Results for 'Problematic internet use'

992 found
Order:
  1. The association between parent-child relationship and problematic internet use among English- and Chinese-language studies: A meta-analysis.Yalin Zhu, Linyuan Deng & Kun Wan - 2022 - Frontiers in Psychology 13:885819.
    As past studies of the association between parent-child relationship and problematic internet use show mixed results and are influenced by many factors, this meta-analysis of 75 primary Chinese and English language studies from 1990 to 2021 with 110,601 participants (aged 6−25 years) explored (a) the overall association between parent-child relationship and problematic internet use, and (b) whether the association is affected by their types, country, measures, objects of the parent-child relationship, gender, age, year and publication types. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  3. Nomophobia (no-mobile-phone phobia) among the undergraduate medical students.Suleman Lazarus, Abdul Rahim Ghafari, Richard Kapend, Khalid Jan Rezayee, Hasibullah Aminpoor, Mohammad Yasir Essar & Arash Nemat - 2024 - Heliyon 10 (16):1-13.
    Nomophobia (no-mobile-phone phobia) is the fear and anxiety of being without a mobile phone. This study pioneers the investigation of nomophobia in Afghanistan using the Nomophobia Questionnaire (NMP-Q), addressing a crucial gap in the field. We collected statistical data from 754 undergraduate medical students, comprising men (56.50 %) and women (43.50 %), and analyzed the dimensions of nomophobia. While results revealed that all but two participants were nomophobic, they identified three significant dimensions affecting the level of nomophobia among participants: (a) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Internet Use and Healthcare.László Ropolyi - 2021 - In Dagmar Eigner (ed.), Wahrnehmung, Kommunikation und Resonanz. Beiträge zur Medical Anthropology, Band 4. Perception, Communication, and Resonance. Contributions to Medical Anthropology, Volume 4. Schriftenreihe der Landesverteidigungsakademie. pp. 173-192.
    The medical use of computing and information and communication technologies (ICTs) has a history of several decades, but the emergence of the internet, and especially the web and social media, created a new situation. As a result, currently the term eHealth is widely used – and the usage of the internet (and mobile) “technologies” in healthcare (among the patients and professionals, too) tends to be usual practice. There are more and more signs of the institutionalization of this new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Promoting Vices: Designing the Web for Manipulation.Lukas Schwengerer - 2022 - In Michael Klenk & Fleur Jongepier (eds.), The Philosophy of Online Manipulation. Routledge. pp. 292-310.
    This chapter discusses a problematic relation between user-friendly design and manipulation. Some specific features of the design of a website can make it a more or less potent tool for manipulation. In particular, features that can be summed up as creating a user-friendly experience are also manipulation-friendly. The ease of using a website also makes it easier to be manipulated via the website. The chapter provides an argument that this can be explained as a less intellectually virtuous engagement with (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Re-assessing Google as Epistemic Tool in the Age of Personalisation.Tanya de Villiers-Botha - 2022 - The Proceedings of SACAIR2022 Online Conference, the 3rd Southern African Conference for Artificial Intelligence Research.
    Google Search is arguably one of the primary epistemic tools in use today, with the lion’s share of the search-engine market globally. Scholarship on countering the current scourge of misinformation often recommends “digital lit- eracy” where internet users, especially those who get their information from so- cial media, are encouraged to fact-check such information using reputable sources. Given our current internet-based epistemic landscape, and Google’s dominance of the internet, it is very likely that such acts of epistemic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Teknoloji Çağında Rasyonalite, Deneyim ve Bilgi Sorunlar & Eleştiriler.Mete Han Ariturk - 2014 - Kaygi (22):113-131.
    Özet -/- Bu çalışmada modern endüstri toplumlarında teknolojinin, bireylerin ve bir bütün olarak toplumun rasyonalitesini nasıl etkilediği ve bunun da ötesinde nasıl belirlediği incelenecektir. Bu inceleme Herbert Marcuse’nin Tek Boyutlu İnsan adlı eserinde ortaya koyduğu teknolojiye ilişkin görüşleri üzerinden yapılacaktır. Rasyonalite, bilgi ve deneyim arasındaki ilişki teknoloji üzerinden irdelenecek ve daha sonra Marcuse’nin ‘teknolojik rasyonalite’ kavramı Claus Offe’nin eleştirileri bağlamında çözümlenecektir. Son olarak Marcuse’nin teknoloji eleştirisi günümüzde ortaya çıkan toplumsal pratiklerle ele alınarak değerlendirilecektir. -/- Anahtar Terimler Teknoloji, Bilgi, Eleştiri, Pratik, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Digital Technology and the Problem of Dialogical Discourse in Social Media.Bradley Warfield - 2023 - Techné Research in Philosophy and Technology 27 (2):220-239.
