Results for 'cyber abuse'

1000+ found
Order:
  1.  8
    Adverse Childhood Experiences and Early Maladaptive Schemas as Predictors of Cyber Dating Abuse: An Actor-Partner Interdependence Mediation Model Approach.Laura Celsi, F. Giorgia Paleari & Frank D. Fincham - 2021 - Frontiers in Psychology 12.
    The increasing role that new technologies play in intimate relationships has led to the emergence of a new form of couple violence, cyber dating abuse, especially among adolescents and young adults. Although this phenomenon has received increased attention, no research has investigated predictors of cyber dating abuse taking into account the interdependence of the two partners. The study examines adverse childhood experiences and early maladaptive schemas as possible predictors of young adults’ perpetrated and suffered cyber (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  6
    Gender Differences in the Associations Between Perceived Parenting Styles and Young Adults’ Cyber Dating Abuse.F. Giorgia Paleari, Laura Celsi, Desirèe Galati & Monica Pivetti - 2022 - Frontiers in Psychology 13.
    Existing literature indicates that parenting styles affect the development of cyber aggression in offspring differently, depending on the gender of children. The present study investigates whether mothers’ and fathers’ parenting styles show similar gender differences in their associations with a new form of dating violence, i.e., cyber dating abuse. The limited evidence on the issue focuses on the relation that each parenting style has with CDA perpetration, without considering CDA victimization and the joint effects of fathers’ and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  24
    Wisdom in the digital age: a conceptual and practical framework for understanding and cultivating cyber-wisdom.Tom Harrison & Gianfranco Polizzi - 2022 - Ethics and Information Technology 24 (1):1-16.
    The internet presents not just opportunities but also risks that range, to name a few, from online abuse and misinformation to the polarisation of public debate. Given the increasingly digital nature of our societies, these risks make it essential for users to learn how to wisely use digital technologies as part of a more holistic approach to promoting human flourishing. However, insofar as they are exacerbated by both the affordances and the political economy of the internet, this article argues (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This research report (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  7
    Challenges in cybersecurity.Thomas S. K. Tang - forthcoming - Asian Journal of Business Ethics:1-7.
    Digital technologies can be an asset to serving communities and societies through data analytics and management to achieve greater good. However, care must be exercised in that societies without digital access do not get overlooked or, worse, face abuses of privacy disclosure or exploitation. Regulations exist to prevent this happening, but ethical considerations are important in deciding in what is allowable and what is not. The further risk of artificial intelligence where computers start to make autonomous decisions and the vulnerabilities (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  25
    Machiavellian Apparatus of Cyberbullying: Its Triggers Igniting Fury With Legal Impacts.Anne Wagner & Wei Yu - 2021 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (4):945-963.
    Young netizens are an emerging generator of online content, engaging in an increasing number of online flaming interactions. This shortened communication mode has incorporated power amplifiers, enabling the inclusion of both verbal and non-verbal triggers, thereby initiating abuses akin to cyberbullying. Cyberbullying has emerged as an extremely unstable hot issue, which is difficult to regulate upstream, severely impacting inexperienced young netizens. This Machiavellian apparatus proves to be sophisticated, given its powerful nature, and results in its victims being ensnared in a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7. The Benefits and Risks of Digital Diplomacy.Viona Rashica - 2018 - Seeu Review 13 (1):75-89.
    As a product of globalization and as a fruit of new public diplomacy, digital diplomacy is considered one of the major trends of the twenty-first century in diplomatic communication. Being under the influence of the extraordinary advances in ICT, the internet and social media, the way of realization and presentation of diplomacy has been radically changed and is increasingly removed from the traditional diplomatic elements. The importance of digital diplomacy is based on the usage of ICT, the internet and social (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  30
    Cyberbullying a desecration of information ethics.Lancelord Siphamandla Ncube & Luyanda Dube - 2016 - Journal of Information, Communication and Ethics in Society 14 (4):313-322.
    Purpose Cyberbullying occurs when a minor is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child. Given that cyberbullying entails defamation or spreading false information or portfolios about someone, it is regarded as a violation of the ethical code of information use. The purpose of the study was to explore the perceptions, experiences and challenges of post-high school youth with regards to cyberbullying. This is a quantitative study that used a survey approach to gather data using a self-administered (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9. Blockchain, The Greater Good, and Human and Civil Rights.Kobina Hughes - 2017 - Metaphilosophy 48 (5):654-665.
    The central theme of this paper is that the development of a technology that is predicted to have a major impact on the way we transact with each other should be a matter where the needs of society at large are taken into account. Where the technology is one that emerges from the domain of the Internet, inclusivity becomes even more acute in order to avoid widening the already existing gap in reaping the “digital dividend.” With blockchain, the obligation could (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Framework for a Church Response, Report of the Irish Catholic Bishops' Advisory Committee on Child Sexual Abuse by Priests and Religious.Child Sexual Abuse - forthcoming - Veritas – Revista de Filosofia da Pucrs.
     
