Results for 'Cyber laws'

981 found
Order:
  1. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  3. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Cyberbullying: Effect on work place production.James Nambusi Makhulo - 2019 - Africa International Journal of Multidisciplinary Research 2 (1).
    Cyber bullying affects many adolescents and teens on a daily basis; it is a form of violence that can do lasting harm to people at different ages and social status in a society. Cyber bullying is real experience that has been in existence for a quite a long time; Bullying statistics show that cyber bullying is a serious problem among teens and gaining roots among adults. By being more aware of cyber bullying, teens and adults can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Mad Speculation and Absolute Inhumanism: Lovecraft, Ligotti, and the Weirding of Philosophy.Ben Woodard - 2011 - Continent 1 (1):3-13.
    continent. 1.1 : 3-13. / 0/ – Introduction I want to propose, as a trajectory into the philosophically weird, an absurd theoretical claim and pursue it, or perhaps more accurately, construct it as I point to it, collecting the ground work behind me like the Perpetual Train from China Mieville's Iron Council which puts down track as it moves reclaiming it along the way. The strange trajectory is the following: Kant's critical philosophy and much of continental philosophy which has followed, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  10. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  11. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Is Human Virtue a Civic Virtue? A Reading of Aristotle's Politics 3.4.L. K. Gustin Law - 2017 - In Emma Cohen de Lara & Rene Brouwer (eds.), Aristotle’s Practical Philosophy: On the Relationship between the Ethics and Politics. Chem, Switzerland: Springer. pp. 93-118.
    Is the virtue of the good citizen the same as the virtue of the good man? Aristotle addresses this in Politics 3.4. His answer is twofold. On the one hand, (the account for Difference) they are not the same both because what the citizen’s virtue is depends on the constitution, on what preserves it, and on the role the citizen plays in it, and because the good citizens in the best constitution cannot all be good men, whereas the good man’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  72
    Time Travel, Foreknowledge, and Dependence: A Response to Cyr.Andrew Law - forthcoming - Faith and Philosophy.
    The dependence solution claims that God’s foreknowledge is no threat to our freedom because God’s foreknowledge depends (in a relevant sense) on our actions. The assumption here is that those parts of the world which depend on our actions are no threat to the freedom of those actions. Recently, Taylor Cyr has presented a case which challenges this assumption. Moreover, since the case is analogous to the case of God’s foreknowledge, it would seem to establish that, even if God’s foreknowledge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Dependence Response and Explanatory Loops.Andrew Law - 2020 - Faith and Philosophy 37 (3):294-307.
    There is an old and powerful argument for the claim that divine foreknowledge is incompatible with the freedom to do otherwise. A recent response to this argument, sometimes called the “dependence response,” centers around the claim that God’s relevant past beliefs depend on the relevant agent’s current or future behavior in a certain way. This paper offers a new argument for the dependence response, one that revolves around different cases of time travel. Somewhat serendipitously, the argument also paves the way (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  16. Incompatibilism and the garden of forking paths.Andrew Law - 2023 - Philosophical Issues 33 (1):110-123.
    Let (leeway) incompatibilism be the thesis that causal determinism is incompatible with the freedom to do otherwise. Several prominent authors have claimed that incompatibilism alone can capture, or at least best captures, the intuitive appeal behind Jorge Luis Borges's famous “Garden of Forking Paths” metaphor. The thought, briefly, is this: the “single path” leading up to one's present decision represents the past; the forking paths that one must decide between represent those possible futures consistent with the past and the (...) of nature. But if determinism is true, there is only one possible future consistent with the past and the laws and, hence, only one path to choose from. That is, if determinism is true, then we are not free to do otherwise. In this paper, I argue that this understanding of the Garden of Forking Paths faces a number of problems and ought to be rejected even by incompatibilists. I then present an alternative understanding that not only avoids these problems but still supports incompatibilism. Finally, I consider how various versions of (leeway) compatibilism fit with the Garden of Forking Paths as well as the broader question of whether metaphors, however intuitive, have any dialectical force in the debates over freedom. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  17. If Molinism is true, what can you do?Andrew Law - 2024 - International Journal for Philosophy of Religion 95 (3):307-322.
