Results for 'cyber world'

999 found
Order:
  1. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Loss of the world: A philosophical dialogue.Raymond Kolcaba - 2000 - Ethics and Information Technology 2 (1):3-9.
    Humanity has begun to move from the natural world intothe cyber world. Issues surrounding this mentalmigration are debated in philosophical dialogue. Thelead character is Becket Geist, a romantic philosopherwith views tempered by 20th century science. He openswith a monologue in which he argues that loss of theworld in exchange for the cyber world is dark andinevitable. His chief adversary is Fortran McCyborg,a cyborg with leanings toward Scottish philosophy. The moderating force is Nonette Naturski who championsnaturalism, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  4. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Making fair choices on the path to universal health coverage: Final report of the WHO consultative group on equity and universal health coverage.World Health Organization - 2014 - World Health Organization.
    Universal health coverage (UHC) is at the center of current efforts to strengthen health systems and improve the level and distribution of health and health services. This document is the final report of the WHO Consultative Group on Equity and Universal Health Coverage. The report addresses the key issues of fairness and equity that arise on the path to UHC. As such, the report is relevant for every actor that affects that path and governments in particular, as they are in (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  6. Post-COVID-19: Education and Thai Society in Digital Era.Pattamawadee Sankheangaew - 2021 - Conference Proceedings 2.
    The article entitled “Post-COVID-19: Education and Thai Society in Digital Era” has two objectives: 1) to study digital technology 2) to study the living life in Thailand in the digital era after COVID-19 pandemics. According to the study, it was found that the new digitized service is a service process on digital platforms such as ordering food, hailing a taxi, and online trading. It is a service called via smartphone. The information is used digitally. Public relations, digital marketing, and living (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Does Putnam's argument Beg the question against the skeptic? Bad news for radical skepticism.Olaf Müller - 2001 - Erkenntnis 54 (3):299-320.
    Are we perhaps in the "matrix", or anyway, victims of perfect and permanent computer simulation? No. The most convincing—and shortest—version of Putnam's argument against the possibility of our eternal envattment is due to Crispin Wright (1994). It avoids most of the misunderstandings that have been elicited by Putnam's original presentation of the argument in "Reason, Truth and History" (1981). But it is still open to the charge of question-begging. True enough, the premisses of the argument (disquotation and externalism) can be (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  8. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Chinese approach to artificial intelligence: an analysis of policy, ethics, and regulation.Huw Roberts, Josh Cowls, Jessica Morley, Mariarosaria Taddeo, Vincent Wang & Luciano Floridi - 2021 - AI and Society 36 (1):59–⁠77.
    In July 2017, China’s State Council released the country’s strategy for developing artificial intelligence, entitled ‘New Generation Artificial Intelligence Development Plan’. This strategy outlined China’s aims to become the world leader in AI by 2030, to monetise AI into a trillion-yuan industry, and to emerge as the driving force in defining ethical norms and standards for AI. Several reports have analysed specific aspects of China’s AI policies or have assessed the country’s technical capabilities. Instead, in this article, we focus (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  10. What is the philosophy of information?Luciano Floridi - 2002 - Metaphilosophy 33 (1-2):123–145.
    Computational and information-theoretic research in philosophy has become increasingly fertile and pervasive, giving rise to a wealth of interesting results. In consequence, a new and vitally important field has emerged, the philosophy of information (PI). This essay is the first attempt to analyse the nature of PI systematically. PI is defined as the philosophical field concerned with the critical investigation of the conceptual nature and basic principles of information, including its dynamics, utilisation, and sciences, and the elaboration and application of (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  11. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. 'Techno-Risk - The Perils of Learning and Sharing Everything' from a Criminal Information Sharing Perspective.John Sliter - manuscript
    The author has extensive law enforcement experience and the paper is intended to provoke thought on the use of technology as it pertains to information sharing between the police and the private sector. -/- As the world edges closer and closer to the convergence of man and machine, the human capacity to retrieve information is increasing by leaps and bounds. We are on the verge of knowing everything and anything there is to know, and literally in the blink of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Mad Speculation and Absolute Inhumanism: Lovecraft, Ligotti, and the Weirding of Philosophy.Ben Woodard - 2011 - Continent 1 (1):3-13.
