Results for 'Cloud Secure Storage'

986 found
Order:
  1.  25
    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment.Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu & Na Chen - 2021 - Complexity 2021:1-12.
    This article starts with the analysis of the existing electronic commerce system, summarizes its characteristics, and analyzes and solves its existing problems. Firstly, the characteristics of the relational database My Structured Query Language and the distributed database HBase are analyzed, their respective advantages and disadvantages are summarized, and the advantages and disadvantages of each are taken into account when storing data. My SQL is used to store structured business data in the system, while HBase is used to store unstructured data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  18
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  66
    Crossing the Olentangy River: The Figure of the Earth and the Military-Industrial-Academic-Complex, 1947–1972.John Cloud - 2000 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 31 (3):371-404.
    This paper explores the history of a unique assemblage of researchers in the geodetic and allied sciences organised at Ohio State University (OSU) in 1947 at the beginning of the Cold War. From about 1950 to 1970, the OSU geodetic sciences group was the most significant group of geodetic researchers in the world. Funded almost entirely by military and intelligence agencies, they pioneered the technologies, organised the research initiatives, ordered the data sets, and trained the generation of geodesists who eventually (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  30
    Student reflections on the value of a professionalism module.Lynda Holland - 2013 - Journal of Information, Communication and Ethics in Society 11 (1):19-30.
    PurposeThe purpose of this paper is to analyze written reflections of final year computing students taking a professionalism module that covered the social, legal, professional and ethical aspects of computing. Society's dependence on computers makes it essential that computing students, whose future work may involve the analysis, storage and security of private data, are capable of identifying ethical issues and of making reflective moral judgements. The capacity to make moral judgements has been linked to an ability to reflect, so (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  16
    Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm.Yangting Huai & Qianxiao Zhang - 2021 - Complexity 2021:1-11.
    Guided by the theories of system theory, synergetic theory, and other disciplines and based on fuzzy data mining algorithm, this article constructs a three-tier social security fund cloud audit platform. Firstly, the article systematically expounds the current situation of social security fund and social security fund audit, such as the technical basis of cloud computing and data mining. Combined with the actual work, the necessity and feasibility of building a cloud audit platform for social security funds are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  83
    Timescapes of security: Clocks, clouds, and the complexity of security governance.Emilian Kavalski - 2009 - World Futures 65 (7):527 – 551.
    This article pulls together the disjointed complexification of security studies. Such analytical overview suggests that the perspective of “timescapes” allows for exploring the complexity that shapes meanings and practices of security and its governance. In this respect, it is the imperative to change that suggests the significance of complexity thinking to security studies—that is, it is alone in taking the discontinuities of global life seriously. Security, in this regard, is not merely about the clockwork of survival, but is redefined through (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  16
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  41
    Lockbox: mobility, privacy and values in cloud storage[REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
    This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Thinking in the Cloud: The Cognitive Incorporation of Cloud-Based Technology.Robert Clowes - 2015 - Philosophy and Technology 28 (2):261-296.
    Technologies and artefacts have long played a role in the structure of human memory and our cognitive lives more generally. Recent years have seen an explosion in the production and use of a new regime of information technologies that might have powerful implications for our minds. Electronic-Memory, powerful, portable and wearable digital gadgetry and “the cloud” of ever-present data services allow us to record, store and access an ever-expanding range of information both about and of relevance to our lives. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  10.  12
    Users’ Payment Intention considering Privacy Protection in Cloud Storage: An Evolutionary Game-Theoretic Approach.Jianguo Zheng & Jinming Chen - 2021 - Complexity 2021:1-15.
    To solve the current privacy leakage problems of cloud storage services, research on users’ payment intention for cloud storage services with privacy protection is extremely important for improving the sustainable development of cloud storage services. An evolutionary game model between cloud storage users and providers that considers privacy is constructed. Then, the model’s evolutionary stability strategies via solving the replication dynamic equations are analyzed. Finally, simulation experiments are carried out for verifying and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  17
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received cyber security event (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  62
    Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  19
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  64
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the user—the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  58
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two examples (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  16. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  10
    Deconstructing the cloud: Responses to Big Data phenomena from social sciences, humanities and the arts.Raymond Taudin Chabot & Sabine Niederer - 2015 - Big Data and Society 2 (2).
