Results for 'Nigerian cyber fraudsters'

927 found
Order:
  1. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  2.  84
    The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  23
    Cheques or dating scams? Online fraud themes in hip-hop songs across popular music apps.Suleman Lazarus, Olaigbe Olaigbe, Ayo Adeduntan, Tochukwu Dibiana, Edward & Uzoma OKolorie, Geoffrey - 2023 - Journal of Economic Criminology 2:1-17.
    How do hip-hop songs produced from 2017 to 2023 depict and rationalize online fraud? This study examines the depiction of online fraudsters in thirty-three Nigerian hip-hop songs on nine popular streaming platforms such as Spotify, Deezer, iTunes, SoundCloud, Apple Music, and YouTube. Using a directed approach to qualitative content analysis, we coded lyrics based on the moral disengagement mechanism and core themes derived from existing literature. Our findings shed light on how songs (a) justify the fraudulent actions of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. What Nigerian hip-hop lyrics have to say about the country’s Yahoo Boys.Suleman Lazarus - 2019 - The Conversation.
    The article is based on lyrics from 2007 to 2017 involving 18 hip-hop artists. All the songs I studied were by male singers apart from one entitled, “Maga no need pay,” which involved seven multiple artists. In all the songs, the glamorization of cybercrime and cybercriminals was one of the most significant themes. The implications are discussed.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  2
    Proverbs 4:10–19 and the growing spate of Internet fraud amongst Nigerian youths.Favour C. Uroko - 2021 - HTS Theological Studies 77 (4):7.
    This research article examines the increasing spate of youths who engage in fraudulent Internet activities in Nigeria in the light of Proverbs 4:10–19. Nigerian youths are fast becoming impatient with their quest for wealth. This had led many of them to engage in high-level fraudulent Internet activities. It has come to a point where Internet fraudsters opened schools to teach prospecting youths how to make money fast. The circle keeps expanding on a daily basis. Their victims include the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  22
    Lexical trends in Facebook and Twitter texts of selected Nigerian Pentecostal churches: A stylistic inquiry.Lily Chimuanya, Christopher Awonuga & Innocent Chiluwa - 2018 - Semiotica 2018 (224):45-83.
    The influx of religious activities and religious discourse on the Internet has made it pertinent to examine the fundamental roles of language in the expression, presentation, understanding, and advancement of any set of religious beliefs and practices. One main aspect of online religious activities that continues to arrest the attention of scholars is the uniqueness of language used by religious practitioners. For instance, new linguistic strategies and devices have emerged as a result of bending language to suit trends on a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  18
    Discursive-manipulative strategies in scam emails and SMS: The Nigerian perspective.Temitope Michael Ajayi - 2022 - Lodz Papers in Pragmatics 18 (1):175-195.
    Cyber scam, a subculture in Nigeria, especially among youths, has been under-investigated from the linguistic perspective. This study thus explores discursive-manipulative strategies in scam emails and SMS/messages in Nigeria, drawing samples from a corpus of over 200 emails and 50 SMS documented between 2018 and 2022. With insights from Brown and Levinson’s face, Mey’s pragmatic act and McCronack’s information manipulation theories, it is observed that discursive manipulative strategies such as positive and negative false alarm, self-denigration, formulaic, and evocation of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  10. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”).Suleman Lazarus, Mark Button & Afe Adogame - 2022 - Heliyon Journal 8 (11):1-10.
    This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and politicians? The study undertakes a qualitative analysis of ‘engaged’ tweets of an elite law enforcement agency in West Africa. We analyzed and coded over 100,000 ‘engaged’ tweets based on a component of mechanisms of moral disengagement (i.e., advantageous comparison), a linguistic device. The results reveal how respondents defend the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  72
    A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  12. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  13. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  8
    Fraudsters operate and officialdom turns a blind eye: a proposal for controlling stem cell therapy in China.Li Jiang & Bing He Dong - 2016 - Medicine, Health Care and Philosophy 19 (3):403-410.
