Results for 'cyber space'

961 found
Order:
  1. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and harness (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Cartografía filosófico-política del ciberespacio: posturas extremas y moderadas.Lucas Emmanuel Misseri - 2015 - Cuadernos Del Sur. Filosofía (43-44):207-228.
    Information and communication technologies present new challenges for political theory and philosophy due to its large-scale and scope transformations. Their demands are reflected in institutional needs that cover a “cyber-political” space, i. e., a cluster of problems of the governance of the network of networks –Internet– that results in the formation of new institutions –e. g. ICANN. The question I try to answer here is: What characterizes cyberspace political discourses? The proposed hypothesis is that it is possible to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Mad Speculation and Absolute Inhumanism: Lovecraft, Ligotti, and the Weirding of Philosophy.Ben Woodard - 2011 - Continent 1 (1):3-13.
    continent. 1.1 : 3-13. / 0/ – Introduction I want to propose, as a trajectory into the philosophically weird, an absurd theoretical claim and pursue it, or perhaps more accurately, construct it as I point to it, collecting the ground work behind me like the Perpetual Train from China Mieville's Iron Council which puts down track as it moves reclaiming it along the way. The strange trajectory is the following: Kant's critical philosophy and much of continental philosophy which has followed, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  4. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Development of a strategic complexity management framework for industrial systems - A multi-case study -.Freund Lucas - 2022 - Dissertation, Lincoln University
    Today decision-makers face surging increases in overall system complexity leading up to more unstable and unpredictable business environments. Leaders and decision-makers are confronted with volatility (dynamic and intense changes), uncertainty (lack of predictability), complexity (interconnection of parts which is sometimes overwhelmingly difficult to process), and ambiguity (unclear relationships), namely the VUCA-world. The implications of the VUCA-world for business and strategy can be applied to the rise of complex cyber-physical systems in Industry 4.0. There is an expressed need to develop (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Urban scale digital twins in data-driven society: Challenging digital universalism in urban planning decision-making.Marianna Charitonidou - 2022 - International Journal of Architectural Computing 19:1-16.
    The article examines the impact of the virtual public sphere on how urban spaces are experienced and conceived in our data-driven society. It places particular emphasis on urban scale digital twins, which are virtual replicas of cities that are used to simulate environments and develop scenarios in response to policy problems. The article also investigates the shift from the technical to the socio-technical perspective within the field of smart cities. Despite the aspirations of urban scale digital twins to enhance the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  41
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. (1 other version)AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  11.  26
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Space Emergence in Contemporary Physics: Why We Do Not Need Fundamentality, Layers of Reality and Emergence.Baptiste Le Bihan - 2018 - Disputatio 10 (49):71-95.
    Space does not exist fundamentally: it emerges from a more fundamental non-spatial structure.’ This intriguing claim appears in various research programs in contemporary physics. Philosophers of physics tend to believe that this claim entails either that spacetime does not exist, or that it is derivatively real. In this article, I introduce and defend a third metaphysical interpretation of the claim: reductionism about space. I argue that, as a result, there is no need to subscribe to fundamentality, layers of (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  13. Shepherd's Accounts of Space and Time.David Landy - forthcoming - Mind.
    There is an apparent tension in Shepherd’s accounts of space and time. Firstly, Shepherd explicitly claims that we know that the space and time of the unperceived world exist because they cause our phenomenal experience of them. Secondly, Shepherd emphasizes that empty space and time do not have the power to effect any change in the world. My proposal is that for Shepherd time has exactly one causal power: to provide for the continued existence of self-same or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  37
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Space travel does not constitute a condition of moral exceptionality. That which obtains in space obtains also on Earth!Maurizio Balistreri & Steven Umbrello - 2022 - Medicina E Morale 71 (3):311-321.
