Results for 'Internet Protocol'

762 found
Order:
  1. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  4. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Реформа интернета.Andrej Poleev - 2020 - Enzymes 18.
    Частным аспектом предлагаемой реформы интернета является метаномические правила референцирования и адресации виртуальных объектов с целью приближения их к естественным языкам, и создания их логической системы. Однако реформа интернета и преобразование его в средство общения и служения обществу требует также других мер. К этим мерам относится передача определённых имён в неотчуждаемое владение, чтобы их собственники безусловно и беспрепятственно могли осуществлять их право публикации, т.е. публичного высказывания и выражения их мыслей, что также важно для документографии. Другой мерой должно стать упразднение всей сложившейся (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. UNVEILING THE REALM OF ACADEMIC CHALLENGES: THE ELEMENTARY LEARNERS' EXPERIENCES IN MODULAR LEARNING.Jeanette Pedriña, Karyll Rose Digaum, Mea Ann Malcampo, Julia Zyraelle Pantoja & Von Christian Ubaldo - 2024 - International Journal of Research Publications 143 (1).
    Modular learning was used to assist elementary learners in continuing their education during the pandemic. This modular learning posed academic challenges. This phenomenological study delved into the academic challenges of modular learning of public-school elementary school learners. Validated In-depth interview protocol (IDI) was used to collect the data from ten (10) Grade six learners. Findings revealed that these academic challenges include unfavorable learning environments, reading comprehension issues, lack of motivation, and poor quality of printed learning modules that affect the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Divulging the Lived Experiences of Public School Teachers in the USA during COVID-19 Pandemic: Phenomenological Analysis.Jaypee Lopres, Glendale Niadas, Geraldine Minez, Greatchie Lopres, Madeleine Gutierrez, Albert Marion Quiap & Saturnino Renante Bangot Jr - 2023 - International Journal of Learning, Teaching and Educational Research 22 (5):180-205.
    This research examined the lived experiences of public school teachers in the United States during the COVID-19 pandemic. A qualitative design was performed using interpretative phenomenological analysis. Twenty public school teachers in the United States formed the sample, with the inclusion criterion being a minimum of three years’ teaching experience, including the pandemic. To meet the safety measure protocols set by the U.S. government, the data gathering was conducted online using Microsoft Forms. The semi-structured interviews comprised two sections: the first (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The multiplicity of experimental protocols: A challenge to reductionist and non-reductionist models of the unity of neuroscience.Jacqueline A. Sullivan - 2009 - Synthese 167 (3):511-539.
    Descriptive accounts of the nature of explanation in neuroscience and the global goals of such explanation have recently proliferated in the philosophy of neuroscience and with them new understandings of the experimental practices of neuroscientists have emerged. In this paper, I consider two models of such practices; one that takes them to be reductive; another that takes them to be integrative. I investigate those areas of the neuroscience of learning and memory from which the examples used to substantiate these models (...)
    Download  
     
