evidence that people of all ages, in particular teens and young adults, are facing very real and sometimes very severe consequences in daily life resulting from an addictive use of online games. This article summarizes general (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  11
    Application of embedded Linux in the design of Internet of Things gateway.Rajeev Kumar, Poonam Rani, Renu Popli, Pengfei Yan, Li Wang & Tao Wang - 2022 - Journal of Intelligent Systems 31 (1):1014-1023.
    To study the development trend of embedded platforms in home appliances Internet of Things, an application of embedded Linux in the design of IoT gateway is designed. ARM microprocessor S3C2410, EM310 radio frequency module, and Ethernet DM9000A module are used to realize the home network information-processing platform. The platform utilizes existing network facilities, RF modules, and network interface modules to realize the interconnection of the home perception network through wireless or wired links. For experimental analysis, Ping the central server (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  4
    Intelligent Digital Currency and Dynamic Coding Service System Based on Internet of Things Technology.Shanshen Li & Xin Jing - 2020 - Complexity 2020:1-16.
    The amazing rise of digital currency is not only favored by investors but also attractive to lawbreakers for its anonymity and decentralization. This paper mainly discusses the intelligent digital currency and dynamic coding service system based on Internet of Things technology. In this paper, the RDCAR algorithm is used to realize the routing discovery process of the wireless network. When the intermediate node receives the RREQ message, first of all, to avoid the loop, it checks whether the same RREQ (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  12
    Emerging Tort Issues in the Collection and Dissemination of Internet-Based Research Data.Tomas Lipinski - 2006 - Journal of Information Ethics 15 (2):55-81.
    This article examines the possible basis for legal liability of researchers who use the Internet in the collection of research data. In particular, it examines the potential legal issues associated with the protocols of ethnographers who use listserv, discussion board, blog, chat room and other sorts of web or Internet-based postings as the source of their data. The author assumes that the forum for participation is legitimate, in that the list, board, blog, chat, etc. is not created (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14. Protocolo de prevención de caídas.Fall Prevention Protocol - forthcoming - Horizonte.
     
    Export citation  
     
    Bookmark  
  15. Avicenna : Logic.Internet Encylcopedia of Philosophy - 2016
    Avicenna : Logic Avicenna is one of the most important philosophers and logicians in the Arabic world. His logical works are presented in several treatises. Some of them are commentaries on Aristotle's Organon, and are presented in al-Shifa al-Mantiq, the logical part of … Continue reading Avicenna : Logic →.
     
    Export citation  
     
    Bookmark  
  16.  17
    Network Working Group B. Callaghan Request for Comments: 1813 B. Pawlowski Category: Informational P. Staubach Sun Microsystems, Inc. June 1995. [REVIEW]Protocol Specification - 1995 - Philosophy 8:1-7.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  33
    Universal service in a ubiquitous digital network.L. Jean Camp & Rose P. Tsang - 2000 - Ethics and Information Technology 2 (4):211-221.
    Before there was the digital divide there was the analog divide– and universal service was the attempt to close that analogdivide. Universal service is becoming ever more complex in terms ofregulatory design as it becomes the digital divide. In order to evaluatethe promise of the next generation Internet with respect to the digitaldivide this work looks backwards as well as forwards in time. Byevaluating why previous universal service mechanisms failed andsucceeded this work identifies specific characteristics ofcommunications systems – in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  4
    Study on Tourism Consumer Behavior Characteristics Based on Big Data Analysis.Muyi Gan & Yao Ouyang - 2022 - Frontiers in Psychology 13.
    In terms of scenic marketing, big data research also plays an important role in the precise marketing of scenic spots. This paper has focused on the big data related to scenic spots as the research object, explores the relationship between various subdivision big data and the number of tourists in scenic spots, and investigates the difference and influence of the consumption behavior of the secondary consumption items in the scenic area, to find the potential of the scenic area’s business growth (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  24
    Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):90-99.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and informed (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  25
    Teaching & Learning Guide for: Full Disclosure of the ‘Raw Data’ of Research on Humans: Citizens’ Rights, Product Manufacturers’ Obligations and the Quality of the Scientific Database.Dennis J. Mazur - 2011 - Philosophy Compass 6 (2):152-157.