    There is a growing body of scholarship that is addressing the ethics, in particular, the bioethics of space travel and colonisation. Naturally, a variety of perspectives concerning the ethical issues and moral permissibility of different technological strategies for confronting the rigours of space travel and colonisation have emerged in the debate. Approaches ranging from genetically enhancing human astronauts to modifying the environments of planets to make them hospitable have been proposed as methods. This paper takes a look at (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  58
    Choreographing Space.Eva Perez de Vega - 2021 - London: Artifice Press.
    Choreographing Space is a reflection on the collaborative work of e+i studio, a New York City based architecture practice. Founders Eva Perez de Vega and Ian Gordon guide the reader through a dynamic selection of projects, each one opening us up to their relationship with the choreography of human and nonhuman forces at play. -/- Born as a retrospective and future-oriented book, it engages philosophical thought with architectural projects located in Europe, Asia, and the US, as well as speculative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Qualia, space, and control.Pete Mandik - 1999 - Philosophical Psychology 12 (1):47-60.
    According to representionalists, qualia-the introspectible properties of sensory experience-are exhausted by the representational contents of experience. Representationalists typically advocate an informational psychosemantics whereby a brain state represents one of its causal antecedents in evolutionarily determined optimal circumstances. I argue that such a psychosemantics may not apply to certain aspects of our experience, namely, our experience of space in vision, hearing, and touch. I offer that these cases can be handled by supplementing informational psychosemantics with a procedural psychosemantics whereby a (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  22. Absolute Space and the Riddle of Rotation: Kant’s Response to Newton.Marius Stan - 2016 - Oxford Studies in Early Modern Philosophy 7:257-308.
    Newton had a fivefold argument that true motion must be motion in absolute space, not relative to matter. Like Newton, Kant holds that bodies have true motions. Unlike him, though, Kant takes all motion to be relative to matter, not to space itself. Thus, he must respond to Newton’s argument above. I reconstruct here Kant’s answer in detail. I prove that Kant addresses just one part of Newton’s case, namely, his “argument from the effects” of rotation. And, to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  24. Space and perceptual boundaries.Błażej Skrzypulec - 2024 - Philosophical Studies 181 (6):1393-1411.
    In consideration of the spatial structures of sensory experiences, an ‘Externality Thesis’ is commonly proposed, according to which awareness of sensory boundaries is also an awareness of the presence of a space beyond these boundaries. The paper evaluates the Externality Thesis in the context of vision and touch. More specifically, relying on mereotopological theories, it is shown that the notion of spatial boundaries is ambiguous as it encompasses various distinct ways in which entities may be connected by a boundary. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Conceptual Space Modeling for Space Event Characterization.Jeremy R. Chapman, David Kasmier, David Limbaugh, Stephen R. Gagnon, John L. Crassidis, James Llinas, Barry Smith & Alexander P. Cox - 2020 - IEEE 23rd International Conference on Information Fusion (FUSION).
    This paper provides a method for characterizing space events using the framework of conceptual spaces. We focus specifically on estimating and ranking the likelihood of collisions between space objects. The objective is to design an approach for anticipatory decision support for space operators who can take preventive actions on the basis of assessments of relative risk. To make this possible our approach draws on the fusion of both hard and soft data within a single decision support framework. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  26. Properties of QBist State Spaces.D. M. Appleby, Åsa Ericsson & Christopher A. Fuchs - 2011 - Foundations of Physics 41 (3):564-579.
    Every quantum state can be represented as a probability distribution over the outcomes of an informationally complete measurement. But not all probability distributions correspond to quantum states. Quantum state space may thus be thought of as a restricted subset of all potentially available probabilities. A recent publication (Fuchs and Schack, arXiv:0906.2187v1, 2009) advocates such a representation using symmetric informationally complete (SIC) measurements. Building upon this work we study how this subset—quantum-state space—might be characterized. Our leading characteristic is that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. Space Debris: Litter or Pollution?Michael Lindquist - 2024 - Diálogos. Revista de Filosofía de la Universidad de Puerto Rico 55 (114):195-226.
