Results for 'cyber vulnerability'

762 found
Order:
  1. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin (ed.), The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm: SIPRI. pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  89
    Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  99
    Vulnerability, Recognition, and the Ethics of Pregnancy: A Theological Response.Margaret Kamitsuka - 2024 - Hypatia.
    Vulnerability is a notion discussed in feminist philosophy as a basis for a morality that widens our sense of those whose deaths are grievable. Vulnerability and grievability also factor in reproductive ethics. This essay employs recognition theory to analyze critically how these notions are mobilized in conservative Christian anti-abortion writings and in feminist philosophy. This analysis exposes weaknesses and misrecognition in both sets of discourses. In response, I offer theological arguments for recognizing fetal value without implying a right (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Epistemic vulnerability and tolerance in society.Maddox Larson - 2024 - The Philosophy, Politics, and Economics Review 3:15-28.
    The question of church-state separation has haunted America since her founding. James Madison and select founding fathers suggest that religions and states are better off when they minimize (or altogether eliminate) their interactions. Many Muslims in Iran, for instance, believe the opposite – aligning state functions with religious motives results in the most effective state. In this paper, I propose a model of thinking about church-state separation in which states and religions must maintain epistemic vulnerability to allow legal, political, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Vulnerable due to hope: aspiration paradox as a cross-cultural concern.Eric Palmer - 2014 - Conference Publication, International Development Ethics Association 10th Conference: Development Ethics Contributions for a Socially Sustainable Future.
    (Conference proceedings 2014) This presentation (International Development Ethics Association, July 2014) considers economic vulnerability, exploring the risk of deprivation of necessary resources due to a complex and rarely discussed vulnerability that arises from hope. Pierre Bourdieu’s sociological account of French petit-bourgeois aspiration in The Social Structures of the Economy has recently inspired Wendy Olsen to introduce the term “aspiration paradox” to characterize cases wherein “a borrower's status aspirations may contribute to a situation in which their borrowings exceed their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Safeguarding Vulnerable Autonomy? Situational Vulnerability, The Inherent Jurisdiction and Insights from Feminist Philosophy.Jonathan Lewis - 2021 - Medical Law Review 29 (2):306-336.
    The High Court continues to exercise its inherent jurisdiction to make declarations about interventions into the lives of situationally vulnerable adults with mental capacity. In light of protective responses of health care providers and the courts to decision-making situations involving capacitous vulnerable adults, this paper has two aims. The first is diagnostic. The second is normative. The first aim is to identify the harms to a capacitous vulnerable adult’s autonomy that arise on the basis of the characterisation of situational (...) and autonomy as fundamentally opposed concepts or the failure to adequately acknowledge the conceptual relationship between them at common law. The second part of this aim is to draw upon developments in analytic feminist philosophy to illustrate how standard approaches to autonomy are ill-equipped to capture the autonomy issues of capacitous vulnerable adults when their decisions regarding care and treatment are at stake. The second (normative) aim is to develop an account of self-authorised, intersubjective autonomy on the basis of analytic feminist insights into the relational practices of recognition. This account not only attempts to capture the autonomy of capacitous vulnerable adults and account for the necessary harms to their autonomy that arise from standard common law responses to their situational vulnerability, it is also predicated on the distinctions between mental capacity, the satisfaction of conditions for informed consent and the exercise of autonomy, meaning that it is better placed to fulfil the primary aim of the inherent jurisdiction – to facilitate the autonomy of vulnerable adults with capacity. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Vulnerability in Social Epistemic Networks.Emily Sullivan, Max Sondag, Ignaz Rutter, Wouter Meulemans, Scott Cunningham, Bettina Speckmann & Mark Alfano - 2020 - International Journal of Philosophical Studies 28 (5):1-23.
