Results for 'Information Technology'

967 found
Order:
  1. Nihilism and Information Technology.Alireza Mansouri & Ali Paya - 2020 - Persian Journal of Philosophical Theological Research 21 (4):29-54.
    Søren Kierkegaard, in his essay "The Present Age," takes a hostile stance towards the press. This is because he maintains that the press prepares the ground for the emergence of nihilism. Hubert Dreyfus extends this idea to other information technologies, especially the Internet. Since Kierkegaard-Dreyfus’ attitude towards various forms of information technology originates from philosophical anthropology and a particular conception of the meaning of life, assessing the viability of the attitude they hold requires further critical scrutiny. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Information Technology, the Good and Modernity.Pak-Hang Wong - 2010 - In Jordi Vallverdú (ed.), Thinking Machines and the Philosophy of Computer Science: Concepts and Principles. IGI. pp. 223-236.
    In Information and Computer Ethics (ICE), and, in fact, in normative and evaluative research of Information Technology (IT) in general, researchers have paid few attentions to the prudential values of IT. Hence, analyses of the prudential values of IT are mostly found in popular discourse. Yet, the analyses of the prudential values of IT are important for answering normative questions about people’s well-being. In this chapter, the author urges researchers in ICE to take the analyses of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Agency Laundering and Information Technologies.Alan Rubel, Clinton Castro & Adam Pham - 2019 - Ethical Theory and Moral Practice 22 (4):1017-1041.
    When agents insert technological systems into their decision-making processes, they can obscure moral responsibility for the results. This can give rise to a distinct moral wrong, which we call “agency laundering.” At root, agency laundering involves obfuscating one’s moral responsibility by enlisting a technology or process to take some action and letting it forestall others from demanding an account for bad outcomes that result. We argue that the concept of agency laundering helps in understanding important moral problems in a (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  4. The Role of the Practice of Excellence Strategies in Education to Achieve Sustainable Competitive Advantage to Institutions of Higher Education-Faculty of Engineering and Information Technology at Al-Azhar University in Gaza a Model.Mazen J. Al Shobaki & Samy S. Abu Naser - 2017 - International Journal of Digital Publication Technology 1 (2):135-157.
    This study aims to look at the role of the practice of excellence strategies in education in achieving sustainable competitive advantage for the Higher educational institutions of the faculty of Engineering and Information Technology at Al-Azhar University in Gaza, a model, and the study considered the competitive advantage of educational institutions stems from the impact on the level of each student, employee, and the institution. The study was based on the premise that the development of strategies for excellence (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  5.  45
    The complex roles of social influence in promoting information technology adoption in nursing education.Geng Li - 2024 - Sm3D Portal.
    The incorporation of information and communication technologies (ICT) within healthcare education plays a significant role in shaping students’ development, contributing to the emergence of more proficient healthcare practitioners. As the acceptance and utilization of technology reflect human behavior, the challenge resides in the readiness of students to engage with ICT-based systems.
    Download  
     
