Results for 'Cyber laws'

999 found
Order:
  1.  7
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  27
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  10
    Cyber Terrorism And Cyber Law - Duties Of Service Providers.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    The year 2017 has dawned in a new era. This is an era where cyber terrorism and cyber extremism are increasingly going to be significant factors in our day-to-day lives. Whether we like it or not, today social media platforms are infiltrated with cyber terrorists and cyber extremists. In addition, Cyber radicalization as a phenomenon is constantly on the rise.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  53
    The Influence of Using Cyber Technologies in Armed Conflicts on International Humanitarian Law.Justinas Žilinskas - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (3):1195-1212.
    Cyber warfare is becoming a new reality with new battles fought everyday on virtual battlefields. For a century and a half, International Humanitarian Law has been a sentry for victims of wars guaranteeing their legal protection from the calamities of war, trying hard to respond to Clausewitz’s “chameleon of war”. Cyber conflict marks new chameleon’s colour together with the unmanned aerial vehicles, autonomic battle systems and other technologies deployed on battlefields. However, it would be greatly erroneous to claim (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  5.  7
    From social to cyber justice: critical views on justice, law, and ethics.Nythamar Fernandes de Oliveira, Marek Hrubec & Emil Albert Sobottka (eds.) - 2018 - Porto Alegre: PUCRS.
    The book contains critical analyses of injustice in connection to law and ethics, and develops normative alternatives linked to justice. It covers the relevant issues from social justice to cyber justice. The chapters address issues and concepts which guideline on social innovations, transformations inherent in democratizing processes, global conflicts and other interactions, including the ultimate danger of escalation to war conflicts, be they conventional wars or new cyberwars.--From publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  53
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  44
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  5
    Ai Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws.Max Parasol - 2021 - Cambridge University Press.
    The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws affect innovation in artificial intelligence. The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  24
    Ethics and Policies for Cyber Operations: A Nato Cooperative Cyber Defence Centre of Excellence Initiative.Ludovica Glorioso & Mariarosaria Taddeo (eds.) - 2016 - Cham: Springer Verlag.
    This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations. It clarifies and discusses the ethical and regulatory problems raised by the deployment of cyber capabilities by a state’s army to inflict disruption or damage to an adversary’s targets in or through cyberspace. Written by world-leading philosophers, ethicists, policy-makers, and law and military experts, the essays cover such topics as the conceptual novelty of COs and the ethical problems that this engenders; (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  12.  6
    Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.Deborah R. Farringer - 2019 - Journal of Law, Medicine and Ethics 47 (S4):91-102.
    The health care industry has moved at a rapid pace away from paper records to an electronic platform across almost all sectors — much of it at the encouragement and insistence of the federal government. Such rapid expansion has increased exponentially the risk to individuals in the privacy of their data and, increasingly, to their physical well-being when medical records are inaccessible through ransomware attacks. Recognizing the unique and critical nature of medical records, the United States Congress established the Health (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  55
    Reliable Old Wineskins: The Applicability of the Just War Tradition to Military Cyber Operations.Edward T. Barrett - 2015 - Philosophy and Technology 28 (3):387-405.
    This article argues that the traditional jus ad bellum and jus in bello criteria are fully capable of providing the ethical guidance needed to legitimately conduct military cyber operations. The first part examines the criteria’s foundations by focusing on the notion of liability to defensive harm worked out by revisionist just war thinkers. The second part critiques the necessity of alternative frameworks, which its proponents assert are required to at least supplement the traditional just war criteria. Using the latter, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  14
    A Case Study of the Productivity of the Prefix Cyber- in English and Greek Legal Languages.Hanna Ciszek & Aleksandra Matulewska - 2019 - Studies in Logic, Grammar and Rhetoric 58 (1):35-57.
    The aim of the paper is to investigate the impact of the Greek language on modern legal languages in the United Kingdom and United States of America. The focus is placed on terms with the prefix cyber- of Greek origin that have recently enriched the English legal languages in connection with the fact that certain new phenomena have been regulated by laws as a result of the development of new technologies. Therefore, the authors have investigated the occurrence of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  16
    High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties.Hao Wang, He Jiang, Yan Zhao, Huanxin Guan, Bo Hu & Shunjiang Wang - 2020 - Complexity 2020:1-11.
    System security is essential for the operation of the island microgrid. However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. Firstly, a high-order disturbance observer is designed to estimate the unmeasurable factors in the microgrid. Secondly, a HODO-based sliding mode control strategy is proposed where the estimated value observed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. New Technologies and the Law in War and Peace.William H. Boothby (ed.) - 2018 - Cambridge University Press.
    Policymakers, legislators, scientists, thinkers, military strategists, academics, and all those interested in understanding the future want to know how twenty-first century scientific advance should be regulated in war and peace. This book tries to provide some of the answers. Part I summarises some important elements of the relevant law. In Part II, individual chapters are devoted to cyber capabilities, highly automated and autonomous systems, human enhancement technologies, human degradation techniques, the regulation of nanomaterials, novel naval technologies, outer space, synthetic (...)
    No categories
     
