Results for 'computer crimes'

1000+ found
Order:
  1. Computer Crime.Jacqueline E. C. Wyatt - 1995 - Journal of Information Ethics 4.
     
    Export citation  
     
    Bookmark  
  2. Computer crime statutes in the united-states.Jec Wyatt - 1995 - Journal of Information Ethics 4 (1):36-40.
     
    Export citation  
     
    Bookmark  
  3. Computer Crime and Victim Justice.John T. Chu - 1991 - In D. Sank & D. Caplan (eds.), To Be a Victim. Plenum. pp. 217.
     
    Export citation  
     
    Bookmark  
  4.  23
    Computer crime: Assessing the lawyer's perspective. [REVIEW]Karen A. Forcht, Daphyne Thomas & Karen Wigginton - 1989 - Journal of Business Ethics 8 (4):243 - 251.
    The past decade has seen a rapid development and proliferation of sophisticated computer systems in organizations. Designers, however, have minimized the importance of security control systems, (except for those systems where data security and access control have obviously been of major importance). The result is an increasing recognition that computer systems security is often easily compromised.This research will provide the initial step in assessing ways in which attorneys retained to prosecute computer crimes and computer people (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5.  6
    Digital Forensics and Computer Crimes: The Case of North Macedonia.Mentor Hamiti & Deshira Imeri-Saiti - 2023 - Seeu Review 18 (2):55-73.
    The subject of the research refers to the aspect of digital forensics and computer crime and the latter is one of the reasons for the evolution of crime in general. Based on the growing trend of technology development and the increase in the number of digital crimes, a special emphasis is given to the statistical aspect of computer crime as well as measures to reduce the impact of computer crime, including the ethical and legal aspects in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. K. Wigginton," Computer Crime: Assessing the Lawyer's Perspective.K. Forcht & D. Thomas - 1989 - Journal of Business Ethics 8 (4).
     