    The era of Big Data comes with the omnipresent metaphor of the Cloud, a term suggesting an ephemeral and seemingly endless storage space, unhindered by time and place. Similar to the satellite image of the Whole Earth, which was the icon of technological progress in the late 60s, the Cloud as a metaphor breathes the promise of technology, whilst obfuscating the hardware reality of server farms and software infrastructure necessary to enable the proliferation of data. This article (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  32
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, namely, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  13
    Hadoop-Based Painting Resource Storage and Retrieval Platform Construction and Testing.Chenhua Zu - 2021 - Complexity 2021:1-11.
    This paper adopts Hadoop to build and test the storage and retrieval platform for painting resources. This paper adopts Hadoop as the platform and MapReduce as the computing framework and uses Hadoop Distributed Filesystem distributed file system to store massive log data, which solves the storage problem of massive data. According to the business requirements of the system, this paper designs the system according to the process of web text mining, mainly divided into log data preprocessing module, log (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  21
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists of various (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  7
    5G Security Features, Vulnerabilities, Threats, and Data Protection in IoT and Mobile Devices: A Systematic Review.Alexandre Sousa & Manuel J. C. S. Reis - forthcoming - Evolutionary Studies in Imaginative Culture:414-427.
    The evolution of wireless communications, from the first to the fifth generation, has driven Internet of Things (IoT) advancements. IoT is transforming sectors like agriculture, healthcare, and transportation, but also presents challenges like spectrum bandwidth demand, speed requirements, and security issues. IoT environments, with embedded sensors and actuators, connect to other devices to transmit and receive data over the internet. These data are processed locally or in the cloud, enabling decision-making and automation. Various wireless technologies, including Bluetooth, Zigbee, LoRa, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  21
    Mental Images, Memory Storage, and Composition in the High Middle Ages.Mary J. Curruthers - 2008 - Das Mittelalter 13 (1):63-79.
    This essay explores the implications of a commonly held ancient and medieval belief that human memory and invention are, if not exactly the same, the closest thing to it. In order to create, in order to think at all, human beings require both a well-provisioned stock of memory-held knowledge and some mental tool or machine, an engine which lives in the intricate networks of their own memories. In the verbal arts of the trivium students learned the basic principles of memory (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  17
    Investigating consumers’ reluctance to give up local hard drives after adopting the Cloud.Joanne E. McNeish, Anthony Francescucci & Ummaha Hazra - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):152-166.
    Purpose The next phase of hardware technology development is focused on alternative ways to manage and store consumers’ personal content. However, even consumers who have adopted Cloud-based services have demonstrated a reluctance to move all of their personal content into the Cloud and continue to resist giving up local hard drives. This paper aims to investigate the characteristics of local hard drives and the Cloud that lead to simultaneous use. Design/methodology/approach This paper uses content analysis of online (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  37
    The Tasks of Climate Related Energy Ethics – The Example of Carbon Capture and Storage.Klaus Steigleder - 2017 - Jahrbuch für Wissenschaft Und Ethik 21 (1):121-146.
    Name der Zeitschrift: Jahrbuch für Wissenschaft und Ethik Jahrgang: 21 Heft: 1 Seiten: 121-146.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  69
    Gender relations in household grain storage management and marketing: the case of Binga District, Zimbabwe. [REVIEW]Joanne Manda & Brighton M. Mvumi - 2010 - Agriculture and Human Values 27 (1):85-103.
    This study uses the Locke and Okali gender analysis framework to explore gender relations surrounding grain storage management and marketing in Binga District of Zimbabwe. The study was conducted during one grain storage season and involved multiple visits to selected households, which were used as case studies. The main question that the study sought to address was: “What bargaining goes on between men and women in the area of stored grain management and marketing?” Data were collected from four (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  18
    Large language models in cryptocurrency securities cases: can a GPT model meaningfully assist lawyers?Arianna Trozze, Toby Davies & Bennett Kleinberg - forthcoming - Artificial Intelligence and Law:1-47.
    Large Language Models (LLMs) could be a useful tool for lawyers. However, empirical research on their effectiveness in conducting legal tasks is scant. We study securities cases involving cryptocurrencies as one of numerous contexts where AI could support the legal process, studying GPT-3.5’s legal reasoning and ChatGPT’s legal drafting capabilities. We examine whether a) GPT-3.5 can accurately determine which laws are potentially being violated from a fact pattern, and b) whether there is a difference in juror decision-making based on complaints (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  17
    An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM.Chandrashekhar Meshram, Rabha W. Ibrahim & Rafida M. Elobaid - 2022 - Complexity 2022:1-11.
