Results for ' cyberspace'

40 found
Order:
  1. Communication Discourse and Cyberspace: Challenges to Philosophy for Children.Arie Kizel - 2014 - Thinking: The Journal of Philosophy for Children 20 (3-4):40 – 44.
    This article addresses the principal challenges the philosophy for children (P4C) educator/practitioner faces today, particularly in light of the multi-channel communication environment that threatens to undermine the philosophical enterprise as a whole and P4C in particular. It seeks to answer the following questions: a) What status does P4C hold as promoting a community of inquiry in an era in which the school discourse finds itself in growing competition with a communication discourse driven by traditional media tools?; b) What philosophical challenges (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Reality, sex, and cyberspace.P. D. Magnus - 2000 - In MacHack conference proceedings.
    Typical discussions of virtual reality (VR) fixate on technology for providing sensory stimulation of a certain kind. They thus fail to understand reality as the place wherein we live and work, misunderstanding it instead as merely a sort of presentation. The first half of the paper examines popular conceptions of VR. The most common conception is a shallow one according to which VR is a matter of simulating appearances. Yet there is, even in popular depictions, a second, more subtle conception (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Carry on Learning: Learning Cyberspace[REVIEW]Ray Scott Percival - 1995 - New Scientist (issue: 2004).
    Download  
     
    Export citation  
     
    Bookmark  
  4. Virtual Embodiment or: When I Enter Cyberspace, What Body Will I Inhabit?Heft Peter - 2023 - Cosmos and History : The Journal of Natural and Social Philosophy 19 (1):193-211.
    The following paper attempts to look at virtual reality technologies—and the (dis)embodiment affected by them—through a phenomenological lens. Specifically, augmenting traditional discussions of virtual reality as a purely technical problem, this paper seeks to bring Maurice Merleau-Ponty’s embodied phenomenology into the discussion to try to make sense of both what body we leave behind and what body we gain as we enter virtual worlds. To do this, I look both at historical examples of virtual reality technologies and their methods of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Springer Netherlands. Edited by Luciano Floridi & J. W. Sanders.
    Moral reasoning traditionally distinguishes two types of evil:moral (ME) and natural (NE). The standard view is that ME is the product of human agency and so includes phenomena such as war,torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in (...), a new class of interesting and important examples of hybrid evil has come to light. In this paper, it is called artificial evil (AE) and a case is made for considering it to complement ME and NE to produce a more adequate taxonomy. By isolating the features that have led to the appearance of AE, cyberspace is characterised as a self-contained environment that forms the essential component in any foundation of the emerging field of Computer Ethics (CE). It is argued that this goes someway towards providing a methodological explanation of why cyberspace is central to so many of CE's concerns; and it is shown how notions of good and evil can be formulated in cyberspace. Of considerable interest is how the propensity for an agent's action to be morally good or evil can be determined even in the absence of biologically sentient participants and thus allows artificial agents not only to perpetrate evil (and fort that matter good) but conversely to `receive' or `suffer from' it. The thesis defended is that the notion of entropy structure, which encapsulates human value judgement concerning cyberspace in a formal mathematical definition, is sufficient to achieve this purpose and, moreover, that the concept of AE can be determined formally, by mathematical methods. A consequence of this approach is that the debate on whether CE should be considered unique, and hence developed as a Macroethics, may be viewed, constructively,in an alternative manner. The case is made that whilst CE issues are not uncontroversially unique, they are sufficiently novel to render inadequate the approach of standard Macroethics such as Utilitarianism and Deontologism and hence to prompt the search for a robust ethical theory that can deal with them successfully. The name Information Ethics (IE) is proposed for that theory. Itis argued that the uniqueness of IE is justified by its being non-biologically biased and patient-oriented: IE is an Environmental Macroethics based on the concept of data entity rather than life. It follows that the novelty of CE issues such as AE can be appreciated properly because IE provides a new perspective (though not vice versa). In light of the discussion provided in this paper, it is concluded that Computer Ethics is worthy of independent study because it requires its own application-specific knowledge and is capable of supporting a methodological foundation, Information Ethics. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  6. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Online Shaming.Kathryn J. Norlock - 2017 - Social Philosophy Today 33:187-197.