    Export citation  
     
    Bookmark  
  7.  38
    Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace.Herman T. Tavani - 2000 - Acm Sigcas Computers and Society 30 (3):3-9.
  8.  12
    Book review: Spectacular Computer Crimes by Buck BloomBecker. [REVIEW]Stan Reviewer-Kurzban - 1991 - Acm Sigcas Computers and Society 21 (1):18-19.
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. Committing Crimes with BCIs: How Brain-Computer Interface Users can Satisfy Actus Reus and be Criminally Responsible.Kramer Thompson - 2021 - Neuroethics 14 (S3):311-322.
    Brain-computer interfaces allow agents to control computers without moving their bodies. The agents imagine certain things and the brain-computer interfaces read the concomitant neural activity and operate the computer accordingly. But the use of brain-computer interfaces is problematic for criminal law, which requires that someone can only be found criminally responsible if they have satisfied the actus reus requirement: that the agent has performed some (suitably specified) conduct. Agents who affect the world using brain-computer interfaces (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  10.  70
    Computer Ethics and Professional Responsibility.Terrell Ward Bynum & Simon Rogerson (eds.) - 1998 - Wiley-Blackwell.
    This clear and accessible textbook and its associated website offer a state of the art introduction to the burgeoning field of computer ethics and professional responsibility. Includes discussion of hot topics such as the history of computing; the social context of computing; methods of ethical analysis; professional responsibility and codes of ethics; computer security, risks and liabilities; computer crime, viruses and hacking; data protection and privacy; intellectual property and the “open source” movement; global ethics and the internet (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  11.  37
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information society, the new (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12. Implemented Crime Prevention Strategies of PNP in Salug Valley, Zamboanga Del Sur, Philippines.Mark Patalinghug - 2017 - Asia Pacific Journal of Multidisciplinary Research (August 2017):143-150.
    Abstract – This study aimed primarily to determine the effectiveness of crime prevention strategies implemented by the Salug Valley Philippine National Police (PNP) in terms of Police Integrated Patrol System, Barangay Peacekeeping Operation, Anti-Criminality Operation, Integrated Area Community Public Safety services, Bantay Turista and School Safety Project as evaluated by 120 inhabitants and 138 PNP officers from four Municipalities of Salug Valley Zamboanga del Sur. Stratified random sampling was utilized in determining the respondents. Index crime rate were correlated with the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13. Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity.Marcello Ienca & Pim Haselager - 2016 - Ethics and Information Technology 18 (2):117-129.
    Brain–computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are potentially vulnerable to cybercriminality. This opens the prospect of “neurocrime”: extending the range of computer-crime to neural devices. This paper explores a type of neurocrime that we call brain-hacking as it aims at the illicit access to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  14.  62
    The computational complexity of logical theories.Jeanne Ferrante - 1979 - New York: Springer Verlag. Edited by Charles W. Rackoff.
    This book asks not only how the study of white-collar crime can enrich our understanding of crime and justice more generally, but also how criminological ...
  15.  7
    Crime, Law and the Internet.Eric Hilgendorf - 2004 - Analyse & Kritik 26 (1):302-312.
    After some introductory remarks on the German legal system and German legal politics, the main forms of datanet crime on the Internet are sketched. After that, one of the most important Internet-cases of the last decade, the CompuServe case, is discussed in some detail. One of the main problems of datanet crime is its global reach. The world-spanning nature of the cyberspace significantly enlarges the ability of offenders to commit crimes that will affect people in a variety of other (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  9
    Computer Ethics.Philip Brey - 2009 - In Jan Kyrre Berg Olsen Friis, Stig Andur Pedersen & Vincent F. Hendricks (eds.), A Companion to the Philosophy of Technology. Oxford, UK: Wiley-Blackwell. pp. 406–411.
    This chapter contains sections titled: Approaches in Computer Ethics Topics in Computer Ethics Moral Responsibility Other Topics References and Further Reading.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  20
    Decoding the Crime Scene Photograph: Seeing and Narrating the Death of a Gangster.Anita Lam - 2019 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (1):173-190.
    Because Arthur ‘Weegee’ Fellig’s crime scene photographs have become the standard for visually representing crime scenes in popular culture, this paper examines the extra-legal lives of two of his images, both of which were produced at the site of a gangster’s death in 1936. To decode the crime scene photograph is to interrogate the ways in which we make sense of crime through seeing and narrating. To that end, this paper charts how these two crime images were contextualized first in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  5
    Computer applications for handling legal evidence, police investigation, and case argumentation.Ephraim Nissan - 2012 - New York: Springer.
    This book provides an overview of computer techniques and tools — especially from artificial intelligence (AI) — for handling legal evidence, police intelligence, crime analysis or detection, and forensic testing, with a sustained discussion of methods for the modelling of reasoning and forming an opinion about the evidence, methods for the modelling of argumentation, and computational approaches to dealing with legal, or any, narratives. By the 2000s, the modelling of reasoning on legal evidence has emerged as a significant area (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  39
    The Laws of Robots: Crimes, Contracts, and Torts.Ugo Pagallo - 2013 - Dordrecht: Imprint: Springer.
    This book explores how the design, construction, and use of robotics technology may affect today's legal systems and, more particularly, matters of responsibility and agency in criminal law, contractual obligations, and torts. By distinguishing between the behaviour of robots as tools of human interaction, and robots as proper agents in the legal arena, jurists will have to address a new generation of "hard cases." General disagreement may concern immunity in criminal law (e.g., the employment of robot soldiers in battle), personal (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  20.  76
