Results for 'internet protocol suite'

971 found
Order:
  1.  42
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  41
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  41
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  7. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to coerce people (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. UNVEILING THE REALM OF ACADEMIC CHALLENGES: THE ELEMENTARY LEARNERS' EXPERIENCES IN MODULAR LEARNING.Jeanette Pedriña, Karyll Rose Digaum, Mea Ann Malcampo, Julia Zyraelle Pantoja & Von Christian Ubaldo - 2024 - International Journal of Research Publications 143 (1).
    Modular learning was used to assist elementary learners in continuing their education during the pandemic. This modular learning posed academic challenges. This phenomenological study delved into the academic challenges of modular learning of public-school elementary school learners. Validated In-depth interview protocol (IDI) was used to collect the data from ten (10) Grade six learners. Findings revealed that these academic challenges include unfavorable learning environments, reading comprehension issues, lack of motivation, and poor quality of printed learning modules that affect the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. (1 other version)The evaluation of public health ethics, individual, collective and state with institutional, responsibilities and obligation during COVID-19 pandemics through online media reports in Turkey.Sukran Sevimli - 2021 - Eubios Journal of Asian and International Bioethics 31 (2):124-136.
    Aim: The aim of this study is to reveal the convergence of public health ethics, institutional, collective, and individual ethics obligation during the COVID-19 pandemic and give some explanations with online media reports. Method: The study method is qualitative content analysis; this method was chosen as it would suit best the purpose of the study. The Turkish Medical Association, Turkish Public Health Association, and online newspaper articles and videos have been scanned using keywords. After that, related online reports and interviews (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Divulging the Lived Experiences of Public School Teachers in the USA during COVID-19 Pandemic: Phenomenological Analysis.Jaypee Lopres, Glendale Niadas, Geraldine Minez, Greatchie Lopres, Madeleine Gutierrez, Albert Marion Quiap & Saturnino Renante Bangot Jr - 2023 - International Journal of Learning, Teaching and Educational Research 22 (5):180-205.
    This research examined the lived experiences of public school teachers in the United States during the COVID-19 pandemic. A qualitative design was performed using interpretative phenomenological analysis. Twenty public school teachers in the United States formed the sample, with the inclusion criterion being a minimum of three years’ teaching experience, including the pandemic. To meet the safety measure protocols set by the U.S. government, the data gathering was conducted online using Microsoft Forms. The semi-structured interviews comprised two sections: the first (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Measuring Openness and Evaluating Digital Academic Publishing Models: Not Quite the Same Business.Giovanni De Grandis & Yrsa Neuman - 2014 - The Journal of Electronic Publishing 17 (3).
    In this article we raise a problem, and we offer two practical contributions to its solution. The problem is that academic communities interested in digital publishing do not have adequate tools to help them in choosing a publishing model that suits their needs. We believe that excessive focus on Open Access (OA) has obscured some important issues; moreover exclusive emphasis on increasing openness has contributed to an agenda and to policies that show clear practical shortcomings. We believe that academic communities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Out of the chinese room.David B. Suits - 1989 - Computing and Philosophy Newsletter 4:1-7.
    A criticism of Searle's Chinese Room thought experiment.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Some Considerations About the Discovery of Principles of Justice.David Suits - 1978 - Eidos: The Canadian Graduate Journal of Philosophy 1 (1):50-67.
    Download  
     
