Results for 'cyber-societies'

955 found
Order:
  1. The Future of AI: Stanisław Lem’s Philosophical Visions for AI and Cyber-Societies in Cyberiad.Roman Krzanowski & Pawel Polak - 2021 - Pro-Fil 22 (3):39-53.
    Looking into the future is always a risky endeavour, but one way to anticipate the possible future shape of AI-driven societies is to examine the visionary works of some sci-fi writers. Not all sci-fi works have such visionary quality, of course, but some of Stanisław Lem’s works certainly do. We refer here to Lem’s works that explore the frontiers of science and technology and those that describe imaginary societies of robots. We therefore examine Lem’s prose, with a focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  4. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Two theoretical dimensions of the cyber hate crime.Cesar Rommel Salas - 2017 - Social Research: An International Quarterly 1 (01):1-4.
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. ‘Blessed are the breadmakers...’: Sociophobia, digital society and the enduring relevance of technological determinism.Gregory Morgan Swer - 2023 - South African Journal of Philosophy 42 (4):315-327.
    Technological determinism, as a position on the nature and effects of technology/technologies can be divided into optimistic and critical forms. The optimistic variety, of which contemporary cyber-utopianism is an instance, holds that the development of technology shapes or at least facilitates ameliorative alterations in society. The critical variety, on the other hand, tends to problematise or condemn the positive narrative of technological impact on human existence. Whilst the optimistic form still retains some academic credibility, especially concerning digital technologies, the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Post-COVID-19: Education and Thai Society in Digital Era.Pattamawadee Sankheangaew - 2021 - Conference Proceedings 2.
    The article entitled “Post-COVID-19: Education and Thai Society in Digital Era” has two objectives: 1) to study digital technology 2) to study the living life in Thailand in the digital era after COVID-19 pandemics. According to the study, it was found that the new digitized service is a service process on digital platforms such as ordering food, hailing a taxi, and online trading. It is a service called via smartphone. The information is used digitally. Public relations, digital marketing, and living (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Urban scale digital twins in data-driven society: Challenging digital universalism in urban planning decision-making.Marianna Charitonidou - 2022 - International Journal of Architectural Computing 19:1-16.
    The article examines the impact of the virtual public sphere on how urban spaces are experienced and conceived in our data-driven society. It places particular emphasis on urban scale digital twins, which are virtual replicas of cities that are used to simulate environments and develop scenarios in response to policy problems. The article also investigates the shift from the technical to the socio-technical perspective within the field of smart cities. Despite the aspirations of urban scale digital twins to enhance the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Cyberbullying: Effect on work place production.James Nambusi Makhulo - 2019 - Africa International Journal of Multidisciplinary Research 2 (1).
    Cyber bullying affects many adolescents and teens on a daily basis; it is a form of violence that can do lasting harm to people at different ages and social status in a society. Cyber bullying is real experience that has been in existence for a quite a long time; Bullying statistics show that cyber bullying is a serious problem among teens and gaining roots among adults. By being more aware of cyber bullying, teens and adults can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Stanisław Lem’s Visions of a Technological Future: Toward Philosophy in Technology.Paweł Polak & Roman Krzanowski - 2022 - Filozofia i Nauka. Studia Filozoficzne I Interdyscyplinarne 1 (10):41-50.
    Stanisław Lem is mostly known as a sci-fi writer and not widely perceived as a visionary of the cyber age, despite the fact that he foresaw the future of information technology better than most scientific experts. Indeed, his visions of future information-based societies have proved to be remarkably accurate. Lem’s stories fuse together elements of fantasy, philosophy, and science, but what we can really learn from them is the nature of humanity, technology, and philosophy, as well as the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  43
    IT & C, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - It and C 3 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Challenges and Limitations in the Use of Artificial Intelligence Provocări și limitări în utilizarea inteligenței artificiale -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Impact of Big Data Technology on Contemporary Society Impactul tehnologiei Big Data asupra societății contemporane -/- Methods, Techniques and Patterns of Advanced Persistent Threats – APT Lifecycle Metode, tehnici și (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  13. An Evidence-driven Research to the Transgressions of Geneva Conventions by the Communist Party of China Led Autocratic Regime.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (10):249-266.