    In this paper, I discuss some prominent features of our use of social media and what I think are its harms. My paper has three main parts. In the first part, I use a dialogical framework to argue that much of the discursive activity online is manifested as an ethically impoverished other-directedness and interactivity. In the second part, I identify and discuss several reasons that help explain why so much of the discursive activity on social media is ethically lacking. And (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  10. The relationship between future self-continuity and intention to use Internet wealth management: The mediating role of tolerance of uncertainty and trait anxiety.Rongzhao Wang, Xuanxuan Lin, Zetong Ye, Hua Gao & Jianrong Liu - 2022 - Frontiers in Psychology 13:939508.
    This study aimed to analyze the mediating effect of tolerance of uncertainty (TU) and trait anxiety (TA) on future self-continuity (FSC) and intention to use Internet wealth management (IUIWM) systems. A questionnaire survey was distributed online and a total of 388 participants completed questionnaire, The questionnaire included the following scales: Chinese version of the FSC, Intention to Use the Internet Wealth Management, TU, and TA. Pearson correlation was used to investigate the correlation coefficient between variables while the sequential (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. The internet, cognitive enhancement, and the values of cognition.Richard Heersmink - 2016 - Minds and Machines 26 (4):389-407.
    This paper has two distinct but related goals: (1) to identify some of the potential consequences of the Internet for our cognitive abilities and (2) to suggest an approach to evaluate these consequences. I begin by outlining the Google effect, which (allegedly) shows that when we know information is available online, we put less effort into storing that information in the brain. Some argue that this strategy is adaptive because it frees up internal resources which can then be used (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  12. Knowledge, Democracy, and the Internet.Nicola Mößner & Philip Kitcher - 2017 - Minerva 55 (1):1-24.
    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a democratization of knowledge. In the following text, we will analyze this statement. In particular, we will focus on a potential change in epistemic structure. Does the internet change our common epistemic practice to rely on expert (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Metaphors and problematic understanding in chronic care communication.Fabrizio Macagno & Maria Grazia Rossi - 2019 - Journal of Pragmatics 151:103-117.
    Metaphors can be used as crucial tools for reaching shared understanding, especially where an epistemic imbalance of knowledge is at stake. However, metaphors can also represent a risk in intercultural or cross-cultural interactions, namely in situations characterised by little or deficient common ground between interlocutors. In such cases, the use of metaphors can lead to misunderstandings and cause communicative breakdowns. The conditions defining when metaphors promote, and hinder understanding have not been analyzed in detail, especially in intracultural contexts. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Critical Rationalism and the Internet.Donald Gillies - 2023 - Journal of Philosophical Investigations at University of Tabriz 17 (42):80-90.
    The aim of this paper is to consider whether critical rationalism has any ideas which could usefully be applied to the internet. Today we tend to take the internet for granted and it is easy to forget that it was only about two decades ago that it began to be used to any significant extent. Accordingly in section 1 of the paper, there is a brief consideration of the history of the internet. At first sight this makes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Internet ethics: the constructionist values of homo poieticus.Luciano Floridi & J. W. Sanders - 2005 - In Robert J. Cavalier (ed.), The Impact of the Internet on Our Moral Lives. State University of New York Press. pp. 195-214.
    In this chapter, we argue that the web is a poietically- enabling environment, which both enhances and requires the development of a “constructionist ethics”. We begin by explaining the appropriate concept of “constructionist ethics”, and analysing virtue ethics as the primary example. We then show why CyberEthics (or Computer Ethics, as it is also called) cannot be based on virtue ethics, yet needs to retain a constructionist approach. After providing evidence for significant poietic uses of the web, we argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  20. A virtue epistemology of the Internet: Search engines, intellectual virtues and education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to (...)
    Download  
     
    Export citation  
     
    Bookmark   52 citations  
  21. Engineering affect: emotion regulation, the internet, and the techno-social niche.Joel Krueger & Lucy Osler - 2019 - Philosophical Topics 47 (2):205-231.
    Philosophical work exploring the relation between cognition and the Internet is now an active area of research. Some adopt an externalist framework, arguing that the Internet should be seen as environmental scaffolding that drives and shapes cognition. However, despite growing interest in this topic, little attention has been paid to how the Internet influences our affective life — our moods, emotions, and our ability to regulate these and other feeling states. We argue that the Internet scaffolds (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  22. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. The Problematic Status of Gender-Neutral Language in the History of Philosophy: The Case of Kant.Pauline Kleingeld - 1993 - Philosophical Forum 25:134-150.
