Results for 'Information Flow'

1000+ found
Order:
  1. Information and Information Flow: An Introduction.Manuel Bremer & Daniel Cohnitz - 2004 - De Gruyter.
    This book is conceived as an introductory text into the theory of syntactic and semantic information, and information flow.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  2. Racial Injustice and information flow.Eric Bayruns García - 2021 - Feminist Philosophy Quarterly 7 (4):1-18.
    I submit that the critical epistemology of race and standpoint literature has not explicitly focused on the properties of information about, say, racial or gender injustice in a way similar to how epistemologists have focused on propositions and information when they describe propositional justification. I describe information in the racial-injustice-information domain in a way similar to how epistemologists describe propositional justification. To this end, I argue (C1) that if subjects in racially unjust societies tend to violate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. From coincidence to purposeful flow? properties of transcendental information cascades.Markus Luczak-Roesch, Ramine Tinati, Max van Kleek & Nigel Shadbolt - 2015 - In Markus Luczak-Roesch, Ramine Tinati, Max van Kleek & Nigel Shadbolt (eds.), International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 2015.
    In this paper, we investigate a method for constructing cascades of information co-occurrence, which is suitable to trace emergent structures in information in scenarios where rich contextual features are unavailable. Our method relies only on the temporal order of content-sharing activities, and intrinsic properties of the shared content itself. We apply this method to analyse information dissemination patterns across the active online citizen science project Planet Hunters, a part of the Zooniverse platform. Our results lend insight into (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Randomized Controlled Trials and the Flow of Information: Comment on Cartwright.Sherrilyn Roush - 2009 - Philosophical Studies 143 (1):137-145.
    The transferability problem—whether the results of an experiment will transfer to a treatment population—affects not only Randomized Controlled Trials but any type of study. The problem for any given type of study can also, potentially, be addressed to some degree through many different types of study. The transferability problem for a given RCT can be investigated further through another RCT, but the variables to use in the further experiment must be discovered. This suggests we could do better on the epistemological (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. Talent Flow Network, the Life Cycle of Firms, and Their Innovations.Bo Sun, Ao Ruan, Biyu Peng & Wenzhu Lu - 2022 - Frontiers in Psychology 13:788515.
    This paper explores how talent flow network and the firm life cycle affect the innovative performances of firms. We first established an interorganizational talent flow network with the occupational mobility data available from the public resumes on LinkedIn China. Thereafter, this information was combined with the financial data of China’s listed companies to develop a unique dataset for the time period between 2000 and 2015. The empirical results indicate the following: (1) The breadth and depth of firms’ (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Semantic information and the network theory of account.Luciano Floridi - 2012 - Synthese 184 (3):431-454.
    The article addresses the problem of how semantic information can be upgraded to knowledge. The introductory section explains the technical terminology and the relevant background. Section 2 argues that, for semantic information to be upgraded to knowledge, it is necessary and sufficient to be embedded in a network of questions and answers that correctly accounts for it. Section 3 shows that an information flow network of type A fulfils such a requirement, by warranting that the erotetic (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  7. Ethics after the information revolution.Luciano Floridi - 2010 - In The Cambridge handbook of information and computer ethics. Cambridge University Press. pp. 3-19.
    This chapter discusses some conceptual undercurrents, which flow beneath the surface of the literature on information and computer ethics (ICE). It focuses on the potential impact of Information and Communication Technologies (ICTs) on our lives. Because of their 'data superconductivity', ICTs are well known for being among the most influential factors that affect the ontological friction in the infosphere. As a full expression of techne, the information society has already posed fundamental ethical problems, whose complexity and (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  8. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  9. Complexity Biology-based Information Structures can explain Subjectivity, Objective Reduction of Wave Packets, and Non-Computability.Alex Hankey - 2014 - Cosmos and History 10 (1):237-250.
    Background: how mind functions is subject to continuing scientific discussion. A simplistic approach says that, since no convincing way has been found to model subjective experience, mind cannot exist. A second holds that, since mind cannot be described by classical physics, it must be described by quantum physics. Another perspective concerns mind's hypothesized ability to interact with the world of quanta: it should be responsible for reduction of quantum wave packets; physics producing 'Objective Reduction' is postulated to form the basis (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. Concepts, introspection, and phenomenal consciousness: An information-theoretical approach.Murat Aydede & Güven Güzeldere - 2005 - Noûs 39 (2):197-255.
    This essay is a sustained attempt to bring new light to some of the perennial problems in philosophy of mind surrounding phenomenal consciousness and introspection through developing an account of sensory and phenomenal concepts. Building on the information-theoretic framework of Dretske (1981), we present an informational psychosemantics as it applies to what we call sensory concepts, concepts that apply, roughly, to so-called secondary qualities of objects. We show that these concepts have a special informational character and semantic structure that (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  11.  94