    Export citation  
     
    Bookmark  
  6. Bargaining Power and Information Technology in African-European Business Relationships: Case of the Dutch Flower Auctions.Mayen Cunden & Eric van Heck - 2004 - European Management Journal 22 (5):573-587.
    This article addresses the emergence of African– European business relationships. Its focus is on the role of bargaining power and information tech- nology and its impact on the different stakeholders in (electronic) markets (sellers, market maker, buy- ers). Information technology is seen as an enabling technology that facilitates reaching a wider cus- tomer base (called reach) and providing a channel for increased customer services (called richness). The central question is how African suppliers can create bargaining power (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Editorial introduction – ethics of new information technology.Philip Brey, Luciano Floridi & Frances Grodzinsky - 2005 - Ethics and Information Technology 7 (3):109–109.
    This special issue of Ethics and Information Technology focuses on the ethics of new and emerging information technology (IT). The papers have been selected from submissions to the sixth international conference on Computer Ethics: Philosophical Enquiry (CEPE2005), which took place at the University of Twente, the Netherlands, July 17–19, 2005. -/- .
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Can intuitive and analytical decision styles explain managers' evaluation of information technology?Marcus Selart, Svein Tvedt Johansen, Tore Holmesland & Kjell Grønhaug - 2008 - Management Decision 46:1326 -1341.
    Purpose – The purpose of this paper is to clarify how IT managers' decision styles affect their evaluation of information technology. Design/methodology/approach – Four different decision styles were assessed in a leadership test directed towards IT managers. Each style included two dimensions: confidence judgment ability and decision heuristic usage. Participants belonging to each style were interviewed and their answers analysed with regard to their reasoning about central areas of IT management. Findings – Results suggest that a decision style (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. Rebound effects of progress in information technology.Lorenz M. Hilty, Andreas Köhler, Fabian Schéele, Rainer Zah & Thomas Ruddy - 2006 - Poiesis and Praxis 4 (1):19-38.
    Information technology (IT) is continuously making astounding progress in technical efficiency. The time, space, material and energy needed to provide a unit of IT service have decreased by three orders of magnitude since the first personal computer (PC) was sold. However, it seems difficult for society to translate IT’s efficiency progress into progress in terms of individual, organizational or socio-economic goals. In particular it seems to be difficult for individuals to work more efficiently, for organizations to be more (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Philosophical Pragmatism and the Challenges of Information Technologies.David L. Hildebrand - 2023 - The Pluralist 18 (1):1-9.
    Overview of challenges facing philosophical analyses of experience in the face of life with constant connection, social media, and data mining.
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Knowledge-based systems that determine the appropriate students major: In the faculty of engineering and information technology.Samy S. Abu Naser & Ihab S. Zaqout - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (10):26-34.
    In this paper a Knowledge-Based System (KBS) for determining the appropriate students major according to his/her preferences for sophomore student enrolled in the Faculty of Engineering and Information Technology in Al-Azhar University of Gaza was developed and tested. A set of predefined criterions that is taken into consideration before a sophomore student can select a major is outlined. Such criterion as high school score, score of subject such as Math I, Math II, Electrical Circuit I, and Electronics I (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Immediate Program Learning Outcomes of Information Technology Candidates and their Introspections Towards IT Education Relevance and Global Competence Initiatives.Kannapat Kankaew, Joel Alanya-Beltran, Zaituna Khamidullina, Gilbert C. Magulod Jr, Leonilo B. Capulso, Glenn S. Cabacang, Vu Tran Anh, Leo Agustin Palapar Vela & Jupeth Pentang - 2021 - Psychology and Education 58 (2):5417-5427.
    A nation’s economy runs on the knowledge and skills of its people.Quality assurance mechanisms for higher education institutions must take cognizance of the graduates' acquisition of skills to become productive and contributory for societal development. The study is a quantitative survey assessing the attainment of the immediate program learning outcomes of the graduating Bachelor of Science in Information Technology of one campus of a public higher education institution in the Philippines. It also assessed the introspection and level of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Foundations of Information Technology Based on Bunge’s Systemist Philosophy of Reality.Roman Lukyanenko, Veda C. Storey & Oscar Pastor - 2022 - Mεtascience: Scientific General Discourse 2:140-181.
    General ontology is a prominent theoretical foundation for information technology analysis, design, and development. Ontology is a branch of philosophy which studies what exists in reality. A widely used ontology in information systems, especially for conceptual modeling, is the BWW (Bunge–Wand–Weber), which is based on ideas of the philosopher and physicist Mario Bunge, as synthesized by Wand and Weber. The ontology was founded on an early subset of Bunge’s philosophy; however, many of Bunge’s ideas have evolved since (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Nineteen Fifty Eight: Information Technology and the Reconceptualization of Creativity.Christopher Mole - 2011 - The Cambridge Quarterly 40 (4):301-327.
    Nineteen fifty-eight was an extraordinary year for cultural innovation, especially in English literature. It was also a year in which several boldly revisionary positions were first articulated in analytic philosophy. And it was a crucial year for the establishment of structural linguistics, of structuralist anthropology, and of cognitive psychology. Taken together these developments had a radical effect on our conceptions of individual creativity and of the inheritance of tradition. The present essay attempts to illuminate the relationships among these developments, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Sunlight as a Photosyntheic Information Technology.Yogi Hendlin - 2020 - In Plants in Science Fiction: Speculative Vegetation.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an organized set of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Ethical Aspects of Information Technology, by Richard A. Spinello. [REVIEW]Edmund F. Byrne - 1988 - Teaching Philosophy 21 (2):198-200.
    Download  
     
