Results for 'Cyber laws'

993 found
Order:
  1. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  3. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  24
    Mitigating Cyber Threats and Protecting Data Privacy.Baladari Venkata - 2020 - Journal of Scientific and Engineering Research 7 (8):279-288.
    The rapid growth of digital technologies has heightened cybersecurity and data protection issues, putting individuals and organizations at risk of surveillance, cyber-attacks, and data misuse. The collection of large amounts of data by governments and companies has sparked worries about ethics and the law and cyberattacks such as ransomware and significant data theft incidents demonstrate major security weaknesses. This paper examines the nexus of cybersecurity and privacy, specifically investigating state-sponsored espionage, algorithmic data profiling, and regulatory frameworks. The analysis investigates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  28
    A Practical Model for a Resource-Based Economy Guided by Natural Laws.Angelito Malicse - manuscript
    -/- Title: A Practical Model for a Resource-Based Economy Guided by Natural Laws -/- Author: Angelito Malicse -/- Introduction -/- The current global economic system, primarily based on money, has long contributed to inequality, ecological degradation, and systemic inefficiencies. These problems persist because the system itself is not aligned with the natural laws that govern sustainable life on Earth. This essay proposes a practical model for a Resource-Based Economy (RBE), grounded in a universal formula based on the law (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  8. Cyberbullying: Effect on work place production.James Nambusi Makhulo - 2019 - Africa International Journal of Multidisciplinary Research 2 (1).
    Cyber bullying affects many adolescents and teens on a daily basis; it is a form of violence that can do lasting harm to people at different ages and social status in a society. Cyber bullying is real experience that has been in existence for a quite a long time; Bullying statistics show that cyber bullying is a serious problem among teens and gaining roots among adults. By being more aware of cyber bullying, teens and adults can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  62
    ADB Debugging – Security Risks and Investigations.Dara Sai Ganesh R. Prathiba - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9343-9347.
    With the widespread adoption of mobile devices, Android Debug Bridge (ADB) has become a vital utility for developers and system administrators. However, its open nature presents significant security concerns when left unsecured. This project addresses the potential threats posed by improper ADB usage and introduces a custom-built forensic and security analysis tool designed for cyber security analysts and law enforcement professionals. Leveraging ADB commands, the tool extracts critical data such as logs, installed applications, and system information. On rooted devices, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Mad Speculation and Absolute Inhumanism: Lovecraft, Ligotti, and the Weirding of Philosophy.Ben Woodard - 2011 - Continent 1 (1):3-13.
    continent. 1.1 : 3-13. / 0/ – Introduction I want to propose, as a trajectory into the philosophically weird, an absurd theoretical claim and pursue it, or perhaps more accurately, construct it as I point to it, collecting the ground work behind me like the Perpetual Train from China Mieville's Iron Council which puts down track as it moves reclaiming it along the way. The strange trajectory is the following: Kant's critical philosophy and much of continental philosophy which has followed, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  32
    The Holistic Governance System (HGS): A New Form of Government.Angelito Malicse - manuscript
    The Holistic Governance System (HGS): A New Form of Government -/- The Holistic Governance System (HGS) is a new form of government that combines the strengths of successful systems while minimizing their weaknesses. It blends democracy, strategic planning, economic efficiency, and strong social welfare policies to ensure balanced governance. -/- Core Principles of HGS: -/- 1. Balanced Democracy: A hybrid system that combines representative democracy, direct democracy, and meritocratic leadership to ensure efficient governance. -/- 2. Strategic Economic Growth: A regulated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  15.  72
    Enhancing data security and regulatory compliance in AI-driven cloud ecosystems: Strategies for advanced information governance.V. Talati Dhruvitkumar - 2022 - International Journal of Science and Research Archive 15 (03).
    This study examines adaptive information governance models to address the key issues of AI-based cloud environments, in the end aiming to enable enhanced data security and regulatory compliance. Conventional governance models fail to respond to complexity issues posed by AI-cloud integration, with this resulting in incident response shortcomings, privacy laws, and regulatory compliance identification. In response to these weaknesses, this research analyzes governance elements such as Privacy-Enhancing Technologies (PETs), ethical regulation, and incident response models using sophisticated quantitative methods such (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  16. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The Responsibility of Freedom of Speech and the Role of Media in Propagating Correct Knowledge.Angelito Malicse - manuscript
    The Responsibility of Freedom of Speech and the Role of Media in Propagating Correct Knowledge -/- In modern societies, freedom of speech is often heralded as a fundamental right, allowing individuals to express their thoughts and opinions freely. However, the concept of absolute freedom of speech is not without its flaws. When viewed through the lens of natural laws, including the universal law of balance, the unchecked exercise of speech can lead to societal imbalances. It is essential to recognize (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  52
    Protecting Government Research Content Using AES-Encrypted QR Code Technology.Mareedu Navya Gowtham Raju Kongara - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):704-712.