    Liquid Networks and the Metaphysics of Flux: Ontologies of Flow in an Age of Speed and Mobility.Thomas Sutherland - 2013 - Theory, Culture and Society 30 (5):3-23.
    It is common for social theorists to utilize the metaphors of ‘flow’, ‘fluidity’, and ‘liquidity’ in order to substantiate the ways in which speed and mobility form the basis for a new kind of information or network society. Yet rarely have these concepts been sufficiently theorized in order to establish their relevance or appropriateness. This article contends that the notion of flow as utilized in social theory is profoundly metaphysical in nature, and needs to be judged as (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Asking about data: exploring different realities of data via the social data flow network methodology.Brian Ballsun-Stanton - unknown
    What is data? That question is the fundamental investigation of this dissertation. I have developed a methodology from social-scientific processes to explore how different people understand the concept of data, rather than to rely on my own philosophical intuitions or thought experiments about the “nature” of data. The evidence I have gathered as to different individuals' constructions of data can be used to inform further inquiry of data and the design of information systems. My research demonstrates that people have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Sharing Fake News about Brands on Social Media: a New Conceptual Model Based on Flow Theory.Rareș Obadă - 2019 - Argumentum. Journal of the Seminar of Discursive Logic, Argumentation Theory and Rhetoric 17 (2):144-166.
    The growing importance of Social Networking Sites (SNS) in today's information economy has generated significant interest for understanding and managing shared fake news about brands on social media among academia and industry worldwide. In this context, we consider it is important to discuss the role of flow, also called optimal experience, in sharing fake news about brands on social media. Firstly, we will critically analyze the conceptualizations of the umbrella term „fake news‟ in the so-called „post-truth‟ era and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Confusing the "Confusion Matrix": The Misapplication of Shannon Information Theory in Sensory Psychology.Lance Nizami - 2012 - Acta Systemica 12 (1):1-17.
    Information flow in a system is a core cybernetics concept. It has been used frequently in Sensory Psychology since 1951. There, Shannon Information Theory was used to calculate "information transmitted" in "absolute identification" experiments involving human subjects. Originally, in Shannon's "system", any symbol received ("outcome") is among the symbols sent ("events"). Not all symbols are received as transmitted, hence an indirect noise measure is calculated, "information transmitted", which requires knowing the confusion matrix, its columns labeled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The cognitive integration of scientific instruments: Information, situated cognition, and scientific practice.Richard Heersmink - 2016 - Phenomenology and the Cognitive Sciences 15 (4):1-21.
    Researchers in the biological and biomedical sciences, particularly those working in laboratories, use a variety of artifacts to help them perform their cognitive tasks. This paper analyses the relationship between researchers and cognitive artifacts in terms of integration. It first distinguishes different categories of cognitive artifacts used in biological practice on the basis of their informational properties. This results in a novel classification of scientific instruments, conducive to an analysis of the cognitive interactions between researchers and artifacts. It then uses (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. Cultural Evolution and the Evolution of Cultural Information.Alejandro Gordillo-García - 2023 - Biological Theory 18 (1):30-42.
    Cultural evolution is normally framed in informational terms. However, it is not clear whether this is an adequate way to model cultural evolutionary phenomena and what, precisely, “information” is supposed to mean in this context. Would cultural evolutionary theory benefit from a well-developed theory of cultural information? The prevailing sentiment is that, in contradistinction to biology, informational language should be used nontechnically in this context for descriptive, but not explanatory, purposes. Against this view, this article makes the case (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Social pathologies of informational privacy.Wulf Loh - 2022 - Journal of Social Philosophy.
    Following the recent practice turn in privacy research, informational privacy is increasingly analyzed with regard to the “appropriate flow of information” within a given practice, which preserves the “contextual integrity” of that practice (Nissenbaum, 2010, p. 149; 2015). Such a practice-theoretical take on privacy emphasizes the normative structure of practices as well as its structural injustices and power asymmetries, rather than focusing on the intentions and moral considerations of individual or institutional actors. Since privacy norms are seen to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student success (however defined). (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. The Case for Continuous Auditing of Management Information Systems.Robert E. Davis - 2012 - Effective Auditing for Corporates: Key Developments in Practice and Procedures (Key Concepts).
    In the wake of the recent financial crisis, increasing the effectiveness of auditing has weighed heavily on the minds of those responsible for governance. When a business is profitable and paying healthy dividends to its stockholders, fraudulent activities and accounting irregularities can go unnoticed. However, when revenue and cash flow decline, internal costs and operations may be scrutinized more diligently, and discrepancies can emerge as a result. Effective Auditing for Corporates provides you with proactive advice to ...
    Download  
     