    This guide accompanies the following article(s): ‘Full Disclosure of the “Raw Data” of Research on Humans: Citizens’ Rights, Product Manufacturer’s Obligations and the Quality of the Scientific Database.’Philosophy Compass 6/2 (2011): 90–99. doi: 10.1111/j.1747‐9991.2010.00376.x Author’s Introduction Securing consent (and informed consent) from patients and research study participants is a key concern in patient care and research on humans. Yet, the legal doctrines of consent and informed consent differ in their applications. In patient care, the judicial doctrines of consent and informed (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Реформа интернета.Andrej Poleev - 2020 - Enzymes 18.
    Частным аспектом предлагаемой реформы интернета является метаномические правила референцирования и адресации виртуальных объектов с целью приближения их к естественным языкам, и создания их логической системы. Однако реформа интернета и преобразование его в средство общения и служения обществу требует также других мер. К этим мерам относится передача определённых имён в неотчуждаемое владение, чтобы их собственники безусловно и беспрепятственно могли осуществлять их право публикации, т.е. публичного высказывания и выражения их мыслей, что также важно для документографии. Другой мерой должно стать упразднение всей сложившейся (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  1
    Souveraineté numérique et ordre public.Pierre Bellanger - 2015 - Archives de Philosophie du Droit 58 (1):285-296.
    L’auteur rappelle d’abord que l’internet devient la société toute entière et que ce territoire global est contrôlé par des entreprises privées, essentiellement américaines. Les défis ainsi posés à l’ordre public, et dont l’auteur fournit des illustrations nombreuses, exigent le rétablissement d’une véritable souveraineté numérique. Pour y parvenir l’auteur propose que l’Etat autorise les protocoles de chiffrement, lutte contre l’évasion fiscale des entreprises de données, leurs serveurs devant eux-mêmes être localisés en France ou en Europe.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  14
    架空名義入札に頑健な複数ユニットオークションプロトコル.櫻井 祐子 横尾 真 - 2002 - Transactions of the Japanese Society for Artificial Intelligence 17:390-397.
    This paper presents a new multi-unit auction protocol that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  26
    Introduction.Nigel Blake & Paul Standish - 2000 - Journal of Philosophy of Education 34 (1):1–16.
    The Internet has recently enjoyed its thirtieth birthday. In 1969, a computer at the University of California sent a message down a wire to another in a research centre at Stanford. The message was just two letters, *LO’.1 Since then the development of the Internet—of the physical infrastructure of computers and the material or broadcast links between them, along with the digital protocols that enable it to function—has been largely an academic achievement. Up until six years ago, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  25.  13
    Introduction.Nigel Blake & Paul Standish - 2000 - Journal of Philosophy of Education 34 (1):1-16.
    The Internet has recently enjoyed its thirtieth birthday. In 1969, a computer at the University of California sent a message down a wire to another in a research centre at Stanford. The message was just two letters, *LO’.1 Since then the development of the Internet—of the physical infrastructure of computers and the material or broadcast links between them, along with the digital protocols that enable it to function—has been largely an academic achievement. Up until six years ago, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  26.  15
    競り上げオークションにおける情報顕示の促進. 松原繁夫 - 2001 - Transactions of the Japanese Society for Artificial Intelligence 16 (6):473-482.
    An ascending-bid auction protocol with a fixed end time has been widely used in many Internet auction sites. In such auctions, we can observe bidders’ behavior called last minute bidding, namely, a large fraction of bids are submitted in the closing seconds of the auction. This may cause a problem of information revelation failure as well as a problem of the server’s overload and network congestion. If almost all bids are submitted only during the last minute, each bidder cannot (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  43
    The eradication of hate speech on social media: a systematic review.Javier Gracia-Calandín & Leonardo Suárez-Montoya - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):406-421. Translated by Jeremy Roe.
    Purpose The purpose of this paper is to present a quantitative and qualitative synthesis of the diverse academic proposals and initiatives for preventing and eliminating hate speech on the internet. Design/methodology/approach The foundation for this study is a systematic review of papers devoted to the analysis of hate speech. It has been conducted using the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) protocol and applied to an initial corpus of 436 academic texts. Having implemented the suitability, screening (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  98
    Disputation by Design.Sally Jackson - 1997 - Argumentation 12 (2):183-198.