    Government Exploration is pivotal for public development and profitable growth. still, icing that sensitive exploration content is safe from unauthorized access and cyber pitfalls is a significant challenge. Traditional storehouse styles frequently suffer from data breaches, inefficiencies, and availability issues. This study introduces an innovative result using AES- translated QR law technology to ameliorate the security and availability of government exploration accoutrements. By applying the AES(Rijndael) encryption algorithm, exploration data is securely converted into ciphertext and also bedded into QR (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  41
    Applying the Holistic Governance System (HGS) to the Philippines.Angelito Malicse - manuscript
    Applying the Holistic Governance System (HGS) to the Philippines -/- The Philippines has struggled with corruption, political instability, economic inequality, and weak governance. Applying the Holistic Governance System (HGS) could transform the country into a stable, prosperous, and globally competitive nation. -/- Key Challenges in the Philippines: -/- 1. Corruption – Widespread in government agencies, law enforcement, and politics. -/- 2. Political Dynasties & Electoral Manipulation – Many leaders come from elite families, limiting true democracy. -/- 3. Economic Inequality – (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  81
    AI-DRIVEN TRAFFIC MANAGEMENT SYSTEM FORZERO VIOLATION AND ENHANCED ROAD SAFETY.C. E. Rajaprabha - 2025 - Journal of Artificial Intelligence and Cyber Security (Jaics) 9 (1):1-14.
    This project addresses the critical issue of traffic safety and law enforcement, specifically focusing on noncompliance with helmet laws by motorcyclists, a leading cause of fatalities in road accidents. Traditional methods of enforcing helmet laws are often ineffective due to the challenge of ensuring immediate detection and action. To solve this, we propose an automated traffic management system that integrates artificial intelligence (AI) with real-time surveillance and data monitoring to improve road safety. The core of the proposed system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Incompatibilism and the garden of forking paths.Andrew Law - 2023 - Philosophical Issues 33 (1):110-123.
    Let (leeway) incompatibilism be the thesis that causal determinism is incompatible with the freedom to do otherwise. Several prominent authors have claimed that incompatibilism alone can capture, or at least best captures, the intuitive appeal behind Jorge Luis Borges's famous “Garden of Forking Paths” metaphor. The thought, briefly, is this: the “single path” leading up to one's present decision represents the past; the forking paths that one must decide between represent those possible futures consistent with the past and the (...) of nature. But if determinism is true, there is only one possible future consistent with the past and the laws and, hence, only one path to choose from. That is, if determinism is true, then we are not free to do otherwise. In this paper, I argue that this understanding of the Garden of Forking Paths faces a number of problems and ought to be rejected even by incompatibilists. I then present an alternative understanding that not only avoids these problems but still supports incompatibilism. Finally, I consider how various versions of (leeway) compatibilism fit with the Garden of Forking Paths as well as the broader question of whether metaphors, however intuitive, have any dialectical force in the debates over freedom. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. The Dependence Response and Explanatory Loops.Andrew Law - 2020 - Faith and Philosophy 37 (3):294-307.
    There is an old and powerful argument for the claim that divine foreknowledge is incompatible with the freedom to do otherwise. A recent response to this argument, sometimes called the “dependence response,” centers around the claim that God’s relevant past beliefs depend on the relevant agent’s current or future behavior in a certain way. This paper offers a new argument for the dependence response, one that revolves around different cases of time travel. Somewhat serendipitously, the argument also paves the way (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  24. What Does Indeterminism Offer to Agency?Andrew Law - 2022 - Australasian Journal of Philosophy 100 (2):371-385.
    Libertarian views of freedom claim that, although determinism would rule out our freedom, we are nevertheless free on some occasions. An odd implication of such views (to put it mildly) seems to be that indeterminism somehow enhances or contributes to our agency. But how could that be? What does indeterminism have to offer agency? This paper develops a novel answer, one that is centred around the notion of explanation. In short, it is argued that, if indeterminism holds in the right (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Is Human Virtue a Civic Virtue? A Reading of Aristotle's Politics 3.4.L. K. Gustin Law - 2017 - In Emma Cohen de Lara & Rene Brouwer, Aristotle’s Practical Philosophy: On the Relationship between the Ethics and Politics. Chem, Switzerland: Springer. pp. 93-118.
