Results for 'Teaching, Information Security'

967 found
Order:
  1. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  2. ITS for teaching DES information security Algorithm.Abed Elhaleem A. Alnajar & Monnes Hanjory - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  4. Utilization of Scholarly Journal Articles in the Teaching and Learning of Teacher Education Courses.Derren Gaylo, Manuel Caingcoy & Daisy Mugot - 2020 - Balkan and Near Eastern Journal of Social Sciences 6 (3):59-66.
    The usage of scholarly journal articles in the academe is now gaining attention to cope with the ever dynamic and evolving teaching and learning processes. However, the use implies possible potential usage only because what is measured is the number of views and downloads of the articles. This paper explored how the teacher education faculty and students utilized scholarly journal articles in the teaching and learning of professional education courses. The study also determined the challenges in using these primary sources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Web-based School Information and Publication System: A Developmental Study.Kevin Caratiquit - 2021 - Global Education and Social Sciences Journal 1 (3):45-55.
    The study aimed to promote the school online, provide timely, engaging, and current information of the school to employees, learners, parents, and community, share updates of school activities online, supply downloadable instructional materials and resources for both employees and students. Also, it evaluated the assessment of teaching and non-teaching staff, learners, parents and IT specialists to the ISO 25010:2011 software quality standards of the developed Web-based School Information and Publication System along functional and suitability, maintainability, usability, security, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines the works (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Going Back to Normal: A Phenomenological Study on the Challenges and Coping Mechanisms of Junior High School Teachers in the Full Implementation of In-Person Classes in the Public Secondary Schools in the Division of Rizal.Jarom Anero & Eloisa Tamayo - 2023 - Psychology and Education: A Multidisciplinary Journal 12:767-808.
    The study focused on exploring and understanding the challenges junior high school teachers in the Division of Rizal faced during the full implementation of in-person classes and identifying the coping mechanisms they employed to adapt to this new educational landscape. Forty participants were purposefully selected from various public secondary school clusters in the division of Rizal. A qualitative phenomenological design was employed, and the information collected through Google Forms was imported into Microsoft Excel and Microsoft Word. After importing the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Informing, teaching or propagandising? Combining Environmental and Science Studies for undergraduates.Sean Johnston & Mhairi Harvey - 2002 - Discourse: Learning and Teaching in Philosophical and Religious Studies 1 (2):130-140.
    This article discusses experiences in the integrated teaching of Environmental Studies and Science Studies in a generalist curriculum at a university campus in Scotland. At the University of Glasgow Crichton Campus, a mixed curriculum has been developed to combine coherently Environmental and Science Studies, perhaps the first such curriculum in the UK and equally uncommon in America. The Crichton curricum is intentionally multi-disciplinary, drawing closely on the successful nineteenth-century Scottish model exported to America. This generalist approach, emphasising broad philosophical principles, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper (...) countermeasures can be devised. Ontologies are instruments developed to address these conceptual clarification and terminological systematization issues. Over the years, several ontologies have been proposed in Risk Management and Security Engineering. However, as shown in recent literature, they fall short in many respects, including generality and expressivity - the latter impacting on their interoperability with related models. We propose a Reference Ontology for Security Engineering (ROSE) from a Risk Treatment perspective. Our proposal leverages on two existing Reference Ontologies: the Common Ontology of Value and Risk and a Reference Ontology of Prevention, both of which are grounded on the Unified Foundational Ontology (UFO). ROSE is employed for modeling and analysing some cases, in particular providing clarification to the semantically overloaded notion of Security Mechanism. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  16.  60
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Reconceptualising teaching as transformative practice: Alasdair MacIntyre in the South African context.Dominic Griffiths & Maria Prozesky - 2020 - Journal of Education 2 (79):4-17.