    In this paper, I undertake a conceptual analysis of ordinary usages of the concepts of “litter” and “pollution.” If “litter” or “pollution” applies to space debris in its various contexts, then in dealing with space debris as an ethical concern, we may more neatly apply arguments for the wrongness of litter and pollution to these new contexts. After engaging in a conceptual analysis of “litter” and “pollution,” I consider whether these concepts apply to space debris, examining three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Conceptual Spaces for Cognitive Architectures: A Lingua Franca for Different Levels of Representation.Antonio Lieto, Antonio Chella & Marcello Frixione - 2017 - Biologically Inspired Cognitive Architectures 19:1-9.
    During the last decades, many cognitive architectures (CAs) have been realized adopting different assumptions about the organization and the representation of their knowledge level. Some of them (e.g. SOAR [35]) adopt a classical symbolic approach, some (e.g. LEABRA[ 48]) are based on a purely connectionist model, while others (e.g. CLARION [59]) adopt a hybrid approach combining connectionist and symbolic representational levels. Additionally, some attempts (e.g. biSOAR) trying to extend the representational capacities of CAs by integrating diagrammatical representations and reasoning are (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  29. Quality-Space Functionalism about Color.Jacob Berger - 2021 - Journal of Philosophy 118 (3):138-164.
    I motivate and defend a previously underdeveloped functionalist account of the metaphysics of color, a view that I call ‘quality-space functionalism’ about color. Although other theorists have proposed varieties of color functionalism, this view differs from such accounts insofar as it identifies and individuates colors by their relative locations within a particular kind of so-called ‘quality space’ that reflects creatures’ capacities to discriminate visually among stimuli. My arguments for this view of color are abductive: I propose that quality- (...) functionalism best captures our commonsense conception of color, fits with many experimental findings, coheres with the phenomenology of color experience, and avoids many issues for standard theories of color such as color physicalism and color relationalism. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. Space, time and parsimony.Daniel Nolan - 2022 - Noûs 57 (4):763-783.
    This paper argues that all of the standard theories about the divisions of space and time can benefit from, and may need to rely on, parsimony considerations. More specifically, whether spacetime is discrete, gunky or pointy, there are wildly unparsimonious rivals to standard accounts that need to be resisted by proponents of those accounts, and only parsimony considerations offer a natural way of doing that resisting. Furthermore, quantitative parsimony considerations appear to be needed in many of these cases.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  73
    Conceptual Spaces: A Solution to Goodman’s New Riddle of Induction?Sebastian Scholz - forthcoming - Philosophia.
    Nelson Goodman observed that we use only certain ‘good’ (viz. projectible) predicates during reasoning, with no obvious demarcation criterion in sight to distinguish them from the bad and gruesome ones. This apparent arbitrariness undermines the justifiability of our reasoning practices. Inspired by Quine’s 1969 paper on Natural Kinds, Peter Gärdenfors proposes a cognitive criterion based on his theory of Conceptual Spaces (CS). He argues the good predicates are those referring to natural concepts, and that we can capture naturalness in terms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Conceptual Spaces, Generalisation Probabilities and Perceptual Categorisation.Nina Poth - 2019 - In Peter Gärdenfors, Antti Hautamäki, Frank Zenker & Mauri Kaipainen (eds.), Conceptual Spaces: Elaborations and Applications. Cham, Switzerland: Springer Verlag. pp. 7-28.
    Shepard’s (1987) universal law of generalisation (ULG) illustrates that an invariant gradient of generalisation across species and across stimuli conditions can be obtained by mapping the probability of a generalisation response onto the representations of similarity between individual stimuli. Tenenbaum and Griffiths (2001) Bayesian account of generalisation expands ULG towards generalisation from multiple examples. Though the Bayesian model starts from Shepard’s account it refrains from any commitment to the notion of psychological similarity to explain categorisation. This chapter presents the conceptual (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Space Colonization and Existential Risk.Joseph Gottlieb - 2019 - Journal of the American Philosophical Association 5 (3):306-320.
