Results for 'Bhanuraj Kashyap'

Order:
  1. The Authority to Moderate: Social Media Moderation and its Limits.Bhanuraj Kashyap & Paul Formosa - 2023 - Philosophy and Technology 36 (4):1-22.
    The negative impacts of social media have given rise to philosophical questions around whether social media companies have the authority to regulate user-generated content on their platforms. The most popular justification for that authority is to appeal to private ownership rights. Social media companies own their platforms, and their ownership comes with various rights that ground their authority to moderate user-generated content on their platforms. However, we argue that ownership rights can be limited when their exercise results in significant harms (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Generative AI and the Future of Democratic Citizenship.Paul Formosa, Bhanuraj Kashyap & Siavosh Sahebi - 2024 - Digital Government: Research and Practice 2691 (2024/05-ART).
    Generative AI technologies have the potential to be socially and politically transformative. In this paper, we focus on exploring the potential impacts that Generative AI could have on the functioning of our democracies and the nature of citizenship. We do so by drawing on accounts of deliberative democracy and the deliberative virtues associated with it, as well as the reciprocal impacts that social media and Generative AI will have on each other and the broader information landscape. Drawing on this background (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  13
    Guardians of the Cloud: Securing the Digital Sky.Brijesh Yadav Kashyap Bhalodiya - 2022 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 9 (12):3185-3188.
    The rapid growth of cloud computing has revolutionized how businesses and individuals store and access data. However, as the digital landscape expands, it becomes increasingly vulnerable to cyber threats. This paper delves into the security challenges and solutions in cloud computing, exploring various risks including data breaches, service interruptions, and unauthorized access. We examine the layers of security measures required to protect data in cloud environments, from encryption and authentication protocols to network security and compliance frameworks. By emphasizing proactive security (...)
    Download  
     
    Export citation  
     
    Bookmark