Results for 'personal computer'

1000+ found
Order:
  1. High Tech Heretic: Why Computers Don't Belong in the Classroom and Other Reflections by a Computer Contrarian.R. Person - 2000 - Knowledge, Technology & Policy 13 (2):113-114.
     
    Export citation  
     
    Bookmark  
  2.  32
    Images of Personal Computing and Networking in Advertising.Robert T. Swank - 1989 - Semiotics:373-379.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3.  6
    Usable and Useful: On the Origins of Transparent Design in Personal Computing.Michael L. Black - 2020 - Science, Technology, and Human Values 45 (3):515-537.
    It is often taken for granted that personal computers today are designed to hide technical information in order to make software seem easier. While “transparency of interaction” has influenced popular understandings of computer systems, it also shapes our engagement with software as critics. This essay examines the origins of transparent design in different models of usability proposed by IBM and Apple in response to popular concerns over the inaccessibility of personal computers in the early 1980s. By tracing (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  39
    A semiotic analysis of sounds in personal computers: Toward a semiotic model of human-computer interaction.Yoonjae Nam & Joohan Kim - 2010 - Semiotica 2010 (182):269-284.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  6
    PCTS: An Object-Oriented Diagnostic and Trouble-Shooting System for Maintenance of Personal Computers.R. Malhotra - 1998 - Journal of Intelligent Systems 8 (3-4):357-382.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  15
    From the Entscheidungsproblem to the Personal Computer–and Beyond.B. Jack Copeland - 2011 - In Matthias Baaz (ed.), Kurt Gödel and the foundations of mathematics: horizons of truth. New York: Cambridge University Press. pp. 151.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  6
    Just a Machine? Dehumanizing Strategies in Personal Computer Use.Deborah Lupton & Greg Noble - 1997 - Body and Society 3 (2):83-101.
  8.  18
    The mind’s machines: The Turing machine, the Memex, and the personal computer.Peter Skagestad - 1996 - Semiotica 111 (3-4):217-244.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  11
    The writing on the screen: A meditation on the Virginia Tech shooting spree: Age-appropriate use of violent first-person computer games.Camilla Benolirao Griggers - 2009 - Semiotica 2009 (177):189-196.
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  26
    Michael Friedewald: Der Computer als Werkzeug und Medium. Die geistigen und technischen Wurzeln des Personal Computers. (Aachener Beiträge zur Wissenschafts‐ und Technikgeschichte des 20. Jahrhunderts, Bd 3) Berlin/Diepholz: Verlag für Geschichte der Naturwissenschaften und der Technik 1999, ISBN 3‐928186‐47‐7; zugleich Diss. Aachen, Technische Hochschule 1999. [REVIEW]Rudolf Seising - 2000 - Berichte Zur Wissenschaftsgeschichte 23 (3):390-392.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Book Review: Beyond the Image Machine: A History of Visual Technologies; Critical Technology: A Social Theory of Personal Computing. [REVIEW]Nicholas Gane - 2006 - Thesis Eleven 84 (1):141-144.
  12. Computers, Persons, and the Chinese Room. Part 1: The Human Computer.Ricardo Restrepo - 2012 - Journal of Mind and Behavior 33 (1):27-48.
    Detractors of Searle’s Chinese Room Argument have arrived at a virtual consensus that the mental properties of the Man performing the computations stipulated by the argument are irrelevant to whether computational cognitive science is true. This paper challenges this virtual consensus to argue for the first of the two main theses of the persons reply, namely, that the mental properties of the Man are what matter. It does this by challenging many of the arguments and conceptions put forth by the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  66
    Thinking Computers and Virtual Persons: Essays on the Intentionality of Machines.Eric Dietrich (ed.) - 1994 - Academic Press.
    Can computers think? This book is intended to demonstrate that thinking, understanding, and intelligence are more than simply the execution of algorithms--that is, that machines cannot think. Written and edited by leaders in the fields of artificial intelligence and the philosophy of computing.
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  14.  33
    Multiobjective Personalized Recommendation Algorithm Using Extreme Point Guided Evolutionary Computation.Qiuzhen Lin, Xiaozhou Wang, Bishan Hu, Lijia Ma, Fei Chen, Jianqiang Li & Carlos A. Coello Coello - 2018 - Complexity 2018:1-18.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Computers, Persons, and the Chinese Room. Part 2: Testing Computational Cognitive Science.Ricardo Restrepo - 2012 - Journal of Mind and Behavior 33 (3):123-140.
    This paper is a follow-up of the first part of the persons reply to the Chinese Room Argument. The first part claims that the mental properties of the person appearing in that argument are what matter to whether computational cognitive science is true. This paper tries to discern what those mental properties are by applying a series of hypothetical psychological and strengthened Turing tests to the person, and argues that the results support the thesis that the Man performing the computations (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Personal Publications Media Views Ulimate Computing.Stuart Hameroff & Roger Penrose - unknown
    Features of consciousness difficult to understand in terms of conventional neuroscience have evoked application of quantum theory, which describes the fundamental behavior of matter and energy. In this paper we propose that aspects of quantum theory (e.g. quantum coherence) and of a newly proposed physical phenomenon of quantum wave function "self-collapse"(objective reduction: OR -Penrose, 1994) are essential for consciousness, and occur in cytoskeletal microtubules and other structures within each of the brain's neurons. The particular characteristics of microtubules suitable for quantum (...)
     