    continent. 1.1 : 3-13. / 0/ – Introduction I want to propose, as a trajectory into the philosophically weird, an absurd theoretical claim and pursue it, or perhaps more accurately, construct it as I point to it, collecting the ground work behind me like the Perpetual Train from China Mieville's Iron Council which puts down track as it moves reclaiming it along the way. The strange trajectory is the following: Kant's critical philosophy and much of continental philosophy which has followed, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  14. Even good bots fight: the case of Wikipedia.Milena Tsvetkova, Ruth García-Gavilanes, Luciano Floridi & Taha Yasseri - 2017 - PLoS ONE 12 (2).
    In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  68
    The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  69
    Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Information Matters: Informational Conflict and the New Materialism.Tim Stevens - manuscript
    This paper focuses upon the challenge posed by the concept of ‘information’ to the new materialisms, viewed with reference to the multifaceted worldly phenomenon of informational conflict. ‘Informational conflict’ is a broad term designed to encompass the hi-tech ‘cyber’ operations of inter-state warfare as well as the informational actions of non-state actors, and is contingent not upon information technologies, as commonly understood, but upon ‘information’. Informational conflicts can be viewed as sociotechnical assemblages of humans and non-humans although information is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Development of a strategic complexity management framework for industrial systems - A multi-case study -.Freund Lucas - 2022 - Dissertation, Lincoln University
    Today decision-makers face surging increases in overall system complexity leading up to more unstable and unpredictable business environments. Leaders and decision-makers are confronted with volatility (dynamic and intense changes), uncertainty (lack of predictability), complexity (interconnection of parts which is sometimes overwhelmingly difficult to process), and ambiguity (unclear relationships), namely the VUCA-world. The implications of the VUCA-world for business and strategy can be applied to the rise of complex cyber-physical systems in Industry 4.0. There is an expressed need (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Impossible worlds and logical omniscience: an impossibility result.Jens Christian Bjerring - 2013 - Synthese 190 (13):2505-2524.
    In this paper, I investigate whether we can use a world-involving framework to model the epistemic states of non-ideal agents. The standard possible-world framework falters in this respect because of a commitment to logical omniscience. A familiar attempt to overcome this problem centers around the use of impossible worlds where the truths of logic can be false. As we shall see, if we admit impossible worlds where “anything goes” in modal space, it is easy to model extremely non-ideal (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  22. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  84
    Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  24. World and Logic.Jens Lemanski - 2021 - London, Vereinigtes Königreich: College Publications.
    What is the relationship between the world and logic, between intuition and language, between objects and their quantitative determinations? Rationalists, on the one hand, hold that the world is structured in a rational way. Representationalists, on the other hand, assume that language, logic, and mathematics are only the means to order and describe the intuitively given world. In World and Logic, Jens Lemanski takes up three surprising arguments from Arthur Schopenhauer’s hitherto undiscovered Berlin Lectures, which concern (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  25. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  28. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  31. World Trade Organization.Christian Barry & Scott Wisor - 2022 - In Hugh LaFollette (ed.), International Encyclopedia of Ethics. Wiley.
    The World Trade Organization (WTO) is a multilateral trade organization that, at least partially, governs trade relations between its member states. The WTO (2011a) proclaims that its “overriding objective is to help trade flow smoothly, freely, fairly and predictably.” The WTO is a “treaty-based” organization – it has been constituted through an agreed, legally binding treaty made up of more than 30 articles, along with additional commitments by some members in specific areas. At present, 153 states are members of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Worlds are Pluralities.Isaac Wilhelm - 2024 - Australasian Journal of Philosophy 102 (1):221-231.