    In its ideal conception, the post-apartheid education landscape is regarded as a site of transformation that promotes democratic ideals such as citizenship, freedom, and critical thought. The role of the educator is pivotal in realising this transformation in the learners she teaches, but this realisation extends beyond merely teaching the curriculum to the educator herself, as the site where these democratic ideals are embodied and enacted. The teacher is thus centrally placed as a moral agent whose behaviour, in the classroom (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. 'Information as a Condition of Justice in Financial Markets: The Regulation of Credit-Rating Agencies.Boudewijn De Bruin - 2017 - In Lisa Herzog (ed.), Just Financial Markets?: Finance in a Just Society. Oxford University Press. pp. 250-270.
    This chapter argues for deregulation of the credit-rating market. Credit-rating agencies are supposed to contribute to the informational needs of investors trading bonds. They provide ratings of debt issued by corporations and governments, as well as of structured debt instruments (e.g. mortgage-backed securities). As many academics, regulators, and commentators have pointed out, the ratings of structured instruments turned out to be highly inaccurate, and, as a result, they have argued for tighter regulation of the industry. This chapter shows, however, that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. (1 other version)Teaching & Learning Guide for: The Epistemic Aims of Democracy.Robert Weston Siscoe - 2023 - Philosophy Compass 18 (11):e12954.
    In order to serve their citizens well, democracies must secure a number of epistemic goods. Take the truth, for example. If a democratic government wants to help its impoverished citizens improve their financial position, then elected officials will need to know what policies truly help those living in poverty. Because truth has such an important role in political decision-making, many defenders of democracy have highlighted the ways in which democratic procedures can lead to the truth. But there are also a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. INFORMATION-THEORETIC LOGIC.John Corcoran - 1998 - In C. Martínez U. Rivas & L. Villegas-Forero (eds.), Truth in Perspective edited by C. Martínez, U. Rivas, L. Villegas-Forero, Ashgate Publishing Limited, Aldershot, England (1998) 113-135. ASHGATE. pp. 113-135.
    Information-theoretic approaches to formal logic analyse the "common intuitive" concept of propositional implication (or argumental validity) in terms of information content of propositions and sets of propositions: one given proposition implies a second if the former contains all of the information contained by the latter; an argument is valid if the conclusion contains no information beyond that of the premise-set. This paper locates information-theoretic approaches historically, philosophically and pragmatically. Advantages and disadvantages are identified by examining (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  23. Information Asymmetries and the Paradox of Sustainable Business Models: Toward an integrated theory of sustainable entrepreneurship.V. Blok - unknown
    In this conceptual paper, the traditional conceptualization of sustainable entrepreneurship is challenged because of a fundamental tension between processes involved in sustainable development and processes involved in entrepreneurship: the concept of sustainable business models contains a paradox, because sustainability involves the reduction of information asymmetries, whereas entrepreneurship involves enhanced and secured levels of information asymmetries. We therefore propose a new and integrated theory of sustainable entrepreneurship that overcomes this paradox. The basic argument is that environmental problems have to (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  24. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed various challenges (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Informal Logic: A 'Canadian' Approach to Argument.Federico Puppo (ed.) - 2019 - Windsor, Canada: Windsor Studies in Argumentation.
    The informal logic movement began as an attempt to develop – and teach – an alternative logic which can account for the real life arguing that surrounds us in our daily lives – in newspapers and the popular media, political and social commentary, advertising, and interpersonal exchange. The movement was rooted in research and discussion in Canada and especially at the University of Windsor, and has become a branch of argumentation theory which intersects with related traditions and approaches (notably formal (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27.  37
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Probability and Informed Consent.Nir Ben-Moshe, Benjamin A. Levinstein & Jonathan Livengood - 2023 - Theoretical Medicine and Bioethics 44 (6):545-566.
    In this paper, we illustrate some serious difficulties involved in conveying information about uncertain risks and securing informed consent for risky interventions in a clinical setting. We argue that in order to secure informed consent for a medical intervention, physicians often need to do more than report a bare, numerical probability value. When probabilities are given, securing informed consent generally requires communicating how probability expressions are to be interpreted and communicating something about the quality and quantity of the evidence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Teaching & Researching Big History: Exploring a New Scholarly Field.Leonid Grinin, David Baker, Esther Quaedackers & Andrey V. Korotayev - 2014 - Volgograd: "Uchitel" Publishing House.
