Results for 'Internet Protocol'

831 found
Order:
  1. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  44
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  5. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  46
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Реформа интернета.Andrej Poleev - 2020 - Enzymes 18.
    Частным аспектом предлагаемой реформы интернета является метаномические правила референцирования и адресации виртуальных объектов с целью приближения их к естественным языкам, и создания их логической системы. Однако реформа интернета и преобразование его в средство общения и служения обществу требует также других мер. К этим мерам относится передача определённых имён в неотчуждаемое владение, чтобы их собственники безусловно и беспрепятственно могли осуществлять их право публикации, т.е. публичного высказывания и выражения их мыслей, что также важно для документографии. Другой мерой должно стать упразднение всей сложившейся (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  52
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Divulging the Lived Experiences of Public School Teachers in the USA during COVID-19 Pandemic: Phenomenological Analysis.Jaypee Lopres, Glendale Niadas, Geraldine Minez, Greatchie Lopres, Madeleine Gutierrez, Albert Marion Quiap & Saturnino Renante Bangot Jr - 2023 - International Journal of Learning, Teaching and Educational Research 22 (5):180-205.
    This research examined the lived experiences of public school teachers in the United States during the COVID-19 pandemic. A qualitative design was performed using interpretative phenomenological analysis. Twenty public school teachers in the United States formed the sample, with the inclusion criterion being a minimum of three years’ teaching experience, including the pandemic. To meet the safety measure protocols set by the U.S. government, the data gathering was conducted online using Microsoft Forms. The semi-structured interviews comprised two sections: the first (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. UNVEILING THE REALM OF ACADEMIC CHALLENGES: THE ELEMENTARY LEARNERS' EXPERIENCES IN MODULAR LEARNING.Jeanette Pedriña, Karyll Rose Digaum, Mea Ann Malcampo, Julia Zyraelle Pantoja & Von Christian Ubaldo - 2024 - International Journal of Research Publications 143 (1).
    Modular learning was used to assist elementary learners in continuing their education during the pandemic. This modular learning posed academic challenges. This phenomenological study delved into the academic challenges of modular learning of public-school elementary school learners. Validated In-depth interview protocol (IDI) was used to collect the data from ten (10) Grade six learners. Findings revealed that these academic challenges include unfavorable learning environments, reading comprehension issues, lack of motivation, and poor quality of printed learning modules that affect the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  15. Protocol Analysis in Creative Problem-solving.Steven James Bartlett - 1978 - Journal of Creative Behavior 12 (3):181-192.
    The use of protocol analysis in the traning of cognitive skills.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Hidden protocols: Modifying our expectations in an evolving world.Hans van Ditmarsch, Sujata Ghosh, Rineke Verbrugge & Yanjing Wang - 2014 - Artificial Intelligence 208 (1):18--40.
    When agents know a protocol, this leads them to have expectations about future observations. Agents can update their knowledge by matching their actual observations with the expected ones. They eliminate states where they do not match. In this paper, we study how agents perceive protocols that are not commonly known, and propose a semantics-driven logical framework to reason about knowledge in such scenarios. In particular, we introduce the notion of epistemic expectation models and a propositional dynamic logic-style epistemic logic (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. The multiplicity of experimental protocols: A challenge to reductionist and non-reductionist models of the unity of neuroscience.Jacqueline A. Sullivan - 2009 - Synthese 167 (3):511-539.
    Descriptive accounts of the nature of explanation in neuroscience and the global goals of such explanation have recently proliferated in the philosophy of neuroscience and with them new understandings of the experimental practices of neuroscientists have emerged. In this paper, I consider two models of such practices; one that takes them to be reductive; another that takes them to be integrative. I investigate those areas of the neuroscience of learning and memory from which the examples used to substantiate these models (...)
    Download  
     