    Export citation  
     
    Bookmark  
  20. Global Media and Cultural Domination: Strategies for a New World Information and Communication Order (NWICO) for Arica.Essien Edet & Lyorza Stanislaus - 2014 - Journal of Globalization and International Studies 4 (1):69-82.
    The thrust of this paper is to assess the efficacy of establishing African Global Media channel to strike a balance in communication between Africa and the rest of the world. This paper is a reaction to the imbalance in communication flow as engineered by the global media. Global media has contributed greatly to cultural domination in Africa by Europe and the Western world. These channels of communication such as), Cable News Network (CNN), British Broadcasting Corporation (BBQ, DeutseWelle Television (DWTV) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Global Media and Cultural Domination: Strategies for a New World Information Order (NWICO) for Africa.Essien Edet & Stanis Iyorza - 2009 - Journal of Globalization and International Studies 4 (2).
    The thrust of this paper is to access the efficacy of establishing African Global Media channel to strike a balance in communication between Africa and the rest of the world. This paper is a reaction to the imbalance in communication flow as engineered by the global media. Global media has contributed greatly to cultural domination in Africa by Europe and the Western World. These channels of communication such as, Cable News Network (CNN), British Broadcasting Corporation (BBC), Deutse Welle Television (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Mind and artifact: A multidimensional matrix for exploring cognition-artifact relations.Richard Heersmink - 2012 - In R. Heersmink (ed.), Proceedings of AISB/IACAP World Congres 2012.
    What are the possible varieties of cognition-artifact relations, and which dimensions are relevant for exploring these varieties? This question is answered in two steps. First, three levels of functional and informational integration between human agent and cognitive artifact are distinguished. These levels are based on the degree of interactivity and direction of information flow, and range from monocausal and bicausal relations to continuous reciprocal causation. In these levels there is a hierarchy of integrative processes in which there is (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  23. 47 Vietnamese people are among the world's most influential scientists in 2023.Authority of Foreign Information Service - 2023 - Vietnam Information Service.
    Vietnamese scientists on the list of "100.000 influential scientists" this year increased sharply in number and rank. -/- The ranking was selected by a group of scientists led by Professor John PA Ioannidis and colleagues from Stanford University (USA) on the Scopus database and published by Elsevier Publishing House.
    Download  
     
    Export citation  
     
    Bookmark  
  24. Signals that make a Difference.Brett Calcott, Paul E. Griffiths & Arnaud Pocheville - 2017 - British Journal for the Philosophy of Science:axx022.
    Recent work by Brian Skyrms offers a very general way to think about how information flows and evolves in biological networks — from the way monkeys in a troop communicate, to the way cells in a body coordinate their actions. A central feature of his account is a way to formally measure the quantity of information contained in the signals in these networks. In this paper, we argue there is a tension between how Skyrms talks of signalling networks (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  25. Crowd-sourced science: societal engagement, scientific authority and ethical practice.Sean F. Johnston, Benjamin Franks & Sandy Whitelaw - 2017 - Journal of Information Ethics 26 (1):49-65.
    This paper discusses the implications for public participation in science opened by the sharing of information via electronic media. The ethical dimensions of information flow and control are linked to questions of autonomy, authority and appropriate exploitation of knowledge. It argues that, by lowering the boundaries that limit access and participation by wider active audiences, both scientific identity and practice are challenged in favor of extra-disciplinary and avocational communities such as scientific enthusiasts and lay experts. Reconfigurations of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience:1-12.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood data collection (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  27. Dimensions of integration in embedded and extended cognitive systems.Richard Heersmink - 2015 - Phenomenology and the Cognitive Sciences 14 (3):577-598.
    The complementary properties and functions of cognitive artifacts and other external resources are integrated into the human cognitive system to varying degrees. The goal of this paper is to develop some of the tools to conceptualize this complementary integration between agents and artifacts. It does so by proposing a multidimensional framework, including the dimensions of information flow, reliability, durability, trust, procedural transparency, informational transparency, individualization, and transformation. The proposed dimensions are all matters of degree and jointly they constitute (...)
    Download  
     