    Suppose Molinism is true and God placed Adam in the garden because God knew Adam would freely eat of the fruit. Suppose further that, had it not been true that Adam would freely eat of the fruit, were he placed in the garden, God would have placed someone else there instead. When Adam freely eats of the fruit, is he free to do otherwise? This paper argues that there is a strong case for both a positive and a negative answer. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. What Does Indeterminism Offer to Agency?Andrew Law - 2022 - Australasian Journal of Philosophy 100 (2):371-385.
    Libertarian views of freedom claim that, although determinism would rule out our freedom, we are nevertheless free on some occasions. An odd implication of such views (to put it mildly) seems to be that indeterminism somehow enhances or contributes to our agency. But how could that be? What does indeterminism have to offer agency? This paper develops a novel answer, one that is centred around the notion of explanation. In short, it is argued that, if indeterminism holds in the right (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Freedom, Foreknowledge, and Dependence: A Dialectical Intervention.Taylor W. Cyr & Andrew Law - 2020 - American Philosophical Quarterly 57 (2):145-154.
    Recently, several authors have utilized the notion of dependence to respond to the traditional argument for the incompatibility of freedom and divine foreknowledge. However, proponents of this response have not always been so clear in specifying where the incompatibility argument goes wrong, which has led to some unfounded objections to the response. We remedy this dialectical confusion by clarifying both the dependence response itself and its interaction with the standard incompatibility argument. Once these clarifications are made, it becomes clear both (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  20. Causation and Free Will. [REVIEW]Peter J. Graham, Andrew Law & Jonah Nagashima - 2018 - Analysis 78 (2):371-373.
    Review of Causation and Free Will by Carolina Sartorio, Oxford University Press, 2016. viii + 188 pp. £35.00.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Commonsense Metaphysics and Lexical Semantics.Jerry R. Hobbs, William Croft, Todd Davies, Douglas Edwards & Kenneth Laws - 1987 - Computational Linguistics 13 (3&4):241-250.
    In the TACITUS project for using commonsense knowledge in the understanding of texts about mechanical devices and their failures, we have been developing various commonsense theories that are needed to mediate between the way we talk about the behavior of such devices and causal models of their operation. Of central importance in this effort is the axiomatization of what might be called commonsense metaphysics. This includes a number of areas that figure in virtually every domain of discourse, such as granularity, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  56
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Platonic Laws of Nature.Tyler Hildebrand - 2020 - Canadian Journal of Philosophy 50 (3):365-381.
    David Armstrong accepted the following three theses: universals are immanent, laws are relations between universals, and laws govern. Taken together, they form an attractive position, for they promise to explain regularities in nature—one of the most important desiderata for a theory of laws and properties—while remaining compatible with naturalism. However, I argue that the three theses are incompatible. The basic idea is that each thesis makes an explanatory claim, but the three claims can be shown to run (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  27.  88
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Laws of Nature: Necessary and Contingent.Samuel Kimpton-Nye - 2022 - Philosophical Quarterly 72 (4):875-895.
    This paper shows how a niche account of the metaphysics of laws of nature and physical properties—the Powers-BSA—can underpin both a sense in which the laws are metaphysically necessary and a sense in which it is true that the laws could have been different. The ability to reconcile entrenched disagreement should count in favour of a philosophical theory, so this paper constitutes a novel argument for the Powers-BSA by showing how it can reconcile disagreement about the (...)’ modal status. This paper also constitutes a defence of modal necessitarianism, the interesting and controversial view according to which all worlds are nomologically identical, because it shows how the modal necessitarian can appease the orthodox contingentist about laws. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  31.  50
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Lawful Persistence.David Builes & Trevor Teitel - 2022 - Philosophical Perspectives 36 (1):5-30.
