Results for 'identification in cyberspace'

989 found
Order:
  1.  15
    Preconditions for Legal Regulation of Personal Identification in Cyberspace.Darius Štitilis, Paulius Pakutinskas, Inga Dauparaitė & Marius Laurinaitis - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):703-724.
    The article analyses legal preconditions for personal identification in physical and electronic space (hereinafter – cyberspace). Analysis of legal governing of identification in physical space is followed by the analysis of the same in cyberspace. Compulsory elements of identification in physical space and compulsory and non-compulsory elements of identification in cyberspace are provided which leads to conclusions about problem aspects concerning personal identification in cyberspace and related legal governing. This scientific article (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  12
    Maushumi Guha and Amita Chatterjee.Morality In Cyberspace - 2010 - In Shashi Motilal (ed.), Applied Ethics and Human Rights: Conceptual Analysis and Contextual Applications. London: Anthem Press.
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  83
    Moral luck and computer ethics: Gauguin in cyberspace[REVIEW]David Sanford Horner - 2010 - Ethics and Information Technology 12 (4):299-312.
    Issue Title: Moral Luck, Social Networking Sites, and Trust on the Web I argue that the problem of 'moral luck' is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its 'logical malleability', leads to ever greater levels of complexity, unreliability and uncertainty. The ever widening contexts of application in turn lead to greater scope for the operation of chance and the phenomenon of moral luck. Moral luck bears down most heavily (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  39
    An enquiry into the ethical efficacy of the use of radio frequency identification technology.David M. Wasieleski & Mordechai Gal-Or - 2008 - Ethics and Information Technology 10 (1):27-40.
    This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  24
    Deterrence in Cyberspace: a Silver Bullet or a Sacred Cow?Ewan Lawson - 2018 - Philosophy and Technology 31 (3):431-436.
    This commentary briefly reviews the challenges associated with the concept of cyber deterrence. It considers the concept of deterrence more broadly before identifying the specific issues that make both deterrence by denial and by punishment particularly difficult in cyberspace. However, overall, it argues that the concept is valid and indeed essential in contributing to delivering strategic stability.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  5
    Pigs in Cyberspace.Hans Moravec - 2013 - In Max More & Natasha Vita‐More (eds.), The Transhumanist Reader. Oxford: Wiley. pp. 177–181.
    Exploration and colonization of the universe await, but Earth‐adapted biological humans are ill equipped to respond to the challenge. Machines have gone farther and seen more, limited though they presently are by insect‐like behavioral inflexibility.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  12
    Ethics in Cyberspace: Have We Seen This Movie Before?Thomas Donaldson - 2001 - Business and Society Review 106 (4):273-291.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  8.  33
    Consent in Cyberspace: Internet-Based Research Involving Young People.Merle Spriggs - 2009 - Monash Bioethics Review 28 (4):25-39.
    Social networking sites such as MySpace and virtual communities such as on-line support groups can be a rich source of data for researchers. These sites can be an effective way of reaching and researching young people in order to address their particular health needs. Internet-based research is also potentially risky and exploitative. There is some guidance for conducting research online, but there are no detailed or universally accepted ethics guidelines for research of webspaces such as MySpace or virtual communities in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  31
    Gandhigiri in cyberspace: a novel approach to information ethics.Vaibhav Garg & L. Jean Camp - 2012 - Acm Sigcas Computers and Society 42 (1):9-20.
    The interpretation of the terms 'information' and 'ethics' is often culturally situated. A common understanding is contingent to facilitating dialogue concerning the novel ethical issues we face during computer-mediated interactions. Developing a nuanced understanding of information ethics is critical at a point when the number of information and communication technology -enabled interactions may soon exceed traditional human interactions. Utilitarianism and deontology, the two major schools of ethics are based in a western perspective. We contribute to the existing discourse on information (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  10.  65
    Lost in cyberspace: Ethical decision making in the online environment. [REVIEW]Joan M. McMahon & Ronnie Cohen - 2009 - Ethics and Information Technology 11 (1):1-17.
    In this study, a 20-item questionnaire was used to elicit undergraduates’ (N = 93) ethical judgment and behavioral intention regarding a number of behaviors involving computers and internet usage. Machiavellianism was found to be uncorrelated with both ethical judgment and behavioral intention. Gender was found to be negatively correlated with both ethical judgment and behavioral intention, such that females judged the behaviors as being less ethical than males, and were less likely to engage in the behaviors than males. A disconnect (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  11. Pigs in cyberspace.Hans Moravec - manuscript
    Exploration and colonization of the universe awaits, but earth-adapted biological humans are ill-equipped to respond to the challenge. Machines have gone farther and seen more, limited though they presently are by insect-like behavioral inflexibility. As they become smarter over the coming decades, space will be theirs. Organizations of robots of ever increasing intelligence and sensory and motor ability will expand and transform what they occupy, working with matter, space and time. As they grow, a smaller and smaller fraction of their (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  9
    Sunlight in cyberspace? On transparency as a form of ordering.Mikkel Flyverbom - 2015 - European Journal of Social Theory 18 (2):168-184.
    While we witness a growing belief in transparency as an ideal solution to a wide range of societal problems, we know less about the practical workings of transparency as it guides conduct in organizational and regulatory settings. This article argues that transparency efforts involve much more than the provision of information and other forms of ‘sunlight’, and are rather a matter of managing visibilities than providing insight and clarity. Building on actor-network theory and Foucauldian governmentality studies, it calls for careful (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  25
    Physicians in Cyberspace: Finding Boundaries.Aamir Jafarey, Sualeha Shekhani, Mohsin-E. Azam, Roger Gill, Bushra Shirazi, Mariam Hassan, Saima Pervaiz Iqbal & Rubina Naqvi - 2016 - Asian Bioethics Review 8 (4):272-289.
    Social media particularly Facebook has become a popular platform amongst medical professionals for both social and professional interactions. However, given the nature of such platforms, their use raises ethical concerns including violation of patient privacy and blurring of classical professional and patient-physician relationship boundaries. In order to investigate the pattern of Facebook usage among medical professionals in Pakistan, a mixed method study was conducted at five medical institutions in three different cities including Karachi, Lahore and Islamabad. 806 participants, including 87 (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  12
    Eavesdroppers in Cyberspace.Frank Jossi - 1994 - Business Ethics 8 (3):22-25.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  12
    Eavesdroppers in Cyberspace.Frank Jossi - 1994 - Business Ethics: The Magazine of Corporate Responsibility 8 (3):22-25.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  8
    Physicians in Cyberspace: Finding Boundaries.Aamir Jafarey, Sualeha Shekhani, Mohsin-E.- Azam, Roger Gill, Bushra Shirazi, Mariam Hassan, Saima Pervaiz Iqbal & Rubina Naqvi - 2016 - Asian Bioethics Review 8 (4):272-289.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. LIVING IN CYBERSPACE Video Games, Facebook, and the Image of God.Noreen Herzfeld - 2011 - Journal of Dharma 36 (2):149-156.
    No categories
     
