Results for 'intrusion'

85 found
Order:
  1. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  3.  89
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike traditional methods (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  23
    Network Intrusion Classification.O. Sri Nagesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    The rapid proliferation of interconnected devices and the increasing complexity of digital networks in the modern era have resulted in a surge of diverse and voluminous network traffic. This growth poses considerable challenges in effectively distinguishing between normal and malicious data flows. As cyber threats continue to evolve, traditional traffic classification methods struggle to keep pace with the dynamic and multifaceted security challenges of contemporary networks. In this context, ensuring robust network security has become an imperative. This research aims to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Natural Compatibilism, Indeterminism, and Intrusive Metaphysics.Thomas Nadelhoffer, David Rose, Wesley Buckwalter & Shaun Nichols - 2020 - Cognitive Science 44 (8):e12873.
    The claim that common sense regards free will and moral responsibility as compatible with determinism has played a central role in both analytic and experimental philosophy. In this paper, we show that evidence in favor of this “natural compatibilism” is undermined by the role that indeterministic metaphysical views play in how people construe deterministic scenarios. To demonstrate this, we re-examine two classic studies that have been used to support natural compatibilism. We find that although people give apparently compatibilist responses, this (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  8. Belief reports and pragmatic intrusion: the case of null appositives.Alessandro Capone - 2008 - Journal of Pragmatics 40:2019-2040.
    In this paper, I explore Bach’s idea (Bach, 2000) that null appositives, intended as expanded qua-clauses, can resolve the puzzles of belief reports. These puzzles are crucial in understanding the semantics and pragmatics of belief reports and are presented in a section. I propose that Bach’s strategy is not only a way of dealing with puzzles, but also an ideal way of dealing with belief reports. I argue that even simple unproblematic cases of belief reports are cases of pragmatic (...), involving null appositives, or to use the words of Bach, ‘qua-clauses’. The main difference between my pragmatic approach and the one by Salmon (1986) is that this author uses the notion of conversational implicature, whereas I use the notion of pragmatic intrusion and explicature. From my point of view, statements such as ‘‘John believes that Cicero is clever’’ and ‘‘John believes that Tully is clever’’ have got distinct truth-values. In other words, I claim that belief reports in the default case illuminate the hearer on the mental life of the believer, that includes specific modes of presentation of the referents talked about. Furthermore, while in the other pragmatic approaches, it is mysterious how a mode of presentation is assumed to be the main filter of the believer’s mental life, here I provide an explanatory account in terms of relevance, cognitive effects, and processing efforts. The most important part of the paper is devoted to showing that null appositives are required, in the case of belief reports, to explain certain anaphoric effects, which would otherwise be mysterious. My examples show that null appositives are not necessitated at logical form, but only at the level of the explicature, in line with the standard assumptions by Carston and Recanati on pragmatic intrusion. I develop a potentially useful analysis of belief reports by exploiting syntactic and semantic considerations on presuppositional clitics in Romance. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  9. Intrusive Uncertainty in Obsessive Compulsive Disorder.Tom Cochrane & Keeley Heaton - 2017 - Mind and Language 32 (2):182-208.
    In this article we examine obsessive compulsive disorder (OCD). We examine and reject two existing models of this disorder: the Dysfunctional Belief Model and the Inference‐Based Approach. Instead, we propose that the main distinctive characteristic of OCD is a hyperactive sub‐personal signal of being in error, experienced by the individual as uncertainty about his or her intentional actions (including mental actions). This signalling interacts with the anxiety sensitivities of the individual to trigger conscious checking processes, including speculations about possible harms. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  10. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen, Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  11. A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Knowing how and pragmatic intrusion.Alessandro Capone - 2011 - Intercultural Pragmatics 8 (4):543-570.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the proposed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  16.  47
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel capacity of main (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  17. Causes and Correlates of Intrusive Memory: a response to Clark, MacKay, Holmes and Bourne.Christopher Mole - 2016 - Psychological Medicine 46 (15):3255-3258.