    Online shaming is a subject of import for social philosophy in the Internet age, and not simply because shaming seems generally bad. I argue that social philosophers are well-placed to address the imaginal relationships we entertain when we engage in social media; activity in cyberspace results in more relationships than one previously had, entailing new and more responsibilities, and our relational behaviors admit of ethical assessment. I consider the stresses of social media, including the indefinite expansion of our relationships (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  8. On the morality of artificial agents.Luciano Floridi & J. W. Sanders - 2004 - Minds and Machines 14 (3):349-379.
    Artificial agents (AAs), particularly but not only those in Cyberspace, extend the class of entities that can be involved in moral situations. For they can be conceived of as moral patients (as entities that can be acted upon for good or evil) and also as moral agents (as entities that can perform actions, again for good or evil). In this paper, we clarify the concept of agent and go on to separate the concerns of morality and responsibility of agents (...)
    Download  
     
    Export citation  
     
    Bookmark   287 citations  
  9.  37
    ‘Blessed are the breadmakers...’: Sociophobia, digital society and the enduring relevance of technological determinism.Gregory Morgan Swer - 2023 - South African Journal of Philosophy 42 (4):315-327.
    Technological determinism, as a position on the nature and effects of technology/technologies can be divided into optimistic and critical forms. The optimistic variety, of which contemporary cyber-utopianism is an instance, holds that the development of technology shapes or at least facilitates ameliorative alterations in society. The critical variety, on the other hand, tends to problematise or condemn the positive narrative of technological impact on human existence. Whilst the optimistic form still retains some academic credibility, especially concerning digital technologies, the critical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Some discussions on critical information security issues in the artificial intelligence era.Vuong Quan Hoang, Viet-Phuong La, Hong-Son Nguyen & Minh-Hoang Nguyen - manuscript
    The rapid advancement of Information Technology (IT) platforms and programming languages has transformed the dynamics and development of human society. The cyberspace and associated utilities are expanding, leading to a gradual shift from real-world living to virtual life (also known as cyberspace or digital space). The expansion and development of Natural Language Processing (NLP) models and Large Language Models (LLMs) demonstrate human-like characteristics in reasoning, perception, attention, and creativity, helping humans overcome operational barriers. Alongside the immense potential of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  12. “The loss of experience” in digital age: Legal implications.Nataliia Satokhina & Yulia Razmetaeva - 2021 - Phenomenology and Mind 20:128-136.
    Exploring the history of our experience, Hannah Arendt reveals not only a radical transformation of its structure, but also the loss of experience as such and its replacement with technology. In order to identify the place of law in this process, we are trying to clarify the legal aspect of experience in terms of phenomenological hermeneutics and to trace its transformation in the digital age. The experience of law is thought of as one of the aspects of our mode of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  14. Castoriadis against Heidegger: Time and existence.Alexandros Schismenos - 2023 - DOI 10.5281/zenodo.7978996.
    The political actions of Martin Heidegger raise a compelling question to those concerned with philosophy: How was one of the most important philosophers of the 20th century willing to ally himself with Nazism and what does this mean for philosophy? This question has been raised and brushed aside from the end of the Second World War, when Heidegger was formally accused for his involvement with Hitler's regime and forbidden to attain any official teaching position henceforth. Important thinkers, like his colleague (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Artificial evil and the foundation of computer ethics.L. Floridi & J. Sanders - 2000 - Etica E Politica 2 (2).
    Moral reasoning traditionally distinguishes two types of evil: moral and natural. The standard view is that ME is the product of human agency and so includes phenomena such as war, torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in (...), a new class of interesting and important examples of hybrid evil has come to light. In this paper, it is called artificial evil and a case is made for considering it to complement ME and NE to produce a more adequate taxonomy. By isolating the features that have led to the appearance of AE, cyberspace is characterised as a self-contained environment that forms the essential component in any foundation of the emerging field of Computer Ethics. It is argued that this goes some way towards providing a methodological explanation of why cyberspace is central to so many of CE’s concerns; and it is shown how notions of good and evil can be formulated in cyberspace. Of considerable interest is how the propensity for an agent’s action to be morally good or evil can be determined even in the absence of biologically sentient participants and thus allows artificial agents not only to perpetrate evil but conversely to ‘receive’ or ‘suffer from’ it. The thesis defended is that the notion of entropy structure, which encapsulates human value judgement concerning cyberspace in a formal mathematical definition, is sufficient to achieve this purpose and, moreover, that the concept of AE can be determined formally, by mathematical methods. A consequence of this approach is that the debate on whether CE should be considered unique, and hence developed as a Macroethics, may be viewed, constructively, in an alternative manner. The case is made that whilst CE issues are not uncontroversially unique, they are sufficiently novel to render inadequate the approach of standard Macroethics such as Utilitarianism and Deontologism and hence to prompt the search for a robust ethical theory that can deal with them successfully. The name Information Ethics is proposed for that theory. It is argued that the uniqueness of IE is justified by its being non-biologically biased and patient-oriented: IE is an Environmental Macroethics based on the concept of data entity rather than life. It follows that the novelty of CE issues such as AE can be appreciated properly because IE provides a new perspective. In light of the discussion provided in this paper, it is concluded that Computer Ethics is worthy of independent study because it requires its own application-specific knowledge and is capable of supporting a methodological foundation, Information Ethics. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  16. Trusting virtual trust.Paul B. de Laat - 2005 - Ethics and Information Technology 7 (3):167-180.
