Results for 'excessive internet use'

959 found
Order:
  1. Addiction, Autonomy, and the Internet: Some ethical considerations.Anna Hartford & Dan J. Stein - 2021
    Despite growing understanding of the addictive qualities of the internet, and rising concerns about the effects of excessive internet use on personal wellbeing and mental health, the corresponding ethical debate is still in its infancy, and many of the relevant philosophical and conceptual frameworks are underdeveloped. Our goal in this chapter is to explore some of this evolving terrain. While there are unique ethical considerations that pertain to the formalisation of a disorder related to excessive (...) use, our ethical concerns (and indeed our mental health concerns) about whether certain technologies undermine wellbeing can and should be far broader than the debates about the appropriateness of particular diagnostic categories. In this chapter we introduce some of these wider debates with regards to persuasive digital technologies— particularly those which aim to maximise use, or even to encourage compulsive engagement—as well as the difficulty in articulating the harms involved in excessive internet use, especially where such use has not led to functional impairment. Following these conversations we briefly consider some more practical ethical implications, including regulation of certain design features, concerns about growing socioeconomic inequality in online services, and whether there should be a “right to disconnect.”. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  2. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This research report (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  3. Attentional Harms and Digital Inequalities.Anna Hartford & Dan J. Stein - 2022 - JMIR Mental Health 9 (2).
    Recent years have seen growing public concern about the effects of persuasive digital technologies on public mental health and well-being. As the draws on our attention reach such staggering scales and as our ability to focus our attention on our own considered ends erodes ever further, the need to understand and articulate what is at stake has become pressing. In this ethical viewpoint, we explore the concept of attentional harms and emphasize their potential seriousness. We further argue that the acknowledgment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Internet Use and Healthcare.László Ropolyi - 2021 - In Dagmar Eigner (ed.), Wahrnehmung, Kommunikation und Resonanz. Beiträge zur Medical Anthropology, Band 4. Perception, Communication, and Resonance. Contributions to Medical Anthropology, Volume 4. Schriftenreihe der Landesverteidigungsakademie. pp. 173-192.
    The medical use of computing and information and communication technologies (ICTs) has a history of several decades, but the emergence of the internet, and especially the web and social media, created a new situation. As a result, currently the term eHealth is widely used – and the usage of the internet (and mobile) “technologies” in healthcare (among the patients and professionals, too) tends to be usual practice. There are more and more signs of the institutionalization of this new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The association between parent-child relationship and problematic internet use among English- and Chinese-language studies: A meta-analysis.Yalin Zhu, Linyuan Deng & Kun Wan - 2022 - Frontiers in Psychology 13:885819.
    As past studies of the association between parent-child relationship and problematic internet use show mixed results and are influenced by many factors, this meta-analysis of 75 primary Chinese and English language studies from 1990 to 2021 with 110,601 participants (aged 6−25 years) explored (a) the overall association between parent-child relationship and problematic internet use, and (b) whether the association is affected by their types, country, measures, objects of the parent-child relationship, gender, age, year and publication types. We used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Measuring Openness and Evaluating Digital Academic Publishing Models: Not Quite the Same Business.Giovanni De Grandis & Yrsa Neuman - 2014 - The Journal of Electronic Publishing 17 (3).
    In this article we raise a problem, and we offer two practical contributions to its solution. The problem is that academic communities interested in digital publishing do not have adequate tools to help them in choosing a publishing model that suits their needs. We believe that excessive focus on Open Access (OA) has obscured some important issues; moreover exclusive emphasis on increasing openness has contributed to an agenda and to policies that show clear practical shortcomings. We believe that academic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Psychopower and Ordinary Madness: Reticulated Dividuals in Cognitive Capitalism.Ekin Erkan - 2019 - Cosmos and History 15 (1):214-241.