    I propose an account of possible worlds. According to the account, possible worlds are pluralities of sentences in an extremely large language. This account avoids a problem, relating to the total number of possible worlds, that other accounts face. And it has several additional benefits.
    Download  
     
    Export citation  
     
    Bookmark  
  34. Sensitivity, safety, and impossible worlds.Guido Melchior - 2021 - Philosophical Studies 178 (3):713-729.
    Modal knowledge accounts that are based on standards possible-worlds semantics face well-known problems when it comes to knowledge of necessities. Beliefs in necessities are trivially sensitive and safe and, therefore, trivially constitute knowledge according to these accounts. In this paper, I will first argue that existing solutions to this necessity problem, which accept standard possible-worlds semantics, are unsatisfactory. In order to solve the necessity problem, I will utilize an unorthodox account of counterfactuals, as proposed by Nolan, on which we also (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  35. Impossible Worlds and the Logic of Imagination.Francesco Berto - 2017 - Erkenntnis 82 (6):1277-1297.
    I want to model a finite, fallible cognitive agent who imagines that p in the sense of mentally representing a scenario—a configuration of objects and properties—correctly described by p. I propose to capture imagination, so understood, via variably strict world quantifiers, in a modal framework including both possible and so-called impossible worlds. The latter secure lack of classical logical closure for the relevant mental states, while the variability of strictness captures how the agent imports information from actuality in the (...)
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  36. Impossible Worlds.Mark Jago - 2013 - Noûs 47 (3):713-728.
    Impossible worlds are representations of impossible things and impossible happenings. They earn their keep in a semantic or metaphysical theory if they do the right theoretical work for us. As it happens, a worlds-based account provides the best philosophical story about semantic content, knowledge and belief states, cognitive significance and cognitive information, and informative deductive reasoning. A worlds-based story may also provide the best semantics for counterfactuals. But to function well, all these accounts need use of impossible and as well (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  37. Impossible worlds and propositions: Against the parity thesis.Francesco Berto - 2010 - Philosophical Quarterly 60 (240):471-486.
    Accounts of propositions as sets of possible worlds have been criticized for conflating distinct impossible propositions. In response to this problem, some have proposed to introduce impossible worlds to represent distinct impossibilities, endorsing the thesis that impossible worlds must be of the same kind; this has been called the parity thesis. I show that this thesis faces problems, and propose a hybrid account which rejects it: possible worlds are taken as concrete Lewisian worlds, and impossibilities are represented as set-theoretic constructions (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  38.  82
    The World Crisis - And What To Do About It: A Revolution for Thought and Action.Nicholas Maxwell - 2021 - New Jersey: World Scientific.
    Two great problems of learning confront humanity: learning about the universe, and about ourselves and other living things as a part of the universe; and learning how to create a good, civilized, enlightened, wise world. We have solved the first great problem of learning – we did that when we created modern science and technology in the 17th century. But we have not yet solved the second one. That combination of solving the first problem, failing to solve the second (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Phenomenal worlds and nervous system activity.Fred Cummins - 2009 - In Proceedings of the 2009 Annual Meeting of the Cognitive Science Society.
    The epistemological situation of a single cell is considered. In chemotaxis, the relation between perception and action is found to be lawful and bidirectional. Consideration of the perception/action relation allows a characterization of the phe- nomenal world of the cell. This phenomenal world is grounded in perceptual distinctions that are relevant to the sustained vi- ability of the cell. Moving up the phylogenetic chain, this lawfulness, and its relation to the phenomenal world of ex- perience, is found (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Possible Worlds and the Objective World.Jeffrey Sanford Russell - 2013 - Philosophy and Phenomenological Research 90 (2):389-422.
    David Lewis holds that a single possible world can provide more than one way things could be. But what are possible worlds good for if they come apart from ways things could be? We can make sense of this if we go in for a metaphysical understanding of what the world is. The world does not include everything that is the case—only the genuine facts. Understood this way, Lewis's “cheap haecceitism” amounts to a kind of metaphysical anti-haecceitism: (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  41. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The Future of AI: Stanisław Lem’s Philosophical Visions for AI and Cyber-Societies in Cyberiad.Roman Krzanowski & Pawel Polak - 2021 - Pro-Fil 22 (3):39-53.