    On crimes and punishments in virtual worlds: bots, the failure of punishment and players as moral entrepreneurs.Stefano De Paoli & Aphra Kerr - 2012 - Ethics and Information Technology 14 (2):73-87.
    This paper focuses on the role of punishment as a critical social mechanism for cheating prevention in MMORPGs. The role of punishment is empirically investigated in a case study of the MMORPG Tibia and by focusing on the use of bots to cheat. We describe the failure of punishment in Tibia, which is perceived by players as one of the elements facilitating the proliferation of bots. In this process some players act as a moral enterprising group contributing to the reform (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  21.  13
    Characterizing Human Expertise Using Computational Metrics of Feature Diagnosticity in a Pattern Matching Task.Thomas Busey, Dimitar Nikolov, Chen Yu, Brandi Emerick & John Vanderkolk - 2017 - Cognitive Science 41 (7):1716-1759.
    Forensic evidence often involves an evaluation of whether two impressions were made by the same source, such as whether a fingerprint from a crime scene has detail in agreement with an impression taken from a suspect. Human experts currently outperform computer-based comparison systems, but the strength of the evidence exemplified by the observed detail in agreement must be evaluated against the possibility that some other individual may have created the crime scene impression. Therefore, the strongest evidence comes from features (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  38
    We have to talk about emotional AI and crime.Lena Podoletz - 2023 - AI and Society 38 (3):1067-1082.
    Emotional AI is an emerging technology used to make probabilistic predictions about the emotional states of people using data sources, such as facial (micro)-movements, body language, vocal tone or the choice of words. The performance of such systems is heavily debated and so are the underlying scientific methods that serve as the basis for many such technologies. In this article I will engage with this new technology, and with the debates and literature that surround it. Working at the intersection of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  24
    Transafe: a crowdsourced mobile platform for crime and safety perception management.M. Hamilton, F. Salim, E. Cheng & S. L. Choy - 2011 - Acm Sigcas Computers and Society 41 (2):32-37.
    An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society at Saint Xavier University in Chicago, Illinois. This paper describes a proposed mobile platform, Transafe, that captures and analyses public perceptions of safety to deliver 'crowdsourced' collective intelligence about places in the City of Melbourne, Australia, and their affective states at various times of the day. Public perceptions of crime on public transport in Melbourne are often mismatched with actual crime statistics and (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  24.  62
    Using artificial intelligence to prevent crime: implications for due process and criminal justice.Kelly Blount - forthcoming - AI and Society:1-10.
    Traditional notions of crime control often position the police against an individual, known or not yet known, who is responsible for the commission of a crime. However, with increasingly sophisticated technology, policing increasingly prioritizes the prevention of crime, making it necessary to ascertain who, or what class of persons, may be the next likely criminal before a crime can be committed, termed predictive policing. This causes a shift from individualized suspicion toward predictive profiling that may sway the expectations of a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  32
    Could the destruction of a beloved robot be considered a hate crime? An exploration of the legal and social significance of robot love.Paula Sweeney - forthcoming - AI and Society:1-7.
    In the future, it is likely that we will form strong bonds of attachment and even develop love for social robots. Some of these loving relations will be, from the human’s perspective, as significant as a loving relationship that they might have had with another human. This means that, from the perspective of the loving human, the mindless destruction of their robot partner could be as devastating as the murder of another’s human partner. Yet, the loving partner of a robot (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  92
    Trends and patterns among online software pirates.Sameer Hinduja - 2003 - Ethics and Information Technology 5 (1):49-61.
    Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  27.  8
    Big Browser Manning the Thin Blue Line - Computational Legal Theory Meets Law Enforcement.Wiebke Abel & Burkhard Schafer - 2008 - Problema. Anuario de Filosofía y Teoria Del Derecho 1 (2):51-84.
    This paper analyses some current jurisprudential and conceptual issues in evidence and procedure from the perspective of a computational legal theory. It introduces a specific investigative device, Trojans operated by police during crime investigation, and analyses whether current formal approaches to legal reasoning can be modified in such a way that the software code underlying this device can represent the relevant legal constraints that should govern its operation. We will argue that traditional formalist theories of legal reasoning are typically restricted (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  13
    Is there an Ethics of Computing?Geoffrey Brown - 1991 - Journal of Applied Philosophy 8 (1):19-26.
    ABSTRACT The article constitutes an attempt to answer the question contained in the title, by reference to three example topics: individual privacy, ownership of software, and computer ‘hacking’. The ethical question is approached via the legal one of whether special, computer–specific legislation is appropriate. The conclusion is in the affirmative, and rests on the claim that computer technology has brought with it, not so much the potential for committing totally new kinds of crimes, as a distinctive (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  14
    M-LAMAC: a model for linguistic assessment of mitigating and aggravating circumstances of criminal responsibility using computing with words.Carlos Rafael Rodríguez Rodríguez, Yarina Amoroso Fernández, Denis Sergeevich Zuev, Marieta Peña Abreu & Yeleny Zulueta Veliz - forthcoming - Artificial Intelligence and Law:1-43.