    The central aim of this paper is to use a particular view about how the laws of nature govern the evolution of our universe in order to develop and evaluate the two main competing options in the metaphysics of persistence, namely endurantism and perdurantism. We begin by motivating the view that our laws of nature dictate not only qualitative facts about the future, but also which objects will instantiate which qualitative properties. We then show that both traditional doctrines (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  33. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Revaluing Laws of Nature in Secularized Science.Eli I. Lichtenstein - 2022 - In Yemima Ben-Menahem (ed.), Rethinking the Concept of Law of Nature: Natural Order in the Light of Contemporary Science. Springer. pp. 347-377.
    Discovering laws of nature was a way to worship a law-giving God, during the Scientific Revolution. So why should we consider it worthwhile now, in our own more secularized science? For historical perspective, I examine two competing early modern theological traditions that related laws of nature to different divine attributes, and their secular legacy in views ranging from Kant and Nietzsche to Humean and ‘governing’ accounts in recent analytic metaphysics. Tracing these branching offshoots of ethically charged God-concepts sheds (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Humean laws, explanatory circularity, and the aim of scientific explanation.Chris Dorst - 2019 - Philosophical Studies 176 (10):2657-2679.
    One of the main challenges confronting Humean accounts of natural law is that Humean laws appear to be unable to play the explanatory role of laws in scientific practice. The worry is roughly that if the laws are just regularities in the particular matters of fact (as the Humean would have it), then they cannot also explain the particular matters of fact, on pain of circularity. Loewer (2012) has defended Humeanism, arguing that this worry only arises if (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  36. Sensorimotor Laws, Mechanisms, and Representations.Alfredo Vernazzani - 2014 - Proceedings of the 36th Meeting of the Cognitive Science Society.
    According to the sensorimotor account, vision does not imply theconstruction of internally generated representations of the environment, butit isthe skillful exercise of the sensorimotor contingencies obeying sense-specific laws. In this short study, I focus on the notion of “sensorimotor law” and characterize the kind of explanation providedby the sensorimotor theory as a form of covering law model. I then question the nature of such sensorimotor laws and describe them as mechanisms. I show that a mechanistic interpretation provides a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. The Law of Non-Contradiction as a Metaphysical Principle.Tuomas E. Tahko - 2009 - Australasian Journal of Logic 7:32-47.
    The goals of this paper are two-fold: I wish to clarify the Aristotelian conception of the law of non-contradiction as a metaphysical rather than a semantic or logical principle, and to defend the truth of the principle in this sense. First I will explain what it in fact means that the law of non-contradiction is a metaphysical principle. The core idea is that the law of non-contradiction is a general principle derived from how things are in the world. For example, (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  38. The Law of Political Economy: An Introduction.Poul F. Kjaer - 2020 - In The Law of Political Economy: Transformation in the Function of Law. Edited by Poul F. Kjaer. Cambridge, Storbritannien: Cambridge University Press. pp. 1- 30.
    The law of political economy is a contentious ideological field characterised by antagonistic relations between scholarly positions which tend to be either affirmative or critical of capitalism. Going beyond this schism, two particular features appear as central to the law of political economy: the first one is the way it epistemologically seeks to handle the distinction between holism and differentiation, i.e., the extent to which it sees society as a singular whole which is larger than its parts, or, rather, as (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Law-Abiding Causal Decision Theory.Timothy Luke Williamson & Alexander Sandgren - 2023 - British Journal for the Philosophy of Science 74 (4):899-920.
    In this paper we discuss how Causal Decision Theory should be modified to handle a class of problematic cases involving deterministic laws. Causal Decision Theory, as it stands, is problematically biased against your endorsing deterministic propositions (for example it tells you to deny Newtonian physics, regardless of how confident you are of its truth). Our response is that this is not a problem for Causal Decision Theory per se, but arises because of the standard method for assessing the truth (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  40. Laws and the Completeness of the Fundamental.Martin Glazier - 2016 - In Mark Jago (ed.), Reality Making. Oxford, United Kingdom: Oxford University Press UK. pp. 11-37.