    Export citation  
     
    Bookmark   65 citations  
  28. Dimensions of integration in embedded and extended cognitive systems.Richard Heersmink - 2015 - Phenomenology and the Cognitive Sciences 13 (3):577-598.
    The complementary properties and functions of cognitive artifacts and other external resources are integrated into the human cognitive system to varying degrees. The goal of this paper is to develop some of the tools to conceptualize this complementary integration between agents and artifacts. It does so by proposing a multidimensional framework, including the dimensions of information flow, reliability, durability, trust, procedural transparency, informational transparency, individualization, and transformation. The proposed dimensions are all matters of degree and jointly they constitute (...)
    Download  
     
    Export citation  
     
    Bookmark   67 citations  
  29. The perception/cognition distinction.Sebastian Watzl, Kristoffer Sundberg & Anders Nes - 2021 - Inquiry: An Interdisciplinary Journal of Philosophy 66 (2):165-195.
    ABSTRACT The difference between perception and cognition seems introspectively obvious in many cases. Perceiving and thinking have also been assigned quite different roles, in epistemology, in theories of reference and of mental content, in philosophy of psychology, and elsewhere. Yet what is the nature of the distinction? In what way, or ways, do perception and cognition differ? The paper reviews recent work on these questions. Four main respects in which perception and cognition have been held to differ are discussed. First, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. Developing a Trusted Human-AI Network for Humanitarian Benefit.Susannah Kate Devitt, Jason Scholz, Timo Schless & Larry Lewis - forthcoming - Journal of Digital War:TBD.
    Humans and artificial intelligences (AI) will increasingly participate digitally and physically in conflicts yet there is a lack of trusted communications across agents and platforms. For example, humans in disasters and conflict already use messaging and social media to share information, however, international humanitarian relief organisations treat this information as unverifiable and untrustworthy. AI may reduce the ‘fog-of-war’ and improve outcomes, however current AI implementations are often brittle, have a narrow scope of application and wide ethical risks. Meanwhile, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. A Semantics-Based Common Operational Command System for Multiagency Disaster Response.Linda Elmhadhbi, Mohamed-Hedi Karray, Bernard Archimède, J. Neil Otte & Barry Smith - 2022 - IEEE Transactions on Engineering Management 69 (6):3887 - 3901.
    Disaster response is a highly collaborative and critical process that requires the involvement of multiple emergency responders (ERs), ideally working together under a unified command, to enable a rapid and effective operational response. Following the 9/11 and 11/13 terrorist attacks and the devastation of hurricanes Katrina and Rita, it is apparent that inadequate communication and a lack of interoperability among the ERs engaged on-site can adversely affect disaster response efforts. Within this context, we present a scenario-based terrorism case study to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Rethinking the Human Body in the Digital Age.Teodor Negru - 2013 - European Journal of Science and Theology 9 (1):123-132.
    The theory of information and Cybernetics allowed the transcendence of the material substrata of the human being by thinking it in terms of information units. The whole material world is reduced to information flows, which are encoded in various forms and which, by means of algorithms can be processed and reconfigured with a view to multiple simulation of the physical reality we live in. By applying these codes, communication and information technologies open the possibility of multidimensional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  65
    Generalized plithogenic whole hypersoft set, PFHSS-Matrix, operators and applications as COVID-19 data structures.Shazia Rana, Muhammad Saeed, Madiha Qayyum & Florentin Smarandache - 2023 - Journal of Intelligent and Fuzzy Systems 44.
    This article is a preliminary draft for initiating and commencing a new pioneer dimension of expression. To deal with higher-dimensional data or information flowing in this modern era of information technology and artificial intelligence, some innovative super algebraic structures are essential to be formulated. In this paper, we have introduced such matrices that have multiple layers and clusters of layers to portray multi-dimensional data or massively dispersed information of the plithogenic universe made up of numerous subjects their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. A Larger Space for Moral Reflection.Judith Andre - 1998 - Ethical Currents (53):6-8.
    Margaret Urban Walker argues that hospital ethics committees should think of their task as "keeping moral space open." I develop her suggestion with analogies: Enlarge the windows (i.e., expand what counts as an ethical issue); add rooms and doors (i.e., choose particular issues to engage). Examples include confidentiality defined as information flow, and moral distress in the healthcare workplace.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Transferring knowledge.Peter J. Graham - 2000 - Noûs 34 (1):131–152.