    The increasingly common use of inclusive language (e.g., "he or she") in representing past philosophers' views is often inappropriate. Using Immanuel Kant's work as an example, I compare his use of terms such as "human race" and "human being" with his views on women to show that his use of generic terms does not prove that he includes women. I then discuss three different approaches to this issue, found in recent Kant-literature, and show why each of them is insufficient. I (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  24. The social media use of adult New Zealanders: Evidence from an online survey.Edgar Pacheco - 2022 - Report.
    To explore social media use in New Zealand, a sample of 1001 adults aged 18 and over were surveyed in November 2021. Participants were asked about the frequency of their use of different social media platforms (text message included). This report describes how often each of the nine social media sites and apps covered in the survey are used individually on a daily basis. Differences based on key demographics, i.e., age and gender, are tested for statistical significance, and findings summarised.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Alan Rubel, Clinton Castro & Adam Pham (eds.), Algorithms and Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  26. Social Support Is Not the Only Problematic Criterion, But If Used at All, “Lack of Social Support” Should Count in Favor of Listing, Not Against.Maura Priest - 2019 - American Journal of Bioethics 19 (11):35-37.
    Berry, Daniels, and Ladin make a strong argument for discontinuing the use of, “lack of social support,” as an organ transplantation listing criterion. This argument, however, actually leads to conclusions much stronger than those that the authors’ propose: The argument works equally well against using, (1) any “psychosocial” factors at all as a listing criterion, and, (2) any criteria other than factors that directly relate to empirically established medical need, and/or empirically established survival rate. Moreover, while the authors rightly point (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Addiction, Autonomy, and the Internet: Some ethical considerations.Anna Hartford & Dan J. Stein - 2021
    Despite growing understanding of the addictive qualities of the internet, and rising concerns about the effects of excessive internet use on personal wellbeing and mental health, the corresponding ethical debate is still in its infancy, and many of the relevant philosophical and conceptual frameworks are underdeveloped. Our goal in this chapter is to explore some of this evolving terrain. While there are unique ethical considerations that pertain to the formalisation of a disorder related to excessive internet use, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The socio-economic argument for the human right to internet access.Merten Reglitz - 2023 - Politics, Philosophy and Economics 22 (4): 441-469.
    This paper argues that Internet access should be recognised as a human right because it has become practically indispensable for having adequate opportunities to realise our socio-economic human rights. This argument is significant for a philosophically informed public understanding of the Internet and because it provides the basis for creating new duties. For instance, accepting a human right to Internet access minimally requires guaranteeing access for everyone and protecting Internet access and use from certain objectionable interferences (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Problematics of Grounded Theory: Innovations for Developing an Increasingly Rigorous Qualitative Method.Jason Adam Wasserman, Jeffrey Michael Clair & Kenneth L. Wilson - 2009 - Qualitative Research 9 (3):355-381.
    Our purpose in this article is to identify and suggest resolution for two core problematics of grounded theory. First, while grounded theory provides transparency to one part of the conceptualization process, where codes emerge directly from the data, it provides no such systematic or transparent way for gaining insight into the conceptual relationships between discovered codes. Producing a grounded theory depends not only on the definition of conceptual pieces, but the delineation of a relationship between at least two of those (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Homo Virtualis: existence in Internet space.Daria Bylieva, Victoria Lobatyuk & Anna Rubtsova - 2018 - SHS Web of Conference 44:00021.
    The study of a person existence in Internet space is certainly an actual task, since the Internet is not only a source of innovation, but also the cause of society's transformations and the social and cultural problems that arise in connection with this. Computer network is global. It is used by people of different professions, age, level and nature of education, living around the world and belonging to different cultures. It complicates the problem of developing common standards of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Three Problematics of Linguistic Vulnerability: Gadamer, Benhabib, and Butler".Steele Meili - 2003 - In Lorraine Code (ed.), Feminist Interpretations of Hans-Georg Gadamer. Pennsylvania State University Press. pp. 335-366.
    Debates in feminist political philosophy often focus on what problematic(s) to use in order to understand normative ideals, gendered differences, and their histories. For the purposes of this chapter, I will contrast two important problematics in these debates, the procedural/deliberative politics in the tradition of Critical Theory, represented here by Seyla Benhabib, and the poststructuralist or postmodern politics, represented here by Judith Butler. The goal of the contrast will be to set up the contribution that Gadamer’s work can make (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Exploring age-related patterns in internet access: Insights from a secondary analysis of New Zealand survey data.Edgar Pacheco - 2024 - Media Peripheries 18 (1):38-56.