    Download  
     
    Export citation  
     
    Bookmark  
  18. (1 other version)Enforcement Rights Against Non‐Culpable Non‐Just Intrusion.Peter Vallentyne - 2011 - Ratio 24 (4):422-442.
    I articulate and defend a principle governing enforcement rights in response to a non‐culpable non‐just rights‐intrusion (e.g., wrongful bodily attack by someone who falsely, but with full epistemic justification, believes that he is acting permissibly). The account requires that the use of force reduce the harm from such intrusions and is sensitive to the extent to which the intruder is agent‐responsible for imposing intrusion‐harm.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  19.  94
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  20.  35
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  91
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Review of F. Vera-Gray's Men's Intrusion, Women's Embodiment: A Critical Analysis of Street Harassment. [REVIEW]Debra L. Jackson - 2018 - Hypatia Reviews Online:nd.
    Download  
     
    Export citation  
     
    Bookmark  
  23. The attributive/referential distinction, pragmatics, modularity of mind and modularization.Alessandro Capone - 2011 - Australian Journal of Linguistics 31 (2): 153-186.
    attributive/referential. Pragmatic intrusion.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  24. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  25.  92
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. On the tension between semantics and pragmatics.Alessandro Capone - 2013 - RASK: International Journal of Language and Communication 37:5-38.
    Loci of pragmatic intrusion signal the tension between semantics and pragmatics. -/- .
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Consequences of the pragmatics of 'de se'.Alessandro Capone - 2013 - In Neil Feit & Alessandro Capone, Attitudes De Se: Linguistics, Epistemology, Metaphysics. CSLI Publications. pp. 209-244..
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results demonstrate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. (1 other version)A child in a language environment: ascent from reason to mind and wisdom.Yuriy Rotenfeld - unknown
    The aggressive intrusion of science, technology and technology into the space of children as the least protected social group requires their protection from aggressive anthropologically-oriented practices. However, regularly conducted theoretical discussions of this problem do not lead to the solution of the problem of the ecology of childhood, since only one of the possible forms of understanding reality has been fixed within the framework of the international humanitarian and scientific community. We are talking about conceptual reasoning thinking, which is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. On the social practice of indirect reports.Alessandro Capone - 2010 - Journal of Pragmatics 42: 377-391.
    I propose some rules that regiment substitutions of NPs.
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  31. Totally Administered Heteronomy: Adorno on Work, Leisure, and Politics in the Age of Digital Capitalism.Craig Reeves & Matthew Sinnicks - 2024 - Journal of Business Ethics 193 (2):285–301.
    This paper aims to demonstrate the contemporary relevance of Adorno’s thought for business ethicists working in the critical tradition by showing how his critique of modern social life anticipated, and offers continuing illumination of, recent technological transformations of capitalism. It develops and extrapolates Adorno’s thought regarding three central spheres of modern society, which have seen radical changes in light of recent technological developments: work, in which employee monitoring has become ever more sophisticated and intrusive; leisure consumption, in which the algorithmic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Transparency is Surveillance.C. Thi Nguyen - 2021 - Philosophy and Phenomenological Research 105 (2):331-361.
    In her BBC Reith Lectures on Trust, Onora O’Neill offers a short, but biting, criticism of transparency. People think that trust and transparency go together but in reality, says O'Neill, they are deeply opposed. Transparency forces people to conceal their actual reasons for action and invent different ones for public consumption. Transparency forces deception. I work out the details of her argument and worsen her conclusion. I focus on public transparency – that is, transparency to the public over expert domains. (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  33. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry:1-16.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. What Is Intimacy?Jasmine Gunkel - 2024 - Journal of Philosophy 121 (8):425-456.
    Why is it more violating to grab a stranger’s thigh or stroke their face than it is to grab their forearm? Why is it worse to read someone’s dream journal without permission than it is to read their bird watching field notes? Why are gestation mandates so incredibly intrusive? Intimacy is key to understanding these cases, and to explaining many of our most stringent rights. -/- I present two ways of thinking about intimacy, Relationship-First Accounts and the Intimate Zones Account. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Folk Intuitions about Free Will and Moral Responsibility: Evaluating the Combined Effects of Misunderstandings about Determinism and Motivated Cognition.Kiichi Inarimori, Yusuke Haruki & Kengo Miyazono - 2024 - Cognitive Science 48 (11):e70014.