    Export citation  
     
    Bookmark  
  17.  18
    Courts, litigants and the digital age: law, ethics and practice.Karen Eltis - 2012 - Toronto: Irwin Law.
    Courts, Litigants, and the Digital Age examines the ramifications of technology for courts, judges, and the administration of justice. It sets out the issues raised by technology, and, particularly, the Internet, so that conventional paradigms can be updated in the judicial context. In particular, the book dwells on issues such as proper judicial use of Internet sources, judicial ethics and social networking, electronic court records and anonymization techniques, control of the courtroom and jurors' use of new technologies, as well as (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  24
    Being Right-With: On Human Rights Law as Unfreedom.Petero Kalulé - 2022 - Feminist Legal Studies 31 (2):243-264.
    This paper develops the notion of being right-with, a conceptual lens that underscores what happens when individuals turn to human rights law and other legal processes and proceedings to address injustices by the state. It does this through a critical multi-directional reading of two Uganda High Court appeal cases that overturned the decision of a lower court which at first instance had convicted Dr Stella Nyanzi of the offences of cyber harassment and offensive communications. Being right-with is a regulative (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  17
    Legal Recognition of Electronic Signature in Commercial Transactions: A Comparison Between the Jordanian Electronic Transactions Law of 2015 and the United Arab Emirates Electronic Transactions and Trust Services Law of 2021.Mohammad Saeed Abdallah Alsheyab - 2023 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (3):1281-1291.
    Electronic commercial transactions have become a vital part of digital economies around the world. However, the countries need to upgrade their policy frameworks and related legal provisions amid a fragile cyber security environment. The authentication of electronic signatures is a complex phenomenon that needs attention for authentication and recognition. This research presents a comparative analysis of the two countries Jordan and the United Arab Emirates. This study analyzes the related legal statutes to figure out differences and compatibility with reference (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  21.  20
    Limited Force and the Return of Reprisals in the Law of Armed Conflict.Eric A. Heinze & Rhiannon Neilsen - 2020 - Ethics and International Affairs 34 (2):175-188.
    Armed reprisals are the limited use of military force in response to unlawful actions perpetrated against states. Historically, reprisals provided a military remedy for states that had been wronged by another state without having to resort to all-out war in order to counter or deter such wrongful actions. While reprisals are broadly believed to have been outlawed by the UN Charter, states continue to routinely undertake such self-help measures. As part of the roundtable, “The Ethics of Limited Strikes,” this essay (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  23
    The unconscious before Freud.Lancelot Law Whyte - 1978 - Dover, N.H.: F. Pinter.
  23. Power, action, and belief: a new sociology of knowledge?John Law (ed.) - 1986 - Boston: Routledge & Kegan Paul.
  24. The evil-god challenge.Stephen Law - 2010 - Religious Studies 46 (3):353 - 373.
    This paper develops a challenge to theism. The challenge is to explain why the hypothesis that there exists an omnipotent, omniscient and all-good god should be considered significantly more reasonable than the hypothesis that there exists an omnipotent, omniscient and all-evil god. Theists typically dismiss the evil-god hypothesis out of hand because of the problem of good–there is surely too much good in the world for it to be the creation of such a being. But then why doesn't the problem (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  25. The Dependence Response and Explanatory Loops.Andrew Law - 2020 - Faith and Philosophy 37 (3):294-307.
    There is an old and powerful argument for the claim that divine foreknowledge is incompatible with the freedom to do otherwise. A recent response to this argument, sometimes called the “dependence response,” centers around the claim that God’s relevant past beliefs depend on the relevant agent’s current or future behavior in a certain way. This paper offers a new argument for the dependence response, one that revolves around different cases of time travel. Somewhat serendipitously, the argument also paves the way (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  26.  10
    On indeterminacy in law.Law Dictionary - 1985 - American Journal of Jurisprudence 30 (1).
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  13
    Law Week Dinner.Law Council C. E. O. Peter Webb, Justice Mary Finn, Amy Burr, Warwick Burr, Christopher Ryan, Councillor Linda Crebbin & Michael Flynn - forthcoming - Ethos: Journal of the Society for Psychological Anthropology.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  50
    Aircraft stories: decentering the object in technoscience.John Law - 2002 - Durham, NC: Duke University Press.
    "What is a military aircraft? John Law shows in his beautiful analysis that it is a constant oscillation between multiplicity and singularity.
    Direct download  
     
