Results for 'Online security'

1000+ found
Order:
  1.  58
    Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
    This article motions to a real contradiction between online security and civil rights. It traverses semantic and conceptual elaborations of both security and human rights, narrowing their range to national security and human rather than civil rights, and suggests that the concept of security itself, whether online or not, is a rhetorical instrument in the hands of interested parties, mostly states and militaries. This instrument is used to undermine human rights precisely by means of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  2. Balance or Trade-off? Online Security Technologies and Fundamental Rights.Mireille Hildebrandt - 2013 - Philosophy and Technology 26 (4):357-379.
    In this contribution, I will argue that the image of a balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought, I will explore the relationship between online security technologies and fundamental rights, notably privacy, nondiscrimination, freedom of speech and due process. After discriminating between three types of online security technologies, I will trace the reconfiguration of the notion of privacy in the era of smart environments. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  3.  86
    Online Security and the Protection of Civil Rights: A Legal Overview. [REVIEW]Ugo Pagallo - 2013 - Philosophy and Technology 26 (4):381-395.
    The paper examines the connection between online security and the protection of civil rights from a legal viewpoint, that is, considering the different types of rights and interests that are at stake in national and international law and whether, and to what extent, they concern matters of balancing. Over the past years, the purpose of several laws, and legislative drafts such as ACTA, has been to impose “zero-sum games”. In light of current statutes, such as HADOPI in France, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  4.  2
    Framing Effects on Online Security Behavior.Nuria Rodríguez-Priego, René van Bavel, José Vila & Pam Briggs - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Can Trust be Secured Online? A theoretical perspective.Helen Nissenbaum - 1999 - Etica E Politica 1 (2).
  6.  7
    An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM.Chandrashekhar Meshram, Rabha W. Ibrahim & Rafida M. Elobaid - 2022 - Complexity 2022:1-11.
    Chaos distributes with a covert method to condense the dynamic of complexity and satisfies the security requirements of a cryptographic system. This study gives an ability online/offline ID-based short signature scheme using conformable fractional chaotic maps. Furthermore, we establish its security under IBSS existential unforgeability of identity-based short signature under chosen message attack in the random oracle model. Some of the stimulating preparations of obtainable processes are that they give a multiperiod application of the offline storage, which (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  12
    The online users’ perceptions toward electronic government services.Mark Anthony Camilleri - 2019 - Journal of Information, Communication and Ethics in Society 18 (2):221-235.
    Purpose This study aims to examine the individuals’ perceived usefulness and ease of use of the government’s electronic services. It also explores the effect of the social influences, as well as of the facilitating conditions, on the individuals’ intentions to use the government’s digital and mobile services. Design/methodology/approach The researcher has adapted various measuring items from the unified theory of acceptance and use of technology and from the theory of acceptance model to investigate the participants’ utilitarian motivations to engage with (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  42
    Precision Security: Integrating Video Surveillance with Surrounding Environment Changes.Wenfeng Wang, Xi Chen, Guiwei Zhang, Jing Qian, Peng Wei, Boqian Wu & Hongwei Zheng - 2018 - Complexity 2018:1-10.
    Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. This article presents a brain-inspired computing of attention value of surrounding environment changes with a processes-based cognition model by introducing a ratio valueλof EC-implications within considered periods. Theoretical models for computation of warning level of EC-implications to the universal video recognition efficiency are further established. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  10
    Online Learning: A User-Friendly Approach for High School and College Students.Leslie Bowman & J. Michael Tighe Jr - 2010 - R&L Education.
    This book has strategies and tips that every online professor wants students to know before they sign up for an online class. Bowman has provided a reference tool for students to develop self-directed learning skills that will help them become secure and knowledgeable about technology, studying, communicating online, and getting work done on time.
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Online Exclusive: For A Federation Of Democracies.John Davenport - 2009 - Ethics and International Affairs 23 (1).
    Davenport argues for a federation of democracies to replace the United Nations Security Council. This new level of government, he says, is necessary to achieve the international cooperation needed to manage a global economy and address global problems.
