Results for 'Cyber intimacy'

160 found
Order:
  1. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Cyborg Mothering.Shelley Park - 2010 - In Jocelyn Stitt & Pegeen Powell (eds.), Mothers Who Deliver: Feminist Interventions into Public and Interpersonal Discourse. SUNY Press. pp. 57-75.
    As new communication technologies transform everyday life in the 21st century, personal, family, and other social relations are transformed with it. As a way of exploring the larger question, "how exactly does communication technology transform love and how love is lived?" here I explore the cell phone, instant messaging and other communication technologies as electronic extensions of maternal bodies connecting (cyber)mother to (cyber)children. -/- Feminist explorations of the marketing and use of cell phones, as well as other communication (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Can Intimacy Justify Home Education?Michael S. Merry & Charles Howell - 2009 - Theory and Research in Education 7 (3):363-381.
    Many parents cite intimacy as one of their reasons for deciding to educate at home. It seems intuitively obvious that home education is conducive to intimacy because of the increased time families spend together. Yet what is not clear is whether intimacy can provide justification for one’s decision to home educate. To see whether this is so, we introduce the concept of ‘attentive parenting’, which encompasses a set of family characteristics, and we examine whether and under what (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  4. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Cultural appropriation and the intimacy of groups.C. Thi Nguyen & Matthew Strohl - 2019 - Philosophical Studies 176 (4):981-1002.
    What could ground normative restrictions concerning cultural appropriation which are not grounded by independent considerations such as property rights or harm? We propose that such restrictions can be grounded by considerations of intimacy. Consider the familiar phenomenon of interpersonal intimacy. Certain aspects of personal life and interpersonal relationships are afforded various protections in virtue of being intimate. We argue that an analogous phenomenon exists at the level of large groups. In many cases, members of a group engage in (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  6. What is Intimacy?Jasmine Gunkel - forthcoming - Journal of Philosophy.
    Why is it more violating to grab a stranger’s thigh or stroke their face than it is to grab their forearm? Why is it worse to read someone’s dream journal without permission than it is to read their bird watching field notes? Why are gestation mandates so incredibly intrusive? Intimacy is key to understanding these cases, and to explaining many of our most stringent rights. -/- I present two ways of thinking about intimacy, Relationship-First Accounts and the Intimate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Intimacy and the face of the other: A philosophical study of infant institutionalization and deprivation. Emotion, Space, and Society.E. M. Simms - 2014 - Emotion, Space, and Society 13:80-86.
    The orphans of Romania were participants in what is sometimes called “the forbidden experiment”: depriving human infants of intimacy, affection, and human contact is an inhuman practice. It is an experiment which no ethical researcher would set out to do. This paper examines historical data, case histories, and research findings which deal with early deprivation and performs a phenomenological analysis of deprivation phenomena as they impact emotional and physical development. A key element of deprivation is the absence of intimate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Intimacy without Proximity.Jacob Metcalf - 2008 - Environmental Philosophy 5 (2):99-128.
    Using grizzly-human encounters as a case study, this paper argues for a rethinking of the differences between humans and animals within environmental ethics. A diffractive approach that understands such differences as an effect of specific material and discursive arrangements (rather than as pre-settled and oppositional) would see ethics as an interrogation of which arrangements enable flourishing, or living and dying well. The paper draws on a wide variety of human-grizzly encounters in order to describe the species as co-constitutive and challenges (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. Intimacy with God: K. Ch. Fr. Krause´s Philosophy of Religion.Ricardo Pinilla Burgos - 1970 - European Journal for Philosophy of Religion 14 (2).
    This paper deals with the concept of religiousness and religion in the context of Krause´s panentheist metaphysics, understood as a life of union, as intimacy of and with God, particularly on the part of human beings and also in relation to the rest of the existing. An evolutionary review of this conception of religion is undertaken throughout Krause´s work, and the program of a philosophy of religion is traced, which, besides a metaphysical and anthropological substantiation, would address an understanding (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. What Is Sexual Intimacy?Sascha Settegast - 2024 - Think 23 (67):53-58.