    Social epistemologists should be well-equipped to explain and evaluate the growing vulnerabilities associated with filter bubbles, echo chambers, and group polarization in social media. However, almost all social epistemology has been built for social contexts that involve merely a speaker-hearer dyad. Filter bubbles, echo chambers, and group polarization all presuppose much larger and more complex network structures. In this paper, we lay the groundwork for a properly social epistemology that gives the role and structure of networks their due. In particular, (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  18. Vulnerability, Insecurity and the Pathologies of Trust and Distrust.Catriona Mackenzie - 2020 - International Journal of Philosophical Studies:624-643.
    While some trust theorists have adverted to the vulnerabilities involved in trust, especially vulnerability to betrayal, the literature on trust has not engaged with recent work on the ethics of vulnerability. This paper initiates a dialogue between these literatures, and in doing so begins to explore the complex interrelations between vulnerability and trust. More specifically, it aims to show how trust can both mitigate and compound vulnerability. Through a discussion of two examples drawn from literary sources, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  20. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  21. Recognition, Vulnerability and Trust.Danielle Petherbridge - 2021 - International Journal of Philosophical Studies 29 (1):1-23.
    ABSTRACT This paper examines the question of whether recognition relations are based on trust. Theorists of recognition have acknowledged the ways in which recognition relations make us vulnerable to others but have largely neglected the underlying ‘webs of trust’ in which such relations are embedded. In this paper, I consider the ways in which the theories of recognition developed by Jürgen Habermas and Axel Honneth, not only point to our mutual vulnerability but also implicitly rely upon mutual relations of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  22. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The role of vulnerability in Kantian ethics.Paul Formosa - 2013 - In Catriona Mackenzie, Wendy Rogers & Susan Dodds (eds.), Vulnerability: New Essays in Ethics and Feminist Philosophy. New York: Oup Usa. pp. 88-109.
    Does the fact that humans are vulnerable, needy and dependent beings play an important role in Kantian ethics? It is sometimes claimed that it cannot and does not. I argue that it can and does. I distinguish between broad (all persons are vulnerable) and narrow (only some persons are vulnerable) senses of vulnerability, and explain the role of vulnerability in both senses in Kantian ethics. The basis of this argument is to show that the core normative focus of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  24. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  25. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Human vulnerability: A break to autonomy?Carlos Alberto Rosas Jimenez - 2015 - Revista de Bioética Latinoamericana 1 (16):1-16.
    In society, human vulnerability is associated with multiple causes such as poverty, injustice, discrimination and illnesses, among others. In the midst of this panorama of external agents that lead human beings to situations of vulnerability, some clearly see – although others not so much – a vulnerability proper to the human person, simply because they exist. This approach to vulnerability is considered to be a conditio humana that affects everyone. Precisely because it is a conditio humana, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Expressive Vulnerabilities: Language and the Non-Human.Joe Larios - 2020 - International Journal of Philosophical Studies 28 (5):662-676.
    Emmanuel Levinas’s work seemingly places a great emphasis on language leading some commentators towards a Kantian reading of him where moral consideration would be based on the moral patient’s capacity for reason with language functioning as a proxy for this. Although this reading is possible, a closer look at Levinas’s descriptions of language reveal that its defining characteristic is not reason but the capacity to express beyond any thematized contents we would give to the Other. This expressivity (which Levinas calls (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. In defence of posthuman vulnerability.Belen Liedo Fernandez & Jon Rueda - 2021 - Scientia et Fides 9 (1):215-239.
    Transhumanism is a challenging movement that invites us to rethink what defines humanity, including what we value and regret the most about our existence. Vulnerability is a key concept that require thorough philosophical scrutiny concerning transhumanist proposals. Vulnerability can refer to a universal condition of human life or, rather, to the specific exposure to certain harms due to particular situations. Even if we are all vulnerable in the first sense, there are also different sources and levels of (...) depending on concrete social circumstances. Recently, Michael Hauskeller argued about a fundamental incompatibility between transhumanism and vulnerability. He understands vulnerability as an existential category, linked to woundability and mortality. This idea is akin to ontological vulnerability, but it does not notice some important features of social vulnerability. On the other side, transhumanism is a complex and non-homogeneous movement. Here we distinguish between a strong and a weak version of transhumanism. We will propose that the salience of vulnerability is only diminished in the radical one, while a moderate version can reconcile vulnerability with human enhancement. Thus, vulnerability, a concept that has recently gained much importance as an anthropological category in contemporary ethics, is not necessarily at odds with any transhumanist project. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Children's Vulnerability and Legitimate Authority Over Children.Anca Gheaus - 2018 - Journal of Applied Philosophy:60-75.