    Despite the seemingly neutral vantage of using nature for widely-distributed computational purposes, neither post-biological nor post-humanist teleology simply concludes with the real "end of nature" as entailed in the loss of the specific ontological status embedded in the identifier "natural." As evinced by the ecological crises of the Anthropocene—of which the 2019 Brazil Amazon rainforest fires are only the most recent—our epoch has transfixed the “natural order" and imposed entropic artificial integration, producing living species that become “anoetic,” made to serve (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Metaliteracy for Best Practices in Crisis and Risk Communication.Alireza Salehi-Nejad - 2022 - In Media and Information Literacy Seminar 2022: Nurturing Trust for Media and Information Literacy. Tehran, Tehran Province, Iran:
    The dissemination of information in times of crisis or emergency is distinctive since the affected individuals may take, process, and act on information differently. As the Centers for Disease Control and Prevention noted “the right message at the right time from the right person can save lives.” This study elaborates on the principles of crisis and emergency risk communication (CERC) in the realistic narrative, and notes that a successful CERC should be prompt, accurate, veracious, empathetic, respectful, and promote meaningful action. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Hinduism and ecology: Its relevance and importance.Justus Onyebuchi Okafor & Osim Stella - 2018 - FAHSANU Journal 1 (1).
    The sustenance of the environment is one of the cardinal teachings of the Hindus tradition and, in this regard, the Hindus tradition points out clearly that a good environment is indispensable for a healthy life. This work seeks to explore some of the fundamental teachings of Hinduism that point to the implications of the relationship between human beings and their environment. For instance, the dharma ecology explains the mechanism for creating respect for nature and the consequences of not doing so. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech and high (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  11. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  12. The internet, cognitive enhancement, and the values of cognition.Richard Heersmink - 2016 - Minds and Machines 26 (4):389-407.
    This paper has two distinct but related goals: (1) to identify some of the potential consequences of the Internet for our cognitive abilities and (2) to suggest an approach to evaluate these consequences. I begin by outlining the Google effect, which (allegedly) shows that when we know information is available online, we put less effort into storing that information in the brain. Some argue that this strategy is adaptive because it frees up internal resources which can then be used (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  13. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Knowledge, Democracy, and the Internet.Nicola Mößner & Philip Kitcher - 2017 - Minerva 55 (1):1-24.
    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a democratization of knowledge. In the following text, we will analyze this statement. In particular, we will focus on a potential change in epistemic structure. Does the internet change our common epistemic practice to rely on expert (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  18. Critical Rationalism and the Internet.Donald Gillies - 2023 - Journal of Philosophical Investigations at University of Tabriz 17 (42):80-90.
    The aim of this paper is to consider whether critical rationalism has any ideas which could usefully be applied to the internet. Today we tend to take the internet for granted and it is easy to forget that it was only about two decades ago that it began to be used to any significant extent. Accordingly in section 1 of the paper, there is a brief consideration of the history of the internet. At first sight this makes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. A virtue epistemology of the Internet: Search engines, intellectual virtues and education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to (...)
    Download  
     
    Export citation  
     
    Bookmark   53 citations  
  20. Internet ethics: the constructionist values of homo poieticus.Luciano Floridi & J. W. Sanders - 2005 - In Robert J. Cavalier (ed.), The Impact of the Internet on Our Moral Lives. State University of New York Press. pp. 195-214.
    In this chapter, we argue that the web is a poietically- enabling environment, which both enhances and requires the development of a “constructionist ethics”. We begin by explaining the appropriate concept of “constructionist ethics”, and analysing virtue ethics as the primary example. We then show why CyberEthics (or Computer Ethics, as it is also called) cannot be based on virtue ethics, yet needs to retain a constructionist approach. After providing evidence for significant poietic uses of the web, we argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  21. Engineering affect: emotion regulation, the internet, and the techno-social niche.Joel Krueger & Lucy Osler - 2019 - Philosophical Topics 47 (2):205-231.
    Philosophical work exploring the relation between cognition and the Internet is now an active area of research. Some adopt an externalist framework, arguing that the Internet should be seen as environmental scaffolding that drives and shapes cognition. However, despite growing interest in this topic, little attention has been paid to how the Internet influences our affective life — our moods, emotions, and our ability to regulate these and other feeling states. We argue that the Internet scaffolds (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  22. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication among various (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. The social media use of adult New Zealanders: Evidence from an online survey.Edgar Pacheco - 2022 - Report.