    Export citation  
     
    Bookmark  
  11.  26
    The Significance of Network Ethics Education in Japanese Universities.Tetsu Ueno & Yasushi Maruyama - 2011 - International Journal of Cyber Ethics in Education 1 (3):50-58.
    Cell phone abuse amongst Japanese school students, including sex crimes and bullying, are commonly managed with filters and phone bans. Many believe these measures are more effective than moral education. Japanese teenagers therefore enter college without moral education in the Internet society, which can cause problems on campus: students plagiarizing from the Internet, or posting anonymous defamatory messages on bulletin boards. Japanese universities address these problems ineffectively. Problems are caused by both student ignorance of network ethics and moral immatureness. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12. John D. Corrigan.Substance Abuse - 2005 - In Walter M. High Jr, Angelle M. Sander, Margaret A. Struchen & Karen A. Hart (eds.), Rehabilitation for Traumatic Brain Injury. Oxford University Press. pp. 133.
     
    Export citation  
     
    Bookmark  
  13. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  14.  11
    Cyber Victimization Is Associated With Eating Disorder Psychopathology in Adolescents.Jose H. Marco & M. Pilar Tormo-Irun - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15. A Description of the Erhard Seminars Training (est).Donald M. Baer, Stephanie B. Stolz & Drug Abuse Alcohol - 1978 - Behaviorism 6 (1):45-70.
  16. Betrayal trauma: Traumatic amnesia as an adaptive response to childhood abuse.Jennifer J. Freyd - 1994 - Ethics and Behavior 4 (4):307 – 329.
    Betrayal trauma theory suggests that psychogenic amnesia is an adaptive response to childhood abuse. When a parent or other powerful figure violates a fundamental ethic of human relationships, victims may need to remain unaware of the trauma not to reduce suffering but rather to promote survival. Amnesia enables the child to maintain an attachment with a figure vital to survival, development, and thriving. Analysis of evolutionary pressures, mental modules, social cognitions, and developmental needs suggests that the degree to which (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  17.  41
    Power Day: Addressing the Use and Abuse of Power in Medical Training.Nancy R. Angoff, Laura Duncan, Nichole Roxas & Helena Hansen - 2016 - Journal of Bioethical Inquiry 13 (2):203-213.
    Problem: Medical student mistreatment, as well as patient and staff mistreatment by all levels of medical trainees and faculty, is still prevalent in U.S. clinical training. Largely missing in interventions to reduce mistreatment is acknowledgement of the abuse of power produced by the hierarchical structure in which medicine is practiced. Approach: Beginning in 2001, Yale School of Medicine has held annual “Power Day” workshops for third year medical students and advanced practice nursing students, to define and analyse power dynamics (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  18
    ‘Find out this Abuse’ - Saara Lilja: Terms of Abuse in Roman Comedy. (Annales Academiae Scientiarum Fennicae; Series B, Tom. 141, 3.) Pp. 117. Helsinki: Finnish Academy, 1965. Paper, mk. 5.50.R. H. Martin - 1966 - The Classical Review 16 (03):357-.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  75
    Warfare in a new domain: The ethics of military cyber-operations.Edward T. Barrett - 2013 - Journal of Military Ethics 12 (1):4-17.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  20.  53
    The investigation of life-threatening child abuse and Munchausen syndrome by proxy.D. Evans - 1995 - Journal of Medical Ethics 21 (1):9-13.
    The use of covert video surveillance in the investigation of suspected life-threatening child abuse and Munchausen syndrome by proxy raises important ethical questions. That the recently reported provision of this facility in North Staffordshire was not presented to a Local Research Ethics Committee (LREC) for approval as a research exercise raises important questions about the ethical review of research and practice. The case made for avoiding such review is first set out and then examined. The three main premisses which (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  21. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  22.  50
    Percepção, identificação e comportamento dos professores da ULBRA/Canoas frente ao uso de drogas na universidade; The ULBRA professors perception of drug abuse at the university.Adria Daniel, Carmen Freitas, José Vicente Lima Robaina, Lauraci Dondé da Silva, Loreci Menna Barreto & Lúcia Zelinda Zanella Felizardo - 2001 - Aletheia: An International Journal of Philosophy 13:53-61.
    Direct download  
     
