Results for 'Cyber-Information'

972 found
Order:
  1. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. The Information Age Needs Knowledge and Morality.Ruel F. Pepa - manuscript
    In situations of information overload, where cases of garbage-in-garbage-out are commonplace, it is necessary to sort out important and appropriate data for one’s specific purposes. A deluge of seemingly interrelated or interconnected data may lead us from one analytic moment to another without consideration for the credibility of our sources. Since people generally tend to be on one side of an issue rather than the other, information exploration and gathering can become a quantitative rather than qualitative exercise, as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and (...) security governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 largest for-profit United States headquartered corporations. The results of the multiple linear regression indicated the model was able to significantly predict ISG effectiveness, F(5, 89) = 3.08, p = 0.01, R² = 0.15. Strategic alignment was the only statistically significant (t = 2.401, p <= 0.018) predictor. The implications for positive social change include the potential to constructively understand the correlates of ISG effectiveness, thus increasing the propensity for consumer trust and reducing consumers' costs. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  11. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Cartografía filosófico-política del ciberespacio: posturas extremas y moderadas.Lucas Emmanuel Misseri - 2015 - Cuadernos Del Sur. Filosofía (43-44):207-228.
    Information and communication technologies present new challenges for political theory and philosophy due to its large-scale and scope transformations. Their demands are reflected in institutional needs that cover a “cyber-political” space, i. e., a cluster of problems of the governance of the network of networks –Internet– that results in the formation of new institutions –e. g. ICANN. The question I try to answer here is: What characterizes cyberspace political discourses? The proposed hypothesis is that it is possible to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. The Modern Origins & Sources of China’s Techtransfer.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):18-25.
    The research identified the key element on P. R. China’s incentives in modern history on techtransfer practices. With reviewing on the state funding surrogacy in the natural sciences, the author identified the key militant coercive contracting clauses in the document of the National Natural Science Foundation of China. With its combined workings with the statutory & martial laws, the analysis takes a com- parative culture approach that partially counteracts the work of the “United Front Working Group of the CPC”, which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm: SIPRI. pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  66
    Ethical principles shaping values-based cybersecurity decision-making.Joseph Fenech, Deborah Richards & Paul Formosa - 2024 - Computers and Society 140 (103795).
    The human factor in information systems is a large vulnerability when implementing cybersecurity, and many approaches, including technical and policy driven solutions, seek to mitigate this vulnerability. Decisions to apply technical or policy solutions must consider how an individual’s values and moral stance influence their responses to these implementations. Our research aims to evaluate how individuals prioritise different ethical principles when making cybersecurity sensitive decisions and how much perceived choice they have when doing so. Further, we sought to use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Loss of the world: A philosophical dialogue.Raymond Kolcaba - 2000 - Ethics and Information Technology 2 (1):3-9.
    Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, conservation of humanist (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Post-COVID-19: Education and Thai Society in Digital Era.Pattamawadee Sankheangaew - 2021 - Conference Proceedings 2.
    The article entitled “Post-COVID-19: Education and Thai Society in Digital Era” has two objectives: 1) to study digital technology 2) to study the living life in Thailand in the digital era after COVID-19 pandemics. According to the study, it was found that the new digitized service is a service process on digital platforms such as ordering food, hailing a taxi, and online trading. It is a service called via smartphone. The information is used digitally. Public relations, digital marketing, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Stanisław Lem’s Visions of a Technological Future: Toward Philosophy in Technology.Paweł Polak & Roman Krzanowski - 2022 - Filozofia i Nauka. Studia Filozoficzne I Interdyscyplinarne 1 (10):41-50.
    Stanisław Lem is mostly known as a sci-fi writer and not widely perceived as a visionary of the cyber age, despite the fact that he foresaw the future of information technology better than most scientific experts. Indeed, his visions of future information-based societies have proved to be remarkably accurate. Lem’s stories fuse together elements of fantasy, philosophy, and science, but what we can really learn from them is the nature of humanity, technology, and philosophy, as well as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Targeted Human Trafficking -- The Wars between Proxy and Surrogated Economy.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):398-409.