    Any explanation of one fact in terms of another will appeal to some sort of connection between the two. In a causal explanation, the connection might be a causal mechanism or law. But not all explanations are causal, and neither are all explanatory connections. For example, in explaining the fact that a given barn is red in terms of the fact that it is crimson, we might appeal to a non-causal connection between things’ being crimson and their being red. Many (...)
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  41. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Natural law ethics in disciplines abstract to applied.James Franklin - manuscript
    Language suggestive of natural law ethics, similar to the Catholic understanding of ethical foundations, is prevalent in a number of disciplines. But it does not always issue in a full-blooded commitment to objective ethics, being undermined by relativist ethical currents. In law and politics, there is a robust conception of "human rights", but it has become somewhat detached from both the worth of persons in themselves and from duties. In education, talk of "values" imports ethical considerations but hints at a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Secret Law Revisited.Benjamin L. S. Nelson - 2019 - Ratio Juris 32 (4):473-486.
    What follows is an attempt to do some conceptual housekeeping around the notion of secret law as provided by Christopher Kutz (2013). First I consider low-salience (or merely obscure) law, suggesting that it fails to capture the legal and moral facts that are at stake in the case which Kutz used to motivate it. Then I outline a theoretical contrast between mere obscurity and secrecy, in contrast to the 'neutral' account of secrecy provided by Sissela Bok (1989). The upshot of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. No laws and (thin) powers in, no (governing) laws out.Stavros Ioannidis, Vassilis Livanios & Stathis Psillos - 2021 - European Journal for Philosophy of Science 11 (1):1-26.
    Non-Humean accounts of the metaphysics of nature posit either laws or powers in order to account for natural necessity and world-order. We argue that such monistic views face fundamental problems. On the one hand, neo-Aristotelians cannot give unproblematic power-based accounts of the functional laws among quantities offered by physical theories, as well as of the place of conservation laws and symmetries in a lawless ontology; in order to capture these characteristics, commitment to governing laws is indispensable. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  45. Laws and natural philosophy.Marius Stan - forthcoming - In _The History and Philosophy of Science, 1450 to 1750._. Bloombury Press.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Law, the Rule of Law, and Goodness-Fixing Kinds.Emad H. Atiq - forthcoming - Engaging Raz: Themes in Normative Philosophy (OUP).
    Laws can be evaluated as better or worse relative to different normative standards. But the standard set by the Rule of Law defines a kind-relative standard of evaluation: features like generality, publicity, and non-retroactivity make the law better as law. This fact about legal evaluation invites a comparison between law and other “goodness-fixing kinds,” where a kind is goodness-fixing if what it is to be a member of the kind fixes a standard for evaluating instances as better or worse. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Humean Laws and (Nested) Counterfactuals.Christian Loew & Siegfried Jaag - 2019 - Philosophical Quarterly 70 (278):93-113.
    Humean reductionism about laws of nature is the view that the laws reduce to the total distribution of non-modal or categorical properties in spacetime. A worry about Humean reductionism is that it cannot motivate the characteristic modal resilience of laws under counterfactual suppositions and that it thus generates wrong verdicts about certain nested counterfactuals. In this paper, we defend Humean reductionism by motivating an account of the modal resilience of Humean laws that gets nested counterfactuals right.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  49. Laws of Nature.Tuomas E. Tahko - 2024 - In A. R. J. Fisher & Anna-Sofia Maurin (eds.), The Routledge Handbook of Properties. London: Routledge. pp. 337-346.
    Properties have an important role in specifying different views on laws of nature: virtually any position on laws will make some reference to properties, and some of the leading views even reduce laws to properties. This chapter will first outline what laws of nature are typically taken to be and then specify their connection to properties in more detail. We then move on to consider three different accounts of properties: natural, essential, and dispositional properties, and we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 981