    Children's vulnerability gives rise to duties of justice towards children and determines when authority over them is legitimately exercised. I argue for two claims. First, children's general vulnerability to objectionable dependency on their caregivers entails that they have a right not to be subject to monopolies of care, and therefore determines the structure of legitimate authority over them. Second, children's vulnerability to the loss of some special goods of childhood determines the content of legitimate authority over them. (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  31. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  32. Feminist archives: narrating embodied vulnerabilities and practices of care.Valentina Moro - 2022 - Biblioteca Della Libertà 57 (235):39-71.
    The outbreak of SARS-CoV-2 has exposed a shared condition of vulnerability on a global scale. How can we use vulnerability as an effective paradigm in order to foster collective political initiatives? This essay claims that the idea of care is key to understand the vulnerability framework as being both an epistemic and a political resource to address ethical issues. The first half of the essay recollects several arguments in Adriana Cavarero’s and Judith Butler’s most recent works, insofar (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place them at a disadvantage (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The Vulnerable Self: Enabling the Recognition of Racial Inequality.Desirée H. Melton - 2009 - In Lisa Tessman (ed.), Feminist Ethics and Social and Political Philosophy: Theorizing the Non-Ideal. Springer. pp. 149--164.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  23
    Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Reluctant Mercenary: Vulnerability and the 'Whores of War'.Ben Fraser - 2013 - Journal of Military Ethics 12 (3):235-251.
    Mercenaries are the target of moral condemnation far more often than they are subject of moral concern. One attempt at morally condemning mercenaries proceeds by analogy with prostitutes; mercenaries are ?the whores of war?. This analogy is unconvincing as a way of condemning mercenaries. However, careful comparison of mercenarism and prostitution suggests that, like many prostitutes, some mercenaries may be vulnerable individuals. If apt, this comparison imposes a consistency requirement: if one thinks certain prostitutes are appropriate subjects of moral concern (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. The Politics of Vulnerability and Care: An Interview with Estelle Ferrarese.Liesbeth Schoonheim, Tivadar Vervoort & Estelle Ferrarese - 2022 - Krisis 42 (1):77-92.
    In this interview, Estelle Ferrarese elaborates on her account of vulnerability and care to highlight its political and social, as opposed to its ethical, dimensions. Drawing on, amongst others, Adorno, Tronto, Castell, and Laugier, she argues that vulnerability and care should not be understood ontologically, as an antropological exposure of the body, but rather socially, as the normative expectations and material conditions under which care work takes place. Situating her approach in anglophone and francophone discussions on vulnerability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. ACCEPTING VULNERABILITY: TOWARDS A MINDFUL SPORT PHILOSOPHY.Finn Janning - 2022 - Journal of Applied Sport Science 2:119-126.
    In this paper, I would argue for a mindful sports philosophy that stresses that wisdom does not emerge from abstract thinking; instead, it requires that we become attentive to what is concrete: our everyday life and how we spend it. Do we spend our life wisely or not? Answering this question requires that we know ourselves sufficiently — that is to say, have we explored and examined our own life by paying attention to it while we are living it? Am (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Vulnerability, Health Care, and Need.Vida Panitch & L. Chad Horne - 2016 - In Straehle Christine (ed.), Vulnerability, Autonomy, and Applied Ethics. New York: Routledge. pp. 101-120.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Spreading the Plague: Vulnerability, Solidarity and Autonomy in the Time of Pandemic.Noemi Magnani - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):69 - 81.