    Export citation  
     
    Bookmark  
  23. Bringing Peace Home: A Feminist Philosophical Perspective on the Abuse of Women, Children, and Pet Animals.Carol J. Adams - 1994 - Hypatia 9 (2):63 - 84.
    In this essay, I connect the sexual victimization of women, children, and pet animals with the violence manifest in a patriarchal culture. After discussing these connections, I demonstrate the importance of taking seriously these connections because of their implications for conceptual analysis, epistemology, and political, environmental, and applied philosophy. My goal is to broaden our understanding of issues relevant to creating peace and to provide some suggestions about what must be included in any adequate feminist peace politics.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  24. Thoroughly muddled Mctaggart: Or, how to abuse gauge freedom to create metaphysical monostrosities.Tim Maudlin - 2002 - Philosophers' Imprint 2:1-23.
    It has long been a commonplace that there is a problem understanding the role of time when one tries to quantize the General Theory of Relativity (GTR). In his "Thoroughly Modern McTaggart" (Philosophers' Imprint Vol 2, No. 3), John Earman presents several arguments to the conclusion that there is a problem understanding change and the passage of time in the unadorned GTR, quite apart from quantization. His Young McTaggart argues that according to the GTR, no physical magnitude ever changes. A (...)
    Direct download  
     
    Export citation  
     
    Bookmark   41 citations  
  25. AI as IA: The use and abuse of artificial intelligence (AI) for human enhancement through intellectual augmentation (IA).Alexandre Erler & Vincent C. Müller - 2023 - In Fabrice Jotterand & Marcello Ienca (eds.), The Routledge Handbook of the Ethics of Human Enhancement. Routledge. pp. 187-199.
    This paper offers an overview of the prospects and ethics of using AI to achieve human enhancement, and more broadly what we call intellectual augmentation (IA). After explaining the central notions of human enhancement, IA, and AI, we discuss the state of the art in terms of the main technologies for IA, with or without brain-computer interfaces. Given this picture, we discuss potential ethical problems, namely inadequate performance, safety, coercion and manipulation, privacy, cognitive liberty, authenticity, and fairness in more detail. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  26.  15
    The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.Jessica Dawson & Robert Thomson - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  9
    The need for Hispanic cultural competency in drug abuse treatment training programs: An empirical and ethical evaluation of US universities.Veronica Fish - forthcoming - Clinical Ethics.
    Ethical clinical practice requires cultural competency. In the United States, Hispanics report stronger attitudinal barriers to drug abuse treatment than any other racial/ethnic group. Hispanics report feeling that drug abuse treatment providers do not understand their unique cultural needs and are unfamiliar with their experiences of discrimination and immigration. Using this case study to explore broader ethical and policy issues, this study investigates the extent to which US universities train counselors to address the culturally specific needs of Hispanic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  13
    Relevance Of Magna Carta To Rights Of Victims Of Abuse Of Power.Besa Arifi - 2015 - Seeu Review 11 (1):48-58.
    Magna Carta Libertatum is one of the few documents that continuously imply thorough discussions about fundamental principles of the law. In 2011, Lord McNelly, Justice Minister of UK at the time, has emphasized the core and everlasting principles that derived from this document: ᠅ that the power of the state is not absolute ᠅ that whoever governs the state must obey the law ᠅ and that whoever governs the state must take account of the views of those who are governed. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  35
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  30.  29
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  10
    Can Computers Create Meanings? A Cyber/Bio/Semiotic Perspective.N. Katherine Hayles - 2019 - Critical Inquiry 46 (1):32-55.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  28
    Wolves in Sheep’s Clothing: How and When Machiavellian Leaders Demonstrate Strategic Abuse.Zhiyu Feng, Fong Keng-Highberger, Kai Chi Yam, Xiao-Ping Chen & Hu Li - 2022 - Journal of Business Ethics 184 (1):255-280.
    The extant literature has largely conceptualized abusive supervision as a hot and impulsive form of aggression. In this paper, we offer a cold and strategic perspective on how abusive supervision might be used strategically to achieve goals. Drawing on the Machiavellian literature and social interaction theory of aggression, we develop a moderated serial mediation model, in which leader Machiavellianism predicts their strategic use of abusive supervision on subordinates via the mediating role of leaders’ guanxi with direct supervisor. We further theorize (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  33.  26
    The Sleeping Subject: On the Use and Abuse of Imagination in Hobbes’s Leviathan.Avshalom M. Schwartz - 2020 - Hobbes Studies 33 (2):153-175.
    This paper offers a novel interpretation of the political implications of Hobbes’s theory of imagination and his solution to the threat posed by the imagination to political stability. While recent work has correctly identified the problem the imagination poses for Hobbes, it has underestimated the severity of the problem and, accordingly, has underestimated the length to which the Hobbesian sovereign will have to go in order to solve it. By reconstructing Hobbes’s account of sleep and the operation of the imagination (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  53
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Ethical aspects of workplace urine screening for drug abuse.A. R. Forrest - 1997 - Journal of Medical Ethics 23 (1):12-17.
    OBJECTIVE: To review the ethical and legal implications of the involvement of medical practitioners in workplace screening for drug misuse. CONCLUSIONS: Workplace screening for drugs of abuse raises many ethical issues. If screening is considered as being part of medical practice with the involvement of occupational health physicians, as suggested by the Faculty of Occupational Medicine, then the ethical requirements of a normal medical consultation are fully applicable. The employee's full and informed consent to the process must be obtained (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  16
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  27
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  88
    You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites.Angel N. M. Leung, Natalie Wong & JoAnn M. Farver - 2018 - Frontiers in Psychology 9.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39.  52
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  13
    How to educate Internet Language in Cyber Youth Culture?Sangsoo Lim - 2014 - Journal of Ethics: The Korean Association of Ethics 1 (99):183-204.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  13
    New Task of Information Ethics Education to raise the 'Cyber Citizenship' - focusing the Candle-lit Demonstration in Korea -.Sangsoo Lim - 2009 - Journal of Ethics: The Korean Association of Ethics 1 (73):51-77.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. Cat in the Hat and Cyber Warfare.Jon R. Lindsay & Michael Poznansky - 2024 - In Montgomery McFate (ed.), Dr. Seuss and the art of war: secret military lessons. Lanham: Rowman & Littlefield.
     