     
    Export citation  
     
    Bookmark   2 citations  
  12.  38
    Achieving online consent to participation in large-scale gene-environment studies: a tangible destination.F. Wood, J. Kowalczuk, G. Elwyn, C. Mitchell & J. Gallacher - 2011 - Journal of Medical Ethics 37 (8):487-492.
    Background Population based genetics studies are dependent on large numbers of individuals in the pursuit of small effect sizes. Recruiting and consenting a large number of participants is both costly and time consuming. We explored whether an online consent process for large-scale genetics studies is acceptable for prospective participants using an example online genetics study. Methods We conducted semi-structured interviews with 42 members of the public stratified by age group, gender and newspaper readership (a measure of social status). (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  20
    An Online Lab Examination Management System (OLEMS) to Avoid Malpractice.Manjur Kolhar, Abdalla Alameen & Zakaria Mokhtar Gharsseldien - 2018 - Science and Engineering Ethics 24 (4):1367-1369.
    Examination and evaluation are two important phases of education at any level of a student’s curriculum. However, these assessment processes are problematic in the sense that they encourage learners to devise ways to be dishonest. The traditional way of conducting exams is particularly conducive to dishonesty. In view of this, this letter proposes an online lab examination management system to prevent misconduct and to secure the process of lab examination.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  55
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  27
    The Ethics of Online Retailing: A Scale Development and Validation from the Consumers’ Perspective.Sergio Roman - 2007 - Journal of Business Ethics 72 (2):131-148.
    While e-commerce has witnessed extensive growth in recent years, so has consumers' concerns regarding ethical issues surrounding online shopping. The vast majority of earlier research on this area is conceptual in nature, and limited in scope by focusing on consumers' privacy issues. This study develops a reliable and valid scale to measure consumers' perceptions regarding the ethics of online retailers. Findings indicate that the four factors of the scale - security, privacy, non-deception and fulfillment/reliability - are strongly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  16.  17
    Use of Health-Related Online Sites.Amy M. Bovi - 2003 - American Journal of Bioethics 3 (3):48-52.
    This report offers recommendations to physicians who provide information or services through online sites. The recommendations maintain that physicians responsible for health-related information should ensure that it is accurate, timely, reliable, and scientifically sound. Also, advice to online users with whom physicians do not have preexisting relationships or the use of decision-support programs that generate personalized information directly transmitted to users should be consistent with general and specialty-specific standards. In particular, these standards should address truthfulness, protection of privacy, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  4
    Brill Online Books and Journals.Suzanne Tallichet, Christopher Hensley & Stephen Singer - 2005 - Society and Animals 13 (2):91-108.
    Studies investigating the specific methods for committing nonhuman animal cruelty have only begun to expose the complexities of this particular form of violence. This study used a sample of 261 male inmates surveyed at both medium- and maximum-security prisons. The study examined the influence of demographic attributes. It also examined situational factors and specific methods of animal cruelty. Regression analyses revealed that white inmates tended to shoot animals more frequently than did non-whites and were less likely to be upset (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  35
    Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.Yuval Elovici, Michael Fire, Amir Herzberg & Haya Shulman - 2014 - Science and Engineering Ethics 20 (4):1027-1043.
    Online social networks have rapidly become a prominent and widely used service, offering a wealth of personal and sensitive information with significant security and privacy implications. Hence, OSNs are also an important—and popular—subject for research. To perform research based on real-life evidence, however, researchers may need to access OSN data, such as texts and files uploaded by users and connections among users. This raises significant ethical problems. Currently, there are no clear ethical guidelines, and researchers may end up (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  44
    Worldwide Testing and Test Security Issues: Ethical Challenges and Solutions.David F. Foster - 2010 - Ethics and Behavior 20 (3-4):207-228.
    As psychology ethics begins to become more standardized and formalized globally (e.g., Gauthier, 2007) there are still educational, political, and psychological areas that require significant discussion. For example, test security has become a global issue, as psychological tests and even college entrance and graduate school admission tests have found their way online.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  27
    Hybrid Real-Time Protection System for Online Social Networks.Muneer Bani Yassein, Shadi Aljawarneh & Yarub Wahsheh - 2020 - Foundations of Science 25 (4):1095-1124.