    Export citation  
     
    Bookmark   87 citations  
  18. (1 other version)The internet: which future for organised knowledge, Frankenstein or Pygmalion? Part 1.Luciano Floridi - 1995 - International Journal of Human-Computer Studies 43 (2):261–274.
    The Internet is like a new country, with a growing population of millions of well educated citizens. If it wants to keep track of its own cultural achievements in real time, it will have to provide itself with an infostructure like a virtual National Library system. This paper proposes that institutions all over the world should take full advantage of the new technologies available, and promote and coordinate such a global service. This is essential in order to make possible (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  19. The internet, cognitive enhancement, and the values of cognition.Richard Heersmink - 2016 - Minds and Machines 26 (4):389-407.
    This paper has two distinct but related goals: (1) to identify some of the potential consequences of the Internet for our cognitive abilities and (2) to suggest an approach to evaluate these consequences. I begin by outlining the Google effect, which (allegedly) shows that when we know information is available online, we put less effort into storing that information in the brain. Some argue that this strategy is adaptive because it frees up internal resources which can then be used (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  20. Internet Trolling: Social Exploration and the Epistemic Norms of Assertion.Daniel Munro - forthcoming - Philosophers' Imprint.
    Internet trolling involves making assertions with the aim of provoking emotionally heated responses, all while pretending to be a sincere interlocutor. In this paper, I give an account of some of the epistemic and psychological dimensions of trolling, with the goal of better understanding why certain kinds of trolling can be dangerous. I first analyze how trolls eschew the epistemic norms of assertion, thus covertly violating their conversation partners’ normative expectations. Then, drawing on literature on the “explore/exploit trade-off,” I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Internet and Advertisement.Khaled Moustafa - 2016 - Science and Engineering Ethics 22 (1):293-296.
    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. The Internet as an Epistemic Agent (EA).Roman Krzanowski & Paweł Polak - 2022 - Információs Társadalom 22 (2):39-56.
    We argue that the Internet is, and is acting as, an EA because it shapes our belief systems, our worldviews. We explain key concepts for this discussion and provide illustrative examples to support our claims. Furthermore, we explain why recognising the Internet as an EA is important for Internet users and society in general. We discuss several ways in which the Internet influences the choices, beliefs, and attitudes of its users, and we compare this effect with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The use of protocol analysis in philosophy.Steven Bartlett - 1978 - Metaphilosophy 9 (3-4):324-336.
    A description of the author's application of protocol analysis in the teaching of philosophy.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  24. Internet Techniques for an Untimely Anthropology.Meg Stalcup - 2020 - In Julie Laplante, Willow Scobie & Ari Gandsman (eds.), Searching After Method: Live Anthropology. Berghahn Book. pp. 102-107.
    Making “the familiar strange and the strange familiar” is what anthropology has long claimed as its expertise. The Internet and its broader technological problem space pose methodological challenges, however, for a discipline that has traditionally drawn on the authority of “being there” to ground its claims to knowledge.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Discussion protocol for alleviating epistemic injustice: The case of community rehabilitation interaction and female substance abusers.Petra Auvinen, Jaana Parviainen, Lauri Lahikainen & Hannele Palukka - 2021 - Social Sciences 10 (2).
    Substance-abusing women are vulnerable to specific kinds of epistemic injustice, including stigmatization and discrimination. This article examines the development of the epistemic agency of female substance abusers by asking: How does the use of a formal discussion protocol in community rehabilitation interaction alleviate epistemic injustice and strengthen the epistemic agency of substance abusers? The data were collected in a Finnish rehabilitation center by videotaping six group discussions between social workers, peer support workers, and rehabilitation clients with substance abuse problems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Knowledge, Democracy, and the Internet.Nicola Mößner & Philip Kitcher - 2017 - Minerva 55 (1):1-24.
    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a democratization of knowledge. In the following text, we will analyze this statement. In particular, we will focus on a potential change in epistemic structure. Does the internet change our common epistemic practice to rely on expert (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. Engineering affect: emotion regulation, the internet, and the techno-social niche.Joel Krueger & Lucy Osler - 2019 - Philosophical Topics 47 (2):205-231.
    Philosophical work exploring the relation between cognition and the Internet is now an active area of research. Some adopt an externalist framework, arguing that the Internet should be seen as environmental scaffolding that drives and shapes cognition. However, despite growing interest in this topic, little attention has been paid to how the Internet influences our affective life — our moods, emotions, and our ability to regulate these and other feeling states. We argue that the Internet scaffolds (...)
    Download  
     