    About thirty years ago, when the Internet started to be commercialised, access to the medium became a topic of research and debate. Up-to-date evidence about key predictors, such as age, is crucial because of the Internet's ever-changing nature and the challenges associated with gaining access to it. This paper aims to give an overview of New Zealand's Internet access trends and how they relate to age. It is based on secondary analysis of data from a larger online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. What Can a Medieval Friar Teach Us About the Internet? Deriving Criteria of Justice for Cyberlaw from Thomist Natural Law Theory.Brandt Dainow - 2013 - Philosophy and Technology 26 (4):459-476.
    This paper applies a very traditional position within Natural Law Theory to Cyberspace. I shall first justify a Natural Law approach to Cyberspace by exploring the difficulties raised by the Internet to traditional principles of jurisprudence and the difficulties this presents for a Positive Law Theory account of legislation of Cyberspace. This will focus on issues relating to geography. I shall then explicate the paradigm of Natural Law accounts, the Treatise on Law, by Thomas Aquinas. From this account will (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Three Problematics of Linguistic Vulnerablity: Gadamer, Benhabib, and Butler.Meili Steele - 2003 - In Lorraine Code (ed.), Feminist Interpretations of Hans-Georg Gadamer. Pennsylvania State University Press. pp. 335-366.
    Debates in feminist political philosophy often focus on what problematic(s) to use in order to understand normative ideals, gendered differences, and their histories. For the purposes of this chapter, I will contrast two important problematics in these debates, the procedural/deliberative politics in the tradition of Critical Theory, represented here by Seyla Benhabib, and the poststructuralist or postmodern politics, represented here by Judith Butler. The goal of the contrast will be to set up the contribution that Gadamer’s work can make (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Toward a Philosophy of the Internet.Laszlo Ropolyi - 2018 - APA Newsletter on Philosophy and Computers 17 (2):40-49.
    The paper argues for the necessity of building up a philosophy of the Internet and proposes a version of it, an «Aristotelian» philosophy of the Internet. First, an overview of the recent trends in the Internet research is presented. This train of thoughts leads to a proposal of understanding the nature of the Internet in the spirit of the Aristotelian philosophy i. e., to conceive the Internet as the Internet, as a totality of its (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Accountability and Community on the Internet: A Plea for Restorative Justice.Laura Wildemann Kane - 2020 - Journal of Applied Philosophy 37 (4):594-611.
    In this article, I analyze norm enforcement on social media, specifically cases where an agent has committed a moral transgression online and is brought to account by an Internet mob with incongruously injurious results in their offline life. I argue that users problematically imagine that they are members of a particular kind of moral community where shaming behaviors are not only acceptable, but morally required to ‘take down’ those who appear to violate community norms. I then demonstrate the costs (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Towards a just and fair Internet: applying Rawls’ principles of justice to Internet regulation.David M. Douglas - 2015 - Ethics and Information Technology 17 (1):57-64.
    I suggest that the social justice issues raised by Internet regulation can be exposed and examined by using a methodology adapted from that described by John Rawls in 'A Theory of Justice'. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the 'original position' as a method of removing bias in decision-making about justice. The original position imposes a 'veil of ignorance' that hides the particular circumstances of individuals from them so that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  94
    Communication ethics and the internet: intercultural and localising influencers.Robert Beckett - 2004 - International Review of Information Ethics 2.
    In the information-technology powered twenty first century a general demand for more effective communication is driving people to question the present, examine the past and to prognosticate the future. The ‘unique global media-information system’ - the Internet- is the central fact of a vast new complexity of communication that is driving social-economic-political-religious- technological change at a rate never experienced before. The premise of this paper is that the Internet can be better understood as the first complex global media (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. PROBLEMATIC ENGLISH SEGMENTAL SOUNDS: EVIDENCE FROM INDONESIAN LEARNERS OF ENGLISH.Andi Kaharuddin - 2020 - Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17 (6):9105-9114.
    Difficulty in producing natural English sounds by Indonesian learners of English is due to the divergence in manner of producing the sounds in English and Indonesia and resulted in unnatural pronunciation of the English sounds. This research addresses the issue of English sound production with special attention to segmental sounds produced by Indonesian learners of English. Descriptive method was used to explain the data collected from picture description task and interview. The study was divided into two: 1) an in-depth phonetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. The world is a big network. Pandemic, the Internet and institutions.Constantin Vica - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):136-161.