    The impact of Online Social Networks on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their ideas, photos, daily life events, feelings and news. Since OSNs’ security and privacy challenges are more potential than ever before, it is necessary to enhance the protection and filtering approaches of OSNs contents. This paper explores OSNs’ threats and challenges, and categorize them into: account-based, URL-based and content-based threats. In addition, we analyze (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  55
    The introduction of online authentication as part of the new electronic national identity card in Germany.Torsten Noack & Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):87-110.
    This chapter provides an analysis of the long process of introducing an electronic identity for online authentication in Germany. This process is described as a multi-facet innovation, involving actors from different policy fields shifting over time. The eID process started in the late ‘90s in the context of eGovernment and eCommerce with the legislation on e-signatures, which were supposed to allow for online authentication of citizens. When after 5 years it was recognized that this was not the case, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  24.  62
    Historical records and homeland security: The declassification and retraction of government documents on human radiation experiments.Laura M. Calkins - 2008 - International Journal of Feminist Approaches to Bioethics 1 (2):165-173.
    Following press disclosures in 1993 that U.S. government agencies had been using human subjects in tests and trials involving radioactive isotopes since the mid-1940s, a major national initiative to locate and declassify records concerning these tests was initiated. The U.S. Department of Energy, which led the declassification effort, pledged that a new “culture of openness” would attend the management of classified documents in the future. Following the attacks on the United States in September 2001, this momentum was reversed. Declassification initiatives (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  25.  66
    The ethics of online retailing: A scale development and validation from the consumers' perspective. [REVIEW]Sergio Roman - 2007 - Journal of Business Ethics 72 (2):131-148.
    While e-commerce has witnessed extensive growth in recent years, so has consumers’ concerns regarding ethical issues surrounding online shopping. The vast majority of earlier research on this area is conceptual in nature, and limited in scope by focusing on consumers’ privacy issues. This study develops a reliable and valid scale to measure consumers’ perceptions regarding the ethics of online retailers. Findings indicate that the four factors of the scale – security, privacy, non-deception and fulfillment/reliability – are strongly (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  26.  46
    The Nature of and Conditions for Online Trust.Daryl Koehn - 2003 - Journal of Business Ethics 43 (1/2):3 - 19.
    As use of the Internet has increased, many issues of trust have arisen. Users wonder: will may privacy be protected if I provide information to this Internet vendor? Will my credit card remain secure? Should I trust that this party will deliver the goods? Will the goods be as described? These questions are not merely academic. A recent Boston Consulting Group study revealed that one out of ten consumers have ordered and paid for items online that never were delivered (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  27.  4
    Synbiosafe e-conference:online community discussion on the societal aspects of synthetic biology.M. Schmidt, H. Torgersen, A. Ganguli-Mitra, A. Kelle, Anna Https://Orcidorg Deplazes & N. Https://Orcidorg Biller-Andorno - 2008 - .
    As part of the SYNBIOSAFE project, we carried out an open electronic conference (e-conference), with the aim to stimulate an open debate on the societal issues of synthetic biology in a proactive way. The e-conference attracted 124 registered participants from 23 different countries and different professional backgrounds, who wrote 182 contributions in six different categories: (I) Ethics; (II) Safety; (III) Security; (IV) IPR; (V) Governance and regulation; (VI) and Public perception. In this paper we discuss the main arguments brought (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  28.  12
    “The modesty guard” reflected in online comments in mainstream news sites.Shirley Druker Shitrit, Smadar Ben-Asher & Ella Ben-Atar - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose At times, a traditional minority group that opposes a change in the patriarchal structure is violent toward women who wish to adopt modern lifestyles. This study aims to examine online comments regarding a shooting at a café in an Arab-Bedouin city in Israel, where women were employed as servers. The event was framed in Israeli media as an act of backlash by young men, who call themselves “The Modesty Guard.” Design/methodology/approach In this qualitative study, the authors collected 916 (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. Sentiment analysis on online social network.Vijaya Abhinandan - forthcoming - International Journal of Computer Science, Information Technology, and Security.