    Can trust evolve on the Internet between virtual strangers? Recently, Pettit answered this question in the negative. Focusing on trust in the sense of ‘dynamic, interactive, and trusting’ reliance on other people, he distinguishes between two forms of trust: primary trust rests on the belief that the other is trustworthy, while the more subtle secondary kind of trust is premised on the belief that the other cherishes one’s esteem, and will, therefore, reply to an act of trust in kind (‘trust-responsiveness’). (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  17. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast with “Notice and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, cyber‐fraud, revenge (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  21. Horrorporn/Pornhorror: The Problematic Communities and Contexts of Extreme Online Imagery.Steve Jones - 2010 - In Feona Attwood (ed.), Porn.com: Making Sense of Online Pornography. Peter Lang. pp. 123-137.
    This chapter explores the tentative line between erotic spectacle and horror; a judgement that is problematic given that is based on an axis of moral or ideological normality. The contexts of viewing impact on the status of ‘obscene’ images, both in terms of the communities that view them and their motivation for viewing; for sexual arousal, out of morbid curiosity or malevolence, or perhaps all three simultaneously. The reception of an obscene image is largely based upon the issue of viewer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Media Culture and the Triumph of the Spectacle.Douglas Kellner - unknown
    During the past decades, the culture industries have multiplied media spectacles in novel spaces and sites, and spectacle itself is becoming one of the organizing principles of the economy, polity, society, and everyday life. An Internet-based economy has been developing hi-tech spectacle as a means of promotion, reproduction, and the circulation and selling of commodities, using multimedia and increasingly sophisticated technology to dazzle consumers. M edia culture proliferates ever more technologically sophisticated spectacles to seize audiences and augment their power and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Post-COVID-19: Education and Thai Society in Digital Era.Pattamawadee Sankheangaew - 2021 - Conference Proceedings 2.
    The article entitled “Post-COVID-19: Education and Thai Society in Digital Era” has two objectives: 1) to study digital technology 2) to study the living life in Thailand in the digital era after COVID-19 pandemics. According to the study, it was found that the new digitized service is a service process on digital platforms such as ordering food, hailing a taxi, and online trading. It is a service called via smartphone. The information is used digitally. Public relations, digital marketing, and living (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Internet Characteristics and Online Alternative Dispute Resolution.Bashar H. Malkawi - 2008 - Harvard Negotiation Law Review 13:327-348.
    Electronic commerce is important, and perhaps, inevitable. Thus, to consider the legal implications of the growth and development of electronic commerce is essential. However, the lack of suitable dispute resolution mechanisms in cyberspace will constitute a serious obstacle to the further development of electronic commerce. Bearing this in mind, this thesis argues that when Alternative Dispute Resolution (ADR) moves to cyberspace, particularly arbitration and mediation as the main types of ADR, the form of Online Alternative Dispute Resolution (OADR) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The ontological revolution: On the phenomenology of the internet.Alexandros Schismenos - 2016 - SOCRATES 4 (2):56-67.
    Cogitation described as calculation, the living being described as a machine, cognitive functions considered as algorithmic sequences and the ‘mechanization’ of the subjective were the theoretical elements that late heideggerian anti–humanism, especially in France was able to utilize[1], even more so, after the second cybernetics or post-cybernetics movement of the late ‘60s introduced the concepts of the autopoietic and the allopoietic automata[2]. Recently, neurologists pose claims on the traditional epistemological field of philosophy, proceeding from this ontological decision, the equation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. What Can a Medieval Friar Teach Us About the Internet? Deriving Criteria of Justice for Cyberlaw from Thomist Natural Law Theory.Brandt Dainow - 2013 - Philosophy and Technology 26 (4):459-476.
