Results for 'Cyber spiritualism'

113 found
Order:
  1. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  2. What Nigerian hip-hop lyrics have to say about the country’s Yahoo Boys.Suleman Lazarus - 2019 - The Conversation.
    The article is based on lyrics from 2007 to 2017 involving 18 hip-hop artists. All the songs I studied were by male singers apart from one entitled, “Maga no need pay,” which involved seven multiple artists. In all the songs, the glamorization of cybercrime and cybercriminals was one of the most significant themes. The implications are discussed.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Cosmic Spiritualism among the Pythagoreans, Stoics, Jews, and Early Christians.Phillip Sidney Horky - 2019 - In Cosmos in the Ancient World. New York: Cambridge University Press. pp. 270-94.
    This paper traces how the dualism of body and soul, cosmic and human, is bridged in philosophical and religious traditions through appeal to the notion of ‘breath’ (πνεῦμα). It pursues this project by way of a genealogy of pneumatic cosmology and anthropology, covering a wide range of sources, including the Pythagoreans of the fifth century BCE (in particular, Philolaus of Croton); the Stoics of the third and second centuries BCE (especially Posidonius); the Jews writing in Hellenistic Alexandria in the first (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  41
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. (1 other version)AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  11.  26
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  37
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  15. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  17. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  19.  39
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  36
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  81
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Future of AI: Stanisław Lem’s Philosophical Visions for AI and Cyber-Societies in Cyberiad.Roman Krzanowski & Pawel Polak - 2021 - Pro-Fil 22 (3):39-53.
    Looking into the future is always a risky endeavour, but one way to anticipate the possible future shape of AI-driven societies is to examine the visionary works of some sci-fi writers. Not all sci-fi works have such visionary quality, of course, but some of Stanisław Lem’s works certainly do. We refer here to Lem’s works that explore the frontiers of science and technology and those that describe imaginary societies of robots. We therefore examine Lem’s prose, with a focus on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Cyberbullying: Effect on work place production.James Nambusi Makhulo - 2019 - Africa International Journal of Multidisciplinary Research 2 (1).
    Cyber bullying affects many adolescents and teens on a daily basis; it is a form of violence that can do lasting harm to people at different ages and social status in a society. Cyber bullying is real experience that has been in existence for a quite a long time; Bullying statistics show that cyber bullying is a serious problem among teens and gaining roots among adults. By being more aware of cyber bullying, teens and adults can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Loss of the world: A philosophical dialogue.Raymond Kolcaba - 2000 - Ethics and Information Technology 2 (1):3-9.
    Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, conservation of humanist (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Grading Religions.Noriaki Iwasa - 2011 - Sophia 50 (1):189-209.
    This essay develops standards for grading religions including various forms of spiritualism. First, I examine the standards proposed by William James, John Hick, Paul Knitter, Dan Cohn-Sherbok, and Harold Netland. Most of them are useful in grading religions with or without conditions. However, those standards are not enough for refined and piercing evaluation. Thus, I introduce standards used in spiritualism. Although those standards are for grading spirits and their teachings, they are useful in refined and piercing evaluation of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, (...)‐fraud, revenge porn, and cyber‐stalking to demonstrate that who is victimised, why, and to what effect are the critical starting points for the analysis of the connections between gender and crimes. In turn, it uses the lens of intersectionality to acknowledge that, while conceptions of gender and crime interact, they intersect with other categories (e.g., sexuality) to provide additional layers of explanation. To nuance the utilitarian value of the synergy between the TCF and the feminist perspectives, the focus shifts to a recent case study (which compared socioeconomic and psychosocial cybercrimes). The article concludes that, while online and offline lives are inextricably intertwined, the victimisations in psychosocial cybercrimes may be more gendered than in socioeconomic cybercrimes. These contributions align the TCF to the feminist epistemology of crime in their attempt to move gender analysis of digital crimes “from margin to centre”. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  35. Cartografía filosófico-política del ciberespacio: posturas extremas y moderadas.Lucas Emmanuel Misseri - 2015 - Cuadernos Del Sur. Filosofía (43-44):207-228.
    Information and communication technologies present new challenges for political theory and philosophy due to its large-scale and scope transformations. Their demands are reflected in institutional needs that cover a “cyber-political” space, i. e., a cluster of problems of the governance of the network of networks –Internet– that results in the formation of new institutions –e. g. ICANN. The question I try to answer here is: What characterizes cyberspace political discourses? The proposed hypothesis is that it is possible to interpret (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. AI Sovereignty: Navigating the Future of International AI Governance.Yu Chen - manuscript
    The rapid proliferation of artificial intelligence (AI) technologies has ushered in a new era of opportunities and challenges, prompting nations to grapple with the concept of AI sovereignty. This article delves into the definition and implications of AI sovereignty, drawing parallels to the well-established notion of cyber sovereignty. By exploring the connotations of AI sovereignty, including control over AI development, data sovereignty, economic impacts, national security considerations, and ethical and cultural dimensions, the article provides a comprehensive understanding of this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm: SIPRI. pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security governance (ISG) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. EVOLUTIONARY RISK OF HIGH HUME TECHNOLOGIES. Article 1. STABLE ADAPTIVE STRATEGY OF HOMO SAPIENS.V. T. Cheshko, L. V. Ivanitskaya & V. I. Glazko - 2014 - Integrative Anthropology (2):4-14.