    Export citation  
     
    Bookmark   23 citations  
  29.  27
    Complexities: Social Studies of Knowledge Practices.John Law & Annemarie Mol (eds.) - 2002 - Duke University Press.
    Although much recent social science and humanities work has been a revolt against simplification, this volume explores the contrast between simplicity and complexity to reveal that this dichotomy, itself, is too simplistic. John Law and Annemarie Mol have gathered a distinguished panel of contributors to offer—particularly within the field of science studies—approaches to a theory of complexity, and at the same time a theoretical introduction to the topic. Indeed, they examine not only ways of relating to complexity but complexity _in (...)
  30. Motivation, depression and character.Iain Law - 2009 - In Matthew Broome & Lisa Bortolotti (eds.), Psychiatry as Cognitive Neuroscience: Philosophical Perspectives. New York: Oxford University Press. pp. 351--364.
     
    Export citation  
     
    Bookmark   3 citations  
  31.  48
    Lessons from Grandfather.Andrew Law & Ryan Wasserman - 2022 - Philosophies 7 (1):11.
    Assume that, even with a time machine, Tim does not have the ability to travel to the past and kill Grandfather. Why would that be? And what are the implications for traditional debates about freedom? We argue that there are at least two satisfactory explanations for why Tim cannot kill Grandfather. First, if an agent’s behavior at time _t_ is causally dependent on fact _F_, then the agent cannot perform an action (at _t_) that would require _F_ to have not (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Ecological Laws.Ecological Laws - unknown
    The question of whether there are laws in ecology is important for a number of reasons. If, as some have suggested, there are no ecological laws, this would seem to distinguish ecology from other branches of science, such as physics. It could also make a difference to the methodology of ecology. If there are no laws to be discovered, ecologists would seem to be in the business of merely supplying a suite of useful models. These models would (...)
     