    To explore social media use in New Zealand, a sample of 1001 adults aged 18 and over were surveyed in November 2021. Participants were asked about the frequency of their use of different social media platforms (text message included). This report describes how often each of the nine social media sites and apps covered in the survey are used individually on a daily basis. Differences based on key demographics, i.e., age and gender, are tested for statistical significance, and findings summarised.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Democratic Obligations and Technological Threats to Legitimacy: PredPol, Cambridge Analytica, and Internet Research Agency.Alan Rubel, Clinton Castro & Adam Pham - 2021 - In Alan Rubel, Clinton Castro & Adam Pham (eds.), Algorithms and Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press. pp. 163-183.
    ABSTRACT: So far in this book, we have examined algorithmic decision systems from three autonomy-based perspectives: in terms of what we owe autonomous agents (chapters 3 and 4), in terms of the conditions required for people to act autonomously (chapters 5 and 6), and in terms of the responsibilities of agents (chapter 7). -/- In this chapter we turn to the ways in which autonomy underwrites democratic governance. Political authority, which is to say the ability of a government to exercise (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  25. Caresses, excesses, intimacies and estrangements.Mark Paterson - 2004 - Angelaki 9 (1):165 – 177.
    The first part of the paper, “Foyer: feeling, look- ing, between-us” establishes the role of touch in intersubjectivity. Starting with Irigaray’s notion of the entre-nous, the “between-us,” I use touch as an example of deeply intersubjective communi- cation, an attempt to overcome estrangement. The ambiguity of touching, the physical action of touching and the affective reaction of feeling, is central to this. The second section, “Reception: receptivity, orderings of the sensible,” consolidates this experience of intersubjective touching within the confines of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Exploring age-related patterns in internet access: Insights from a secondary analysis of New Zealand survey data.Edgar Pacheco - 2024 - Media Peripheries 18 (1):38-56.
    About thirty years ago, when the Internet started to be commercialised, access to the medium became a topic of research and debate. Up-to-date evidence about key predictors, such as age, is crucial because of the Internet's ever-changing nature and the challenges associated with gaining access to it. This paper aims to give an overview of New Zealand's Internet access trends and how they relate to age. It is based on secondary analysis of data from a larger online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The socio-economic argument for the human right to internet access.Merten Reglitz - 2023 - Politics, Philosophy and Economics 22 (4): 441-469.
    This paper argues that Internet access should be recognised as a human right because it has become practically indispensable for having adequate opportunities to realise our socio-economic human rights. This argument is significant for a philosophically informed public understanding of the Internet and because it provides the basis for creating new duties. For instance, accepting a human right to Internet access minimally requires guaranteeing access for everyone and protecting Internet access and use from certain objectionable interferences (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Toward a Philosophy of the Internet.Laszlo Ropolyi - 2018 - APA Newsletter on Philosophy and Computers 17 (2):40-49.
    The paper argues for the necessity of building up a philosophy of the Internet and proposes a version of it, an «Aristotelian» philosophy of the Internet. First, an overview of the recent trends in the Internet research is presented. This train of thoughts leads to a proposal of understanding the nature of the Internet in the spirit of the Aristotelian philosophy i. e., to conceive the Internet as the Internet, as a totality of its (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Towards a just and fair Internet: applying Rawls’ principles of justice to Internet regulation.David M. Douglas - 2015 - Ethics and Information Technology 17 (1):57-64.
    I suggest that the social justice issues raised by Internet regulation can be exposed and examined by using a methodology adapted from that described by John Rawls in 'A Theory of Justice'. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the 'original position' as a method of removing bias in decision-making about justice. The original position imposes a 'veil of ignorance' that hides the particular circumstances of individuals from them so that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Exploring New Zealand children’s technology access, use, skills and opportunities. Evidence from Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2019 - Netsafe.
    While children’s interaction with digital technologies is a matter of interest around the world, evidence based on nationally representative data about how integrated these tools are in children’s everyday life is still limited in New Zealand. This research report presents findings from a study that explores children’s internet access, online skills, practices, and opportunities. This report is part of Netsafe’s research project Ngā taiohi matihiko o Aotearoa - New Zealand Kids Online, and our first publication as a member of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one can deny it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Homo Virtualis: existence in Internet space.Daria Bylieva, Victoria Lobatyuk & Anna Rubtsova - 2018 - SHS Web of Conference 44:00021.