    The "second-generation indigenization" hypothesis of Huntington's phenomenological observations on totalitarianism in Cold War regime collapse subtly portrayed the realpolitik interest groups' political influences with autocracy disbandment processes. The research puts democratization as the premise and globalization as purpose for the analysis, with the cultural anthropological psychopathology & criminological elements of genocide and crime against humanity explained, underlying some of the Communist Party of China (CPC)’s organizational behaviors. With the regionalism purposes & approaches to multilateralism by People's Republic of China (PRC), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Chinese approach to artificial intelligence: an analysis of policy, ethics, and regulation.Huw Roberts, Josh Cowls, Jessica Morley, Mariarosaria Taddeo, Vincent Wang & Luciano Floridi - 2021 - AI and Society 36 (1):59–⁠77.
    In July 2017, China’s State Council released the country’s strategy for developing artificial intelligence, entitled ‘New Generation Artificial Intelligence Development Plan’. This strategy outlined China’s aims to become the world leader in AI by 2030, to monetise AI into a trillion-yuan industry, and to emerge as the driving force in defining ethical norms and standards for AI. Several reports have analysed specific aspects of China’s AI policies or have assessed the country’s technical capabilities. Instead, in this article, we focus on (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  17. Computer Ethics and Neoplatonic Virtue.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (1):1-11.
    In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves deontological and utilitarian ethics as appropriate to computer ethics, while classical theories of ethics, such as virtue ethics, are usually neglected as anachronistic and unsuitable to the information era and ICT industry. During past decades, an Aristotelian form of virtue ethics has been revived (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Technologies and Species Transitions: Polanyi, on a Path to Posthumanity?Robert Doede - 2011 - Bulletin of Science, Technology and Society 31 (3):225-235.
    Polanyi and Transhumanism both place technologies in pivotal roles in bringing about Homo sapiens ’ species transitions. The question is asked whether Polanyi’s emphasis on the role of technology in Homo sapiens’ rise out of mute beasthood indicates that he might have been inclined to embrace the Transhumanist vision of Homo sapiens’ technological evolution into a postbiological, techno-cyber species. To answer this question, some of the core commitments of both Transhumanism and Polanyi’s postcritical philosophy are examined, especially as they (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Petition to Include Cephalopods as “Animals” Deserving of Humane Treatment under the Public Health Service Policy on Humane Care and Use of Laboratory Animals.New England Anti-Vivisection Society, American Anti-Vivisection Society, The Physicians Committee for Responsible Medicine, The Humane Society of the United States, Humane Society Legislative Fund, Jennifer Jacquet, Becca Franks, Judit Pungor, Jennifer Mather, Peter Godfrey-Smith, Lori Marino, Greg Barord, Carl Safina, Heather Browning & Walter Veit - forthcoming - Harvard Law School Animal Law and Policy Clinic.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  20.  95
    Hội thảo các vấn đề kinh tế, tài chính và ứng dụng toán học, 27-28/2/2009.Vietnam Mathematical Society - 2009 - Vms Conference 2009.
    Nền kinh tế nước ta đang chuyển biến mạnh mẽ từ nền kinh tế bao cấp sang kinh tế thị trường, nhất là từ khi nước ta gia nhập WTO. Đảng và chính phủ đã đề ra rất nhiều các chính sách để cải tiến các thể chế quản lý nền kinh tế và tài chính. Thị trường chứng khoán Việt Nam đã ra đời và đang đóng một vai trò quan trọng trong việc huy động vốn phục vụ cho (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  36
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  50
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  41
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  29. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  41
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Society, like the market, needs to be constructed.Carlos Palacios - 2018 - History of the Human Sciences 31 (1):74-96.
    It has been commonplace to equate Foucault’s 1979 series of lectures at the Collège de France with the claim that for neoliberalism, unlike for classical liberalism, the market needs to be artificially constructed. The article expands this claim to its full expression, taking it beyond what otherwise would be a simple divulgation of a basic neoliberal tenet. It zeroes in on Foucault’s own insight: that neoliberal constructivism is not directed at the market as such, but, in principle, at society, arguing (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  44
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Mature information societies—a matter of expectations.Luciano Floridi - 2016 - Philosophy and Technology 29 (1):1-4.
    Scholars and policy makers often refer to the “information society”. And yet, it is more accurate to speak of societies, each different, some of which may qualify as information ones at different levels of maturity. Through exploration of the concepts of expectations, education and innovation, this paper explores what it means for an information society to be more or less mature than others, and the impact of this on the ongoing digital revolution.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  39. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. The Well-Ordered Society under Crisis: A Formal Analysis of Public Reason vs. Convergence Discourse.Hun Chung - forthcoming - American Journal of Political Science:1-20.