    Export citation  
     
    Bookmark  
  19. Market of information and communication technologies and place of Ukraine in it.R. Strilchuk & Igor Kryvovyazyuk - 2017 - Economic Forum 1 (2):152-157.
    The meaning of “information and communication technologies (ICT)”, “market of information and communication technologies” were clarified in the article. Components and priority areas for capital investment in the ICT market were determined. The relativity of relationship between the placement of supercomputers in the countries and their level of innovation was revealed. The tendencies of world ICT market development were defined. The place of Ukraine in the world ICT market was established.
    Download  
     
    Export citation  
     
    Bookmark  
  20. Information and Communication Technology in Elementary Schools: A Comparison Between Hybrid and Face-to-Face Learning Systems.Wisnu Zakaria, Turmudi Turmudi & Jupeth Pentang - 2022 - Profesi Pendidikan Dasar 9 (1):46-54.
    At the beginning of 2020, the world was experiencing the Covid-19 pandemic, and Indonesia was no exception. The occurrence of this affects the learning system in Indonesia, the learning system that was originally face-to-face was forced to online form, in this case the teachers are required to provide a creative, efficient and optimal learning system for students. So the purpose of this study is to find out the difference in the average learning result of elementary school students during the pandemic. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  21. How Biological Technology Should Inform the Causal Selection Debate.Janella Baxter - 2019 - Philosophy, Theory, and Practice in Biology 11.
    Waters’s (2007) actual difference making and Weber’s (2013, 2017) biological normality approaches to causal selection have received many criticisms, some of which miss their target. Disagreement about whether Waters’s and Weber’s views succeed in providing criteria that uniquely singles out the gene as explanatorily significant in biology has led philosophers to overlook a prior problem. Before one can address whether Waters’s and Weber’s views successfully account for the explanatory significance of genes, one must ask whether either view satisfactorily meets the (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  22. The Information Society: Technological, socio-economic and cultural aspects - Prolegomena for a sustainability-oriented ethics of ICTs.Jose Carlos Cañizares-Gaztelu - 2018 - Dissertation, University of Twente - Faculty of Behavioral and Management Sciences
    This thesis studies the enabling properties of ICT and their effects and potential for social change, and prepares the ground for a sustainability-oriented ethico-political assessment of this technology. It primarily builds on interdisciplinary scholarship to describe and explain the multifaceted co-evolution between the global deployment of ICTs and the emergence of the Information Society, understood as a socioeconomic restructuring of capitalism. Beyond the role of ICTs in this regime transition, the thesis delivers other philosophical insights about crucial aspects (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Dewey, Mitra, and the “technological proletariat:” Democratizing the information revolution.John Hartmann - manuscript
    In his 1939 essay, “Creative Democracy – The Task Before Us,” John Dewey described democracy as “a way of personal life controlled not merely by faith in human nature in general but by faith in the capacity of human beings for intelligent judgment and action if proper conditions are furnished.”1 While this may seem an odd definition, it is emblematic of the reconstructive tendency in Dewey’s philosophy. If we are to achieve a truly democratic society, we must reconstruct democracy itself (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. INFORMATION COMMUNICATION TECHNOLOGY IN THE ERA OF POST-TRUTH CHALLENGE: BEYOND LOGIC AND EPISTEMOLOGY.Alloy Ihuah - manuscript
    Human actions and decisions are most of the times not only grounded on emotional reactions, they are irrationally debasing. While such emotions and heuristics were perhaps suitable for dealing with life in the Stone Age, they are woefully inadequate in the Silicon Age. The substitution of traditional news agencies and communication platforms in Nigeria with social media networks has not only increased human capacities, it has aided the common good and further eased communication and increased the human knowledge base. For (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  57