    Ian Stoner has recently argued that we ought not to colonize Mars because doing so would flout our pro tanto obligation not to violate the principle of scientific conservation, and there is no countervailing considerations that render our violation of the principle permissible. While I remain agnostic on, my primary goal in this article is to challenge : there are countervailing considerations that render our violation of the principle permissible. As such, Stoner has failed to establish that we ought not (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  34. The Space Object Ontology.Alexander P. Cox, Christopher Nebelecky, Ronald Rudnicki, William Tagliaferri, John L. Crassidis & Barry Smith - 2016 - In Alexander P. Cox, Christopher Nebelecky, Ronald Rudnicki, William Tagliaferri, John L. Crassidis & Barry Smith (eds.), 19th International Conference on Information Fusion (FUSION 2016). IEEE.
    Achieving space domain awareness requires the identification, characterization, and tracking of space objects. Storing and leveraging associated space object data for purposes such as hostile threat assessment, object identification, and collision prediction and avoidance present further challenges. Space objects are characterized according to a variety of parameters including their identifiers, design specifications, components, subsystems, capabilities, vulnerabilities, origins, missions, orbital elements, patterns of life, processes, operational statuses, and associated persons, organizations, or nations. The Space Object Ontology (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  35. Logical information and epistemic space.Mark Jago - 2009 - Synthese 167 (2):327 - 341.
    Gaining information can be modelled as a narrowing of epistemic space . Intuitively, becoming informed that such-and-such is the case rules out certain scenarios or would-be possibilities. Chalmers’s account of epistemic space treats it as a space of a priori possibility and so has trouble in dealing with the information which we intuitively feel can be gained from logical inference. I propose a more inclusive notion of epistemic space, based on Priest’s notion of open worlds yet (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  36. Possibility spaces and the notion of novelty: from music to biology.Maël Montévil - 2019 - Synthese 196 (11):4555-4581.
    We provide a new perspective on the relation between the space of description of an object and the appearance of novelties. One of the aims of this perspective is to facilitate the interaction between mathematics and historical sciences. The definition of novelties is paradoxical: if one can define in advance the possibles, then they are not genuinely new. By analyzing the situation in set theory, we show that defining generic (i.e., shared) and specific (i.e., individual) properties of elements of (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  37. The Production of Space.Henri Lefebvre - 1991 - Cambridge, Mass., USA: Wiley-Blackwell.
    Henri Lefebvre has considerable claims to be the greatest living philosopher. His work spans some sixty years and includes original work on a diverse range of subjects, from dialectical materialism to architecture, urbanism and the experience of everyday life. The Production of Space is his major philosophical work and its translation has been long awaited by scholars in many different fields. The book is a search for a reconciliation between mental space and real space. In the course (...)
    Download  
     
    Export citation  
     
    Bookmark   237 citations  
  38. (1 other version)Space by Design: Aesthetic and Moral Issues in Planning Space Communities.Arnold Berleant & Sarah B. Fowler - 1988 - The Monist 71 (1):72-87.
    We live in an age in which outer space has changed from a theme for flights of science fiction to the actual locus of exploration and travel.1 Space no longer has merely speculative significance for thinking about possible worlds; it has become a real factor in understanding the nature and conditions of the human world that we are constantly refashioning. Our entry into outer space brings with it changes in conditions and experience that require us to rethink (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Fuzzy Space?Didehvar Farzad - manuscript
    In the sequence of articles [1],...,[14], we consider Fuzziness of Time. What about space? Should we consider Fuzzy Space? What would be the Structure of the Physical world? Here we try to shed a light on this subject.
    Download  
     
    Export citation  
     
    Bookmark  
  41. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Atmospheric perception in digital space.Serkan Can Hatıpoğlu & Leyla Yekdane Tokman - 2021 - Archdesign '21 / Viii. International Architectural Design Conference 1:54-65.