    In normative pragmatics, a kind of empirical discourse analysis organized by normative theory, the analysis of any communication process begins with an idealized model of the discourse that can be compared with actual practices. Idealizations of argumentation can be found, among other places, in theoretical descriptions of ‘critical discussion’ and other dialogue types. Comparing ideal models with actual practices can pinpoint defects in the models (leading to theoretical refinements), but it can also identify deficiencies in practice. This latter possibility invites (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  29.  44
    The psychology of human risk preferences and vulnerability to scare-mongers: experimental economic tools for hypothesis formulation and testing.W. Harrison Glenn & Ross Don - 2016 - Journal of Cognition and Culture 16 (5):383-414.
    The Internet and social media have opened niches for political exploitation of human dispositions to hyper-alarmed states that amplify perceived threats relative to their objective probabilities of occurrence. Researchers should aim to observe the dynamic “ramping up” of security threat mechanisms under controlled experimental conditions. Such research necessarily begins from a clear model of standard baseline states, and should involve adding treatments to established experimental protocols developed by experimental economists. We review these protocols, which allow for joint (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  18
    架空名義入札に頑健な公開競上げ式複数同一財オークションプロトコル.横尾 真 岩崎 敦 - 2004 - Transactions of the Japanese Society for Artificial Intelligence 19:334-342.
    This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: it has an open format, sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  16
    Online and Face-to-Face Performance on Two Cognitive Tasks in Children With Williams Syndrome.Maria Ashworth, Olympia Palikara, Elizabeth Burchell, Harry Purser, Dritan Nikolla & Jo Van Herwegen - 2021 - Frontiers in Psychology 11.
    There has been an increase in cognitive assessment via the Internet, especially since the coronavirus disease 2019 surged the need for remote psychological assessment. This is the first study to investigate the appropriability of conducting cognitive assessments online with children with a neurodevelopmental condition and intellectual disability, namely, Williams syndrome. This study compared Raven’s Colored Progressive Matrices and British Picture Vocabulary Scale scores from two different groups of children with WS age 10–11 years who were assessed online or face-to-face. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  50
    Balancing Benefits and Risks of Immortal Data.Oscar A. Zarate, Julia Green Brody, Phil Brown, Monica D. Ramirez-Andreotta, Laura Perovich & Jacob Matz - 2015 - Hastings Center Report 46 (1):36-45.
    An individual's health, genetic, or environmental-exposure data, placed in an online repository, creates a valuable shared resource that can accelerate biomedical research and even open opportunities for crowd-sourcing discoveries by members of the public. But these data become “immortalized” in ways that may create lasting risk as well as benefit. Once shared on the Internet, the data are difficult or impossible to redact, and identities may be revealed by a process called data linkage, in which online data sets are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  33.  47
    Ethical issues in using Twitter for population-level depression monitoring: a qualitative study.Jude Mikal, Samantha Hurst & Mike Conway - 2016 - BMC Medical Ethics 17 (1):1.
    Recently, significant research effort has focused on using Twitter to investigate mental health at the population-level. While there has been influential work in developing ethical guidelines for Internet discussion forum-based research in public health, there is currently limited work focused on addressing ethical problems in Twitter-based public health research, and less still that considers these issues from users’ own perspectives. In this work, we aim to investigate public attitudes towards utilizing public domain Twitter data for population-level mental health monitoring (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  10
    Motion and representation: the language of human movement.Nicolás Salazar Sutil - 2015 - Cambridge, Massachusetts: MIT Press.
    An examination of the ways human movement can be represented as a formal language and how this language can be mediated technologically. In Motion and Representation, Nicolás Salazar Sutil considers the representation of human motion through languages of movement and technological mediation. He argues that technology transforms the representation of movement and that representation in turn transforms the way we move and what we understand to be movement. Humans communicate through movement, physically and mentally. To record and capture integrated movement (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  57
    Human participants challenges in youth-focused research: Perspectives and practices of IRB administrators.Diane K. Wagener, Amy K. Sporer, Mary Simmerling, Jennifer L. Flome, Christina An & Susan J. Curry - 2004 - Ethics and Behavior 14 (4):335 – 349.