    Export citation  
     
    Bookmark  
  33.  25
    Embodied Action, Enacted Bodies: the Example of Hypoglycaemia.John Law & Annemarie Mol - 2004 - Body and Society 10 (2-3):43-62.
    We all know that we have and are our bodies. But might it be possible to leave this common place? In the present article we try to do this by attending to the way we do our bodies. The site where we look for such action is that of handling the hypoglycaemias that sometimes happen to people with diabetes. In this site it appears that the body, active in measuring, feeling and countering hypoglycaemias is not a bounded whole: its boundaries (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   36 citations  
  34.  98
    Jaspers and theology.David R. Law - 2005 - Heythrop Journal 46 (3):334–351.
  35.  16
    The child's mind.Stephen Law - 2003 - Journal of Philosophy of Education 37 (1):185–192.
  36.  6
    The Child’s Mind.Stephen Law - 2003 - Journal of Philosophy of Education 37 (1):185-192.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  73
    From the fixity of the past to the fixity of the independent.Andrew Law - 2020 - Philosophical Studies 178 (4):1301-1314.
    There is an old but powerful argument for the claim that exhaustive divine foreknowledge is incompatible with the freedom to do otherwise. A crucial ingredient in this argument is the principle of the “Fixity of the Past”. A seemingly new response to this argument has emerged, the so-called “dependence response,” which involves, among other things, abandoning FP for an alternative principle, the principle of the “Fixity of the Independent”. This paper presents three arguments for the claim that FI ought to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  38. Naturalism, evolution and true belief.Stephen Law - 2012 - Analysis 72 (1):41-48.
    Plantinga's Evolutionary Argument Against Naturalism aims to show that naturalism is, as he puts it, ‘incoherent or self defeating’. Plantinga supposes that, in the absence of any God-like being to guide the process, natural selection is unlikely to favour true belief. Plantinga overlooks the fact that adherents of naturalism may plausibly hold that there exist certain conceptual links between belief content and behaviour. Given such links, natural selection will favour true belief. A further rather surprising consequence of the existence of (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  39.  47
    Natural Law and Natural Inclinations.Natural Law, Natural Inclinations & Douglas Flippen - 1986 - New Scholasticism 60 (3):284-316.
  40. If Molinism is true, what can you do?Andrew Law - forthcoming - International Journal for Philosophy of Religion:1-16.
    Suppose Molinism is true and God placed Adam in the garden because God knew Adam would freely eat of the fruit. Suppose further that, had it not been true that Adam would freely eat of the fruit, were he placed in the garden, God would have placed someone else there instead. When Adam freely eats of the fruit, is he free to do otherwise? This paper argues that there is a strong case for both a positive and a negative answer. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  41. The Pandora’s box objection to skeptical theism.Stephen Law - 2015 - International Journal for Philosophy of Religion 78 (3):285-299.
    Skeptical theism is a leading response to the evidential argument from evil against the existence of God. Skeptical theists attempt to block the inference from the existence of inscrutable evils to gratuitous evils by insisting that given our cognitive limitations, it wouldn’t be surprising if there were God-justifying reasons we can’t think of. A well-known objection to skeptical theism is that it opens up a skeptical Pandora’s box, generating implausibly wide-ranging forms of skepticism, including skepticism about the external world and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  42.  10
    INTRODUCTION: Law Introduction.Stephen Law - 2011 - Think 10 (29):5-7.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  14
    INTRODUCTION: Law Introduction.Stephen Law - 2011 - Think 10 (27):5-8.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  13
    INTRODUCTION: Law Introduction.Stephen Law - 2012 - Think 11 (32):5-10.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  45.  15
    INTRODUCTION: Law Introduction.Stephen Law - 2013 - Think 12 (35):5-13.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  46.  11
    INTRODUCTION: Law Introduction.Stephen Law - 2011 - Think 10 (28):5-8.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  64
    Kids’ Law.Stephen Law - 2003 - The Philosophers' Magazine 24 (24):38-39.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  11
    Kids’ Law.Stephen Law - 2003 - The Philosophers' Magazine 24:38-39.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49. Sociological Review Monograph 32.John Law - 1986 - In Power, Action, and Belief: A New Sociology of Knowledge? Routledge & Kegan Paul. pp. 234--263.
    No categories
     
    Export citation  
     
    Bookmark   17 citations  
  50. Incompatibilism and the garden of forking paths.Andrew Law - 2023 - Philosophical Issues 33 (1):110-123.
    Let (leeway) incompatibilism be the thesis that causal determinism is incompatible with the freedom to do otherwise. Several prominent authors have claimed that incompatibilism alone can capture, or at least best captures, the intuitive appeal behind Jorge Luis Borges's famous “Garden of Forking Paths” metaphor. The thought, briefly, is this: the “single path” leading up to one's present decision represents the past; the forking paths that one must decide between represent those possible futures consistent with the past and the (...) of nature. But if determinism is true, there is only one possible future consistent with the past and the laws and, hence, only one path to choose from. That is, if determinism is true, then we are not free to do otherwise. In this paper, I argue that this understanding of the Garden of Forking Paths faces a number of problems and ought to be rejected even by incompatibilists. I then present an alternative understanding that not only avoids these problems but still supports incompatibilism. Finally, I consider how various versions of (leeway) compatibilism fit with the Garden of Forking Paths as well as the broader question of whether metaphors, however intuitive, have any dialectical force in the debates over freedom. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999