    In this study, we conducted large-scale experiments with novel descriptions of determinism. Our goal was to investigate the effects of desires for punishment and comprehension errors on people’s intuitions about free will and moral responsibility in deterministic scenarios. Previous research has acknowledged the influence of these factors, but their total effect has not been revealed. Using a large-scale survey of Japanese participants, we found that the failure to understand causal determination (intrusion) has limited effects relative to other factors and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. “Extimate” Technologies and Techno-Cultural Discontent.Hub Zwart - 2017 - Techné: Research in Philosophy and Technology 21 (1):24-54.
    According to a chorus of authors, the human life-world is currently invaded by an avalanche of high-tech devices referred to as “emerging,” ”intimate,” or ”NBIC” technologies: a new type of contrivances or gadgets designed to optimize cognitive or sensory performance and / or to enable mood management. Rather than manipulating objects in the outside world, they are designed to influence human bodies and brains more directly, and on a molecular scale. In this paper, these devices will be framed as ‘extimate’ (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Intuitions About Free Will and the Failure to Comprehend Determinism.Thomas Nadelhoffer, Samuel Murray & Elise Dykhuis - 2023 - Erkenntnis 88 (6):2515-2536.
    Theories of free will are often measured against how well they capture everyday intuitions about free will. But what are these everyday intuitions, and what theoretical commitments do they express? Empirical methods have delivered mixed messages. In response, some free will theorists have developed error theories to undermine the credentials of countervailing intuitions. These efforts are predicated on the idea that people might misunderstand determinism in any of several ways. This paper sheds light on the comprehension problem. We first discuss (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. And Then the Hammer Broke: Reflections on Machine Ethics from Feminist Philosophy of Science.Andre Ye - forthcoming - Pacific University Philosophy Conference.
    Vision is an important metaphor in ethical and political questions of knowledge. The feminist philosopher Donna Haraway points out the “perverse” nature of an intrusive, alienating, all-seeing vision (to which we might cry out “stop looking at me!”), but also encourages us to embrace the embodied nature of sight and its promises for genuinely situated knowledge. Current technologies of machine vision – surveillance cameras, drones (for war or recreation), iPhone cameras – are usually construed as instances of the former rather (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a great (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  40. Shared encoding and the costs and benefits of collaborative recall.Celia Harris, Amanda Barnier & John Sutton - 2013 - Journal of Experimental Psychology: Learning, Memory, and Cognition 39 (1):183-195.
    We often remember in the company of others. In particular, we routinely collaborate with friends, family, or colleagues to remember shared experiences. But surprisingly, in the experimental collaborative recall paradigm, collaborative groups remember less than their potential, an effect termed collaborative inhibition. Rajaram and Pereira-Pasarin (2010) argued that the effects of collaboration on recall are determined by “pre-collaborative” factors. We studied the role of 2 pre-collaborative factors—shared encoding and group relationship—in determining the costs and benefits of collaborative recall. In Experiment (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  41. Introduction.Thomas Douglas & David Birks - 2018 - In David Birks & Thomas Douglas, Treatment for Crime: Philosophical Essays on Neurointerventions in Criminal Justice. Oxford: Oxford University Press.
    Crime-preventing neurointerventions (CPNs) are increasingly being used or advocated for crime prevention. There is increasing use of testosterone-lowering agents to prevent recidivism in sexual offenders, and strong political and scientific interest in developing pharmaceutical treatments for psychopathy and anti-social behaviour. Recent developments suggest that we may ultimately have at our disposal a range of drugs capable of suppressing violent aggression, and it is not difficult to imagine possible applications of such drugs in crime prevention. But should neurointerventions be used in (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  42. In Defence of Luck Egalitarianism.Carl Knight - 2005 - Res Publica 11 (1):55-73.