    The purpose of this research was to understand institutional review board (IRB) challenges regarding youth-focused research submissions and to present advice from administrators. Semistructured self-report questionnaires were sent via e-mail to administrators identified using published lists of universities and hospitals and Internet searches. Of 183 eligible institutions, 49 responded. One half indicated they never granted parental waivers. Among those considering waivers, decision factors included research risks, survey content, and feasibility. Smoking and substance abuse research among children was generally considered (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36.  45
    Identification of ethics committees based on authors’ disclosures: cross-sectional study of articles published in the European Journal of Anaesthesiology and a survey of ethics committees.Davide Zoccatelli, Martin R. Tramèr & Nadia Elia - 2018 - BMC Medical Ethics 19 (1):57.
    Since 2010, the European Journal of Anaesthesiology has required the reporting of five items concerning ethical approval in articles describing human research: ethics committee’s name and address, chairperson’s name, study’s protocol number and approval date. We aimed to assess whether this requirement has helped to identify and to contact the referenced ethics committees. In this cross-sectional study, we analysed articles requiring ethical approval, according to the Swiss federal law for human research and published in the European Journal of Anaesthesiology in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  20
    Design of a New Distributed NoSQL Database with Distributed Hash Tables.Agustín San Román Guzmán, Diego Valdeolmillos, Alberto Rivas, Angélica González Arrieta & Pablo Chamoso - 2022 - Logic Journal of the IGPL 30 (4):566-577.
    Databases play a fundamental role in today’s world, being used by most companies, especially those that offer services through the Internet. Today there is a wide variety of database models, each adapted for use according to the specific requirements of each application. Traditionally, the relational models with centralized architectures have been used mostly due to their simplicity and general-purpose query language, which made relational systems suitable for almost any application. However, with the growth of the Internet in recent (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  10
    Efficient mutual authentication using Kerberos for resource constraint smart meter in advanced metering infrastructure.Md Mehedi Hasan, Noor Afiza Mohd Ariffin & Nor Fazlida Mohd Sani - 2023 - Journal of Intelligent Systems 32 (1).
    The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. In terms of various devices and machine integration, adequate authentication is the key to an accurate source and destination in advanced metering infrastructure (AMI). Various protocols are deployed to lead the identification between two parties, which require high computation time and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  6
    Global media and archaeologies of network technologies.Sean Cubitt - 2013 - In Paul Graves-Brown, Rodney Harrison & Angela Piccini (eds.), The Oxford Handbook of the Archaeology of the Contemporary World. Oxford University Press. pp. 135.
    Analysis of the material properties of the Internet reveals its true weight: the mass of component routers, switches, cables, satellites, cellnet masts, and of course computers, and the vast network of resource extraction, manufacturing, energy generation, and waste in which its functioning is embedded. Equally important is understanding the massless but highly regulated system of software and legislation affecting the ostensibly free and open evolution of network media. The chapter traces some exemplary standards bodies responsible for the design of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  74
    Digital Vigilantism as Weaponisation of Visibility.Daniel Trottier - 2017 - Philosophy and Technology 30 (1):55-72.
    This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this area (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  41.  9
    Remote Data Collection During a Pandemic: A New Approach for Assessing and Coding Multisensory Attention Skills in Infants and Young Children.Bret Eschman, James Torrence Todd, Amin Sarafraz, Elizabeth V. Edgar, Victoria Petrulla, Myriah McNew, William Gomez & Lorraine E. Bahrick - 2022 - Frontiers in Psychology 12.
    In early 2020, in-person data collection dramatically slowed or was completely halted across the world as many labs were forced to close due to the COVID-19 pandemic. Developmental researchers who assess looking time were forced to re-think their methods of data collection. While a variety of remote or online platforms are available for gathering behavioral data outside of the typical lab setting, few are specifically designed for collecting and processing looking time data in infants and young children. To address these (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  17
    Prediction of the RFID Identification Rate Based on the Neighborhood Rough Set and Random Forest for Robot Application Scenarios.Hong-Gang Wang, Shan-Shan Wang, Ruo-Yu Pan, Sheng-Li Pang, Xiao-Song Liu, Zhi-Yong Luo & Sheng-Pei Zhou - 2020 - Complexity 2020:1-15.