    Religion, Technology and Cooperative Rationality: A Philosophical Approach.Ubat Pahala Charles Silalahi - 2024 - Journal for the Study of Religions and Ideologies 23 (68):59-72.
    The conflict between religion and science reached its peak after the Enlightenment. People today exhibit a greater inclination towards science as compared to religion. Religion's influence in shaping human progress diminished as science gained favor. Following over a half-century of strained ties, a movement arose that opposed the growing hostility between religion and science. Today, the era of digital disruption has become part of human civilization. As a result of scientific progress, information technology requires reconciliation with faith. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Teachers’ Information and Communication Technology Application Skills Influencing English Curriculum Implementation in Schools in Kenya.Josiah Waiti, Rosemary Imonje & Mercy Mugambi - 2023 - Journal of Education and Development 7 (4):38-51.
    With English as a universal language and a central player in a globalized digital world, the need for an acceptable level of teacher ICT application skills, competence among teachers of English is necessary. The Government of Kenya (GoK) has put in concerted efforts to propel Kenya towards vision 2030 by investing in ICT integration in curriculum implementation, to equip a professional teacher with ICT skills for quality classroom practices and satisfactory learner performance in national examinations. Despite the efforts by the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines the works (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Decision support information and analytical technology in discharge military personnel employment// 9th International Conference on Monitoring, Modeling & Management of Emergent Economy (M3E2 2021) 24 May 2021. - SHS Web of Conferences Volume 107, 05001 (2021). – 7 p.Mykhailo Medvid, Peter Ivashchenko, Igor Britchenko, Iryna Trubavina & Volodymyr Liutyi - 2021 - 9th International Conference on Monitoring, Modeling and Management of Emergent Economy (M3E2 2021).
    The research material proposes the use of decision support information-analytical technology in discharge military personnel employment, which, in contrast to the usual processing of survey results, makes it possible to obtain more information for decision-making. Adherence to such an approach in the development of public administration mechanisms increases the likelihood that in the case of their implementation in the country there will be positive changes, as they will indirectly take into account the availability of necessary resources. (...) and analytical technology to support decisions in the field of labor economics substantiates the development of the example of discharged military personnel social welfare. According to the content, the developed decision support information-analytical technology in the field of labor economics provides for the following components: formation of social protection mechanisms; development of a questionnaire on the use of the appropriate mechanism; statistical analysis of survey results (generation of empirical distributions of answers to questions relative frequencies; comparison of answers medians; correspondences analysis; factor analysis; analysis of hierarchies); meaningful interpretation; decision making. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Book Review – Alien Information Theory: Psychedelic Drug Technologies and the Cosmic Game.Peter Sjöstedt-H. - 2019 - Psychedelic Press UK: Psychedelic Book Reviews.
    Dr Peter Sjöstedt-H reviews Dr Andrew R. Gallimore's book, Alien Information Theory. -/- This was published on PsyPressUK on 13 June 2019.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Information Warfare: A Response to Taddeo.Tim Stevens - 2013 - Philosophy and Technology 26 (2):221-225.
    Taddeo’s recent article, ‘Information Warfare: A Philosophical Perspective’ (Philos. Technol. 25:105–120, 2012) is a useful addition to the literature on information communications technologies (ICTs) and warfare. In this short response, I draw attention to two issues arising from the article. The first concerns the applicability of ‘information warfare’ terminology to current political and military discourse, on account of its relative lack of contemporary usage. The second engages with the political and ethical implications of treating ICT environments as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  32. Information quality.Luciano Floridi - 2013 - Philosophy and Technology 26 (1):1-6.