    Looking into the future is always a risky endeavour, but one way to anticipate the possible future shape of AI-driven societies is to examine the visionary works of some sci-fi writers. Not all sci-fi works have such visionary quality, of course, but some of Stanisław Lem’s works certainly do. We refer here to Lem’s works that explore the frontiers of science and technology and those that describe imaginary societies of robots. We therefore examine Lem’s prose, with a focus on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Is the quantum world composed of propensitons?Nicholas Maxwell - 2010 - In Mauricio Suárez (ed.), Probabilities, Causes and Propensities in Physics. New York: Springer. pp. 221-243.
    In this paper I outline my propensiton version of quantum theory (PQT). PQT is a fully micro-realistic version of quantum theory that provides us with a very natural possible solution to the fundamental wave/particle problem, and is free of the severe defects of orthodox quantum theory (OQT) as a result. PQT makes sense of the quantum world. PQT recovers all the empirical success of OQT and is, furthermore, empirically testable (although not as yet tested). I argue that Einstein almost (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  44. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. A World of Muscle, Bone & Organs: Research and Scholarship in Dance.Simon Ellis, Hetty Blades & Charlotte Waelde (eds.) - 2018 - Coventry, United Kingdom: Coventry University.
    A World of Muscle, Bone & Organs: Research and Scholarship in Dance is an e-book exploring contemporary ideas and themes in the research and practice of dance. It contains 23 chapters written by researchers at the Centre for Dance Research (C-DaRE), Coventry University, and is divided into six sections: Spaces of Practice, Philosophy, Communities, Politics, Data and Thinking, and Epistemology.
    Download  
     
    Export citation  
     
    Bookmark  
  46. ProAna Worlds: Affectivity and Echo Chambers Online.Lucy Osler & Joel Krueger - 2021 - Topoi 41 (5):883-893.
    Anorexia Nervosa (AN) is an eating disorder characterised by self-starvation. Accounts of AN typically frame the disorder in individualistic terms: e.g., genetic predisposition, perceptual disturbances of body size and shape, experiential bodily disturbances. Without disputing the role these factors may play in developing AN, we instead draw attention to the way disordered eating practices in AN are actively supported by others. Specifically, we consider how Pro-Anorexia (ProAna) websites—which provide support and solidarity, tips, motivational content, a sense of community, and understanding (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  47. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Impossible worlds and partial belief.Edward Elliott - 2019 - Synthese 196 (8):3433-3458.
    One response to the problem of logical omniscience in standard possible worlds models of belief is to extend the space of worlds so as to include impossible worlds. It is natural to think that essentially the same strategy can be applied to probabilistic models of partial belief, for which parallel problems also arise. In this paper, I note a difficulty with the inclusion of impossible worlds into probabilistic models. Under weak assumptions about the space of worlds, most of the propositions (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49. External World Skepticism, Confidence and Psychologism about the Problem of Priors.Sharon Berry - 2019 - Southern Journal of Philosophy 57 (3):324-346.
    In this paper I will draw attention to an important route to external world skepticism, which I will call confidence skepticism. I will argue that we can defang confidence skepticism (though not a meeker ‘argument from might’ which has got some attention in the 20th century literature on external world skepticism) by adopting a partially psychologistic answer to the problem of priors. And I will argue that certain recent work in the epistemology of mathematics and logic provides independent (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Lewisian Worlds and Buridanian Possibilia.Boaz Faraday Schuman - forthcoming - Dialectica.
    Many things can be other than they are. Many other things cannot. But what are statements like these about? One answer to this question is that we are speaking of possible worlds: if something can be other than it is, then it actually is that way in some possible world. If something cannot be otherwise, it is not otherwise in any world. This answer is presently dominant in analytical philosophy of language and logic. What are these worlds? David (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 999