    Export citation  
     
    Bookmark  
  17.  77
    Computer ethics: The role of personal, informal, and formal codes. [REVIEW]Margaret Anne Pierce & John W. Henry - 1996 - Journal of Business Ethics 15 (4):425 - 437.
    Ethical decisions related to computer technology and computer use are subject to three primary influences: (1) the individual's own personal code (2) any informal code of ethical behavior that exists in the work place, and (3) exposure to formal codes of ethics. The relative importance of these codes, as well as factors influencing these codes, was explored in a nationwide survey of information system (IS) professionals. The implications of the findings are important to educators and employers in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  18.  51
    Does computer-synthesized speech manifest personality? Experimental tests of recognition, similarity-attraction, and consistency-attraction.Clifford Nass & Kwan Min Lee - 2001 - Journal of Experimental Psychology: Applied 7 (3):171.
  19.  6
    Do Personality Traits Matter? Exploring Anti-drug Behavioral Patterns in a Computer-Assisted Situated Learning Environment.Tien-Chi Huang & Yu-Jie Chen - 2022 - Frontiers in Psychology 13.
    Drug abuse has been and continues to be, a common social issue worldwide, yet the efficiency of widely adopted sweeping speech for anti-drug campaigns has proven inefficient. To provide students with a safe and efficient learning situation related to drug refusal skills, we used a novel approach rooted in a serious learning game and concept map during a brief extracurricular period to help students understand drugs and their negative effects. The proposed game-based situational learning system allowed all students to participate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  88
    Multiple personality and computational models.Margaret A. Boden - 1994 - Philosophy 37:103-114.
    Some readers may have seen the re-runs, on BBC-TV recently, of the ‘Face to Face’ interviews done by John Freeman in the 1960s. One of these was with the singer Adam Faith, then a startlingly beautiful young man with the grace to be amazed at being chosen to be sandwiched between Martin Luther King and J. K. Galbraith. The re-runs were accompanied, where possible, with a further interview with the same person. What I found almost as startling as his lost (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  21.  93
    Is having your computer compromised a personal assault? The ethics of extended cognition.J. Adam Carter & S. Orestis Palermos - 2016 - Journal of the American Philosophical Association 2 (4):542-560.
    Philosophy of mind and cognitive science have recently become increasingly receptive to the hypothesis of extended cognition, according to which external artifacts such as our laptops and smartphones can—under appropriate circumstances—feature as material realizers of a person's cognitive processes. We argue that, to the extent that the hypothesis of extended cognition is correct, our legal and ethical theorizing and practice must be updated by broadening our conception of personal assault so as to include intentional harm toward gadgets that have (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  22.  11
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  16
    A computational model of personality'.Tohru Nitta - 2002 - In Kunio Yasue, Mari Jibu & Tarcisio Della Senta (eds.), No Matter, Never Mind: Proceedings of Toward a Science of Consciousness : Fundamental Approaches (Tokyo '99). John Benjamins. pp. 33--315.
  24.  24
    The computer as a person.Lars-Erik Janlert - 1987 - Journal for the Theory of Social Behaviour 17 (3):321–341.
  25.  20
    Multiple Personality and Computational Models.Margaret A. Boden - 1994 - Royal Institute of Philosophy Supplement 37:103-114.
    Some readers may have seen the re-runs, on BBC-TV recently, of the ‘Face to Face’ interviews done by John Freeman in the 1960s. One of these was with the singer Adam Faith, then a startlingly beautiful young man with the grace to be amazed at being chosen to be sandwiched between Martin Luther King and J. K. Galbraith. The re-runs were accompanied, where possible, with a further interview with the same person. What I found almost as startling as his lost (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  51
    Impacting Persons through Shifts from Face-to-face to Computer Interactions.Paul Ford - 1999 - The Personalist Forum 15 (2):334-346.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  28
    Personal technologies: memory and intimacy through physical computing. [REVIEW]Joanna Berzowska - 2006 - AI and Society 20 (4):446-461.
    In this paper, I present an overview of personal and intimate technologies within a pedagogical context. I describe two courses that I have developed for Computation Arts at Concordia University: “Tangible Media and Physical Computing” and “Second Skin and Soft Wear.” Each course deals with different aspects of physical computing and tangible media in a Fine Arts context. In both courses, I introduce concepts of soft computation and intimate reactive artifacts as artworks. I emphasize the concept of memory (contrasting (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  10
    Personalized Virtual Reality Human-Computer Interaction for Psychiatric and Neurological Illnesses: A Dynamically Adaptive Virtual Reality Environment That Changes According to Real-Time Feedback From Electrophysiological Signal Responses.Jacob Kritikos, Georgios Alevizopoulos & Dimitris Koutsouris - 2021 - Frontiers in Human Neuroscience 15.
    Virtual reality constitutes an alternative, effective, and increasingly utilized treatment option for people suffering from psychiatric and neurological illnesses. However, the currently available VR simulations provide a predetermined simulative framework that does not take into account the unique personality traits of each individual; this could result in inaccurate, extreme, or unpredictable responses driven by patients who may be overly exposed and in an abrupt manner to the predetermined stimuli, or result in indifferent, almost non-existing, reactions when the stimuli do not (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  89
    Computer processes and virtual persons: Comments on Cole's "artificial intelligence and personal identity".William J. Rapaport - 1990
    This is a draft of the written version of comments on a paper by David Cole, presented orally at the American Philosophical Association Central Division meeting in New Orleans, 27 April 1990. Following the written comments are 2 appendices: One contains a letter to Cole updating these comments. The other is the handout from the oral presentation.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  30.  38
    How Free: Computing Personal Liberty.Hillel Steiner - 1983 - Royal Institute of Philosophy Supplement 15:73-89.
    Judgments about the extent to which an individual is free are easily among the more intractable of the various raw materials which present themselves for philosophical processing. On the one hand, few of us have any qualms about making statements to the effect that Blue is more free than Red. Explicitly or otherwise, such claims are the commonplaces of most history textbooks and of much that passes before us in the news media. And yet, good evidence for the presence of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  31.  75
    Programs, grammars and arguments: A personal view of some connections between computation, language and logic.J. Lambek - 1997 - Bulletin of Symbolic Logic 3 (3):312-328.
    As an undergraduate I was taught to multiply two numbers with the help of log tables, using the formulaHaving graduated to teach calculus to Engineers, I learned that log tables were to be replaced by slide rules. It was then that Imade the fateful decision that there was no need for me to learn how to use this tedious device, as I could always rely on the students to perform the necessary computations. In the course of time, slide rules were (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  32. Computers and conscience: Personal ethics issues in the education of microcomputer users.W. Briggs - 1993 - Ethics and Information Technology, Salve Regina College Monograph Series.
     