    Is the virtue of the good citizen the same as the virtue of the good man? Aristotle addresses this in Politics 3.4. His answer is twofold. On the one hand, (the account for Difference) they are not the same both because what the citizen’s virtue is depends on the constitution, on what preserves it, and on the role the citizen plays in it, and because the good citizens in the best constitution cannot all be good men, whereas the good man’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  26. If Molinism is true, what can you do?Andrew Law - 2024 - International Journal for Philosophy of Religion 95 (3):307-322.
    Suppose Molinism is true and God placed Adam in the garden because God knew Adam would freely eat of the fruit. Suppose further that, had it not been true that Adam would freely eat of the fruit, were he placed in the garden, God would have placed someone else there instead. When Adam freely eats of the fruit, is he free to do otherwise? This paper argues that there is a strong case for both a positive and a negative answer. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Mengzi's Reception of Two All-Out Externality Statements on Yì 義.L. K. Gustin Law - forthcoming - Dao: A Journal of Comparative Philosophy:1-30.
    In Mengzi 6A4, Gaozi states that “yì 義 (propriety, rightness) is external, not internal.” In 6A5, Meng Jizi says of yì that “...it is on the external, not from the internal.” Their defenses are met with Mengzi’s resistance. What does he perceive and resist in these statements? Focusing on several key passages, I compare six promising interpretations. 6A4 and a relevant part of 2A2 can be rendered comparably sensible under each of the six. However, what Gaozi says in 6A1 clearly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Time Travel, Foreknowledge, and Dependence: A Response to Cyr.Andrew Law - forthcoming - Faith and Philosophy.
    The dependence solution claims that God’s foreknowledge is no threat to our freedom because God’s foreknowledge depends (in a relevant sense) on our actions. The assumption here is that those parts of the world which depend on our actions are no threat to the freedom of those actions. Recently, Taylor Cyr has presented a case which challenges this assumption. Moreover, since the case is analogous to the case of God’s foreknowledge, it would seem to establish that, even if God’s foreknowledge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Freedom, Foreknowledge, and Dependence: A Dialectical Intervention.Taylor W. Cyr & Andrew Law - 2020 - American Philosophical Quarterly 57 (2):145-154.
    Recently, several authors have utilized the notion of dependence to respond to the traditional argument for the incompatibility of freedom and divine foreknowledge. However, proponents of this response have not always been so clear in specifying where the incompatibility argument goes wrong, which has led to some unfounded objections to the response. We remedy this dialectical confusion by clarifying both the dependence response itself and its interaction with the standard incompatibility argument. Once these clarifications are made, it becomes clear both (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  30. Causation and Free Will. [REVIEW]Peter J. Graham, Andrew Law & Jonah Nagashima - 2018 - Analysis 78 (2):371-373.
    Review of Causation and Free Will by Carolina Sartorio, Oxford University Press, 2016. viii + 188 pp. £35.00.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Commonsense Metaphysics and Lexical Semantics.Jerry R. Hobbs, William Croft, Todd Davies, Douglas Edwards & Kenneth Laws - 1987 - Computational Linguistics 13 (3&4):241-250.
    In the TACITUS project for using commonsense knowledge in the understanding of texts about mechanical devices and their failures, we have been developing various commonsense theories that are needed to mediate between the way we talk about the behavior of such devices and causal models of their operation. Of central importance in this effort is the axiomatization of what might be called commonsense metaphysics. This includes a number of areas that figure in virtually every domain of discourse, such as granularity, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  32.  67
    Towards a Cyber Information Ontology.David Limbaugh, Mark Jensen & John Beverley - 2024 - Joint Ontology Workshops (Jowo) Proceedings.
    This paper introduces a set of terms that are intended to act as an interface between cyber ontologies (like a file system ontology or a data fusion ontology) and top- and mid-level ontologies, specifically Basic Formal Ontology and the Common Core Ontologies. These terms center on what makes cyberinformation management unique: numerous acts of copying items of information, the aggregates of copies that result from those acts, and the faithful members of those aggregates that represent all other members.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Frege Cases and Bad Psychological Laws.Mahrad Almotahari & Aidan Gray - 2021 - Mind 130 (520):1253-1280.
    We draw attention to a series of implicit assumptions that have structured the debate about Frege’s Puzzle. Once these assumptions are made explicit, we rely on them to show that if one focuses exclusively on the issues raised by Frege cases, then one obtains a powerful consideration against a fine-grained conception of propositional-attitude content. In light of this consideration, a form of Russellianism about content becomes viable.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  34. The Fundamental Principles of Existence and the Origin of Physical Laws.Attila Grandpierre - 2002 - Ultimate Reality and Meaning 25 (2):127-147.