    Export citation  
     
    Bookmark   48 citations  
  28. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech and high (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Community-Based Research Protocol on Transboundary Impacts: Fishery Resources, Ecosystem and Communities’ Livelihood.Narith Por, Pichdara Lonn, Solany Kry & Chimor Mor (eds.) - 2022 - Cambodia: My Village.
    The developments along the Mekong River, including in Cambodia, have boomed. There were 755 dams. Of these, 537 have been completed, and 152 have been planned or proposed. Of these, 52 were under construction, and 14 have been canceled or suspended. Of these dams, 392 were hydropower, 337 were irrigation, and 26 were other types (CGIAR, 2015). Even though some officials saw economic development as a result of the hydropower dam, the negative impacts of hydropower dams were seen by many (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  33. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Internet and Biometric Web Based Business Management Decision Support.Artūras Kaklauskas - 2023 - Vilnius, Lithuania: Vilnius Gediminas Technical University, Lithuania.
    Internet and Biometric Web Based Business Management Decision Support MICROBE MOOC material prepared under IO1/A5 Development of the MICROBE personalized MOOCs content and teaching materials Prepared by: A. Kaklauskas, A. Banaitis, I. Ubarte Vilnius Gediminas Technical University, Lithuania Project No: 2020-1-LT01-KA203-078100.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Empirical Protocols for Mediating Long-Range Coherence in Biological Systems.Richard L. Amoroso - 2013 - Journal of Consciousness Exploration and Research 4 (09):24-45.
    Delineating the framework for a fundamental model of long-range coherence in biological systems is said to rely on principles beyond parameters addressed by current physical science. Just as phenomena of quantum mechanics lay beyond tools of classical Newtonian mechanics we must now enter a 3rd regime of unified field, UF mechanics. In this paper we present a battery of nine empirical protocols for manipulating long-range coherence in complex self-organized living systems (SOLS) in a manner surmounting the Copenhagen Interpretation of quantum (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. The Internet Age: A Commentary on Mcluhan’s “The Medium is the Message”.Miguel Elvir Quitain - manuscript
    This paper is my short commentary on Marshall McLuhan’s “The Medium is the Message.” McLuhan wrote this essay in 1964, during a time when the internet was not yet invented. Hence, my contribution to his philosophy and the main content of this paper is to apply his analysis on the age of the internet particularly on the role of this medium in education and remote learning.
    Download  
     