    Chaos distributes with a covert method to condense the dynamic of complexity and satisfies the security requirements of a cryptographic system. This study gives an ability online/offline ID-based short signature scheme using conformable fractional chaotic maps. Furthermore, we establish its security under IBSS existential unforgeability of identity-based short signature under chosen message attack in the random oracle model. Some of the stimulating preparations of obtainable processes are that they give a multiperiod application of the offline storage, which licenses the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  5
    Jurisprudence in hard and soft law output of international organizations: a network analysis of the use of precedent in UN Security Council and general assembly resolutions.Rafael Mesquita & Antonio Pires - forthcoming - Artificial Intelligence and Law:1-30.
    Do hard law international organizations use jurisprudence differently than soft law ones? Precedent can be asset or an encumbrance to international organizations and their members, depending on their aims and on the policy area. Linking current decisions to previously-agreed ones helps to increase cohesion, facilitate consensus among members, and borrow authority – benefits that might be more necessary for some organizations than for others. To compare whether the features of norm-producing organizations correlate with their preference for jurisprudence, we compare two (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30. Meaningful electronic signatures based on an automatic indexing method.Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous & Nathanael Cottin - 2006 - Artificial Intelligence and Law 14 (3):161-175.
    Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in concern. Therefore, these new and evolving technologies offer powerful abilities, such as identification, authentication and certification. The latter contribute to increase the global security of legal digital archives conservation and access. However, currently used cryptographic and hash coding concepts cannot intrinsically enclose cognitive information about both the signer and the signed content. Indeed, an evolution of these (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  31.  18
    ‘Google wants to know your location’: The ethical challenges of fieldwork in the digital age.Sebastian van Baalen - 2018 - Research Ethics 14 (4):1-17.
    Information communications technologies like laptops, smartphones and portable storage devices facilitate travel, communication and documentation for researchers who conduct fieldwork. But despite increasing awareness about the ethical complications associated with using ICTs among journalists and humanitarians, there are few reflections on digital security among researchers. This article seeks to raise awareness of this important question by outlining three sets of ethical challenges related to digital security that may arise during the course of field research. These ethical challenges relate to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  77
    Identity management in GRID computing and Service Oriented Architectures: research and practice. [REVIEW]Theodora Varvarigou & Vassiliki Andronikou - 2009 - Identity in the Information Society 2 (2):95-98.
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms which adjust, monitor and evaluate (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  33.  14
    Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television.Youwen Ma & Yi Wan - 2021 - Complexity 2021:1-10.
    Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. The method selects Hadoop open source cloud platform as the basis, combines the MapReduce distributed programming model and HDFS distributed file storage system and other key cloud computing technologies. In order to cope with different data processing needs of film and television industry, association analysis, cluster analysis, factor analysis, and K-mean + association analysis algorithm training (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  73
    Four Pillars of Internet Research Ethics with Web 2.0.Barry Rooke - 2013 - Journal of Academic Ethics 11 (4):265-268.
    The proliferation of social media and web 2.0 applications (Facebook, MySpace, Twitter, blogs, etc.) in the previous 5 years has created a new social research opportunity, with over an estimated 552 million active daily users on Facebook (Facebook Press 2012). As with all research, boundaries must be set out to create valid and accurate data, keeping ethical practices at the forefront of the data gathering process. The lack of standardized practices requires an in-depth look into the use of such methods, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35.  26
    Ethical Issues in Democratizing Digital Phenotypes and Machine Learning in the Next Generation of Digital Health Technologies.Maurice D. Mulvenna, Raymond Bond, Jack Delaney, Fatema Mustansir Dawoodbhoy, Jennifer Boger, Courtney Potts & Robin Turkington - 2021 - Philosophy and Technology 34 (4):1945-1960.
    Digital phenotyping is the term given to the capturing and use of user log data from health and wellbeing technologies used in apps and cloud-based services. This paper explores ethical issues in making use of digital phenotype data in the arena of digital health interventions. Products and services based on digital wellbeing technologies typically include mobile device apps as well as browser-based apps to a lesser extent, and can include telephony-based services, text-based chatbots, and voice-activated chatbots. Many of these (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  36.  22
    Joint Resource Allocation Optimization of Wireless Sensor Network Based on Edge Computing.Jie Liu & Li Zhu - 2021 - Complexity 2021:1-11.