    Export citation  
     
    Bookmark   84 citations  
  12. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  13. Hidden protocols: Modifying our expectations in an evolving world.Hans van Ditmarsch, Sujata Ghosh, Rineke Verbrugge & Yanjing Wang - 2014 - Artificial Intelligence 208 (1):18--40.
    When agents know a protocol, this leads them to have expectations about future observations. Agents can update their knowledge by matching their actual observations with the expected ones. They eliminate states where they do not match. In this paper, we study how agents perceive protocols that are not commonly known, and propose a semantics-driven logical framework to reason about knowledge in such scenarios. In particular, we introduce the notion of epistemic expectation models and a propositional dynamic logic-style epistemic logic (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  14. Protocol Analysis in Creative Problem-solving.Steven James Bartlett - 1978 - Journal of Creative Behavior 12 (3):181-192.
    The use of protocol analysis in the traning of cognitive skills.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. The Cognitive Ecology of the Internet.Paul Smart, Richard Heersmink & Robert Clowes - 2017 - In Stephen Cowley & Frederic Vallée-Tourangeau (eds.), Cognition Beyond the Brain: Computation, Interactivity and Human Artifice (2nd ed.). Springer. pp. 251-282.
    In this chapter, we analyze the relationships between the Internet and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory and its species of embedded, embodied, extended, distributed and collective cognition. Having thus set the stage, we begin by taking (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  16. The internet, cognitive enhancement, and the values of cognition.Richard Heersmink - 2016 - Minds and Machines 26 (4):389-407.
    This paper has two distinct but related goals: (1) to identify some of the potential consequences of the Internet for our cognitive abilities and (2) to suggest an approach to evaluate these consequences. I begin by outlining the Google effect, which (allegedly) shows that when we know information is available online, we put less effort into storing that information in the brain. Some argue that this strategy is adaptive because it frees up internal resources which can then be used (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  17. The internet: which future for organised knowledge, Frankenstein or Pygmalion? Part 1.Luciano Floridi - 1995 - International Journal of Human-Computer Studies 43 (2):261–274.
    The Internet is like a new country, with a growing population of millions of well educated citizens. If it wants to keep track of its own cultural achievements in real time, it will have to provide itself with an infostructure like a virtual National Library system. This paper proposes that institutions all over the world should take full advantage of the new technologies available, and promote and coordinate such a global service. This is essential in order to make possible (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  18. The Internet as an Epistemic Agent (EA).Roman Krzanowski & Paweł Polak - 2022 - Információs Társadalom 22 (2):39-56.
    We argue that the Internet is, and is acting as, an EA because it shapes our belief systems, our worldviews. We explain key concepts for this discussion and provide illustrative examples to support our claims. Furthermore, we explain why recognising the Internet as an EA is important for Internet users and society in general. We discuss several ways in which the Internet influences the choices, beliefs, and attitudes of its users, and we compare this effect with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  94
    Discussion protocol for alleviating epistemic injustice: The case of community rehabilitation interaction and female substance abusers.Petra Auvinen, Jaana Parviainen, Lauri Lahikainen & Hannele Palukka - 2021 - Social Sciences 10 (2).
    Substance-abusing women are vulnerable to specific kinds of epistemic injustice, including stigmatization and discrimination. This article examines the development of the epistemic agency of female substance abusers by asking: How does the use of a formal discussion protocol in community rehabilitation interaction alleviate epistemic injustice and strengthen the epistemic agency of substance abusers? The data were collected in a Finnish rehabilitation center by videotaping six group discussions between social workers, peer support workers, and rehabilitation clients with substance abuse problems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Internet and Advertisement.Khaled Moustafa - 2016 - Science and Engineering Ethics 22 (1):293-296.
    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Internet Techniques for an Untimely Anthropology.Meg Stalcup - 2020 - In Julie Laplante, Willow Scobie & Ari Gandsman (eds.), Searching After Method: Live Anthropology. Berghahn Book. pp. 102-107.
    Making “the familiar strange and the strange familiar” is what anthropology has long claimed as its expertise. The Internet and its broader technological problem space pose methodological challenges, however, for a discipline that has traditionally drawn on the authority of “being there” to ground its claims to knowledge.
    Download  
     
    Export citation  
     
    Bookmark  
  22.  26
    Communication ethics and the internet: intercultural and localising influencers.Robert Beckett - 2004 - International Review of Information Ethics 2.
    In the information-technology powered twenty first century a general demand for more effective communication is driving people to question the present, examine the past and to prognosticate the future. The ‘unique global media-information system’ - the Internet- is the central fact of a vast new complexity of communication that is driving social-economic-political-religious- technological change at a rate never experienced before. The premise of this paper is that the Internet can be better understood as the first complex global media (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Internet ethics: the constructionist values of homo poieticus.Luciano Floridi & J. W. Sanders - 2005 - In Robert Cavalier (ed.), The Impact of the Internet on our moral lives. New York, NY, USA: pp. 195-214.
    In this chapter, we argue that the web is a poietically- enabling environment, which both enhances and requires the development of a “constructionist ethics”. We begin by explaining the appropriate concept of “constructionist ethics”, and analysing virtue ethics as the primary example. We then show why CyberEthics (or Computer Ethics, as it is also called) cannot be based on virtue ethics, yet needs to retain a constructionist approach. After providing evidence for significant poietic uses of the web, we argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  24. The use of protocol analysis in philosophy.Steven Bartlett - 1978 - Metaphilosophy 9 (3-4):324-336.
    A description of the author's application of protocol analysis in the teaching of philosophy.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  25. The Internet and Privacy.Carissa Veliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. New York: Routledge. pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Knowledge, Democracy, and the Internet.Nicola Mößner & Philip Kitcher - 2017 - Minerva 55 (1):1-24.
    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a democratization of knowledge. In the following text, we will analyze this statement. In particular, we will focus on a potential change in epistemic structure. Does the internet change our common epistemic practice to rely on expert (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. Internet Use and Healthcare.László Ropolyi - 2021 - In Dagmar Eigner (ed.), Wahrnehmung, Kommunikation und Resonanz. Beiträge zur Medical Anthropology, Band 4. Perception, Communication, and Resonance. Contributions to Medical Anthropology, Volume 4. Wien: Schriftenreihe der Landesverteidigungsakademie. pp. 173-192.
    The medical use of computing and information and communication technologies (ICTs) has a history of several decades, but the emergence of the internet, and especially the web and social media, created a new situation. As a result, currently the term eHealth is widely used – and the usage of the internet (and mobile) “technologies” in healthcare (among the patients and professionals, too) tends to be usual practice. There are more and more signs of the institutionalization of this new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Empirical Protocols for Mediating Long-Range Coherence in Biological Systems.Richard L. Amoroso - 2013 - Journal of Consciousness Exploration and Research 4 (09):24-45.
    Delineating the framework for a fundamental model of long-range coherence in biological systems is said to rely on principles beyond parameters addressed by current physical science. Just as phenomena of quantum mechanics lay beyond tools of classical Newtonian mechanics we must now enter a 3rd regime of unified field, UF mechanics. In this paper we present a battery of nine empirical protocols for manipulating long-range coherence in complex self-organized living systems (SOLS) in a manner surmounting the Copenhagen Interpretation of quantum (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. The Internet Age: A Commentary on Mcluhan’s “The Medium is the Message”.Miguel Elvir Quitain - manuscript
    This paper is my short commentary on Marshall McLuhan’s “The Medium is the Message.” McLuhan wrote this essay in 1964, during a time when the internet was not yet invented. Hence, my contribution to his philosophy and the main content of this paper is to apply his analysis on the age of the internet particularly on the role of this medium in education and remote learning.
    Download  
     