    Export citation  
     
    Bookmark  
  18. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The bookmarks are stored in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  93
    Internet Trolling: Social Exploration and the Epistemic Norms of Assertion.Daniel Munro - forthcoming - Philosophers' Imprint.
    Internet trolling involves making assertions with the aim of provoking emotionally heated responses, all while pretending to be a sincere interlocutor. In this paper, I give an account of some of the epistemic and psychological dimensions of trolling, with the goal of better understanding why certain kinds of trolling can be dangerous. I first analyze how trolls eschew the epistemic norms of assertion, thus covertly violating their conversation partners’ normative expectations. Then, drawing on literature on the “explore/exploit trade-off,” I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Protocol Analysis in Creative Problem-solving.Steven James Bartlett - 1978 - Journal of Creative Behavior 12 (3):181-192.
    The use of protocol analysis in the traning of cognitive skills.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Hidden protocols: Modifying our expectations in an evolving world.Hans van Ditmarsch, Sujata Ghosh, Rineke Verbrugge & Yanjing Wang - 2014 - Artificial Intelligence 208 (1):18--40.
    When agents know a protocol, this leads them to have expectations about future observations. Agents can update their knowledge by matching their actual observations with the expected ones. They eliminate states where they do not match. In this paper, we study how agents perceive protocols that are not commonly known, and propose a semantics-driven logical framework to reason about knowledge in such scenarios. In particular, we introduce the notion of epistemic expectation models and a propositional dynamic logic-style epistemic logic (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  22. The Internet as an Epistemic Agent (EA).Roman Krzanowski & Paweł Polak - 2022 - Információs Társadalom 22 (2):39-56.
    We argue that the Internet is, and is acting as, an EA because it shapes our belief systems, our worldviews. We explain key concepts for this discussion and provide illustrative examples to support our claims. Furthermore, we explain why recognising the Internet as an EA is important for Internet users and society in general. We discuss several ways in which the Internet influences the choices, beliefs, and attitudes of its users, and we compare this effect with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  24. (1 other version)The internet: which future for organised knowledge, Frankenstein or Pygmalion? Part 1.Luciano Floridi - 1995 - International Journal of Human-Computer Studies 43 (2):261–274.
    The Internet is like a new country, with a growing population of millions of well educated citizens. If it wants to keep track of its own cultural achievements in real time, it will have to provide itself with an infostructure like a virtual National Library system. This paper proposes that institutions all over the world should take full advantage of the new technologies available, and promote and coordinate such a global service. This is essential in order to make possible (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  25. The multiplicity of experimental protocols: A challenge to reductionist and non-reductionist models of the unity of neuroscience.Jacqueline A. Sullivan - 2009 - Synthese 167 (3):511-539.
    Descriptive accounts of the nature of explanation in neuroscience and the global goals of such explanation have recently proliferated in the philosophy of neuroscience and with them new understandings of the experimental practices of neuroscientists have emerged. In this paper, I consider two models of such practices; one that takes them to be reductive; another that takes them to be integrative. I investigate those areas of the neuroscience of learning and memory from which the examples used to substantiate these models (...)
    Download  
     
    Export citation  
     
    Bookmark   87 citations  
  26. Internet and Advertisement.Khaled Moustafa - 2016 - Science and Engineering Ethics 22 (1):293-296.
    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The internet, cognitive enhancement, and the values of cognition.Richard Heersmink - 2016 - Minds and Machines 26 (4):389-407.
    This paper has two distinct but related goals: (1) to identify some of the potential consequences of the Internet for our cognitive abilities and (2) to suggest an approach to evaluate these consequences. I begin by outlining the Google effect, which (allegedly) shows that when we know information is available online, we put less effort into storing that information in the brain. Some argue that this strategy is adaptive because it frees up internal resources which can then be used (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  28.  75
    The divide between us: Internet access among people with and without disabilities in the post-pandemic era.Edgar Pacheco & Hannah Burgess - 2024 - Disability and Society 1:1-22.
    The COVID-19 pandemic highlighted the importance of internet access across various aspects of life, from remote work and online education to healthcare services and social connections. As we transition to a post-pandemic era, a pressing need arises to update our understanding of the multifaceted nature of internet access. This study is one of the first attempts to do so. Using survey data from New Zealand adult internet users (n=960), it compares internet connection types, frequency of (...) use at home, social media use, and concerns about online risk between people with and without disabilities. Results show people with disabilities have restricted fibre access and higher wireless broadband (a much slower connection type). People with disabilities use social media platforms less and are more concerned about certain online risks. The findings highlight persistent disparities in internet access for people with disabilities in the post-pandemic era. Implications of the study are discussed. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The use of protocol analysis in philosophy.Steven Bartlett - 1978 - Metaphilosophy 9 (3-4):324-336.
    A description of the author's application of protocol analysis in the teaching of philosophy.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  30. Knowledge, Democracy, and the Internet.Nicola Mößner & Philip Kitcher - 2017 - Minerva 55 (1):1-24.
    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a democratization of knowledge. In the following text, we will analyze this statement. In particular, we will focus on a potential change in epistemic structure. Does the internet change our common epistemic practice to rely on expert (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Discussion protocol for alleviating epistemic injustice: The case of community rehabilitation interaction and female substance abusers.Petra Auvinen, Jaana Parviainen, Lauri Lahikainen & Hannele Palukka - 2021 - Social Sciences 10 (2).
    Substance-abusing women are vulnerable to specific kinds of epistemic injustice, including stigmatization and discrimination. This article examines the development of the epistemic agency of female substance abusers by asking: How does the use of a formal discussion protocol in community rehabilitation interaction alleviate epistemic injustice and strengthen the epistemic agency of substance abusers? The data were collected in a Finnish rehabilitation center by videotaping six group discussions between social workers, peer support workers, and rehabilitation clients with substance abuse problems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Internet Techniques for an Untimely Anthropology.Meg Stalcup - 2020 - In Julie Laplante, Willow Scobie & Ari Gandsman (eds.), Searching After Method: Live Anthropology. Berghahn Book. pp. 102-107.
    Making “the familiar strange and the strange familiar” is what anthropology has long claimed as its expertise. The Internet and its broader technological problem space pose methodological challenges, however, for a discipline that has traditionally drawn on the authority of “being there” to ground its claims to knowledge.
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Internet as Friend or Foe of Intellectual Freedom.Elizabeth Buchanan - 2004 - International Review of Information Ethics 2.
    What a long strange trip the Internet has had. From its inception and use by the American military to the billions of users world-wide who log on daily, the Internet is both the promise of access to information and the peril of surveillance and a means of curtailing intellectual freedom. This paper will review this continuum, paying close attention to recent developments in the United States that fuel the dichotomous debate surrounding intellectual freedom.
    Download  
     