    What is the role of intimacy in sex? The two culturally dominant views on this matter both share the implicit assumption that sex is genuinely intimate only when connected to romance, and hence that sex and intimacy stand in a contingent relationship: it is possible to have good sex without it. Liberals embrace this possibility and affirm the value of casual sex, while conservatives attempt to safeguard intimacy by insisting on romantic exclusivity. I reject their shared assumption (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Morality in Intimacy.Jeremy David Fix - 2022 - In Uriah Kriegel (ed.), Oxford studies in philosophy of mind. Oxford, United Kingdom: Oxford University Press.
    Is the exemplar of modern ethical theory estranged from their intimates because the motive of duty dominates their motivational psychology? While this challenge against modern ethical theory is familiar, I argue that with respect to a certain strand of Kantian ethical theory, it does not so much as make sense. I explain the content and functional role of the motive of duty in the psychology of the moral exemplar, stressing in particular how that motive shapes and informs the content of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  17. Where Human and Divine Intimacy Meet: an Insight into the Theodicy of Marilyn McCord Adams.Ionut Untea - 2020 - Sophia 59 (3):525-547.
    Marilyn McCord Adams’s perspective on the intimacy with God as a way of defeating horrendous evils in the course of a human being’s existence has been met with a series of objections in contemporary scholarship. This is due to the fact that the critiques formulated have focused more on the debilitating impact of suffering on the sufferer’s body and mind, on intimacy as mere intermittent relationships between God and humans, or on what is lost or gained from the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Directed Duty, Practical Intimacy, and Legal Wronging.Abraham Sesshu Roth - 2021 - In Teresa Marques & Chiara Valentini (eds.), Collective Action, Philosophy and Law. London: Routledge. pp. 152-174.
    What is it for a duty or obligation to be directed? Thinking about paradigmatic cases such as the obligations generated by promises will take us only so far in answering this question. This paper starts by surveying several approaches for understanding directed duties, as well as the challenges they face. It turns out that shared agency features something similar to the directedness of duties. This suggests an account of directedness in terms of shared agency – specifically, in terms of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  20. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Epistemic Burdens, Moral Intimacy, and Surrogate Decision Making.Parker Crutchfield & Scott Scheall - 2020 - American Journal of Bioethics 20 (2):59-61.
    Berger (forthcoming) states that moral intimacy is important in applying the best interests standard. But what he calls moral intimacy requires that someone has overcome epistemic burdens needed to represent the patient. We argue elsewhere that good surrogate decision-making is first and foremost a matter of overcoming epistemic burdens, or those obstacles that stand in the way of a surrogate decision-maker knowing what a patient wants and how to satisfy those preferences. Berger’s notion of moral intimacy depends (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Is Virtual Marriage Acceptable? A Psychological Study Investigating The Role of Ambiguity Tolerance and Intimacy Illusion in Online Dating among Adolescents and Early Adults.Juneman Abraham & Annisa Falah - 2017 - Journal of Psychological and Educational Research 24 (2):117-143.
    Marriage is one of the most important topics in the education field since life in this world is structured by interaction among families and between families and other social institutions. Dissatisfaction and unsustainability of marriage have led the urgency of premarital education in various countries. The problem is that the spread of virtual reality has made marriage itself to become more complex and experience reinterpretation and reconfiguration, moreover with the emergence of new kind of marriage in the digital era, i.e. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  24. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  26. Trans Women and Interpretive Intimacy: Some Initial Reflections”.Talia Mae Bettcher - 2013 - In D. Castenada (ed.), The Essential Handbook of Women's Sexuality. Praeger. pp. 51-68.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Completeness, Self-Sufficiency, and Intimacy in Seneca’s Account of Friendship.Carissa Phillips-Garrett - 2021 - Ancient Philosophy Today 3 (2):200-221.