    In a series of reflections published in the wake of the Covid-19 crisis, Giorgio Agamben expresses a number of concerns related to the way the pandemic has altered the very fabric of our societies, potentially changing it forever. While maintaining a certain scepticism towards the threat represented by the virus itself, Agamben claims that the response to the contagion shows how easy it is for authorities to limit individual freedoms in the name of public health, and how readily they are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Nature's Relations: Ontology, Vulnerability, Agency.Didier Zúñiga - 2020 - Hypatia 35 (2):298-316.
    Political theory and philosophy need to widen their view of the space in which what matters politically takes place, and I suggest that integrating the conditions of sustainability of all affected—that is, all participants in nature's relations—is a necessary first step in this direction. New materialists and posthumanists have challenged how nature and politics have traditionally been construed. While acknowledging the significance of their contributions, I critically examine the ethical and political implications of their ontological project. I focus particularly on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. The 'Great Equalizer'? Autonomy, Vulnerability and Solidarity in Uncertain Times.Noemi Magnani - 2020 - Biblioteca Della Libertà 2 (228):1 - 22.
    In this paper I engage with the notion that Covid-19 can be seen as the ‘great equalizer’, in virtue of the widespread sense of uncertainty it has caused and the fact that it has forced us to recognize our shared human fragility. Against the view that Covid-19 is the ‘great equalizer’, I argue that, on the contrary, the pandemic reflects existing vulnerabilities and, in many cases, exacerbates them. I do so by offering first a definition of both ontological and relational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Ethics of Marketing to Vulnerable Populations.David Palmer & Trevor Hedberg - 2013 - Journal of Business Ethics 116 (2):403-413.
    An orthodox view in marketing ethics is that it is morally impermissible to market goods to specially vulnerable populations in ways that take advantage of their vulnerabilities. In his signature article “Marketing and the Vulnerable,” Brenkert (Bus Ethics Q Ruffin Ser 1:7–20, 1998) provided the first substantive defense of this position, one which has become a well-established view in marketing ethics. In what follows, we throw new light on marketing to the vulnerable by critically evaluating key components of Brenkert’s general (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  46. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  62
    Envelope culture in the healthcare system: happy poison for the vulnerable.Quan-Hoang Vuong, Viet-Phuong La, Giang Hoang, Quang-Loc Nguyen, Thu-Trang Vuong & Minh-Hoang Nguyen - manuscript
    Bribing doctors for preferential treatment is rampant in the healthcare system of developing countries like Vietnam. Although bribery raises the out-of-pocket expenditures of patients, it is so common to be deemed an “envelope culture.” Given the little understanding of the underlying mechanism of the culture, this study employed the mindsponge theory for reasoning the mental processes of both patients and doctors for why they embrace the “envelope culture” and used the Bayesian Mindsponge Framework (BMF) analytics to validate our reasoning. Analyzing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Exploring the vulnerability of practice-like activities: an ethnographic perspective.Yemisi Bolade-Ogunfodun, Matthew Sinnicks, Kleio Akrivou & German Scalzo - 2022 - Frontiers in Sociology 7.
    Introduction: This paper explores the vulnerability of practice-like activities to institutional domination. Methods: This paper oers an ethnographic case study of a UK-based engineering company in the aftermath of its acquisition, focusing in particular on its R&D unit. Results: The Lab struggled to maintain its practice-based work in an institutional environment that emphasized the pursuit of external goods. Discussion: We use this case to develop two arguments. Firstly, we illustrate the concept of “practice-like” activities and explore their vulnerability (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Commanding, Giving, Vulnerable: What is the Normative Standing of the Other in Levinas.James H. P. Lewis & Robert Stern - 2019 - In Michael Fagenblat & Melis Erdur (eds.), Levinas and Analytic Philosophy: Second-Person Normativity and the Moral Life. New York: Routledge.
    At the heart of Levinas’s work is the apparently simple idea that through the encounter with another person, we are forced to give up our self-concern and take heed of the ethical relation between us. But, while simple on the surface, when one tries to characterize it in more detail, it can be hard to fit together the various ways in which Levinas talks about this relation and to identify precisely what he took its normative structure to be, as this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 762