    The study of a person existence in Internet space is certainly an actual task, since the Internet is not only a source of innovation, but also the cause of society's transformations and the social and cultural problems that arise in connection with this. Computer network is global. It is used by people of different professions, age, level and nature of education, living around the world and belonging to different cultures. It complicates the problem of developing common standards of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The world is a big network. Pandemic, the Internet and institutions.Constantin Vica - 2020 - Revista de Filosofie Aplicata 3 (Supplementary Issue):136-161.
    2020 is the year of the first pandemic lived through the Internet. More than half of the world population is now online and because of self-isolation, our moral and social lives unfold almost exclusively online. Two pressing questions arise in this context: how much can we rely on the Internet, as a set of technologies, and how much should we trust online platforms and applications? In order to answer these two questions, I develop an argument based on two (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  71
    THE USE OF GAMIFICATION TO ENRICH THE PARK EXPERIENCE FOR THE VISITORS: ISTANBUL ATATÜRK URBAN FOREST PARK CASE STUDY.Sarvin Eshaghi - 2022 - Dissertation, Istanbul Technical University
    The excessive population growth leading to urbanization and, subsequent to it, urban sprawl, increases the size and number of urban settlements. Consequently, to fulfill the land needed for this expansion, humans encroach the public open areas, including highly crucial urban green spaces. Generally, any kind of greenness within the city, known as urban green spaces, benefits the ecosystem and the inhabitants. Hence, the green infrastructure, universally, should be preserved. Urban parks, specifically urban forest parks, serving as recreational green public (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Communication ethics and the internet: intercultural and localising influencers.Robert Beckett - 2004 - International Review of Information Ethics 2.
    In the information-technology powered twenty first century a general demand for more effective communication is driving people to question the present, examine the past and to prognosticate the future. The ‘unique global media-information system’ - the Internet- is the central fact of a vast new complexity of communication that is driving social-economic-political-religious- technological change at a rate never experienced before. The premise of this paper is that the Internet can be better understood as the first complex global media (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Gender, age and staff preparedness to adopt Internet tools for research sharing during Covid-19 in African varsities.Valentine Joseph Owan, Michael Ekpenyong Asuquo, Samuel Okpon Ekaette, Sana Aslam, Moses Eteng Obla & Mercy Valentine Owan - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 6133.
    This study assessed the partial as well as the collaborative impact of age and gender on academic staff preparedness to adopt Internet tools for research sharing in African universities during Covid-19. Although evidence abounds in the literature on gender and age as they affect relatively, scholars’ utilisation of digital tools for research communication, such studies did not examine scholars’ preparedness to adopt from a broad perspective of Africa. This study was conducted based on the argument that the preparedness of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. The ontological revolution: On the phenomenology of the internet.Alexandros Schismenos - 2016 - SOCRATES 4 (2):56-67.
    Cogitation described as calculation, the living being described as a machine, cognitive functions considered as algorithmic sequences and the ‘mechanization’ of the subjective were the theoretical elements that late heideggerian anti–humanism, especially in France was able to utilize[1], even more so, after the second cybernetics or post-cybernetics movement of the late ‘60s introduced the concepts of the autopoietic and the allopoietic automata[2]. Recently, neurologists pose claims on the traditional epistemological field of philosophy, proceeding from this ontological decision, the equation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Justificación logica y seguridad epistémica en internet.Francisco Diaz Montilla - 2022 - Revista Contacto 2 (1):1-17.
    This work seeks to answer the question of whether the Internet is epistemically secure. The problem is approached from a double path (i) analytical (a priori, logical-philosophical) and (ii) empirical. For the first, the treatment is based on the logic of justification; while the second, in a survey in which respondents answer on the use and assessment of the information offered by the internet. The argument presented is as follows: If epistemic security requires the exercise or implementation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice command (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Identification of Babbitt Damage and Excessive Clearance in Journal Bearings through an Intelligent Recognition Approach.Joel Pino Gómez, Fidel Ernesto Hernández Montero, Julio César Gómez Mancilla & Yenny Villuendas Rey - 2021 - International Journal of Advanced Computer Science and Applications 12 (4):526-533.