    Stem cell tourism—the flow of patients from home countries to destination countries to obtain stem cell treatment—is a growing business in China. Many concerns have been raised regarding fraudsters that operate unsafe stem cell therapies and an officialdom that turns a blind eye to the questionable technology. The Chinese regulatory approach to stem cell research is based on Guidelines and Administrative Measures, rather than legislation, and may have no binding force on certain institutions, such as military hospitals. There is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. Nigerian Music and the Black Diaspora in the USA : African Identity, Black Power, and the Free Jazz of the 1960s.Martin A. M. Gansinger & Ayman Kole - 2016 - In Martin A. M. Gansinger & Ayman Kole (eds.), From Tribal to Digital - Effects of Tradition and Modernity on Nigerian Media and Culture. Scholars Press. pp. 15-44.
    This article is the attempt of an historically oriented analysis focused on the role of Nigerian music as a cultural hub for the export of African cultural influences into the Black diaspora in the United States and its anticipation by the Free Jazz/Avantgarde-scene as well as the import of key-values related to the Black Power-movement to the African continent. The aim is to demonstrate the leading role and international impact of Nigeria's cultural industry among sub-saharan African nation states and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  17.  9
    Nigerian Radicalism: Towards a New Definition via a Historical Survey.Adam Mayer - forthcoming - Historical Materialism:1-36.
    Recent military coups in West Africa have put the continent’s democratisation itself into question. In some places, for the moment, these coups appear to have popular backing. Nigeria, where radicalism is firmly rooted in democratic values and a human-rights framework, the radical grassroots opposition to the Buhari government’s creeping authoritarianism lies drenched in blood. The roots of this development go back to the history of Nigeria’s radicalism in the twentieth century. Much has appeared on the global 1968 recently, including that (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  33
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  19.  26
    Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  27
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  16
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  86
    Afro cyber resistance: South African Internet art.Tabita Rezaire - 2014 - Technoetic Arts 12 (2):185-196.
    Looking at the digital–cultural–political means of resistance and media activism on the Internet, this article explores Internet art practices in South Africa as a manifestation of cultural dissent towards western hegemony online. Confronting the unilateral flow of online information, Afro Cyber Resistance is a socially engaged gesture aiming to challenge the representation of the African body and culture through online project. Talking as examples the WikiAfrica project, Cuss Group’s intervention Video Party 4 (VP4) and VIRUS SS 16 by artiste (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23.  12
    Cyber Teaming and Role Specialization in a Cyber Security Defense Competition.Norbou Buchler, Claire Genevieve La Fleur, Blaine Hoffman, Prashanth Rajivan, Laura Marusich & Lewis Lightner - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  64
    Nigerian business practices and their interface with virtue ethics.Eric C. Limbs & Timothy L. Fort - 2000 - Journal of Business Ethics 26 (2):169 - 179.
  25.  29
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  19
    Cyber-animism: the art of being alive in hybrid society.V. I. Arshinov, O. A. Grimov & V. V. Chekletsov - forthcoming - Philosophical Problems of IT and Cyberspace.
    The boundaries of social acceptance and models of convergence of human and non-human actors of digital reality are defined. The constructive creative possibilities of convergent processes in distributed neural networks are analyzed from the point of view of possible scenarios for building “friendly” human-dimensional symbioses of natural and artificial intelligence. A comprehensive analysis of new management challenges related to the development of cyber-physical and cybersocial systems is carried out. A model of social organizations and organizational behavior in the conditions (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  52
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  48
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  13
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  26
    Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  43
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I will (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  6
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  31
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  4
    Nigerian Arabic-English Dictionary.Manfred Woidich & Alan S. Kaye - 1988 - Journal of the American Oriental Society 108 (4):663.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  21
    Le cyber-terrorisme.Maura Conway - 2009 - Cités 39 (3):81.
    Après le 11 septembre 2001, un ressort essentiel des politiques américaines de renforcement de la « sécurité nationale » a pris la forme d’une insistance quasi paranoïaque sur les menaces potentiellement catastrophiques constituées par le cyber-terrorisme. Un grand nombre de commentateurs politiques, militaires ou économiques, ainsi que d’universitaires et de journalistes, ont envahi..