    Our concept of the universe and the material world is foundational for our thinking and our moral lives. In an earlier contribution to the URAM project I presented what I called 'the ultimate organizational principle' of the universe. In that article (Grandpierre 2000, pp. 12-35) I took as an adversary the wide-spread system of thinking which I called 'materialism'. According to those who espouse this way of thinking, the universe consists of inanimate units or sets of material such as atoms (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. From Nomos to Hegung: Sovereignty and the Laws of War in Schmitt’s International Order.Johanna Jacques - 2015 - The Modern Law Review 78 (3):411-430.
    Carl Schmitt's notion of nomos is commonly regarded as the international equivalent to the national sovereign's decision on the exception. But can concrete spatial order alone turn a constellation of forces into an international order? This article looks at Schmitt's work The Nomos of the Earth and proposes that it is the process of bracketing war called Hegung which takes the place of the sovereign in the international order Schmitt describes. Beginning from an analysis of nomos, the ordering function of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Xenophobia in Utopia: On the Metics in Plato’s Laws.David Merry - 2024 - In Benoît Castelnérac, Luca Gili & Laetitia Monteils-Laeng, Foreign Influences: The Circulation of Knowledge in Antiquity. Brepols.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  39. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Spinoza on Miracles and Natural Laws.Aurora Yu - 2024 - Belgrade Philosophical Annual 37 (2):157-179.
    Spinoza’s philosophy presents a radical reinterpretation of miracles and laws, rejecting traditional views of miracles as breaches in the natural order. This paper argues that for Spinoza, natural law, which directly follows from God, governs the universe with necessity, while civil and physical laws are human inventions. Some events are considered miracles because they contradict the latter laws due to people’s ignorance of the true causes. By analyzing Spinoza’s typology of laws and his views on extension, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  20
    Real-Time Cyber Threat Detection and Response System.P. Abirami V. Phanikumar, V. Venkata Nani, V. Premkumar, Y. Nithish Naidu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The Real-Time Cyber Threat Detection and Response System is an intelligent security framework designed to proactively identify, analyze, and respond to cyber threats in real time. With the growing sophistication of cyberattacks targeting critical infrastructure, traditional static defense mechanisms are no longer sufficient. This system addresses that gap by leveraging machine learning algorithms and dimensionality reduction techniques such as Principal Component Analysis (PCA) to enable accurate and efficient threat detection. The system captures input data, such as network traffic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  55
    AI and the Transition to a Balanced Economic System Based on Natural Laws.Angelito Malicse - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  43. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Necessary Laws and Chemical Kinds.Nora Berenstain - 2014 - Australasian Journal of Philosophy 92 (4):631-647.
    Contingentism, generally contrasted with law necessitarianism, is the view that the laws of nature are contingent. It is often coupled with the claim that their contingency is knowable a priori. This paper considers Bird's (2001, 2002, 2005, 2007) arguments for the thesis that, necessarily, salt dissolves in water; and it defends his view against Beebee's (2001) and Psillos's (2002) contingentist objections. A new contingentist objection is offered and several reasons for scepticism about its success are raised. It is concluded (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. The immanent contingency of physical laws in Leibniz’s dynamics.Tzuchien Tho - forthcoming - In Garau Rodolfo & Omodeo Pietro D., Contingency and Natural Order in Early Modern Science. Springer.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. The Origins of Darwin's 'unknown laws of variation'.Derek Hough - 2021 - Researchgate.
    The goal of this project is to encourage biologists to exclude any mention of 'copying errors' from the latest definition of the theory of evolution. Instead, it should be accepted that evolutionary change is facilitated by an evolved system of variety-maintenance and variety-generation which in turn leads to novel structures and complexity.
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Seeds of Corruption. How Religions go through the Laws of Adaptation.Tudor-Cosmin Ciocan - 2024 - Dialogo 10 (2):147-168.
    This article explores the concept of 'adaptive symbiosis' between religion and culture, challenging the notion of religions as static or immutable entities by showcasing their dynamic engagement with and adaptation to local cultural contexts. The notion of ‘adaptive symbiosis’ transcends mere coexistence or amalgamation, embodying a deep, complex process of mutual adaptation. Within this evolutionary dance, both religion and culture emerge not merely as participants but as co-creators of a new reality. Through the examination of various religious traditions—such as Christianity, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Nancy Cartwright. Nature, the Artful Modeler: Lectures on Laws, Science, How Nature Arranges the World and How We Can Arrange It Better. [REVIEW]Walter Veit - 2021 - Philosophy of Science 88 (2):366-369.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  50. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 993