    Examining Seneca’s account of friendship produces an interpretative puzzle: if the good of the Stoic sage is already both complete and self-sufficient, how can friendship be a good? I reject the solution that friendship is simply a preferred indifferent instead of a good and argue that though Seneca’s account can consistently explain both why friendship’s nature as a good does not threaten the completeness or the self-sufficiency of the sage, Stoic friends must choose between intimate friendships that leave them vulnerable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Plato, the Intimacies Project.Carolina Drake - manuscript
    I explore the role of intimacy and chance in Republic and their function as dangerous or threatening to self-sufficiency. I argue that both intimacy and chance are wrongly construed as a burden, or as disruptive to the regime of the just city and that, ultimately, the job of philosophy is to regulate affect and the risk of chance in the city. I conclude that the repercussions of Plato’s strong account of self-sufficiency can be found to this day in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Caresses, excesses, intimacies and estrangements.Mark Paterson - 2004 - Angelaki 9 (1):165 – 177.
    The first part of the paper, “Foyer: feeling, look- ing, between-us” establishes the role of touch in intersubjectivity. Starting with Irigaray’s notion of the entre-nous, the “between-us,” I use touch as an example of deeply intersubjective communi- cation, an attempt to overcome estrangement. The ambiguity of touching, the physical action of touching and the affective reaction of feeling, is central to this. The second section, “Reception: receptivity, orderings of the sensible,” consolidates this experience of intersubjective touching within the confines of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Future of AI: Stanisław Lem’s Philosophical Visions for AI and Cyber-Societies in Cyberiad.Roman Krzanowski & Pawel Polak - 2021 - Pro-Fil 22 (3):39-53.
    Looking into the future is always a risky endeavour, but one way to anticipate the possible future shape of AI-driven societies is to examine the visionary works of some sci-fi writers. Not all sci-fi works have such visionary quality, of course, but some of Stanisław Lem’s works certainly do. We refer here to Lem’s works that explore the frontiers of science and technology and those that describe imaginary societies of robots. We therefore examine Lem’s prose, with a focus on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Renunciation Paradox: an Analysis of Vulnerability and Intimacy in Nietzsche’s Anti-Humanism.Stefan Lukits - 2021 - Philosophia 50 (3):1311-1325.
    Nietzsche’s texts contain a puzzle about the role of vulnerability in the creation of intimacy and its function on behalf of human flourishing. I describe the interpretive puzzle and its prima facie paradoxical aspects. On the one hand, there are texts in which Nietzsche expresses a longing for intimacy and other texts where he furnishes details about the possibility of intimacy between equals. On the other hand, Nietzsche is severely critical of certain types of intimacy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Ethical Dilemmas for @Celebrities: Promoting #Intimacy, Facing #Inauthenticity, and Defusing #Invectiveness.Marc Cheong - 2022 - Ethical Perspectives 29 (1):139-166.
    The rise of social-media-mediated celebrity culture raises several philosophical concerns. Therefore, it is not uncommon to see, for example, Hollywood actors being placed in the same bracket as YouTube artists and Instagram influencers. The increased perceived ‘connectivity’ afforded by social media allows online celebrities to reach more fans and increases the perceived engagement or intimacy in the fan-celebrity relationship. In this paper I argue that this online relationship, which is beneficial to celebrities (for brand development) and social media companies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Ancient animistic beliefs live on in our intimacy with tech.Stephen Asma - 2020 - Aeon.
    Animistic cognition has adaptive value in domains of social and physical niche prediction. This argument is extended to our contemporary relationship with digital and AI technology.
    Download  
     
    Export citation  
     
    Bookmark  
  40.  86
    The total relation: poetry, real, and intimacy in António Ramos Rosa.Helena Costa Carvalho - 2021 - In Carlos Joao Correia & Emília Ferreira (eds.), Aesthetics, Art and Intimacy. Center for Philosophy of the University of Lisbon. pp. 25-36.