    Information, and information and communication technologies (ICTs) are critical for most developed post-industrial societies. It follows, therefore, that the better the quality of the information exchanged, the more likely such societies and their members may prosper. But what is information quality (IQ) exactly? This paper discusses current definitions, problems and approaches to IQ and the question of how we should, and could, evaluate IQ in the future.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, (...)
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  34. Global technology regulation and potentially apocalyptic technological threats.James J. Hughes - 2007 - In Fritz Allhoff, Patrick Lin, James Moor, John Weckert & Mihail C. Roco (eds.), Nanoethics: The Ethical and Social Implications of Nanotechnology. Wiley. pp. 201-214.
    In 2000 Bill Joy proposed that the best way to prevent technological apocalypse was to "relinquish" emerging bio-, info- and nanotechnologies. His essay introduced many watchdog groups to the dangers that futurists had been warning of for decades. One such group, ETC, has called for a moratorium on all nanotechnological research until all safety issues can be investigated and social impacts ameliorated. In this essay I discuss the differences and similarities of regulating bio- and nanotechnological innovation to the efforts to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Imaginative Value Sensitive Design: Using Moral Imagination Theory to Inform Responsible Technology Design.Steven Umbrello - 2020 - Science and Engineering Ethics 26 (2):575-595.
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical and ethical literature to (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  36. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  37. Technology’s in-betweeness.Luciano Floridi - 2013 - Philosophy and Technology 26 (2):111–115.
    One of the most obvious features that characterises any technology is its in-betweeness—comprising technologies that stand in-between human users and natural affordances (natural objects, processes, or phenomena). This paper analyses technologies on the basis of their first- second- or third-order nature, and discusses how Information Communication Technologies (ICTs) are creating a new externality.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Fondements des technologies de l’information d’après la philosophie systémiste de la réalité de Bunge.Roman Lukyanenko, Veda C. Storey & Oscar Pastor - 2022 - Mεtascience: Discours Général Scientifique 2:173-217.
    L’ontologie générale constitue un fondement théorique important pour l’analyse, la conception et le développement dans les technologies de l’information. L’ontologie est une branche de la philosophie qui étudie ce qui existe dans la réalité. Une ontologie largement utilisée dans les systèmes d’information, en particulier pour la modélisation conceptuelle, est l’ontologie BWW (Bunge-Wand-Weber), fondée sur les idées du philosophe et physicien Mario Bunge, telles que synthétisées par Wand et Weber. Cette ontologie a été élaborée à partir d’une ancienne version (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. The Uses of Information and Communication Technologies to Strengthen Girls Education in Govt. Girls Secondary Schools of Rural Areas of Sindh.Farzana Jabeen Khoso, Dr Najum Nisa & Dad Shah - 2019 - IJAPR 3 (3):1-7.
    Abstract: The usage of ICTs has become essential component of the teaching methodology in the field of Education. ICT can equip the female students of the area with global information and they can meet the challenges of 21st century. The purpose behind the survey is to analyze the current practices of emerging technologies. The title of the study is; “The Uses of Information and Communication Technologies to Strengthen Girls Education in Govt. Girls Secondary Schools of Rural Areas of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. New Technology: Risks and Gains.Magdalena Klimczuk-Kochańska & Andrzej Klimczuk - 2015 - In Mehmet Odekon (ed.), The Sage Encyclopedia of World Poverty, 2nd Edition. Sage Publications. pp. 1144--1147.
    New technologies are often radical innovations that change current activities across different areas of social and economic life. At the beginning of the 21st century, some of these technologies are information and communications technology, nanotechnology, biotechnology, robotics, and artificial intelligence. These innovations stimulate new opportunities for the production, distribution, and consumption of goods and services, and thus can help solve social problems. But they also cause new social risks and inequalities.
    Download  
     