    Upon Brexit & Trade War, the research took a supply-side analysis in macroeconomic paradigm for the purpose and cause of the actions. In the geopolitical competitions on crude oil resources between the allied powers & the Russian hegemony, the latter of which has effective control over P. R. China’s multilateral behaviors, the external research induced that trade war, either by complete information in intelligence or an unintended result, was a supply chain attack in prohibiting the antisatellite weapon supplies in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  53
    IT & C, Volumul 3, Numărul 3, Septembrie 2024.Nicolae Sfetcu - 2024 - It and C 3 (3).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Tools Used in AI Development – The Turing Test Instrumente utilizate în dezvoltarea IA – Testul Turing -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Trends in the Evolution of Artificial Intelligence – Intelligent Agents Tendințe în evoluția inteligenței artificiale – Agenți inteligenți -/- TELECOMUNICAȚII / TELECOMMUNICATIONS -/- Security in 5G Telecommunications Networks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  51
    IT & C, Volumul 3, Numărul 2, Iunie 2024.Nicolae Sfetcu - 2024 - It and C 3 (2).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Levering Data Science in the Detection of Advanced Persistent Threats Utilizarea științei datelor în detectarea amenințărilor persistente avansate -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Detecting Advanced Persistent Threats in Cyber Warfare – Academic Studies Detectarea amenințărilor persistente avansate în războiul cibernetic – Studii academice -/- TELECOMUNICAȚII / TELECOMMUNICATIONS -/- Artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This research report (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  27.  73
    IT & C, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - It and C 3 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Challenges and Limitations in the Use of Artificial Intelligence Provocări și limitări în utilizarea inteligenței artificiale -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Impact of Big Data Technology on Contemporary Society Impactul tehnologiei Big Data asupra societății contemporane -/- Methods, Techniques and Patterns of Advanced Persistent Threats – APT Lifecycle Metode, tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. An Evidence-driven Research to the Transgressions of Geneva Conventions by the Communist Party of China Led Autocratic Regime.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (10):249-266.
    The "second-generation indigenization" hypothesis of Huntington's phenomenological observations on totalitarianism in Cold War regime collapse subtly portrayed the realpolitik interest groups' political influences with autocracy disbandment processes. The research puts democratization as the premise and globalization as purpose for the analysis, with the cultural anthropological psychopathology & criminological elements of genocide and crime against humanity explained, underlying some of the Communist Party of China (CPC)’s organizational behaviors. With the regionalism purposes & approaches to multilateralism by People's Republic of China (PRC), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and harness (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Development of a strategic complexity management framework for industrial systems - A multi-case study -.Freund Lucas - 2022 - Dissertation, Lincoln University
    Today decision-makers face surging increases in overall system complexity leading up to more unstable and unpredictable business environments. Leaders and decision-makers are confronted with volatility (dynamic and intense changes), uncertainty (lack of predictability), complexity (interconnection of parts which is sometimes overwhelmingly difficult to process), and ambiguity (unclear relationships), namely the VUCA-world. The implications of the VUCA-world for business and strategy can be applied to the rise of complex cyber-physical systems in Industry 4.0. There is an expressed need to develop (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Consciousness an Afterthought.Keith Elkin - manuscript
    The central point is that the consciousness is an advanced information channel. Consciousness is not the seat of the self or free will. The action is in the sub-consciousness brain systems. Consciousness is a "just so story teller" consciousness collects and correlates scenes into sequential presentations. The function of consciousness is to provide a new information channel between other brain systems. The pre-consciousness communication between brain systems evolved and is limited by the possible pathways, these pathways did not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Computer Ethics and Neoplatonic Virtue.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (1):1-11.
    In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves deontological and utilitarian ethics as appropriate to computer ethics, while classical theories of ethics, such as virtue ethics, are usually neglected as anachronistic and unsuitable to the information era and ICT industry. During past decades, an Aristotelian form of virtue ethics has (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. 47 Vietnamese people are among the world's most influential scientists in 2023.Authority of Foreign Information Service - 2023 - Vietnam Information Service.