    According to the working definition of the International Big History Association, ‘Big History seeks to understand the integrated history of the Cosmos, Earth, Life and Humanity, using the best available empirical evidence and scholarly methods’. In recent years Big History has been developing very fast indeed. Big History courses are taught in the schools and universities of several dozen countries. Hundreds of researchers are involved in studying and teaching Big History. The unique approach of Big History, the interdisciplinary genre of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Online Communication Tools in Teaching Foreign Languages for Education Sustainability.Anna Shutaleva - 2021 - Sustainability 13:11127.
    Higher education curricula are developed based on creating conditions for implementing many professional and universal competencies. In Russia, one of the significant competencies for a modern specialist is business communication in oral and written forms in the Russian language and a foreign language. Therefore, teaching students to write in a foreign language is one of the modern requirements for young specialists’ professional training. This article aimed to study the tools of online communication that are used in teaching foreign languages. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. An Unlikely Source of (Absurd and Effective) Case Studies for Introductory Informal Logic.Kamil Lemanek - 2020 - Informal Logic 40 (3):475-487.
    This short work presents a popular fringe theory as a source of case studies for use in teaching informal logic in an introductory course. It puts forward ancient astronaut theory as the candidate source, together with a characterization of why it fits the bill. The televised material associated with that theory is well suited to being used as case studies given that they are easy to follow, contain a surprising number of arguments and fallacies, and keep students reliably engaged. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Perceived Influence of Entrepreneurship Education Methods on Economic Security in Cross River State.Stephen Bepeh Undie, Ezekiel Usip Mfon, Lydia Ochuole Ogbudu, Ubong Edet Uko & Joseph Ogbaji Ebiale - 2023 - Prestige Journal of Education 6 (1):158-171.
    This study investigated the perception of how methods of entrepreneurial education predict the level of economic security in the Southern Senatorial District of Cross River State. It was guided by two research questions and two hypotheses, tested at a significant level of 0.05. The research design was a survey. The study had 350 participants. A 40-item "Entrepreneurship Education and Economic Security Questionnaire" (EEESQ) was validated by five experts from the University of Calabar and used in data collection. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Debunking Arguments: Mathematics, Logic, and Modal Security.Justin Clarke-Doane - 2017 - In Michael Ruse & Robert J. Richards (eds.), The Cambridge Handbook of Evolutionary Ethics. New York: Cambridge University Press.
    I discuss the structure of genealogical debunking arguments. I argue that they undermine our mathematical beliefs if they undermine our moral beliefs. The contrary appearance stems from a confusion of arithmetic truths with (first-order) logical truths, or from a confusion of reliability with justification. I conclude with a discussion of the cogency of debunking arguments, in light of the above. Their cogency depends on whether information can undermine all of our beliefs of a kind, F, without giving us direct (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Argumentative Skills: A Systematic Framework for Teaching and Learning.David Löwenstein, Anne Burkard, Annett Wienmeister, Henning Franzen & Donata Romizi - 2021 - Journal of Didactics of Philosophy 5 (2):72-100.
    In this paper, we propose a framework for fostering argumentative skills in a systematic way in Philosophy and Ethics classes. We start with a review of curricula and teaching materials from the German-speaking world to show that there is an urgent need for standards for the teaching and learning of argumentation. Against this backdrop, we present a framework for such standards that is intended to tackle these difficulties. The spiral-curricular model of argumentative competences we sketch helps teachers introduce the relevant (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Models, information and meaning.Marc Artiga - 2020 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 82:101284.
    There has recently been an explosion of formal models of signalling, which have been developed to learn about different aspects of meaning. This paper discusses whether that success can also be used to provide an original naturalistic theory of meaning in terms of information or some related notion. In particular, it argues that, although these models can teach us a lot about different aspects of content, at the moment they fail to support the idea that meaning just is some (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  40. How to Teach Engineering Ethics?: A Retrospective and Prospective Sketch of TU Delft’s Approach to Engineering Ethics Education.J. B. van Grunsven, L. Marin, T. W. Stone, S. Roeser & N. Doorn - 2021 - Advances in Engineering Education 9 (4).