    A large amount of data is maintained in every Social networking sites.The total data constantly gathered on these sites make it difficult for methods like use of field agents, clipping services and ad-hoc research to maintain social media data. This paper discusses the previous research on sentiment analysis.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  31
    The development of guidelines for implementing information technology to promote food security.Stephen E. Gareau - 2004 - Agriculture and Human Values 21 (4):273-285.
    Food insecurity, and its extreme form, hunger, occur whenever the accessibility to an adequate supply of nutritional and safe foods becomes restricted or unpredictable. They are recurring problems in certain regions of the US, as well as in many parts of the world. According to nation-wide surveys conducted by the US Bureau of the Census, between 1996 and 1998 an estimated 9.7% of US households were classified as food insecure (6.2% being food insecure without evidence of hunger, and 3.5% being (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  8
    Enhancing academic integrity in a UAE safety, security defence emergency management academy – the Covid- 19 response and beyond.Rami Al Sharefeen & Amanda Davies - 2022 - International Journal for Educational Integrity 18 (1).
    Globally, academic integrity and misconduct is a continuing conundrum for education institutions. Whilst the online delivery of education is not new, the onset of Covid-19 with accompanying health and safety limitations and the consequential rapid transition to emergency online delivery of education has, for many, exacerbated the need to focus on emerging potential for new forms of student academic misconduct i.e., e-dishonesty. This paper presents the strategies developed by a higher education institution specializing in university courses for safety (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  27
    ‘A flood of Syrians has slowed to a trickle’: The use of metaphors in the representation of Syrian refugees in the online media news reports of host and non-host countries.Zuhair Abdul Amir Abdul Rahman, Shakila Abdul Manan & Raith Zeher Abid - 2017 - Discourse and Communication 11 (2):121-140.
    Numerous studies have examined the manner in which minority groups, including refugees, are depicted in the media discourse of the host countries or the dominant majority groups. The results of such studies indicate that media systematically discriminate these minority groups and deem them as a security, economic and hygiene threat to the majority groups. Through the use of Lakoff and Jonson’s conceptual metaphor theory, this study compares and contrasts the representation of Syrian refugees in the online media discourse (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  33.  68
    Proceedings of First Online Session of SPPIS, Haryana.Desh Raj Sirswal - manuscript
    First Session of Society for Positive Philosophy and Interdisciplinary Studies (SPPIS), Haryana on the theme -/- “The Contribution of Contemporary Indian Philosophy to World Philosophy” -/- 30th June, 2012 -/- Organizes by Centre for Positive Philosophy and Interdisciplinary Studies (CPPIS), Milestone Education Society (Regd), Pehowa,(Kurukshetra)-136128 (HARYANA) -/- Preface -/- Part-I: Contemporary Indian Philosophers -/- Swami Vivekananda’s response towards religious fanaticism -/- Swami Vivekananda philosophises Easts in the West -/- Four Yogas and the Uniqueness of Swami Vivekananda’s Philosophy -/- The Ethics (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  20
    Proceedings of First Online Session of SPPIS, Haryana.Desh Raj Sirswal - manuscript
    First Session of Society for Positive Philosophy and Interdisciplinary Studies (SPPIS), Haryana on the theme -/- “The Contribution of Contemporary Indian Philosophy to World Philosophy” -/- 30th June, 2012 -/- Organizes by Centre for Positive Philosophy and Interdisciplinary Studies (CPPIS), Milestone Education Society (Regd), Pehowa,(Kurukshetra)-136128 (HARYANA) -/- Preface -/- Part-I: Contemporary Indian Philosophers -/- Swami Vivekananda’s response towards religious fanaticism -/- Swami Vivekananda philosophises Easts in the West -/- Four Yogas and the Uniqueness of Swami Vivekananda’s Philosophy -/- The Ethics (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35. An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications.Markus Christen, Thomas Burri, Joseph O. Chapa, Raphael Salvi, Filippo Santoni de Sio & John P. Sullins - 2017 - University of Zurich Digital Society Initiative White Paper Series, No. 1.