    Export citation  
     
    Bookmark  
  37. Internet Use and Healthcare.László Ropolyi - 2021 - In Dagmar Eigner (ed.), Wahrnehmung, Kommunikation und Resonanz. Beiträge zur Medical Anthropology, Band 4. Perception, Communication, and Resonance. Contributions to Medical Anthropology, Volume 4. Schriftenreihe der Landesverteidigungsakademie. pp. 173-192.
    The medical use of computing and information and communication technologies (ICTs) has a history of several decades, but the emergence of the internet, and especially the web and social media, created a new situation. As a result, currently the term eHealth is widely used – and the usage of the internet (and mobile) “technologies” in healthcare (among the patients and professionals, too) tends to be usual practice. There are more and more signs of the institutionalization of this new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Critical Rationalism and the Internet.Donald Gillies - 2023 - Journal of Philosophical Investigations at University of Tabriz 17 (42):80-90.
    The aim of this paper is to consider whether critical rationalism has any ideas which could usefully be applied to the internet. Today we tend to take the internet for granted and it is easy to forget that it was only about two decades ago that it began to be used to any significant extent. Accordingly in section 1 of the paper, there is a brief consideration of the history of the internet. At first sight this makes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Trustworthiness and truth: The epistemic pitfalls of internet accountability.Karen Frost-Arnold - 2014 - Episteme 11 (1):63-81.
    Since anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. This paper provides a veritistic argument that accountability mechanisms can cause significant epistemic problems for internet encyclopedias and social media communities. I show that accountability mechanisms can undermine both the dissemination of true beliefs and the detection of error. Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  40. A virtue epistemology of the Internet: Search engines, intellectual virtues and education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  41. Homo Virtualis: existence in Internet space.Daria Bylieva, Victoria Lobatyuk & Anna Rubtsova - 2018 - SHS Web of Conference 44:00021.
    The study of a person existence in Internet space is certainly an actual task, since the Internet is not only a source of innovation, but also the cause of society's transformations and the social and cultural problems that arise in connection with this. Computer network is global. It is used by people of different professions, age, level and nature of education, living around the world and belonging to different cultures. It complicates the problem of developing common standards of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Internet ethics: the constructionist values of homo poieticus.Luciano Floridi & J. W. Sanders - 2005 - In Robert J. Cavalier (ed.), The Impact of the Internet on Our Moral Lives. State University of New York Press. pp. 195-214.
    In this chapter, we argue that the web is a poietically- enabling environment, which both enhances and requires the development of a “constructionist ethics”. We begin by explaining the appropriate concept of “constructionist ethics”, and analysing virtue ethics as the primary example. We then show why CyberEthics (or Computer Ethics, as it is also called) cannot be based on virtue ethics, yet needs to retain a constructionist approach. After providing evidence for significant poietic uses of the web, we argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  43. The Cognitive Ecology of the Internet.Paul Smart, Richard Heersmink & Robert Clowes - 2017 - In Stephen Cowley & Frederic Vallée-Tourangeau (eds.), Cognition Beyond the Brain: Computation, Interactivity and Human Artifice (2nd ed.). Springer. pp. 251-282.
    In this chapter, we analyze the relationships between the Internet and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory and its species of embedded, embodied, extended, distributed and collective cognition. Having thus set the stage, we begin by taking (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  44. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Optional Protocol to the International Covenant on Economic, Social and Cultural Rights (OP-ICESCR).Deepa Kansra & Mallika Ramachandran - manuscript
    Human rights treaties are often attached and complemented with Optional Protocols. The Optional protocol instruments are adopted after careful deliberation between different stakeholders including member states to human rights treaties. -/- The present document on Introduction to the International Covenant on Economic Social and Cultural Rights- Optional Protocol [OP-ICESCR] is an addition to the on-going work on the Human Rights Framework on ESC Rights. It covers basic information on the objectives of the OP and the key provisions dealing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Internet, el nuevo dios.Enrique Morata - forthcoming - Academia.Edu.
    In Spanish, on Internet as the new god of all us.
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Internet and Privacy.Carissa Veliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. New York: Routledge. pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Komputer, Kecerdasan Buatan dan Internet: Filsafat Hubert L. Dreyfus tentang Produk Industri 3.0 dan Industri 4.0 (Computer, Artificial Intelligence and Internet: Dreyfus’s Philosophy on the Product of 3.0 and 4.0 Industries).Zainul Maarif - 2019 - Prosiding Paramadina Research Day.
    The content of this paper is an elaboration of Hubert L. Dreyfus’s philosophical critique of Artificial Intelligence (AI), computers and the internet. Hubert L. Dreyfus (1929-2017) is Ua SA philosopher and alumni of Harvard University who teach at the Massachusetts Institute of Technology (MIT) and University of California, Berkeley. He is a phenomenological philosopher who criticize computer researchers and the artificial intelligence community. In 1965, Dreyfus wrote an article for Rand Corporation titled “Alchemy and Artificial Intelligence” which criticizes the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The new ethical responsibilities of internet service providers.Luciano Floridi - 2011 - Philosophy and Technology 24 (4):369-370.
    The exponential developments of internet services and resources have brought enormous benefits, but also enormous moral and ethical challenges. This paper introduces the contributions from a research workshop, tasked with defining new ethical responsibilities for Internet Service Providers (ISPs).
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  84
    The divide between us: Internet access among people with and without disabilities in the post-pandemic era.Edgar Pacheco & Hannah Burgess - 2024 - Disability and Society 1:1-22.
    The COVID-19 pandemic highlighted the importance of internet access across various aspects of life, from remote work and online education to healthcare services and social connections. As we transition to a post-pandemic era, a pressing need arises to update our understanding of the multifaceted nature of internet access. This study is one of the first attempts to do so. Using survey data from New Zealand adult internet users (n=960), it compares internet connection types, frequency of (...) use at home, social media use, and concerns about online risk between people with and without disabilities. Results show people with disabilities have restricted fibre access and higher wireless broadband (a much slower connection type). People with disabilities use social media platforms less and are more concerned about certain online risks. The findings highlight persistent disparities in internet access for people with disabilities in the post-pandemic era. Implications of the study are discussed. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 831