    Export citation  
     
    Bookmark   1 citation  
  33.  30
    Reply--the possibility of computers becoming persons: A response to Dolby.Christopher Cherry - 1989 - Social Epistemology 3 (4):337-348.
  34.  8
    Personal data in cloud computing: Organizational informationrisk perception.Samir Husić - 2015 - Inquiry: Sarajevo Journal of Social Sciences 1.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  78
    How Free: Computing Personal Liberty.Hillel Steiner - 1983 - Royal Institute of Philosophy Lectures 15:73-89.
  36.  41
    Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse.Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett - 2014 - Journal of Business Ethics 121 (3):385-401.
    Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  37. Responsible computers? A case for ascribing quasi-responsibility to computers independent of personhood or agency.Bernd Carsten Stahl - 2006 - Ethics and Information Technology 8 (4):205-213.
    There has been much debate whether computers can be responsible. This question is usually discussed in terms of personhood and personal characteristics, which a computer may or may not possess. If a computer fulfils the conditions required for agency or personhood, then it can be responsible; otherwise not. This paper suggests a different approach. An analysis of the concept of responsibility shows that it is a social construct of ascription which is only viable in certain social contexts (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  38.  82
    The possibility of computers becoming persons.R. G. A. Dolby - 1989 - Social Epistemology 3 (4):321 – 336.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  39.  70
    Ubiquitous computing, empathy and the self.Soraj Hongladarom - 2013 - AI and Society 28 (2):227-236.
    The paper discusses ubiquitous computing and the conception of the self, especially the question how the self should be understood in the environment pervaded by ubiquitous computing, and how ubiquitous computing makes possible direct empathy where each person or self connected through the network has direct access to others’ thoughts and feelings. Starting from a conception of self, which is essentially distributed, composite and constituted through information, the paper argues that when a number of selves are connected to one another (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  26
    Good computing: a pedagogically focused model of virtue in the practice of computing (part 1).Chuck Huff, Laura Barnard & William Frey - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):246-278.
    PurposeThe purpose of this paper is to present a four component model of ethical behavior (PRIMES) that integrates literature in moral psychology, computing ethics, and virtue ethics as informed by research on moral exemplars in computing. This is part 1 of a two‐part contribution.Design/methodology/approachThis psychologically based and philosophically informed model argues that moral action is: grounded in relatively stable PeRsonality characteristics (PR); guided by integration of morality into the self‐system; shaped by the context of the surrounding moral ecology; and facilitated (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  41.  49
    Vividness of Visual Imagery and Personality Impact Motor-Imagery Brain Computer Interfaces.Nikki Leeuwis, Alissa Paas & Maryam Alimardani - 2021 - Frontiers in Human Neuroscience 15.
    Brain-computer interfaces are communication bridges between a human brain and external world, enabling humans to interact with their environment without muscle intervention. Their functionality, therefore, depends on both the BCI system and the cognitive capacities of the user. Motor-imagery BCIs rely on the users’ mental imagination of body movements. However, not all users have the ability to sufficiently modulate their brain activity for control of a MI-BCI; a problem known as BCI illiteracy or inefficiency. The underlying mechanism of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Problems and Solutions in Researching Computer Game Assisted Dialogues for Persons with Aphasia.Ylva Backman, Viktor Gardelli & Peter Parnes - 2022 - Designs for Learning 1 (14):46–51.