    The general mitigating and aggravating circumstances of criminal liability are elements attached to the crime that, when they occur, affect the punishment quantum. Cuban criminal legislation provides a catalog of such circumstances and some general conditions for their application. Such norms give judges broad discretion in assessing circumstances and adjusting punishment based on the intensity of those circumstances. In the interest of broad judicial discretion, the law does not establish specific ways for measuring circumstances’ intensity. This gives judges more freedom (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  20
    Legislation on Cybercrime in Lithuania: Development and Legal Gaps in Comparison with Convention on Cybercrime.Darius Sauliūnas - 2010 - Jurisprudencija: Mokslo darbu žurnalas 122 (4):203-219.
    The Convention on Cybercrime (the Convention) adopted in the framework of the Council of Europe is the main international legislative tool in the fight against cybercrime. It is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. Lithuania is among its signatory states, therefore, the provisions of the Convention have become binding on its legislator, obliging it to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  33
    Aplicación de la inteligencia artificial en el Derecho Penal: problemas y desafios.María Paula Ávila Zea & Ana Fabiola Zamora Vázquez - 2024 - Resistances. Journal of the Philosophy of History 5 (9):e240142.
    La integración de la tecnología en el ámbito del derecho penal plantea desafíos significativos debido a la falta de regulación de la inteligencia artificial (IA), lo que podría comprometer los derechos fundamentales. Este estudio se centra en abordar estos desafíos y proponer soluciones mediante un análisis exhaustivo de la situación actual y las posibles implicaciones de la IA en el sistema jurídico penal. El objetivo principal de esta investigación es analizar los problemas, desafíos y oportunidades que surgen con la implementación (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  41
    An investigation of ethical perceptions of public sector Mis professionals.Ken Udas, William L. Fuerst & David B. Paradice - 1996 - Journal of Business Ethics 15 (7):721 - 734.
    Management information system (MIS) professionals have a central role in technology development, determining how technology is used in organizations, and the effects it has on clients and society. MIS stakeholders have expressed concern regarding MIS professional's role in computer crime, and security of electronically stored information. It is recognized that MIS professionals must make decisions based on their professional ethics. The Association for Computing Machinery (ACM) and the Data Processing Management Association (DPMA) have developed codes of ethics to help (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  33.  74
    Suggested management responses to ethical issues raised by technological change.William P. Cordeiro - 1997 - Journal of Business Ethics 16 (12-13):1393-1400.
    The development of technology raises an array of ethical issues related to work. Many of these ethical issues are old issues surfacing under new guises. Technology has not changed the issues, but technology makes the issues' analysis and application more complex. This paper identifies several new ethical issues raised by technological change: computer crime, an over-reliance on computer controlled systems, bio-technical developments, degradation of quality-of-life at work and new categories of work-related injuries. These issues are discussed in the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  14
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature survey consists (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  35.  63
    Cracking down on autonomy: three challenges to design in IT Law. [REVIEW]U. Pagallo - 2012 - Ethics and Information Technology 14 (4):319-328.
    The paper examines how technology challenges conventional borders of national legal systems, as shown by cases that scholars address as a part of their everyday work in the fields of information technology (IT)-Law, i.e., computer crimes, data protection, digital copyright, and so forth. Information on the internet has in fact a ubiquitous nature that transcends political borders and questions the notion of the law as made of commands enforced through physical sanctions. Whereas many of today’s impasses on jurisdiction, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  75
    Privacy rights and protection: Foreign values in modern thai context. [REVIEW]Krisana Kitiyadisai - 2005 - Ethics and Information Technology 7 (1):17-26.
    The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other drafted legislation on computer crime, the law on privacy protection has not yet been enacted. The political reform and the influences of globalization have speeded up the process of westernization of the urban, educated middle-class (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Neutralization theory and online software piracy: An empirical analysis. [REVIEW]Sameer Hinduja - 2007 - Ethics and Information Technology 9 (3):187-204.
    Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  38.  13
    The icepick surgeon: murder, fraud, sabotage, piracy, and other dastardly deeds perpetrated in the name of science.Sam Kean - 2021 - New York: Little, Brown and Company, a division of Hachette Book Group.
    Science is a force for good in the world--at least usually. But sometimes, when obsession gets the better of scientists, they twist a noble pursuit into something sinister. Under this spell, knowledge isn't everything, it's the only thing--no matter the cost. Bestselling author Sam Kean tells the true story of what happens when unfettered ambition pushes otherwise rational men and women to cross the line in the name of science, trampling ethical boundaries and often committing crimes in the process. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Is it wrong to play violent video games?McCormick Matt - 2001 - Ethics and Information Technology 3 (4):277–287.
    Many people have a strong intuition that there is something morally objectionable about playing violent video games, particularly with increases in the number of people who are playing them and the games' alleged contribution to some highly publicized crimes. In this paper,I use the framework of utilitarian, deontological, and virtue ethical theories to analyze the possibility that there might be some philosophical foundation for these intuitions. I raise the broader question of whether or not participating in authentic simulations of (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  40. Against Parsimony: Three Easy Ways of Complicating some Categories of Economic Discourse.Albert O. Hirschman - 1985 - Economics and Philosophy 1 (1):7-21.