    Our folk epistemology says that if someone knows that P and tells you that P, then, given the absence of defeaters, if you believe what they tell you, you will come to know that P as well. A speaker's knowledge that P is then, for the most part, enough for a hearer to come to know that P. But there are counterexamples to this principle: testimonial knowledge does not always transfer from the speaker to the hearer. Why should that be (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  36. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated public sphere, including which (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. The Collaborative Care Model: Realizing Healthcare Values and Increasing Responsiveness in the Pharmacy Workforce.Barry Maguire & Paul Forsyth - forthcoming - Research in Social and Administrative Pharmacy.
    Abstract The values of the healthcare sector are fairly ubiquitous across the globe, focusing on caring and respect, patient health, excellence in care delivery, and multi-stakeholder collaboration. Many individual pharmacists embrace these core values. But their ability to honor these values is significantly determined by the nature of the system they work in. -/- The paper starts with a model of the prevailing pharmacist workforce model in Scotland, in which core roles are predominantly separated into hierarchically disaggregated jobs focused on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. MEDIA EDUCATION AND THE FORMATION OF THE LEGAL CULTURE OF SOCIETY.Anna Shutaleva - 2020 - Perspektivy Nauki I Obrazovania – Perspectives of Science and Education 45:10-22.
    Introduction. The development of legal culture and a culture of human rights in the modern world through media technologies, is acquiring special significance in connection with the processes of globalization and the spread of media in recent decades. The purpose of the article is to study the prospects for the use of media education in the formation of the legal social culture and a culture of human rights. Materials and methods. Based on a study of domestic and foreign sources, issues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact to raise (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  61
    Digital Nomadism in the Anthropocene: Philosophical-Anthropological Analysis of the Contradictions and Limits of this Phenomenon.Katarína Podušelová - 2023 - Green Marble 2023: Estudos Sobre o Antropoceno e Ecocrítica / Studies on the Anthropocene and Ecocriticism.
    The article focuses on the phenomenon of digital nomadism in the context of the Anthropocene. Digital nomadism is a phenomenon characterized by the ability of people to travel the world voluntarily and with the help of technology and to change their place of work on a regular basis. It is often referred to as either a new form of lifestyle or a working life. Despite this general description, digital nomadism is a phenomenon without a clear definition. Interest in digital nomadism (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. COVID-19 MYTHOLOGY AND NETIZENS PARRHESIA IDEOLOGICAL EFFECTS OF CORONAVIRUS MYTHS ON SOCIAL MEDIA USERS.Muhammad Hasyim - 2020 - Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17 (4):1398-1409.
    Social Media is a new media of information flow gateway that can be accessed by the public, easily and freely. Social Media is an interactive information technology which not only can netizens access information, but they can also make news (information, comments, etc.) and share it on the internet. Easy access to information has caused ideological effects on society. This research aims to examine the ideological effects of the myths about COVID-19 on social media. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. The Effects of Fake News on Consumers’ Brand Trust: An Exploratory Study in the Food Security Context.Farte Gheorghe-Ilie & Obadă Rareș - 2021 - Romanian Journal of Communication and Public Relations 23 (3):47-61.
    The aim of this study is to explore the effects of fake news on consumers’ brand trust in the food security context. The starting point of our research is the finding that issues related to food security cannot be addressed without the contribution of multinational food corporations. The efficiency of their intervention depends on their capacity to build and preserve their brand trust despite the multifarious fake news stories that contaminate the information flow. Is brand trust sensitive to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. The Mediation Effects of Social Media Usage and Sharing Fake News about Companies.Daniel-Rareș Obadă & Dan-Cristian Dabija - 2022 - Behavioral Sciences 10 (12):372.
    Trust in social media information is gaining in importance and relevance for both companies and individuals as nowadays contemporary society is confronted with a wave of fake news about daily life situations, brands, organizations, etc. As it becomes more difficult to accurately assess social media information and to determine its origin or source, as well as to be able to double-check information spread across different Social Networking Sites (SNS), businesses must understand how individuals’ perceived control, concentration, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Disagreement, Question-Begging and Epistemic Self-Criticism.David Christensen - 2011 - Philosophers' Imprint 11.
    Responding rationally to the information that others disagree with one’s beliefs requires assessing the epistemic credentials of the opposing beliefs. Conciliatory accounts of disagreement flow in part from holding that these assessments must be independent from one’s own initial reasoning on the disputed matter. I argue that this claim, properly understood, does not have the untoward consequences some have worried about. Moreover, some of the difficulties it does engender must be faced by many less conciliatory accounts of disagreement.
    Download  
     