    Resource allocation has always been a key technology in wireless sensor networks, but most of the traditional resource allocation algorithms are based on single interface networks. The emergence and development of multi-interface and multichannel networks solve many bottleneck problems of single interface and single channel networks, it also brings new opportunities to the development of wireless sensor networks, but the multi-interface and multichannel technology not only improves the performance of wireless sensor networks but also brings great challenges to the resource (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  43
    Touching at a Distance: Digital Intimacies, Haptic Platforms, and the Ethics of Consent.Madelaine Ley & Nathan Rambukkana - 2021 - Science and Engineering Ethics 27 (5):1-17.
    The last decade has seen rise in technologies that allow humans to send and receive intimate touch across long distances. Drawing together platform studies, digital intimacy studies, phenomenology of touch, and ethics of technology, we argue that these new haptic communication devices require specific ethical consideration of consent. The paper describes several technologies, including Kiiroo teledildonics, the Kissenger, the Apple Watch, and Hey Bracelet, highlighting how the sense of touch is used in marketing to evoke a feeling of connection within (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  10
    Anti-monopoly supervision model of platform economy based on big data and sentiment.Sihan Liu - 2022 - Frontiers in Psychology 13.
    With the advent of the cloud computing era, big data technology has also developed rapidly. Due to the huge volume, variety, fast processing speed and low value density of big data, traditional data storage, extraction, transformation and analysis technologies are not suitable, so new solutions for big data application technologies are needed. However, with the development of economic theory and the practice of market economy, some links in the industrial chain of natural monopoly industries already have a certain (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  8
    Guide to ethics in acquisitions.Wyoma VanDuinkerken - 2014 - Chicago: Association for Library Collections & Technical Services, American Library Association. Edited by Wendi Arant Kaspar & Jeanne Harrell.
    Introduction -- Organization of the Guide -- Ethics. Definition of Ethics; Personal and Societal Values; Legal Ethics (State and Federal); Professional Ethics -- The Acquisitions Librarian and Ethics. Brief History of the Association for Library Collections and Technical Services; Reason for Acquisitions Focus; Guidance from Twelve Statements; Decision Points in Ethical Collection Development. Intellectual Freedom; Collecting Materials According to Collection Development Policies; Selection Stage; Scope of Content; Receipt of Materials; Checks and Balances; Security of Materials; Cost of Preservation; Storage (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. Understanding memories of a near-death experience from the perspective of quantum entanglement and in the presence of the supernatural.Contzen Pereira & Janice Harter - 2016 - Journal of Metaphysics and Connected Consciousness 2.
    Near-death experiences are a big challenge to the fields of science and philosophy; termed as hallucinatory by neurologists and “stuff of which fantasies are made off” by sceptics, there are some unique near-death experiences which defy these claims. Memories generated during these experiences are of specific interest as they are created without a body and can be recalled post the experience. Call it the mind, soul, psyche or consciousness, if deliberated as a form of quantum generated energy, a strong correlation (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  39
    Can We Justify Military Enhancements? Some Yes, Most No.Nicholas Evans & Blake Hereth - 2022 - Cambridge Quarterly of Healthcare Ethics 31 (4):557-569.
    The United States Department of Defense has, for at least 20 years, held the stated intention to enhance active military personnel (“warfighters”). This intention has become more acute in the face of dropping recruitment, an aging fighting force, and emerging strategic challenges. However, developing and testing enhancements is clouded by the ethically contested status of enhancements, the long history of abuse by military medical researchers, and new legislation in the guise of “health security” that has enabled the Department of Defense (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  12
    Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks.Mei Sun, Yuyan Guo, Dongbing Zhang & MingMing Jiang - 2021 - Complexity 2021:1-13.
    Vehicular ad hoc network is a multihop mobile wireless communication network that can realize many vehicle-related applications through multitop communication. In the open wireless communication environment, security and privacy protection are important contents of VANET research. The most basic method of VANET privacy protection is anonymous authentication. Even through, there are many existing schemes to provide anonymous authentication for VANETs. Many existing schemes suffer from high computational cost by using bilinear pairing operation or need the assistance of the trust authorities (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  35
    The emergence of ethical issues in the provision of online sexual health outreach for gay, bisexual, two-spirit and other men who have sex with men: perspectives of online outreach workers.Sophia Fantus, Rusty Souleymanov, Nathan J. Lachowsky & David J. Brennan - 2017 - BMC Medical Ethics 18 (1):59.