    A well-ordered society faces a crisis whenever a sufficient number of noncompliers enter into the political system. This has the potential to destabilize liberal democratic political order. This article provides a formal analysis of two competing solutions to the problem of political stability offered in the public reason liberalism literature—namely, using public reason or using convergence discourse to restore liberal democratic political order in the well-ordered society. The formal analyses offered in this article show that using public reason fails completely, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Affective Societies: Key Concepts.Jan Slaby & Christian von Scheve (eds.) - 2019 - New York: Routledge.
    Affect and emotion have come to dominate discourse on social and political life in the mobile and networked societies of the early 21st century. This volume introduces a unique collection of essential concepts for theorizing and empirically investigating societies as Affective Societies. The concepts engender insights into the affective foundations of social coexistence and are indispensable to comprehend the many areas of conflict linked to emotion such as migration, political populism, or local and global inequalities. Each chapters (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. Happiness within modern societies: a comparison of ideal types, eudaimonism and consumer societies.P. Stuijt - manuscript
    Modern-day societies seem to be dominated by a hedonistic approach to happiness. A less short-term and more process-based definition of happiness - eudaimonism - has been proposed by Aristotle. Can this definition of happiness exist in consumer societies as proposed by Zygmunt Bauman and how can we begin to explore such a question? This essay will provide a comparison between two ideal types: eudaimonism and consumer society. With this comparison, we hope to provide a conceptual framework for further (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Expository Society.Cansu Kandara - manuscript
    This article aims to show the expository society dynamics in the digital age with Michel Foucault's and other critical thinkers' readings. You will find a re-reading the panopticon concept and a new Foucaultian power in the 21st century.
    Download  
     
    Export citation  
     
    Bookmark  
  45. Burdened Societies and Transitional Justice.Lisa L. Fuller - 2012 - Ethical Theory and Moral Practice 15 (3):369-386.
    Following John Rawls, nonideal theory is typically divided into: (1) “partial-compliance theory” and (2) “transitional theory." The former is concerned with those circumstances in which individuals and political regimes do not fully comply with the requirements of justice, such as when people break the law or some individuals do not do their fair share within a distributive scheme. The latter is concerned with circumstances in which background institutions may be unjust or may not exist at all. This paper focuses on (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Is Society-Centered Moral Theory a Contemporary Version of Natural Law Theory?David Copp - 2009 - Dialogue 48 (1):19-36.
    ABSTRACT: David Braybrooke argues that the core of the natural law theory of Thomas Aquinas survived in the work of Hobbes, Locke, Hume, and Rousseau. Much to my surprise, Braybrooke argues as well that David Copp’s society-centered moral theory is a secular version of this same natural law theory. Braybrooke makes a good case that there is an important idea about morality that is shared by the great philosophers in his group and that this idea is also found in Copp’s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Society: Analysis and Challenges of Present Day Nepal.Arjun Dahal - 2018
    Society is one of the intangible needs of humans, for humans since their very dawn have been a social animal. Through this article, we have attempted to analyze the social aspects of current day Nepal, and have made a humble attempt to categorize the major challenges faced by current day Nepal under 4 major headings.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Scientific Progress and Democratic Society through the Lens of Scientific Pluralism.Theptawee Chokvasin - 2023 - Suranaree Journal of Social Science 17 (2):Article ID e268392 (pp. 1-15).
    Background and Objectives: In this research article, the researcher addresses the issue of creating public understanding in a democratic society about the progress of science, with an emphasis on pluralism from philosophers of science. The idea that there is only one truth and that there are just natural laws awaiting discovery by scientists has historically made it difficult to explain scientific progress. This belief motivates science to develop theories that explain the unity of science, and it is thought that diversity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. (2 other versions)Societies differ in how they handle the same facts: an axiom of social anthropology?Terence Rajivan Edward - manuscript
    This paper challenges Marilyn Strathern’s claim that it is, or was, an axiom of social anthropology that societies differ in how they handle the same facts. I present a set of foundational commitments for conducting social anthropology which leave the truth of the proposition as an empirical question of the discipline.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Which societies are liberal democracies?Terence Rajivan Edward - manuscript
    Political philosophers sometimes write of liberal democracies, but which societies, if any, are liberal democracies? John Rawls says that in the public political culture of a liberal democracy, we find the principle that this society should be a fair system of cooperation between free and equal individuals. In this paper, I draw attention to how, if we grant Rawls’s definition, a society can easily be mistaken for a liberal democracy when it is not. I then argue that Andrew March, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 955