    Export citation  
     
    Bookmark   165 citations  
  45.  45
    Prometheus and Proteus: the creative, unpredictable individual in evolution.Wolfgang Sterrer - 1992 - Evolution and Cognition 1:101-129.
    Evolutionary theory usually neglects two variables: the changes induced in the environment by the evolving organism, and individual uniqueness in sexually reproducing species. In order to fuel its maintenance and reproduction, an organism must average a positive net energy balance vis-a-v}s its environment. It achieves this via aptations, which consist of information (i.e., the internalization of all that is predictable about the environment, including the machinery to take advantage of this information) and stored energy (to operate the machinery, (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  46. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and logistics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Retrieval of Liberalism in Policing.Luke William Hunt - 2019 - New York, NY, USA: Oxford University Press.
    There is a growing sense that many liberal states are in the midst of a shift in legal and political norms—a shift that is happening slowly and for a variety of reasons relating to security. The internet and tech booms—paving the way for new forms of electronic surveillance—predated the 9/11 attacks by several years, while the police’s vast use of secret informants and deceptive operations began well before that. On the other hand, the recent uptick in reactionary movements—movements in which (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Cyclic Mechanics: the Principle of Cyclicity.Vasil Penchev - 2020 - Cosmology and Large-Scale Structure eJournal (Elsevier: SSRN) 2 (16):1-35.
    Cyclic mechanic is intended as a suitable generalization both of quantum mechanics and general relativity apt to unify them. It is founded on a few principles, which can be enumerated approximately as follows: 1. Actual infinity or the universe can be considered as a physical and experimentally verifiable entity. It allows of mechanical motion to exist. 2. A new law of conservation has to be involved to generalize and comprise the separate laws of conservation of classical and relativistic mechanics, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. A Mereological Perspective on Husserl’s Account of Time-Consciousness.Di Huang - 2020 - Husserl Studies 36 (2):141-158.
    This paper approaches Husserl’s analysis of time-consciousness from a mereological perspective. Taking as inspiration Bergson’s idea that pure durée is a multiplicity of interpenetration, I will show, from within Husserlian phenomenology, that the absolute flow can indeed be described as a whole of interpenetrating parts. This mereological perspective will inform my re-consideration of the much-discussed issue of Husserl’s self-criticism concerning the schema of content and apprehension. It will also reveal a fundamental similarity between Husserl’s conception of the absolute (...) and Sartre’s conception of lived temporality. This paper consists of four sections. Section 2 presents the basic elements of Husserl’s mereology. Section 3 introduces the difficulty encountered by Husserl’s early account of time that makes use of the schema. I will examine Barry Dainton’s criticism of Husserl’s theory of time-consciousness against the background of the older debate between Meinong and Stern, a debate that has informed Husserl’s own account. Section 4 distinguishes two common criticisms of the schema from Husserl’s own self-criticism, which is in turn divided into two steps. It is shown how the second step of this self-criticism implies the interpenetration of the absolute flow and responds to Dainton’s criticism. Finally, Sect. 5 concludes with some comparative remarks. I will show how Husserl’s notion of absolute flow, as mereologically interpreted, anticipates Sartre’s conception of consciousness as self-transcendence, as well as how it accommodates the apparently conflicting mereological intuitions of Aristotle and Bergson. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Understanding epistemic relevance.Luciano Floridi - 2008 - Erkenntnis 69 (1):69-92.
    Agents require a constant flow, and a high level of processing, of relevant semantic information, in order to interact successfully among themselves and with the environment in which they are embedded. Standard theories of information, however, are silent on the nature of epistemic relevance. In this paper, a subjectivist interpretation of epistemic relevance is developed and defended. It is based on a counterfactual and metatheoretical analysis of the degree of relevance of some semantic information i to (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
1 — 50 / 1000