    In this paper, we describe technological advances for supporting persons with aphasia in philosophical dialogues about personally relevant and contestable questions. A computer game-based application for iPads is developed and researched through Living Lab inspired workshops in order to promote the target group’s communicative participation during group argumentation. We outline some central parts of the background theory of the application and some of its main features, which are related to needs of the target group. Methodological issues connected to the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  13
    To 'the possibility of computers becoming persons' (1989).Adam Drozdek - 1994 - Social Epistemology 8 (2):177 – 197.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  82
    Effective procedures and computable functions.Carole E. Cleland - 1995 - Minds and Machines 5 (1):9-23.
    Horsten and Roelants have raised a number of important questions about my analysis of effective procedures and my evaluation of the Church-Turing thesis. They suggest that, on my account, effective procedures cannot enter the mathematical world because they have a built-in component of causality, and, hence, that my arguments against the Church-Turing thesis miss the mark. Unfortunately, however, their reasoning is based upon a number of misunderstandings. Effective mundane procedures do not, on my view, provide an analysis of ourgeneral concept (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  45. Brain–computer interfaces and dualism: a problem of brain, mind, and body.Joseph Lee - 2016 - AI and Society 31 (1):29-40.
    The brain–computer interface (BCI) has made remarkable progress in the bridging the divide between the brain and the external environment to assist persons with severe disabilities caused by brain impairments. There is also continuing philosophical interest in BCIs which emerges from thoughtful reflection on computers, machines, and artificial intelligence. This article seeks to apply BCI perspectives to examine, challenge, and work towards a possible resolution to a persistent problem in the mind–body relationship, namely dualism. The original humanitarian goals of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  8
    Autonomous synthetic computer characters as personal representatives.Linda Cook, Tim Bickmore, Sara Bly, Elizabeth Churchill, Scott Prevost & Joseph W. Sullivan - 2000 - In Kerstin Dauthenhahn (ed.), Human Cognition and Social Agent Technology. Amsterdam: John Benjamins.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47. Technological prerequisites for indistinguishability of a person and his/her computer replica.Albert Efimov - 2019 - Artificial Societies 4.
    Some people wrongly believe that A. Turing’s works that underlie all modern computer science never discussed “physical” robots. This is not so, since Turing did speak about such machines, though making a reservation that this discussion was still premature. In particular, in his 1948 report [8], he suggested that a physical intelligent machine equipped with motors, cameras and loudspeakers, when wandering through the fields of England, would present “the danger to the ordinary citizen would be serious.” [8, ]. Due (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  17
    Bridging cultural differences in teaching computer ethics: an example using personal portfolios.Christina B. Class - 2012 - Acm Sigcas Computers and Society 42 (2):5-14.
    When a professor from Middle Europe teaches Computer Ethics in the Middle East using a textbook from the US, cultural differences become apparent. A main challenge lies in avoiding cultural imperialism during teaching. In order to meet this challenge, personal portfolios have been used for course work. The course design as well as portfolio tasks are presented and experiences are discussed. Based on our experiences we recommend applying this approach to equally overcome effects of group dynamics in similar (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  49. Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity.Marcello Ienca & Pim Haselager - 2016 - Ethics and Information Technology 18 (2):117-129.
    Brain–computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are potentially vulnerable to cybercriminality. This opens the prospect of “neurocrime”: extending the range of computer-crime to neural devices. This paper explores a type of neurocrime that we call brain-hacking as it aims at the illicit access to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  50.  7
    Editorial: Psychological Models for Personalized Human-Computer Interaction.Bruce Ferwerda, Li Chen & Marko Tkalčič - 2021 - Frontiers in Psychology 12.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000