    Architectural space has some triggers for unique experiences and one of them is its atmosphere. The atmosphere has an unstable structure, instead of static affectivity, and it feeds on uncertainties of spatial experience. Thus, instead of analyzing the dynamic atmospheres through reductionist definitions, it is necessary to address the existing ontological ambiguity of it. Theories of the atmosphere mostly correspond to physical spaces. However, COVID-19 brings about exponential enhance of digitalization. These digital interactions require a spatial dimension. The atmosphere, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Identity, space-time, and cosmology.Jan Faye - 2008 - In Dennis Geert Bernardus Johan Dieks (ed.), The Ontology of Spacetime II. Elsevier. pp. 39-57.
    Modern cosmology treats space and time, or rather space-time, as concrete particulars. The General Theory of Relativity combines the distribution of matter and energy with the curvature of space-time. Here space-time appears as a concrete entity which affects matter and energy and is affected by the things in it. I question the idea that space-time is a concrete existing entity which both substantivalism and reductive relationism maintain. Instead I propose an alternative view, which may be (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  45. The Space Domain Ontologies.Alexander P. Cox, C. K. Nebelecky, R. Rudnicki, W. A. Tagliaferri, J. L. Crassidis & B. Smith - 2021 - In Alexander P. Cox, C. K. Nebelecky, R. Rudnicki, W. A. Tagliaferri, J. L. Crassidis & B. Smith (eds.), National Symposium on Sensor & Data Fusion Committee.
    Achieving space situational awareness requires, at a minimum, the identification, characterization, and tracking of space objects. Leveraging the resultant space object data for purposes such as hostile threat assessment, object identification, and conjunction assessment presents major challenges. This is in part because in characterizing space objects we reference a variety of identifiers, components, subsystems, capabilities, vulnerabilities, origins, missions, orbital elements, patterns of life, operational processes, operational statuses, and so forth, which tend to be defined in highly (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Space, Time, and (how they) Matter: a Discussion about some Metaphysical Insights Provided by our Best Fundamental Physical Theories.Valia Allori - 2016 - In G. C. Ghirardi & J. Statchel (eds.), Space, Time, and Frontiers of Human Understanding. Springer. pp. 95-107.
    This paper is a brief (and hopelessly incomplete) non-standard introduction to the philosophy of space and time. It is an introduction because I plan to give an overview of what I consider some of the main questions about space and time: Is space a substance over and above matter? How many dimensions does it have? Is space-time fundamental or emergent? Does time have a direction? Does time even exist? Nonetheless, this introduction is not standard because I (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  40
    Alternative concept on space used in the BSM – Supergravitational Unified Theory unveils the connection between the micro-cosmos and Universe.Stoyan Sarg Sargoytchev - unknown
    The theory is based on an original alternative space-time concept that leads to a new vision of the micro-cosmos and Universe. The relationship between the forces in Nature is unveiled by adopting the following framework: (1) Empty space without any physical properties and restrictions; (2) Two fundamental particles of superdense protomatter with parameters associated with Planck’s scale; (3) A Fundamental law of Supergravitation (SG) with forces inversely proportional to the cube of distance in a pure empty space. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Towards an Affective Quality Space.Laura Silva - 2023 - Journal of Consciousness Studies 30 (7):164-195.
    In this paper I lay the foundations for the construction of an affective quality space. I begin by outlining what quality spaces are, and how they have been constructed for sensory qualities across different perceptual modalities. I then turn to tackle four obstacles that an affective quality space might face that would make an affective quality space unfeasible. After showing these obstacles to be surmountable, I propose a number of conditions and methodological constraints that should be satisfied (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Against 3N-Dimensional Space.Bradley Monton - 2013 - In Alyssa Ney & David Albert (eds.), The Wave Function: Essays in the Metaphysics of Quantum Mechanics. , US: Oxford University Press.
    I argue that space has three dimensions, and quantum mechanics does not show otherwise. Specifically, I argue that the mathematical wave function of quantum mechanics corresponds to a property that an N-particle system has in three-dimensional space.
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  50.  40
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 961