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  16
    The Cyber and the Subjective.Steve Jones - 1999 - In Ian Parker & Ángel J. Gordo-López (eds.), Cyberpsychology. New York: Routledge. pp. 221.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  33
    Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  26
    'Cyberation' and Just War Doctrine: A Response to Randall Dipert.Colonel James Cook - 2010 - Journal of Military Ethics 9 (4):411-423.
    In this essay, I reject the suggestion that the just war tradition (JWT) does not apply to cyberwarfare (CW). That is not to say CW will not include grey areas defying easy analysis in terms of the JWT. But analogously ambiguous cases have long existed in warfare without undercutting the JWT's broad relevance. That some aspects of CW are unique is likewise no threat to the JWT's applicability. The special character of CW remains similar enough to other kinds of warfare; (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  20
    Le cyber-communisme ou le dépassement du capitalisme dans le Cyberespace.Richard Barbrook - 2001 - Multitudes 2 (2):186-199.
    Richard Barbrook demonstrate that Americans are very good at doing the contrary of what they are supposed to abide by, i.e. capitalist commodification, and engage instead in a digital economy based on exchange, sharing and the free gift labor, idea, and practices. The tone may be ironic, or downwar facetious, but that should not detract from the issue at stake : the cyberage end of the line for a ’cognitive’ capitalism that will prove unable to surmount the « irresoluble contradictions (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  40
    Cyber-Marx: Cycles and Circuits of Struggle in High-Technology Capitalism.Enda Brophy - 2001 - Acm Sigcas Computers and Society 31 (1):22-23.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  41.  8
    Cyber Terrorism And Cyber Law - Duties Of Service Providers.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    The year 2017 has dawned in a new era. This is an era where cyber terrorism and cyber extremism are increasingly going to be significant factors in our day-to-day lives. Whether we like it or not, today social media platforms are infiltrated with cyber terrorists and cyber extremists. In addition, Cyber radicalization as a phenomenon is constantly on the rise.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. Nigerian studies in religious tolerance.C. S. Momoh (ed.) - 1988 - Lagos: National Association for Religious Tolerance.
    v. 1. Religions and their doctrines. -- v. 2. Religion and morality. -- v. 3. Religion and nation building. -- v. 4. Philosophy of religious tolerance.
     
    Export citation  
     
    Bookmark  
  43.  26
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  6
    Cyber Inclusion vs Isolation.Zhanna Vavilova - 2023 - Dialogue and Universalism 33 (1):77-90.
    Recent restrictions of movement during the pandemic have forced people worldwide, even neo-luddites, to turn to communicating online. The virtualization of social processes that we are witnessing today, suggests constant rethinking of the role of the Internet for humanity so that we could optimize conditions of our existence that seem to be irreversibly transformed by technology, and integrate every individual with a unique set of features in the life of society. The author deals with the notions of cyberinclusion, virtual ghetto, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  86
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  13
    Cyber(Body)Parts: Prosthetic Consciousness.Robert Rawdon Wilson - 1995 - Body and Society 1 (3-4):239-259.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49. Psychosocial Disorders of Nigerian Society: Its Causes and Remedy.John Ezenwankwor - 2021 - Journal of Philosophy and Ethics 3 (2):1-8.
    This review aimed at exploring the psychosocial disorders of Nigeria as a nation, its effect on the citizens and the remedy. Psychosocial disorder is a mental illness induced by life experiences, stress, as well as maladaptive cognitive and behavioural processes. The prevalence of these disorders include depression, schizophrenia, anxiety disorders, substance use disorder, personality disorder and autism spectrum disorders have rapidly increase over the past years in Nigeria with its negative impact on the socioeconomic status, psychological well-being; peaceful coexistence and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  86
    Hume – cyber-Hume – enactive Hume. Interview with Tom Froese.Tom Froese, Karolina Karmaza, Przemysław Nowakowski & Witold Wachowski - 2011 - Avant: Trends in Interdisciplinary Studies 2 (1):75-77.
    David Hume; Enactivism; Cognitive Science; Phenomenology; Philosophy of mind.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 927