    Export citation  
     
    Bookmark  
  31. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech and high (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  32. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Internet and Biometric Web Based Business Management Decision Support.Artūras Kaklauskas - 2023 - Vilnius, Lithuania: Vilnius Gediminas Technical University, Lithuania.
    Internet and Biometric Web Based Business Management Decision Support MICROBE MOOC material prepared under IO1/A5 Development of the MICROBE personalized MOOCs content and teaching materials Prepared by: A. Kaklauskas, A. Banaitis, I. Ubarte Vilnius Gediminas Technical University, Lithuania Project No: 2020-1-LT01-KA203-078100.
    Download  
     
    Export citation  
     
    Bookmark  
  34.  98
    Community-Based Research Protocol on Transboundary Impacts: Fishery Resources, Ecosystem and Communities’ Livelihood.Narith Por, Pichdara Lonn, Solany Kry & Chimor Mor (eds.) - 2022 - Cambodia: My Village.
    The developments along the Mekong River, including in Cambodia, have boomed. There were 755 dams. Of these, 537 have been completed, and 152 have been planned or proposed. Of these, 52 were under construction, and 14 have been canceled or suspended. Of these dams, 392 were hydropower, 337 were irrigation, and 26 were other types (CGIAR, 2015). Even though some officials saw economic development as a result of the hydropower dam, the negative impacts of hydropower dams were seen by many (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Critical Rationalism and the Internet.Donald Gillies - 2023 - Journal of Philosophical Investigations at University of Tabriz 17 (42):80-90.
    The aim of this paper is to consider whether critical rationalism has any ideas which could usefully be applied to the internet. Today we tend to take the internet for granted and it is easy to forget that it was only about two decades ago that it began to be used to any significant extent. Accordingly in section 1 of the paper, there is a brief consideration of the history of the internet. At first sight this makes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Inequality, Internet likes, and the rules of philosophy, by Ren*t* S*lecl.Terence Rajivan Edward - manuscript
    How can we explain why certain historically discriminated groups are under-represented in English-speaking analytic philosophy? I present a hypothesis which appeals to rules, rather than relying upon the social theories of Pierre Bourdieu. I do by means of an attempted pastiche of Renata Salecl, my third attempt.
    Download  
     
    Export citation  
     
    Bookmark  
  37. Internet Characteristics and Online Alternative Dispute Resolution.Bashar H. Malkawi - 2008 - Harvard Negotiation Law Review 13:327-348.
    Electronic commerce is important, and perhaps, inevitable. Thus, to consider the legal implications of the growth and development of electronic commerce is essential. However, the lack of suitable dispute resolution mechanisms in cyberspace will constitute a serious obstacle to the further development of electronic commerce. Bearing this in mind, this thesis argues that when Alternative Dispute Resolution (ADR) moves to cyberspace, particularly arbitration and mediation as the main types of ADR, the form of Online Alternative Dispute Resolution (OADR) can maximize (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Internet, el nuevo dios.Enrique Morata - forthcoming - Academia.Edu.
    In Spanish, on Internet as the new god of all us.
    Download  
     