    Mobile applications and socio-sexual networking websites are used by outreach workers to respond synchronously to questions and provide information, resources, and referrals on sexual health and STI/HIV prevention, testing, and care to gay, bisexual and other men who have sex with men. This exploratory study examined ethical issues identified by online outreach workers who conduct online sexual health outreach for GB2M. Semi-structured individual interviews were conducted between November 2013 and April 2014 with online providers and managers to explore the benefits, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  44.  28
    Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: No malicious intent.Caron Jack, Yashik Singh & Maurice Mars - 2013 - BMC Medical Ethics 14 (S1):S8.
    IntroductionInformation and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the workplace (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  45. Single Valued Neutrosophic HyperSoft Set based on VIKOR Method for 5G Architecture Selection.Florentin Smarandache, M. Ali Ahmed & Ahmed Abdelhafeez - 2024 - International Journal of Neutrosophic Science 23 (2):42-52.
    This work introduces the framework for selecting architecture in 5G networks, considering various technological, performance, economic, and operational factors. With the emergence of 5G technology, the architecture selection process has become pivotal in meeting diverse requirements for ultra-high-speed connectivity, low latency, scalability, and diverse service demands. The evaluation comprehensively analyses different architecture options, including centralized, distributed, cloud-based, and virtualized architectures. Factors such as network performance, scalability, cost-effectiveness, security, and compatibility are considered within a multi-criteria decision-making framework. Findings reveal each (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. Technologies of immortality: the brain on ice.Bronwyn Parry - 2004 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 35 (2):391-413.
    One of the first envatted brains, the most cyborgian element of J. D. Bernal’s 1929 futuristic manifesto, The world, the flesh and the the devil, proposed a technological solution to the dreary certainty of mortality. In Bernal’s scenario the brain is maintained in an ‘out of body’ but ‘like-body’ environment—in a bath of cerebral–spinal fluid held at constant body temperature. In reality, acquiring prospective immortality requires access to very different technologies—those that allow human organs and tissues to be preserved in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  47.  36
    The Invisible Children.Maureen Kelley - 2012 - Narrative Inquiry in Bioethics 2 (2):4-6.
    In lieu of an abstract, here is a brief excerpt of the content:The Invisible ChildrenMaureen KelleyИсчезаю в весне,в толпе,в лужах,в синеве.И не ищите.Мне так хорошо...I fade into spring,or into a crowd,or into a puddle,sometimes into the blue.There's no sense in looking for me.I feel fine...—¾"Absentee" by Arvo Mets"You have to go through Lesha to get to Danil," Alexandra told me. Lesha was a small but unmoving dog with matted hair and a fierce growl. The dog was pressed against the little (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  29
    Aristophanes Birds (review).Ian C. Storey - 1997 - American Journal of Philology 118 (2):336-339.
    In lieu of an abstract, here is a brief excerpt of the content:Reviewed by:Aristophanes BirdsIan C. StoreyNan Dunbar, ed. Aristophanes Birds. Oxford: Clarendon Press, 1995. xviii + 792 pp. $105.00.Douglas Young's wonderful translation (The Burdies) is dedicated "to Miss Nan Dunbar with all good wishes for her learned edition of the original Greek." That was in 1959, and while Catullus waited nine years for Cinna's Zmyrna, we Aristophanic ornithophiles have had to wait four times that for this wonderfully thorough commentary (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49. Beirut Blast: A port city in crisis.Asma Mehan & Maurice Jansen - 2020 - The Port City Futures Blog.
    On 4th of August 2020, the Lebanese capital and port city, Beirut, was rocked by a massive explosion that has killed hundreds and injured thousands more, ravaging the heart of the city’s nearby downtown business district and neighbouring housing areas, where more than 750,000 people live. The waterfront neighbourhood and a number of dense residential neighbourhoods in the city’s eastern part were essentially flattened. Lebanese Government officials believe that the blast was caused by around 2,700 tonnes of ammonium nitrate stored (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  2
    When Everything Changes, Everything Does Change: Nuclear Power After September 11th.Michael Mariotte - 2001 - Bulletin of Science, Technology and Society 21 (6):501-506.
    September 11, 2001, may have marked the end of the nuclear power era. Although there are still a large numbe of reactors operating worldwide, the idea that there will be a vast new generation of nuclear reactors is no longer valid given the new world reality. Nuclear power will now be dominated by questions of decommissioning, waste storage, cleanup, and the threat reactors pose to our national security because each is a virtual nuclear weapon, offering a myriad of opportunities (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 986