    Export citation  
     
    Bookmark  
  43. ‘“What’s So Great About Science?” Feyerabend on the Ideological Use and Abuse of Science.Ian James Kidd - 2016 - In Elena Aronova & Simone Turchetti (eds.), The Politics of Science Studies. pp. 55-76.
    It is very well known that from the late-1960s onwards Feyerabend began to radically challenge some deeply-held ideas about the history and methodology of the sciences. It is equally well known that, from around the same period, he also began to radically challenge wider claims about the value and place of the sciences within modern societies, for instance by calling for the separation of science and the state and by questioning the idea that the sciences served to liberate and ameliorate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  89
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45. A survey on the effective factors of the youths 'tendency towards industrial drugs abuse'.H. Aghabakhshi, B. Sedighi & Mohammad Eskandari - 2009 - Social Research (Islamic Azad University Roudehen Branch) 2 (4):71-87.
     
    Export citation  
     
    Bookmark  
  46.  52
    Relationships Between Machiavellianism, Organizational Culture, and Workplace Bullying: Emotional Abuse from the Target’s and the Perpetrator’s Perspective.Irena Pilch & Elżbieta Turska - 2015 - Journal of Business Ethics 128 (1):83-93.
    Exposure to bullying at work is a serious social stressor, having important consequences for the victim, the co-workers, and the whole organization. Bullying can be understood as a multi-causal phenomenon: the result of individual differences between workers, deficiencies in the work environment or an interaction between individual and situational factors. The results of the previous studies confirmed that some characteristics within an individual may predispose to bullying others and/or being bullied. In the present study, we intend to clarify the relationships (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  47.  13
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  13
    Responding To Cyber Risk With Restorative Practices: Perceptions And Experiences Of Canadian Educators.Michael Adorjan, Rosemary Ricciardelli & Mohana Mukherjee - 2024 - British Journal of Educational Studies 72 (2):155-175.
    Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative interventions for online-mediated conflict and harm, including cyberbullying and sexting. Participants include pre-service educators, as well as junior and senior teachers with varying levels of familiarity with restorative practices. Our findings highlight how educators who have implemented (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  14
    Formal assessment of reliability specifications in embedded cyber-physical systems.Aritra Hazra, Pallab Dasgupta & Partha Pratim Chakrabarti - 2016 - Journal of Applied Logic 18:71-104.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  9
    Ethical Concerns of Human-Being, Cyber-Being and Cybertariat: An Educational Perspective.Raghubir Sharan & Bijoy Boruah - 2016 - International Review of Information Ethics 25.
    Few would deny that machines are a cultural creation of great significance. The Human race has shown extraordinary skills in achieving this glory. But this is not the glory of an unblemished modern humanity. While humankind has been admirably powerful in creatively controlling external forces, there has not been a similar display of control over the inner forces of selfish desire and the will to individual power. Education, it its true spirit, is a noble endeavour dedicated to a proper balancing (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000