    This paper applies a very traditional position within Natural Law Theory to Cyberspace. I shall first justify a Natural Law approach to Cyberspace by exploring the difficulties raised by the Internet to traditional principles of jurisprudence and the difficulties this presents for a Positive Law Theory account of legislation of Cyberspace. This will focus on issues relating to geography. I shall then explicate the paradigm of Natural Law accounts, the Treatise on Law, by Thomas Aquinas. From this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Extended Self: Architecture, Memes and Minds.Chris Abel - 2014 - Manchester: Manchester University Press.
    In his wide-ranging study of architecture and cultural evolution, Chris Abel argues that, despite progress in sustainable development and design, resistance to changing personal and social identities shaped by a technology-based and energy-hungry culture is impeding efforts to avert drastic climate change. The book traces the roots of that culture to the coevolution of Homo sapiens and technology, from the first use of tools as artificial extensions of the human body to the motorized cities spreading around the world, whose uncontrolled (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. The Duplicity of Online Behavior.Joseph Ulatowski - 2015 - In Berrin Beasley & Mitchell Haney (eds.), Social Media and Living Well. Lanham, MD: Lexington Books. pp. 31-43.
    People commonly believe that any form of deception, no matter how innocuous it is and no matter whether the deceiving person intended it otherwise, is always morally wrong. In this paper, I will argue that deceiving in real-time is morally distinguishable from deceiving on-line because online actions aren’t as fine-grained as actions occurring in real-time. Our failure to detect the fine-grained characteristics of another avatar leads us to believe that that avatar intended to do a moral harm. Openly deceiving someone (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Equality of Arms in the Digital Age.Bashar H. Malkawi, Haitham Haloush & Basem Melhem - 2008 - Macquarie Journal of Business Law 5:73-85.
    Electronic commerce is important, and perhaps, inevitable. Thus to consider the legal implications of the growth and development of electronic commerce is essential. However, the lack of suitable dispute resolution mechanisms in cyberspace will constitute a serious obstacle to the further development of electronic commerce. Bearing this in mind, this paper argues that when Alternative Dispute Resolution (ADR) moves to cyberspace, particularly arbitration and mediation as the main types of ADR, the form of online alternative dispute resolution (OADR) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. VIRTUAL BEAUTY: Orlan and Morimura.Peg Zeglin Brand Weiser - 2001 - L and B (Lier En Boog) 16:92-104.
    This essay offers some thoughts on the editors' (Annette w. Balkema and Henk Slager) project "Exploding Aesthetics" with the goal of extending aesthetics based on a specific type of artistic output. Both artists--Orlan and Morimura--have already expanded the normal parameters of artistic inquiry and the resulting critical discourse. As an aesthetician, I merely offer some elaboration and philosophical backdrop to their creative enterprise. They constitute the paradigm of the avant-garde artist extraordinaire leading us into the uncharted realm of cyberspace (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  40
    Circum-Navigating the World Island Among Enemies.John T. Giordano - 2019 - Budhi: A Journal of Ideas and Culture 23 (2):1-30.
    Everyday our vision travels across time and space. We see images in the media about atrocities, disruptions, crises, famine, and wars. And in each case our sense of injustice is awakened. We feel outrage and indignation based upon our ideals and value systems which were formed through our traditions and religions. But in this age where the power of media and information is so powerful, what we see is often manufactured to appeal to our values. While these values circulate among (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Friedric Jameson – Fear And Loathing In Globalization.Irfan Ajvazi - manuscript
    William Gibson, now the author of Pattern Recognition, has certainly more often illustrated that other coinage, ‘cyberspace’, and its inner network of global communication and information, than the object world of late commodification through which the latest novel carefully gropes its way. To be sure, Sterling celebrated the hackers, the heroic pirates of cyberspace, but without Gibson’s tragic intensity—portraying them as the oddballs and marginals of the new frontiers to come. The rush and exhilaration of his books, rather (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Neural Implants as Gateways to Digital-Physical Ecosystems and Posthuman Socioeconomic Interaction.Matthew E. Gladden - 2016 - In Łukasz Jonak, Natalia Juchniewicz & Renata Włoch (eds.), Digital Ecosystems: Society in the Digital Age. Digital Economy Lab, University of Warsaw. pp. 85-98.