    Export citation  
     
    Bookmark  
  41. The Comparison of Developing Self Esteem Among Dire Dawa University Male Technology Students.Mustefa Jibril - 2021 - Report and Opinion Journal 13 (10):25-28.
    This study aimed to compare the levels of self-esteem among Dire Dawa University Male Technology students for the program of computer science (CS), Information Technology (IT), Computer Engineering (CE). Subjects for this study were randomly selected. 90 students (30 in Computer Science, 30 in Information Technology, and a 30-in Computer Engineering) were selected as the subjects for this study. The self-esteem of the assessment, so that the student has been Prepared by Rekha Agnihotri self-confidence Inventory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Economic and mathematical modeling of integration influence of information and communication technologies on the development of e-commerce of industrial enterprises.Igor Kryvovyazyuk, Igor Britchenko, Liubov Kovalska, Iryna Oleksandrenko, Liudmyla Pavliuk & Olena Zavadska - 2023 - Journal of Theoretical and Applied Information Technology 101 (11):3801-3815.
    This research aims at establishing the impact of information and communication technologies (ICT) on e-commerce development of industrial enterprises by means of economic and mathematical modelling. The goal was achieved using the following methods: theoretical generalization, analysis and synthesis (to critically analyse the scientific approaches of scientists regarding the expediency of using mathematical models in the context of enterprises’ e-commerce development), target, comparison and grouping (to reveal innovative methodological approach to assessing ICT impact on e-commerce development of industrial enterprises), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund (ed.), The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential treatment of multiple competitors.
    Download  
     
    Export citation  
     
    Bookmark  
  44. Some information is too dangerous to be on the internet.Vincent C. Müller - 2006 - Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Espace et temps vécus dans les pratiques professionnelles enseignantes médiatisées par les technologies de l’information et de la communication.Jean-Luc Rinaudo - 2012 - Revue Phronesis 1 (1):85-91.
    From several researches in educational sciences, the aim of this text is to understand how virtuality questions the professional situation of the teachers, in particular in the unconscious dimensions of the space and of time. The unconscious dimension of professional situation is revealing by the work of unlinking which the context of the information and communication technologies creates. -/- Ce texte tente de repérer à partir de plusieurs travaux de recherche menés en sciences de l’éducation comment la virtualité vient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Computerized Management Information Systems Resources and their Relationship to the Development of Performance in the Electricity Distribution Company in Gaza.Samy S. Abu Naser & Mazen J. Al Shobaki - 2016 - European Academic Research 4 (8):6969-7002.
    This paper aims to identify computerized management information systems resources and their relationship to the development of performance in the Electricity Distribution Company in Gaza. This research used two dimensions. The first dimension is computerized management information systems and the second dimension the Development of Performance. The control sample was (063). (360) questioners were distributed and (306) were retrieved back with a percentage of (85%). Several statistical tools were used for data analysis and hypotheses testing, including reliability correlation (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  48. The philosophy of memory technologies: Metaphysics, knowledge, and values.Heersmink Richard & Carter J. Adam - 2020 - Memory Studies 13 (4):416-433.
    Memory technologies are cultural artifacts that scaffold, transform, and are interwoven with human biological memory systems. The goal of this article is to provide a systematic and integrative survey of their philosophical dimensions, including their metaphysical, epistemological and ethical dimensions, drawing together debates across the humanities, cognitive sciences, and social sciences. Metaphysical dimensions of memory technologies include their function, the nature of their informational properties, ways of classifying them, and their ontological status. Epistemological dimensions include the truth-conduciveness of external memory, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  49. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  50. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans although (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 967