    Export citation  
     
    Bookmark  
  40. The internet: which future for organized knowledge - Frankenstein or Pygmalion, Part 2.Luciano Floridi - 1996 - The Electronic Library 14 (1):49–52.
    This paper is the second half of an invited paper given by the author to the international conference, promoted by the UNESCO Philosophy Forum, to celebrate the fiftieth anniversary of the founding of the organisation (Paris, 14–17 March 1995). The first half, which deals with a slightly different theme, is published as an Article earlier in this issue.
    Download  
     
    Export citation  
     
    Bookmark  
  41. A virtue epistemology of the Internet: Search engines, intellectual virtues and education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to (...)
    Download  
     
    Export citation  
     
    Bookmark   48 citations  
  42. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  43. The Optional Protocol to the International Covenant on Economic, Social and Cultural Rights (OP-ICESCR).Deepa Kansra & Mallika Ramachandran - manuscript
    Human rights treaties are often attached and complemented with Optional Protocols. The Optional protocol instruments are adopted after careful deliberation between different stakeholders including member states to human rights treaties. -/- The present document on Introduction to the International Covenant on Economic Social and Cultural Rights- Optional Protocol [OP-ICESCR] is an addition to the on-going work on the Human Rights Framework on ESC Rights. It covers basic information on the objectives of the OP and the key provisions dealing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Engineering affect: emotion regulation, the internet, and the techno-social niche.Joel Krueger & Lucy Osler - 2019 - Philosophical Topics 47 (2):205-231.
    Philosophical work exploring the relation between cognition and the Internet is now an active area of research. Some adopt an externalist framework, arguing that the Internet should be seen as environmental scaffolding that drives and shapes cognition. However, despite growing interest in this topic, little attention has been paid to how the Internet influences our affective life — our moods, emotions, and our ability to regulate these and other feeling states. We argue that the Internet scaffolds (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  45. Komputer, Kecerdasan Buatan dan Internet: Filsafat Hubert L. Dreyfus tentang Produk Industri 3.0 dan Industri 4.0 (Computer, Artificial Intelligence and Internet: Dreyfus’s Philosophy on the Product of 3.0 and 4.0 Industries).Zainul Maarif - 2019 - Prosiding Paramadina Research Day.
    The content of this paper is an elaboration of Hubert L. Dreyfus’s philosophical critique of Artificial Intelligence (AI), computers and the internet. Hubert L. Dreyfus (1929-2017) is Ua SA philosopher and alumni of Harvard University who teach at the Massachusetts Institute of Technology (MIT) and University of California, Berkeley. He is a phenomenological philosopher who criticize computer researchers and the artificial intelligence community. In 1965, Dreyfus wrote an article for Rand Corporation titled “Alchemy and Artificial Intelligence” which criticizes the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Philosophy of the Internet. A Discourse on the Nature of the Internet.Laszlo Ropolyi - 2013 - Budapest: Eötvös University.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Digital Immortality: Theory and Protocol for Indirect Mind Uploading.Alexey Turchin - manuscript
    Future superintelligent AI will be able to reconstruct a model of the personality of a person who lived in the past based on informational traces. This could be regarded as some form of immortality if this AI also solves the problem of personal identity in a copy-friendly way. A person who is currently alive could invest now in passive self-recording and active self-description to facilitate such reconstruction. In this article, we analyze informational-theoretical relationships between the human mind, its traces, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Trustworthiness and truth: The epistemic pitfalls of internet accountability.Karen Frost-Arnold - 2014 - Episteme 11 (1):63-81.
    Since anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. This paper provides a veritistic argument that accountability mechanisms can cause significant epistemic problems for internet encyclopedias and social media communities. I show that accountability mechanisms can undermine both the dissemination of true beliefs and the detection of error. Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  49. Addiction, Autonomy, and the Internet: Some ethical considerations.Anna Hartford & Dan J. Stein - 2021
    Despite growing understanding of the addictive qualities of the internet, and rising concerns about the effects of excessive internet use on personal wellbeing and mental health, the corresponding ethical debate is still in its infancy, and many of the relevant philosophical and conceptual frameworks are underdeveloped. Our goal in this chapter is to explore some of this evolving terrain. While there are unique ethical considerations that pertain to the formalisation of a disorder related to excessive internet use, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 762