    For many employees, ‘work’ is no longer something performed while sitting at a computer in an office. Employees in a growing number of industries are expected to carry mobile devices and be available for work-related interactions even when beyond the workplace and outside of normal business hours. In this article it is argued that a future step will increasingly be to move work-related information and communication technology (ICT) inside the human body through the use of neuroprosthetics, to create employees who (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. “The Risk of Being Uninformed” - A paper on the character and implications of risk in the context of economically motivated crime.John Sliter - 2011 - Journal of Financial Crime 12 (1). Translated by John Sliter.
    Paper was presented at the 29th Annual Symposium on Economic Crime in Cambridge, England. -/- Regardless of our concern for privacy, real-time criminal activity information is being disseminated throughout cyberspace by the private sector. This information is growing very quickly while being archived for search and retrieval on a long term basis. This is inevitable and could not, nor should not, be stopped. -/- Law enforcement and government policy makers should consider the risk of sharing with the risk of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Cartografía filosófico-política del ciberespacio: posturas extremas y moderadas.Lucas Emmanuel Misseri - 2015 - Cuadernos Del Sur. Filosofía (43-44):207-228.
    Information and communication technologies present new challenges for political theory and philosophy due to its large-scale and scope transformations. Their demands are reflected in institutional needs that cover a “cyber-political” space, i. e., a cluster of problems of the governance of the network of networks –Internet– that results in the formation of new institutions –e. g. ICANN. The question I try to answer here is: What characterizes cyberspace political discourses? The proposed hypothesis is that it is possible to interpret (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Epistemological Relevance of Feminist Hashtags.Baiju Anthony - 2020 - Dissertation, University of Delhi
    There are different ways to study feminism. One of the ways is to study it by analyzing the waves of feminism. Though there are differences of opinion on how many waves of feminism have been so far, we would like to hold on to the generally accepted view that there are four waves of feminism so far and we try to research into one of the hallmarks of the fourth wave feminism, feminist hashtag. Though some people consider hashtags momentary and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Global Media and Information Literacy Week: Moving Towards MIL Cities.Saied Reza Ameli & Alireza Salehi-Nejad - 2019 - Journal of Cyberspace Studies 3 (1):1--4.
    The Global Media and Information Literacy Week commemorates the progress in achieving “MIL for all” by aggregating various MIL-related local and international events and actions across different disciplines around the world.The MIL Global Week 2018, 24 to 31 October, was marked by the United Nations Educational, Scientific and Cultural Organization in collaboration with various organizations including the UN Alliance of Civilizations, the Global Alliance for Partnership on MIL, the International Federation of Library Associations, the International Association of School Libraries, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Connectionist models of mind: scales and the limits of machine imitation.Pavel Baryshnikov - 2020 - Philosophical Problems of IT and Cyberspace 2 (19):42-58.
    This paper is devoted to some generalizations of explanatory potential of connectionist approaches to theoretical problems of the philosophy of mind. Are considered both strong, and weaknesses of neural network models. Connectionism has close methodological ties with modern neurosciences and neurophilosophy. And this fact strengthens its positions, in terms of empirical naturalistic approaches. However, at the same time this direction inherits weaknesses of computational approach, and in this case all system of anticomputational critical arguments becomes applicable to the connectionst models (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Cancel Culture, Then and Now: A Platonic Approach to the Shaming of People and the Exclusion of Ideas.Douglas R. Campbell - 2023 - Journal of Cyberspace Studies 7 (2):147-166.
    In this article, I approach some phenomena seen predominantly on social-media sites that are grouped together as cancel culture with guidance from two major themes in Plato’s thought. In the first section, I argue that shame can play a constructive and valuable role in a person’s improvement, just as we see Socrates throughout Plato’s dialogues use shame to help his interlocutors improve. This insight can help us understand the value of shaming people online for, among other things, their morally reprehensible (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The Necessity and Importance of Incorporating Media and Information Literacy into Holistic Metaliteracy.Alireza Salehi-Nejad - 2020 - Journal of Cyberspace Studies 4 (1):69-75.
    Digitalization and the emergence of the Internet have resulted in escalating access to information and communication. Given the circumstances that soaring access to information amounts to the intensification of misinformation and disinformation, a set of critical skills to navigate and critically assess the information is necessary. This paper outlines the significance of these skills, and provides a perspective on metaliteracy as a supplement to media and information literacy, and argues that the ability to conceptualize, access, comprehend, analyze, and use information (...)
    Download  
     
    Export citation  
     
    Bookmark