    How to be being to be being/ next to the united and firm/ and trembling/ mouth of the poem?”, “How to say what is clearer than clarity [...]?” or “How to unite a light design and an obscure gesture?” These questions, as well as many others that emerge from the poetic and essay writing of António Ramos Rosa (1924-2013), represent different modulations of the same angular question: that of the relation between poem and reality, or, more radically, between poem and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Review: Love, Friendship and the Self: Intimacy, Identification and the Social Nature – Bennett W. Helm. [REVIEW]Nafsika Athanassoulis - 2011 - Philosophical Quarterly 61 (244):662-664.
    Review of Love Friendship and the Self - Helm B.W.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Cyberbullying: Effect on work place production.James Nambusi Makhulo - 2019 - Africa International Journal of Multidisciplinary Research 2 (1).
    Cyber bullying affects many adolescents and teens on a daily basis; it is a form of violence that can do lasting harm to people at different ages and social status in a society. Cyber bullying is real experience that has been in existence for a quite a long time; Bullying statistics show that cyber bullying is a serious problem among teens and gaining roots among adults. By being more aware of cyber bullying, teens and adults can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Loss of the world: A philosophical dialogue.Raymond Kolcaba - 2000 - Ethics and Information Technology 2 (1):3-9.
    Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, conservation of humanist (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Cartografía filosófico-política del ciberespacio: posturas extremas y moderadas.Lucas Emmanuel Misseri - 2015 - Cuadernos Del Sur. Filosofía (43-44):207-228.
    Information and communication technologies present new challenges for political theory and philosophy due to its large-scale and scope transformations. Their demands are reflected in institutional needs that cover a “cyber-political” space, i. e., a cluster of problems of the governance of the network of networks –Internet– that results in the formation of new institutions –e. g. ICANN. The question I try to answer here is: What characterizes cyberspace political discourses? The proposed hypothesis is that it is possible to interpret (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Linguistic Turn.Mota Victor - manuscript
    semiology of social and global transformations on public relations and, by consequence, of human intimacy.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Sexuality.John Danaher - 2022 - In Markus Dubber, Frank Pasquale & Sunit Das (eds.), Oxford Handbook of the Ethics of Artificial Intelligence. Oxford: Oxford University Press.
    Sex is an important part of human life. It is a source of pleasure and intimacy, and is integral to many people’s self-identity. This chapter examines the opportunities and challenges posed by the use of AI in how humans express and enact their sexualities. It does so by focusing on three main issues. First, it considers the idea of digisexuality, which according to McArthur and Twist (2017) is the label that should be applied to those ‘whose primary sexual identity (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  49. Vices of Friendship.Arina Pismenny & Berit Brogaard - 2022 - In Arina Pismenny & Berit Brogaard (eds.), The Moral Psychology of Love. Lanham, MD 20706, USA: pp. 231-253.
    In this paper, we argue that the neo-Aristotelian conception of “friendships of character” appears to misrepresent the essential nature of "genuine", or "true", friendship. We question the neo-Aristotelian imperative that true friendship entails disinterested love of the other “for their own sake” and strives at enhancing moral virtue. We propose an alternative conception of true friendship as involving affective and motivational features which we call closeness, intimacy, identity, and trust. Even on this minimal construal, however, friendship can turn vicious (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  50. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, (...)‐fraud, revenge porn, and cyber‐stalking to demonstrate that who is victimised, why, and to what effect are the critical starting points for the analysis of the connections between gender and crimes. In turn, it uses the lens of intersectionality to acknowledge that, while conceptions of gender and crime interact, they intersect with other categories (e.g., sexuality) to provide additional layers of explanation. To nuance the utilitarian value of the synergy between the TCF and the feminist perspectives, the focus shifts to a recent case study (which compared socioeconomic and psychosocial cybercrimes). The article concludes that, while online and offline lives are inextricably intertwined, the victimisations in psychosocial cybercrimes may be more gendered than in socioeconomic cybercrimes. These contributions align the TCF to the feminist epistemology of crime in their attempt to move gender analysis of digital crimes “from margin to centre”. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 160