    This paper provides a retrospective and prospective overview of TU Delft’s approach to engineering ethics education. For over twenty years, the Ethics and Philosophy of Technology Section at TU Delft has been at the forefront of engineering ethics education, offering education to a wide range of engineering and design students. The approach developed at TU Delft is deeply informed by the research of the Section, which is centered around Responsible Research and Innovation, Design for Values, and Risk Ethics. These theoretical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  79
    Web-Based Complaints Service Information System at Dewantara District Office.Aslam Amrina, Khoirul Islam, I. Ketut Sutapa, Kurniawansyah Kurniawansyah, Dahlan Abdullah & Zalfie Ardian - 2024 - International Journal of Engineering, Science and Informationtechnology 4 (1):33-38.
    The Complaint Service Information System is a web-based platform designed for the Dewantara District Office. The title Complaint Service Information System is based on the need for technological solutions to improve the quality of public services, especially in han-dling public complaints. This system was chosen because it facilitates more efficient complaint reporting, increases transparency, and speeds up responses to issues raised by the public. By applying information technology in handling complaints, it is hoped that we can create (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Teaching medical ethics and law within medical education: a model for the UK core curriculum.Richard Ashcroft & Donna Dickenson - 1998 - Journal of Medical Ethics 24:188-192.
    Consensus statement by UK teachers of medical ethics and law.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Ethics for Records and Information Management.Norman A. Mooradian - 2018 - Chicago, IL, USA: American Library Association.
    The scope and reach of information, driven by the explosive growth of information technologies and content types, has expanded dramatically over the past 30 years. The consequences of these changes to records and information management (RIM) professionals are profound, necessitating not only specialized knowledge but added responsibilities. RIM professionals require a professional ethics to guide them in their daily practice and to form a basis for developing and implementing organizational policies, and Mooradian’s new book provides a rigorous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. (1 other version)UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    From year to year some of us, people of planet Earth, Earthlings, attacks intensify on the veto right in the UN Security Council. They consciously or unconsciously ignore its metaphisical, ontological and existential statuses established in 1945 by the founders of the United Nations as a result of the multimillion sacrificial struggle of all Humanity against nazism. Perhaps this is due to a misunderstanding of the metaphysics of international relations, the enduring existential significance of the veto for the viability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Benefits of Comedy: Teaching Ethics Through Shared Laughter.Christine James - 2005 - Academic Exchange Extra (April).
    Over the last three years I have been fortunate to teach an unusual class, one that provides an academic background in ethical and social and political theory using the medium of comedy. I have taught the class at two schools, a private liberal arts college in western Pennsylvania and a public regional state university in southern Georgia. While the schools vary widely in a number of ways, there are characteristics that the students share: the school in Pennsylvania had a large (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Risk, Rationality and (Information) Resistance: De-rationalizing Elite-group Ignorance.Xin Hui Yong - 2023 - Erkenntnis:1-17.
    There has been a movement aiming to teach agents about their privilege by making the information about their privilege as costless as possible. However, some argue that in risk-sensitive frameworks, such as Lara Buchak’s (2013), it can be rational for privileged agents to shield themselves from learning about their privilege, even if the information is costless and relevant. This threatens the efficacy of these information-access efforts in alleviating the problem of elite-group ignorance. In response, I show that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Using Argument Diagramming to Teach Critical Thinking in a First-Year Writing Course.Maralee Harrell & Danielle Wetzel - 2015 - In Ron Barnett & Bob Ennis Martin Davies (ed.), Palgrave Handbook of Critical Thinking in Higher Education. pp. 213-232.
    The importance of teaching critical thinking skills at the college level cannot be overemphasized. Teaching a subcategory of these skills—argument analysis—we believe is especially important for first-year students with their college careers, as well as their lives, ahead of them. The struggle, however, is how to effectively teach argument analysis skills that will serve students in a broad range of disciplines.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 967