    We propose a multi-step evaluation schema designed to help procurement agencies and others to examine the ethical dimensions of autonomous systems to be applied in the security sector, including autonomous weapons systems.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  14
    Understanding the promises and premises of online health platforms.Thomas Poell & José Van Dijck - 2016 - Big Data and Society 3 (1).
    This article investigates the claims and complexities involved in the platform-based economics of health and fitness apps. We examine a double-edged logic inscribed in these platforms, promising to offer personal solutions to medical problems while also contributing to the public good. On the one hand, online platforms serve as personalized data-driven services to their customers. On the other hand, they allegedly serve public interests, such as medical research or health education. In doing so, many apps employ a diffuse discourse, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Bush’s national security strategy.William Gay - manuscript
     
    Export citation  
     
    Bookmark  
  38.  39
    The Perceptions of Consumers Regarding Online Retailers’ Ethics and Their Relationship with Consumers’ General Internet Expertise and Word of Mouth: A Preliminary Analysis.Sergio Román & Pedro J. Cuestas - 2008 - Journal of Business Ethics 83 (4):641-656.
    Ethical concerns of Internet users continue to rise. Accordingly, several scholars have called for systematic empirical research to address these issues. This study examines the conceptualization and measurement of consumers' perceptions regarding the ethics of online retailers. Also, this research represents a first step into the analysis of the relationship between CPEOR, consumers' general Internet expertise and reported positive word of mouth. Results, from a convenience sample of 357 online shoppers, suggest that CPEOR can be operationalized as a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  39. To Colorize a Worldview Painted in Black and White : Philosophical dialogues to reduce the influence of extremism on youths online.Daniella Nilsson, Viktor Gardelli, Ylva Backman & Teodor Gardelli - 2015 - International Journal of Humanities and Social Science 5 (1):64-70.
    A recent report by the Swedish National Council for Crime Prevention in cooperation with the Swedish Security Service shows that the Internet has been extensively used to spread propaganda by proponents of violent political extremism, characterized by a worldview painted in black and white, an anti-democratic viewpoint, and intolerance towards persons with opposing ideas. We provide five arguments suggesting that philosophical dialogue with young persons would be beneficial to their acquisition of insights, attitudes and thinking tools for encountering such (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  40.  8
    Teaching Strategies and Psychological Effects of Entrepreneurship Education for College Students Majoring in Social Security Law Based on Deep Learning and Artificial Intelligence.Qinlei Zhu & Hao Zhang - 2022 - Frontiers in Psychology 13.
    This study aims to achieve the goal of cultivating and reserving emerging professional talents in social security law, improve the curriculum and mechanism of entrepreneurship education, and improve students’ entrepreneurial willingness and entrepreneurial ability. Deep learning technology is used to study the psychological effects of entrepreneurship education for college students majoring in social security law. Firstly, the concept of entrepreneurial psychology is elaborated and summarized. A related model is designed using the theory of proactive personality and planned behavior (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  49
    The perceptions of consumers regarding online retailers' ethics and their relationship with consumers' general internet expertise and word of mouth: A preliminary analysis. [REVIEW]Sergio Román & Pedro J. Cuestas - 2008 - Journal of Business Ethics 83 (4):641 - 656.
    Ethical concerns of Internet users continue to rise. Accordingly, several scholars have called for systematic empirical research to address these issues. This study examines the conceptualization and measurement of consumers' perceptions regarding the ethics of online retailers (CPEOR). Also, this research represents a first step into the analysis of the relationship between CPEOR, consumers' general Internet expertise and reported positive word of mouth (WOM). Results, from a convenience sample of 357 online shoppers, suggest that CPEOR can be operationalized (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  42.  9
    Technology: COVID-19 and the ‘New-Normal’ Lifestyle vs. Security Challenges.Visar Shehu & Adrian Besimi - 2020 - Seeu Review 15 (1):71-85.