    Vietnamese scientists on the list of "100.000 influential scientists" this year increased sharply in number and rank. -/- The ranking was selected by a group of scientists led by Professor John PA Ioannidis and colleagues from Stanford University (USA) on the Scopus database and published by Elsevier Publishing House.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  99
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Informational Theories of Content and Mental Representation.Marc Artiga & Miguel Ángel Sebastián - 2020 - Review of Philosophy and Psychology 11 (3):613-627.
    Informational theories of semantic content have been recently gaining prominence in the debate on the notion of mental representation. In this paper we examine new-wave informational theories which have a special focus on cognitive science. In particular, we argue that these theories face four important difficulties: they do not fully solve the problem of error, fall prey to the wrong distality attribution problem, have serious difficulties accounting for ambiguous and redundant representations and fail to deliver a metasemantic theory of representation. (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  42. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  43. Informed Consent: What Must Be Disclosed and What Must Be Understood?Joseph Millum & Danielle Bromwich - 2021 - American Journal of Bioethics 21 (5):46-58.
    Over the last few decades, multiple studies have examined the understanding of participants in clinical research. They show variable and often poor understanding of key elements of disclosure, such as expected risks and the experimental nature of treatments. Did the participants in these studies give valid consent? According to the standard view of informed consent they did not. The standard view holds that the recipient of consent has a duty to disclose certain information to the profferer of consent because (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  44.  59
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Environmental information self-reported in listed firms’ annual reports: Risks of environmental commitment cliché, and a call for innovations.Minh-Hoang Nguyen, Phuong-Tri Nguyen & Quan-Hoang Vuong - manuscript
    Periodical reports are important information sources for investors and society to monitor, contribute to, and allocate resources to listed companies contributing to environmental sustainability. This article provides a preliminary investigation into environment-related information disclosure in annual reports of 61 representative companies in Vietnam, a country that has a rapidly developing stock market and is highly vulnerable to the impacts of climate change. It was found that although most of the companies’ reports disclosed the goals to pursue sustainability and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. (1 other version)Integrated Information Theory, Intrinsicality, and Overlapping Conscious Systems.James C. Blackmon - 2021 - Journal of Consciousness Studies 28 (11-12):31-53.
    Integrated Information Theory (IIT) identifies consciousness with having a maximum amount of integrated information. But a thing’s having the maximum amount of anything cannot be intrinsic to it, for that depends on how that thing compares to certain other things. IIT’s consciousness, then, is not intrinsic. A mereological argument elaborates this consequence: IIT implies that one physical system can be conscious while a physical duplicate of it is not conscious. Thus, by a common and reasonable conception of intrinsicality, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48. Information: From Philosophic to Physics Concepts for Informational Modeling of Consciousness.Florin Gaiseanu - 2018 - Philosophy Study 8 (8).
    Information was a frequently used concept in many fields of investigation. However, this concept is still not really understood, when it is referred for instance to consciousness and its informational structure. In this paper it is followed the concept of information from philosophical to physics perspective, showing especially how this concept could be extended to matter in general and to the living in particular, as a result of the intimate interaction between matter and information, the human body (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  49. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  50. INFORMATION-THEORETIC LOGIC.John Corcoran - 1998 - In C. Martínez U. Rivas & L. Villegas-Forero (eds.), Truth in Perspective edited by C. Martínez, U. Rivas, L. Villegas-Forero, Ashgate Publishing Limited, Aldershot, England (1998) 113-135. ASHGATE. pp. 113-135.
    Information-theoretic approaches to formal logic analyse the "common intuitive" concept of propositional implication (or argumental validity) in terms of information content of propositions and sets of propositions: one given proposition implies a second if the former contains all of the information contained by the latter; an argument is valid if the conclusion contains no information beyond that of the premise-set. This paper locates information-theoretic approaches historically, philosophically and pragmatically. Advantages and disadvantages are identified by examining (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
1 — 50 / 972