    With the rapid development of Internet of Things technology, RFID technology has been widely used in various fields. In order to optimize the RFID system hardware deployment strategy and improve the deployment efficiency, the prediction of the RFID system identification rate has become a new challenge. In this paper, a neighborhood rough set and random forest combination model is proposed to predict the identification rate of an RFID system. Firstly, the initial influencing factors of the RFID system identification rate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  2
    Designing a ‘concept of operations’ architecture for next-generation multi-organisational service networks.Tomás Seosamh Harrington & Jagjit Singh Srai - 2023 - AI and Society 38 (6):2533-2545.
    Networked service organisations are increasingly adopting a ‘smarter networking’ philosophy in their design of more agile and customer-focused supply models. Changing consumer behaviours and the emergence of transformative technologies—industry 4.0, artificial intelligence, big data analytics, the Internet of Things—are driving a series of innovations, in terms of ‘products’ and business models, with major implications for the industrial enterprise, in their design of more ‘digitalised’ supply chains. For B2B systems, emerging ‘product-service’ offerings are requiring greater visibility, alignment and integration across (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  22
    Teaching students out of harm’s way.Esther Charlotte Moon - 2018 - Journal of Information, Communication and Ethics in Society 16 (3):290-302.
    Purpose The purpose of this paper is to demonstrate how changes in K-12 educational delivery methods in the USA impacts students as 1:1 device programs become a required tool for learning. This change produces gaps in knowledge and understanding of the digital environment and exposes minors to risk. Mandatory technology integration by school districts places the ethical responsibility on school districts to prepare students to use the digital environment to mitigate risk. Design/methodology/approach The author’s literature review focused on the impact (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45. Protocol Analysis in Creative Problem-solving.Steven James Bartlett - 1978 - Journal of Creative Behavior 12 (3):181-192.
    The use of protocol analysis in the traning of cognitive skills.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Discussion protocol for alleviating epistemic injustice: The case of community rehabilitation interaction and female substance abusers.Petra Auvinen, Jaana Parviainen, Lauri Lahikainen & Hannele Palukka - 2021 - Social Sciences 10 (2).
    Substance-abusing women are vulnerable to specific kinds of epistemic injustice, including stigmatization and discrimination. This article examines the development of the epistemic agency of female substance abusers by asking: How does the use of a formal discussion protocol in community rehabilitation interaction alleviate epistemic injustice and strengthen the epistemic agency of substance abusers? The data were collected in a Finnish rehabilitation center by videotaping six group discussions between social workers, peer support workers, and rehabilitation clients with substance abuse problems. Of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  16
    Scientific Protocols as Recipes: A New Way to Look at Experimental Practice in the Life Sciences and the Hidden Philosophy Within.Federico Boem - 2020 - Humana Mente 13 (38).
    The experimental practice in contemporary molecular biology oscillates between the creativity of the researcher in tinkering with the experimental system, and the necessity of standardization of methods of inquiry. Experimental procedures, when standardized in lab protocols, might definitely be seen as actual recipes. Considering these protocols as recipes can help us understand some epistemological characteristics of current practice in molecular biology. On the one hand, protocols represent a common ground, i.e. the possibility of reproducibility, which constitutes one (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  49.  23
    Protocols, Truth and Convention.Thomas Oberdan (ed.) - 1993 - BRILL.
    The continuing philosophical interest in the famous 'Protocol Sentence Debate' in the Vienna Circle of Logical Positivists is, to a large measure, due to the focus on the epistemological issues in the dispute, and the neglect of differences among the leading players in their philosophical views of logic and language. In _Protocols, Truth and Convention_, the current understanding of the debate is advanced by developing the contemporaneous views of logic and language held by the principal disputants. Rudolf Carnap and Moritz (...)
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  50.  60
    Dialogue Protocols for Formal Fallacies.Magdalena Kacprzak & Olena Yaskorska - 2014 - Argumentation 28 (3):349-369.
    This paper presents a dialogue system called Lorenzen–Hamblin Natural Dialogue (LHND), in which participants can commit formal fallacies and have a method of both identifying and withdrawing formal fallacies. It therefore provides a tool for the dialectical evaluation of force of argument when players advance reasons which are deductively incorrect. The system is inspired by Hamblin’s formal dialectic and Lorenzen’s dialogical logic. It offers uniform protocols for Hamblin’s and Lorenzen’s dialogues and adds a protocol for embedding them. This unification (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
1 — 50 / 1000