    In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily relied on online tools to communicate among each other and with the public, it is quite evident that they have not been well prepared to adopt (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  7
    Mastering the Future: Power and the Futural Logic of Security.Torsten Menge - 2023 - Developing Critical Security Studies From Doha.
  44.  11
    The emergence of ethical issues in the provision of online sexual health outreach for gay, bisexual, two-spirit and other men who have sex with men: perspectives of online outreach workers.Sophia Fantus, Rusty Souleymanov, Nathan J. Lachowsky & David J. Brennan - 2017 - BMC Medical Ethics 18 (1):59.
    Mobile applications and socio-sexual networking websites are used by outreach workers to respond synchronously to questions and provide information, resources, and referrals on sexual health and STI/HIV prevention, testing, and care to gay, bisexual and other men who have sex with men. This exploratory study examined ethical issues identified by online outreach workers who conduct online sexual health outreach for GB2M. Semi-structured individual interviews were conducted between November 2013 and April 2014 with online providers and managers to (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  45.  5
    Data leaking scandal, risks, and financial consumption behaviors in online tourism platforms: The role of trust on college students and teachers.Mingfen Feng, Bin Hu, Yaqi Tian & Huabing Wang - 2022 - Frontiers in Psychology 13.
    Given the importance of data safety for psychology, the present study investigated the influence of data leaking scandal on campus customers’ financial consumption behaviors at intelligent tourism platforms in China, and explored the roles that individual characteristics play in this process by focusing on a set of participants from colleges. Data were collected through sending out an online questionnaire, where respondents were asked to finish a series of questions about their background information, their trust, future consuming intention, and defensive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  11
    Do Wealth Managers Understand Codes of Conduct and Their Ethical Dilemmas? Lessons from an Online Survey.Ewa Lombard & Rajna N. GibsonBrandon - 2023 - Journal of Business Ethics 189 (3):553-572.
    How do wealth managers understand and comply with the social norms embedded in banks’ codes of conduct (CoC), and how do they cope with ethical dilemmas? Do they have a tendency after the global financial crisis to prioritize banks’ financial security over clients’ interests? To answer these and related questions, we conduct a nonincentivized online survey with wealth management employees of the Swiss legal entity of a large multinational bank. We propose a method to estimate the comprehension and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  81
    Schanbacer, William D: The Politics of Food: The Global Conflict Between Food Security and Food Sovereignty: Praeger, Santa Barbara, CA, 2010, ISBN: 978-0-313-36328-3, $34.95 hardback. [REVIEW]Cornelia Butler Flora - 2011 - Journal of Agricultural and Environmental Ethics 24 (5):545-547.
    Schanbacer, William D: The Politics of Food: The Global Conflict Between Food Security and Food Sovereignty Content Type Journal Article DOI 10.1007/s10806-010-9267-1 Authors Cornelia Butler Flora, Iowa State University 317 East Hall Ames IA 50011-1070 USA Journal Journal of Agricultural and Environmental Ethics Online ISSN 1573-322X Print ISSN 1187-7863.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  48.  24
    Ethical considerations of using information obtained from online file sharing sites.Aimee van Wynsberghe & Jeroen van der Ham - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):256-267.
    Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data collected from an online file-sharing site known as The PirateBay. Since the creation of Napster back in the late 1990s for the sharing and distribution of MP3 files across the Internet, the entertainment industry has struggled to deal with the regulation of information sharing at large. Added to the ethical questions of censorship and distributive justice are questions related to the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  16
    Heteroglossia and Identifying Victims of Violence and Its Purpose as Constructed in Terrorist Threatening Discourse Online.Awni Etaywe - 2023 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (2):907-937.
    Unlike one-to-one threats, terrorist threat texts constitute a form of violence and a language crime that is committed in a complex context of public intimidation, and are communicated publicly and designed strategically to force desired sociopolitical changes [19]. Contributing to law enforcement and threat assessors’ fuller understanding of the discursive nature of threat texts in terrorism context, this paper examines how language is used dialogically to communicate threats and to construct both the purpose of threatened actions and the victims. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  11
    Buchbesprechungen.5/04Published Online: - 2009 - Kant Studien 100 (1):252-284.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000