    Economics as a science of human behavior has been grounded in a remarkably parsimonious postulate: that of the self-interested, isolated individual who chooses freely and rationally between alternative courses of action after computing their prospective costs and benefits. In recent decades, a group of economists has shown considerable industry and ingenuity in applying this way of interpreting the social world to a series of ostensibly noneconomic phenomena, from crime to the family, and from collective action to democracy. The “economic” or (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  41.  23
    Do No Harm Policy for Minds in Other Substrates.Soenke Ziesche & Roman V. Yampolskiy - 2019 - Journal of Ethics and Emerging Technologies 29 (2):1-11.
    Various authors have argued that in the future not only will it be technically feasible for human minds to be transferred to other substrates, but this will become, for most humans, the preferred option over the current biological limitations. It has even been claimed that such a scenario is inevitable in order to solve the challenging, but imperative, multi-agent value alignment problem. In all these considerations, it has been overlooked that, in order to create a suitable environment for a particular (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  42.  28
    Killing the competition.Martin Daly & Margo Wilson - 1990 - Human Nature 1 (1):81-107.
    Sex- and age-specific rates of killing unrelated persons of one’s own sex were computed for Canada (1974–1983), England/Wales (1977–1986), Chicago (1965–1981), and Detroit (1972) from census information and data archives of all homicides known to police. Patterns in relation to sex and age were virtually identical among the four samples, although the rates varied enormously (from 3.7 per million citizens per annum in England/Wales to 216.3 in Detroit). Men’s marital status was related to the probability of committing a same-sex, nonrelative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  43. Emotion, Neuroscience, and Law: A Comment on Darwin and Greene.John Mikhail - 2011 - Emotion Review 3 (3):293-295.
    Darwin’s (1871/1981) observation that evolution has produced in us certain emotions responding to right and wrong conduct that lack any obvious basis in individual utility is a useful springboard from which to clarify the role of emotion in moral judgment. The problem is whether a certain class of moral judgment is “constituted” or “driven by” emotion (Greene, 2008, p. 108) or merely correlated with emotion while being generated by unconscious computations (e.g., Huebner, Dwyer, & Hauser, 2008). With one exception, all (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  44.  92
    An emerging ontology of jurisdiction in cyberspace.David R. Koepsell - 2000 - Ethics and Information Technology 2 (2):99-104.
    The emergence of the new information economy hascomplicated jurisdictional issues in commerce andcrime. Many of these difficulties are simplyextensions of problems that arose due to other media.Telephones and fax machines had already complicatedjurists'' determinations of applicable laws. Evenbefore the Internet, contracts were often negotiatedwithout any face-to-face contact – entirely bytelephone and fax. Where is such a contractnegotiated? The answer to this question is critical toany litigation that may arise over such contracts. Thelaws of contract are often quite different from onejurisdiction (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  39
    Just research into killer robots.Patrick Taylor Smith - 2019 - Ethics and Information Technology 21 (4):281-293.
    This paper argues that it is permissible for computer scientists and engineers—working with advanced militaries that are making good faith efforts to follow the laws of war—to engage in the research and development of lethal autonomous weapons systems. Research and development into a new weapons system is permissible if and only if the new weapons system can plausibly generate a superior risk profile for all morally relevant classes and it is not intrinsically wrong. The paper then suggests that these (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  46.  72
    A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space Transition (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  47.  17
    Epistemologies of predictive policing: Mathematical social science, social physics and machine learning.Jens Hälterlein - 2021 - Big Data and Society 8 (1).
    Predictive policing has become a new panacea for crime prevention. However, we still know too little about the performance of computational methods in the context of predictive policing. The paper provides a detailed analysis of existing approaches to algorithmic crime forecasting. First, it is explained how predictive policing makes use of predictive models to generate crime forecasts. Afterwards, three epistemologies of predictive policing are distinguished: mathematical social science, social physics and machine learning. Finally, it is shown that these epistemologies have (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  17
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  94
    Book review: Coeckelbergh, Mark (2022): The political philosophy of AI. [REVIEW]Michael W. Schmidt - 2024 - TATuP - Zeitschrift Für Technikfolgenabschätzung in Theorie Und Praxis 33 (1):68–69.
    Mark Coeckelbergh starts his book with a very powerful picture based on a real incident: On the 9th of January 2020, Robert Williams was wrongfully arrested by Detroit police officers in front of his two young daughters, wife and neighbors. For 18 hours the police would not disclose the grounds for his arrest (American Civil Liberties Union 2020; Hill 2020). The decision to arrest him was primarily based on a facial detection algorithm which matched Mr. Williams’ driving license photo with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  35
    Sherlock Holmes Was In No Danger.Greg Carlson - unknown
    An important ingredient in understanding such sentences is resolving the question of: level in/of what? protection from what? what sort of documents? danger from what? Each of these is an example coming from novels, television commercials, and news reports. In the first instance, it is from a commercial for a brand of computers. In the commercial, which is pushing the most recent version of that computer, the voice-over announces (1a) just as a teenager exults after having apparently accomplished something (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000