    Stable adaptive strategy of Homo sapiens (SASH) is a result of the integration in the three-module fractal adaptations based on three independent processes of generation, replication, and the implementation of adaptations — genetic, socio-cultural and symbolic ones. The evolutionary landscape SASH is a topos of several evolutionary multi-dimensional vectors: 1) extraversional projective-activity behavioral intention (adaptive inversion 1), 2) mimesis (socio-cultural inheritance), 3) social (Machiavellian) intelligence, 4) the extension of inter-individual communication beyond their own social groups and their own species in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. ‘Blessed are the breadmakers...’: Sociophobia, digital society and the enduring relevance of technological determinism.Gregory Morgan Swer - 2023 - South African Journal of Philosophy 42 (4):315-327.
    Technological determinism, as a position on the nature and effects of technology/technologies can be divided into optimistic and critical forms. The optimistic variety, of which contemporary cyber-utopianism is an instance, holds that the development of technology shapes or at least facilitates ameliorative alterations in society. The critical variety, on the other hand, tends to problematise or condemn the positive narrative of technological impact on human existence. Whilst the optimistic form still retains some academic credibility, especially concerning digital technologies, the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Descartes and his contesters: Between Elizabeth of Bohemia and Gottfried Leibniz readings.Gustavo Ruiz da Silva - 2024 - Missões 9 (3):107-123.
    This paper explores two Cartesian-based resolutions which embody a very fruitful problem for Cartesianism: the communication between body and soul. Keeping with the principles defended by the interlocutor, Elisabeth of Bohemia develops her philosophical position in the epistles exchanged with Descartes and argues that the soul should be conceived materially. Conversely, this communication between soul and body is argued differently from the perspective of Leibniz, who pursues a spiritualistic solution to the problem by making the body aggregated with inferior substances (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The - Generation Will One Day Understand: The English language : 'I am' but 'I do' speak English!Rituparna Ray Chaudhuri - 2015
    [ https://plus.google.com/108060242686103906748/posts/cwvdB6mK3J6 ]"As Literature germinates within me, my words are-“Literature is something, that I need to be acclaimed for, I need to know more...it’s my life that has given me birth, my way of thoughts that I am visualizing in the perspective of all dimensions, my frailties, my faults...my every comprehensive discussion even after my death, my spiritualism, my haunting towards the ecology of the cosmic world, and the way that I have brought up at my elbows to enhance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The Adventures of the Thing. Mario Perniola's Sex Appeal of the Inorganic.Enea Bianchi - 2020 - AM Journal of Art Theory and Media Studies 22 (22):23-34.
    This paper explores the concept of "inorganic sexuality" in the work of Italian writer and philosopher Mario Perniola. The main objective is to develop the controversial and original aspects of Perniola's thought within his aesthetic theory of feeling. Perniola elaborates the so-called "thing that feels", namely a feeling in which the neutral and impersonal dimensions of the things flow into organic life and vice versa. This perspective, as will be clarified, by dissolving the vitalist and spiritualist drives of the subject, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. A genealogical map of the concept of habit.Xabier E. Barandiaran & Ezequiel A. Di Paolo - 2014 - Frontiers in Human Neuroscience 8 (522):1--7.
    The notion of information processing has dominated the study of the mind for over six decades. However, before the advent of cognitivism, one of the most prominent theoretical ideas was that of Habit. This is a concept with a rich and complex history, which is again starting to awaken interest, following recent embodied, enactive critiques of computationalist frameworks. We offer here a very brief history of the concept of habit in the form of a genealogical network-map. This serves to provide (...)
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  48. William James on belief: Turning darwinism against empiricistic skepticism.Matthew Crippen - 2010 - Transactions of the Charles S. Peirce Society 46 (3):477-502.
    Few address the extent to which William James regards the neo-Lamarckian account of “direct adaptation” as a biological extension of British empiricism. Consequently few recognize the instrumental role that the Darwinian idea of “indirect adaptation” plays in his lifelong efforts to undermine the empiricist view that sense experience molds the mind. This article examines how James uses Darwinian thinking, first, to argue that mental content can arise independently of sense experience; and, second, to show that empiricists advance a hopelessly skeptical (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  49.  43
    Cunoașterea Științifică, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - Cunoașterea Științifică 3 (1).
    Revista Cunoașterea Științifică este o publicație trimestrială din domeniile științei și filosofiei, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Nicolae SFETCU Defense Against Advanced Cyber Attacks Apărarea împotriva atacurilor cibernetice avansate -/- ȘTIINȚE NATURALE / NATURAL SCIENCE -/- Nicolae SFETCU Cosmological Tests Based on General Relativity for Gravity Teste cosmologice bazate pe relativitatea generală pentru gravitație -/- Ștefan-Daniel FLOREA Integrating modern technology into seismic risk management Integrarea tehnologiei moderne în gestionarea riscului seismic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  40
    Cunoașterea Științifică, Volumul 3, Numărul 2, Iunie 2024.Nicolae Sfetcu - 2024 - Cunoașterea Științifică 3 (2).
    Revista Cunoașterea Științifică este o publicație trimestrială din domeniile științei și filosofiei, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Nicolae SFETCU What is intelligence? Ce este inteligența? -/- ȘTIINȚE NATURALE / NATURAL SCIENCE -/- Nicolae SFETCU Epistemology of Loop Quantum Gravity in the Context of Canonical Quantum Gravity Epistemologia gravitației cuantice în buclă în contextul gravitației cuantice canonice -/- Valentin IONESCU Universal constants, vacuum energy and the growth of black holes over time in (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 113