    2020 is the year of the first pandemic lived through the Internet. More than half of the world population is now online and because of self-isolation, our moral and social lives unfold almost exclusively online. Two pressing questions arise in this context: how much can we rely on the Internet, as a set of technologies, and how much should we trust online platforms and applications? In order to answer these two questions, I develop an argument based on two (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The Conceptual Access-NeTwORk (CANTOR) Thesis: Theorizing the Development or Success of New Internet-Based Products, Services, or Technologies.La Shun L. Carroll - 2023 - Indonesian Journal of Innovation and Applied Sciences (Ijias) 3 (2):86-98.
    For any new internet-based product, service, or technology to succeed, it must satisfy the criterion of providing access to or creating a network of possible users, products, and services. This is the Conceptual Access-Network (CANTOR) Thesis proposed. In addition to the main issues of success and how and why internet technology evolves, the principle can also meet the objective of explaining what underlies a range of traditional and nontraditional technologies beyond the internet. Through qualitative exploration, the tenets (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Gender, age and staff preparedness to adopt Internet tools for research sharing during Covid-19 in African varsities.Valentine Joseph Owan, Michael Ekpenyong Asuquo, Samuel Okpon Ekaette, Sana Aslam, Moses Eteng Obla & Mercy Valentine Owan - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 6133.
    This study assessed the partial as well as the collaborative impact of age and gender on academic staff preparedness to adopt Internet tools for research sharing in African universities during Covid-19. Although evidence abounds in the literature on gender and age as they affect relatively, scholars’ utilisation of digital tools for research communication, such studies did not examine scholars’ preparedness to adopt from a broad perspective of Africa. This study was conducted based on the argument that the preparedness of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. The ontological revolution: On the phenomenology of the internet.Alexandros Schismenos - 2016 - SOCRATES 4 (2):56-67.
    Cogitation described as calculation, the living being described as a machine, cognitive functions considered as algorithmic sequences and the ‘mechanization’ of the subjective were the theoretical elements that late heideggerian anti–humanism, especially in France was able to utilize[1], even more so, after the second cybernetics or post-cybernetics movement of the late ‘60s introduced the concepts of the autopoietic and the allopoietic automata[2]. Recently, neurologists pose claims on the traditional epistemological field of philosophy, proceeding from this ontological decision, the equation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Justificación logica y seguridad epistémica en internet.Francisco Diaz Montilla - 2022 - Revista Contacto 2 (1):1-17.
    This work seeks to answer the question of whether the Internet is epistemically secure. The problem is approached from a double path (i) analytical (a priori, logical-philosophical) and (ii) empirical. For the first, the treatment is based on the logic of justification; while the second, in a survey in which respondents answer on the use and assessment of the information offered by the internet. The argument presented is as follows: If epistemic security requires the exercise or implementation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Using animal-derived constituents in anaesthesia and surgery: the case for disclosing to patients.Daniel Rodger & Bruce P. Blackshaw - 2019 - BMC Medical Ethics 20 (1):1-9.
    Animal-derived constituents are frequently used in anaesthesia and surgery, and patients are seldom informed of this. This is problematic for a growing minority of patients who may have religious or secular concerns about their use in their care. It is not currently common practice to inform patients about the use of animal-derived constituents, yet what little empirical data does exist indicates that many patients want the opportunity to give their informed consent. First, we review the nature and scale of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  47. Brave. Net. World: the Internet as a disinformation superhighway?Luciano Floridi - 1996 - The Electronic Library 14:509-514.
    This article is a modified version of a paper I gave to the conference Philosophy & Informatics - First Italian Conference on the use of ICT in philosophical disciplines, promoted by the Italian Philosophical Association (University of Rome "La Sapienza", 23-24 November, 1995).
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Idleness, Usefulness and Self-Constitution.Brian O’Connor - 2013 - Critical Horizons 14 (2):181-199.
    The core argument of the paper is that the modern philosophical notion of self-constitution is directed against the prospect of human beings dissolving into idleness. Arguments for self-constitution are marked by non-philosophical presuppositions about the value of usefulness. Those arguments also assume a particular conception of superior experience as conscious integration of a person’s actions within an identifiable set of chosen commitments. Exploring particular arguments by Hegel, Kant, Korsgaard and Frankfurt the paper claims that those arguments are problematic in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Using E-learning among EFL Students at Moulay Ismail University: Perspectives, Prospects, and Challenges.Haytham Elaoufy - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (3):1-11.
    The educational process has been dramatically transformed by technology; this transformation has caused the emergence of central concepts, among which is distance learning. The latter has brought new opportunities to learn from; meanwhile, it has presented challenges that have impacted learning in many ways. Thus, the present study investigated the implementation of E-learning among EFL students at Moulay Ismail University to identify students' perceptions about this type of learning and consider the pros and cons to ensure best practice solutions that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 992