    This paper considers issues raised by Elizabeth Anderson’s recent critique of the position she terms ‘luck egalitarianism’. It is maintained that luck egalitarianism, once clarified and elaborated in certain regards, remains the strongest egalitarian stance. Anderson’s arguments that luck egalitarians abandon both the negligent and prudent dependent caretakers fails to account for the moderate positions open to luck egalitarians and overemphasizes their commitment to unregulated market choices. The claim that luck egalitarianism insults citizens by redistributing on the grounds of paternalistic (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  43.  17
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Role of Inner Speech in Executive Functioning Tasks: Schizophrenia With Auditory Verbal Hallucinations and Autistic Spectrum Conditions as Case Studies.Valentina Petrolini, Marta Jorba & Agustín Vicente - 2020 - Frontiers in Psychology 11.
    Several theories propose that one of the core functions of inner speech (IS) is to support subjects in the completion of cognitively effortful tasks, especially those involving executive functions (EF). In this paper we focus on two populations who notoriously encounter difficulties in performing EF tasks, namely, people diagnosed with schizophrenia who experience auditory verbal hallucinations (Sz-AVH) and people within the Autism Spectrum Conditions (ASC). We focus on these two populations because they represent two different ways in which IS can (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45. Responsibility, Paternalism and Alcohol Interlocks.Kalle Grill & Jessica Fahlquist - 2012 - Public Health Ethics 5 (2):116-127.
    Drink driving causes great suffering and material destruction. The alcohol interlock promises to eradicate this problem by technological design. Traditional counter-measures to drink driving such as policing and punishment and information campaigns have proven insufficient. Extensive policing is expensive and intrusive. Severe punishment is disproportionate to the risks created in most single cases. If the interlock becomes inexpensive and convenient enough, and if there are no convincing moral objections to the device, it may prove the only feasible as well as (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  46. La logique symbolique en débat à Oxford à la fin du XIXe siècle : les disputes logiques de Lewis Carroll et John Cook Wilson.Mathieu Marion & Amirouche Moktefi - 2014 - Revue D’Histoire des Sciences 67 (2):185-205.
    The development of symbolic logic is often presented in terms of a cumulative story of consecutive innovations that led to what is known as modern logic. This narrative hides the difficulties that this new logic faced at first, which shaped its history. Indeed, negative reactions to the emergence of the new logic in the second half of the nineteenth century were numerous and we study here one case, namely logic at Oxford, where one finds Lewis Carroll, a mathematical teacher who (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  47. Drinking in the last chance saloon: luck egalitarianism, alcohol consumption, and the organ transplant waiting list.Andreas Albertsen - 2016 - Medicine, Health Care and Philosophy 19 (2):325-338.
    The scarcity of livers available for transplants forces tough choices upon us. Lives for those not receiving a transplant are likely to be short. One large group of potential recipients needs a new liver because of alcohol consumption, while others suffer for reasons unrelated to their own behaviour. Should the former group receive lower priority when scarce livers are allocated? This discussion connects with one of the most pertinent issues in contemporary political philosophy; the role of personal responsibility in distributive (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  48. Lost in the socially extended mind: Genuine intersubjectivity and disturbed self-other demarcation in schizophrenia.Tom Froese & Joel Krueger - 2020 - In Christian Tewes & Giovanni Stanghellini, Time and Body: Phenomenological and Psychopathological Approaches. New York, NY: Cambridge University Press. pp. 318-340.
    Much of the characteristic symptomatology of schizophrenia can be understood as resulting from a pervasive sense of disembodiment. The body is experienced as an external machine that needs to be controlled with explicit intentional commands, which in turn leads to severe difficulties in interacting with the world in a fluid and intuitive manner. In consequence, there is a characteristic dissociality: Others become problems to be solved by intellectual effort and no longer present opportunities for spontaneous interpersonal alignment. This dissociality goes (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Mrs. Aremac and the camera: A response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection for these (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  50. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 85