    Export citation  
     
    Bookmark  
  34. Empirical Protocols for Mediating Long-Range Coherence in Biological Systems.Richard L. Amoroso - 2013 - Journal of Consciousness Exploration and Research 4 (09):24-45.
    Delineating the framework for a fundamental model of long-range coherence in biological systems is said to rely on principles beyond parameters addressed by current physical science. Just as phenomena of quantum mechanics lay beyond tools of classical Newtonian mechanics we must now enter a 3rd regime of unified field, UF mechanics. In this paper we present a battery of nine empirical protocols for manipulating long-range coherence in complex self-organized living systems (SOLS) in a manner surmounting the Copenhagen Interpretation of quantum (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research data collection. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  36. Internet Use and Healthcare.László Ropolyi - 2021 - In Dagmar Eigner (ed.), Wahrnehmung, Kommunikation und Resonanz. Beiträge zur Medical Anthropology, Band 4. Perception, Communication, and Resonance. Contributions to Medical Anthropology, Volume 4. Schriftenreihe der Landesverteidigungsakademie. pp. 173-192.
    The medical use of computing and information and communication technologies (ICTs) has a history of several decades, but the emergence of the internet, and especially the web and social media, created a new situation. As a result, currently the term eHealth is widely used – and the usage of the internet (and mobile) “technologies” in healthcare (among the patients and professionals, too) tends to be usual practice. There are more and more signs of the institutionalization of this new (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Community-Based Research Protocol on Transboundary Impacts: Fishery Resources, Ecosystem and Communities’ Livelihood.Narith Por, Pichdara Lonn, Solany Kry & Chimor Mor (eds.) - 2022 - Cambodia: My Village.
    The developments along the Mekong River, including in Cambodia, have boomed. There were 755 dams. Of these, 537 have been completed, and 152 have been planned or proposed. Of these, 52 were under construction, and 14 have been canceled or suspended. Of these dams, 392 were hydropower, 337 were irrigation, and 26 were other types (CGIAR, 2015). Even though some officials saw economic development as a result of the hydropower dam, the negative impacts of hydropower dams were seen by many (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Internet and Biometric Web Based Business Management Decision Support.Artūras Kaklauskas - 2023 - Vilnius, Lithuania: Vilnius Gediminas Technical University, Lithuania.
    Internet and Biometric Web Based Business Management Decision Support MICROBE MOOC material prepared under IO1/A5 Development of the MICROBE personalized MOOCs content and teaching materials Prepared by: A. Kaklauskas, A. Banaitis, I. Ubarte Vilnius Gediminas Technical University, Lithuania Project No: 2020-1-LT01-KA203-078100.
    Download  
     