    Journal bearings play an important role on many rotating machines placed on industrial environments, especially in steam turbines of thermoelectric power plants. Babbitt damage (BD) and excessive clearance (C) are usual faults of steam turbine journal bearings. This paper is focused on achieving an effective identification of these faults through an intelligent recognition approach. The work was carried out through the processing of real data obtained from an industrial environment. In this work, a feature selection procedure was applied in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The Conceptual Access-NeTwORk (CANTOR) Thesis: Theorizing the Development or Success of New Internet-Based Products, Services, or Technologies.La Shun L. Carroll - 2023 - Indonesian Journal of Innovation and Applied Sciences (Ijias) 3 (2):86-98.
    For any new internet-based product, service, or technology to succeed, it must satisfy the criterion of providing access to or creating a network of possible users, products, and services. This is the Conceptual Access-Network (CANTOR) Thesis proposed. In addition to the main issues of success and how and why internet technology evolves, the principle can also meet the objective of explaining what underlies a range of traditional and nontraditional technologies beyond the internet. Through qualitative exploration, the tenets (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Brave. Net. World: the Internet as a disinformation superhighway?Luciano Floridi - 1996 - The Electronic Library 14:509-514.
    This article is a modified version of a paper I gave to the conference Philosophy & Informatics - First Italian Conference on the use of ICT in philosophical disciplines, promoted by the Italian Philosophical Association (University of Rome "La Sapienza", 23-24 November, 1995).
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Using E-learning among EFL Students at Moulay Ismail University: Perspectives, Prospects, and Challenges.Haytham Elaoufy - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (3):1-11.
    The educational process has been dramatically transformed by technology; this transformation has caused the emergence of central concepts, among which is distance learning. The latter has brought new opportunities to learn from; meanwhile, it has presented challenges that have impacted learning in many ways. Thus, the present study investigated the implementation of E-learning among EFL students at Moulay Ismail University to identify students' perceptions about this type of learning and consider the pros and cons to ensure best practice solutions that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Curriculum Restructuring and Job Creation Among Nigerian Graduates: The Mediating Role of Emerging Internet Applications.Valentine Joseph Owan, Daniel Clement Agurokpon & Joseph Udida Udida - 2021 - International Journal of Educational Administration, Planning and Research 13 (2):1-16.
    Existing literature on entrepreneurship education has continually highlighted its potential for job creation. However, much attention has not been paid to the restructuring of the curriculum that can enable entrepreneurship education to thrive for job creation. This study used a structural equation modelling approach to understand the mediating role that the deployment of emerging Internet Applications (IAs) play in the nexus between curriculum restructuring and job creation. Being a quantitative study, a virtual snowball sample of 4,628 higher education graduates (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Some information is too dangerous to be on the internet.Vincent C. Müller - 2006 - Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category includes information the use of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Professional variables and staff readiness to utilise internet-based channels for research communication in an Era of Covid-19.Valentine Joseph Owan, Levi Udochukwu Akah, Ogbeche Mary Mark & Moses Eteng Obla - 2021 - Library Philosophy and Practice (E-Journal) 2021:Article 5863.
    This study assessed the professional variables of academic staff in African varsities and their readiness to Utilise Internet-Based Channels for Research Communication in an era of Covid-19. Drawing from Maslow’s hierarchy of needs theory, the study was guided by four null hypotheses. The quantitative research method based on the virtual cross-sectional survey design was adopted. A total of 8,591 academics in African universities were the targeted demographic of this study. However, data were collected from a virtual snowball sample of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Use of Machine Learning Methods for Image Classification in Medical Data.Destiny Agboro - forthcoming - International Journal of Ethics.
    Integrating medical imaging with computing technologies, such as Artificial Intelligence (AI) and its subsets: Machine learning (ML) and Deep Learning (DL) has advanced into an essential facet of present-day medicine, signaling a pivotal role in diagnostic decision-making and treatment plans (Huang et al., 2023). The significance of medical imaging is escalated by its sustained growth within the realm of modern healthcare (Varoquaux and Cheplygina, 2022). Nevertheless, the ever-increasing volume of medical images compared to the availability of imaging experts. Biomedical experts (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 959