    Export citation  
     
    Bookmark  
  41. The Optional Protocol to the International Covenant on Economic, Social and Cultural Rights (OP-ICESCR).Deepa Kansra & Mallika Ramachandran - manuscript
    Human rights treaties are often attached and complemented with Optional Protocols. The Optional protocol instruments are adopted after careful deliberation between different stakeholders including member states to human rights treaties. -/- The present document on Introduction to the International Covenant on Economic Social and Cultural Rights- Optional Protocol [OP-ICESCR] is an addition to the on-going work on the Human Rights Framework on ESC Rights. It covers basic information on the objectives of the OP and the key provisions dealing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. A virtue epistemology of the Internet: Search engines, intellectual virtues and education.Richard Heersmink - 2018 - Social Epistemology 32 (1):1-12.
    This paper applies a virtue epistemology approach to using the Internet, as to improve our information-seeking behaviours. Virtue epistemology focusses on the cognitive character of agents and is less concerned with the nature of truth and epistemic justification as compared to traditional analytic epistemology. Due to this focus on cognitive character and agency, it is a fruitful but underexplored approach to using the Internet in an epistemically desirable way. Thus, the central question in this paper is: How to (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  43. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech and high (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  44. Critical Rationalism and the Internet.Donald Gillies - 2023 - Journal of Philosophical Investigations at University of Tabriz 17 (42):80-90.
    The aim of this paper is to consider whether critical rationalism has any ideas which could usefully be applied to the internet. Today we tend to take the internet for granted and it is easy to forget that it was only about two decades ago that it began to be used to any significant extent. Accordingly in section 1 of the paper, there is a brief consideration of the history of the internet. At first sight this makes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Internet ethics: the constructionist values of homo poieticus.Luciano Floridi & J. W. Sanders - 2005 - In Robert J. Cavalier (ed.), The Impact of the Internet on Our Moral Lives. State University of New York Press. pp. 195-214.
    In this chapter, we argue that the web is a poietically- enabling environment, which both enhances and requires the development of a “constructionist ethics”. We begin by explaining the appropriate concept of “constructionist ethics”, and analysing virtue ethics as the primary example. We then show why CyberEthics (or Computer Ethics, as it is also called) cannot be based on virtue ethics, yet needs to retain a constructionist approach. After providing evidence for significant poietic uses of the web, we argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  46. The Internet Age: A Commentary on Mcluhan’s “The Medium is the Message”.Miguel Elvir Quitain - manuscript
    This paper is my short commentary on Marshall McLuhan’s “The Medium is the Message.” McLuhan wrote this essay in 1964, during a time when the internet was not yet invented. Hence, my contribution to his philosophy and the main content of this paper is to apply his analysis on the age of the internet particularly on the role of this medium in education and remote learning.
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Cognitive Ecology of the Internet.Paul Smart, Richard Heersmink & Robert Clowes - 2017 - In Stephen Cowley & Frederic Vallée-Tourangeau (eds.), Cognition Beyond the Brain: Computation, Interactivity and Human Artifice (2nd ed.). Springer. pp. 251-282.
    In this chapter, we analyze the relationships between the Internet and its users in terms of situated cognition theory. We first argue that the Internet is a new kind of cognitive ecology, providing almost constant access to a vast amount of digital information that is increasingly more integrated into our cognitive routines. We then briefly introduce situated cognition theory and its species of embedded, embodied, extended, distributed and collective cognition. Having thus set the stage, we begin by taking (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  48. (2 other versions)Cu sau fără Internet?Sfetcu Nicolae - 2022 - It and C 1 (1):3-10.
    Internetul a schimbat complet modul nostru de viață, fiind considerat unul dintre cele mai benefice progrese tehnologice ale secolului XXI. Totul se vinde și se cumpără acum pe Internet, inclusiv distracția. Internetul face lumea mai mică, pentru că am putea comanda sau comercializa orice în întreaga lume. Și în această societate virtuală suntem cu toții comentatori, editori și creatori. Îți poți imagina cum ar fi viața acum fără Internet? Închide ochii pentru un minut și gândește-te la cum a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Engineering affect: emotion regulation, the internet, and the techno-social niche.Joel Krueger & Lucy Osler - 2019 - Philosophical Topics 47 (2):205-231.
    Philosophical work exploring the relation between cognition and the Internet is now an active area of research. Some adopt an externalist framework, arguing that the Internet should be seen as environmental scaffolding that drives and shapes cognition. However, despite growing interest in this topic, little attention has been paid to how the Internet influences our affective life — our moods, emotions, and our ability to regulate these and other feeling states. We argue that the Internet scaffolds (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  50. Trustworthiness and truth: The epistemic pitfalls of internet accountability.Karen Frost-Arnold - 2014 - Episteme 11 (1):63-81.
    Since anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. This paper provides a veritistic argument that accountability mechanisms can cause significant epistemic problems for internet encyclopedias and social media communities. I show that accountability mechanisms can undermine both the dissemination of true beliefs and the detection of error. Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
1 — 50 / 971