    Export citation  
     
    Bookmark  
  18.  18
    Psychotherapy in cyberspace.George Stricker - 1996 - Ethics and Behavior 6 (2):175 – 177.
  19.  45
    Hohfeld in cyberspace and other applications of normative reasoning in agent technology.Christen Krogh & Henning Herrestad - 1999 - Artificial Intelligence and Law 7 (1):81-96.
    Two areas of importance for agents and multiagent systems are investigated: design of agent programming languages, and design of agent communication languages. The paper contributes in the above mentioned areas by demonstrating improved or novel applications for deontic logic and normative reasoning. Examples are taken from computer-supported cooperative work, and electronic commerce.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  46
    Identification in the limit of categorial grammars.Makoto Kanazawa - 1996 - Journal of Logic, Language and Information 5 (2):115-155.
    It is proved that for any k, the class of classical categorial grammars that assign at most k types to each symbol in the alphabet is learnable, in the Gold (1967) sense of identification in the limit from positive data. The proof crucially relies on the fact that the concept known as finite elasticity in the inductive inference literature is preserved under the inverse image of a finite-valued relation. The learning algorithm presented here incorporates Buszkowski and Penn's (1990) algorithm (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  21.  9
    Art in Cyberspace.Dragan Ćalović - 2013 - Filozofska Istrazivanja 33 (2):243-255.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  27
    Liberty in Cyberspace.Denis G. Arnold - 2003 - Business Ethics Quarterly 13 (4):573-580.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Gnosis in cyberspace? body, Mind and Progress in Posthumanism.Oliver Krueger - 2005 - Journal of Evolution and Technology 14 (2):55-67.
     
    Export citation  
     
    Bookmark   1 citation  
  24.  4
    Absolute fetishism: genius and identification in Balzac's ‘Unknown Masterpiece’.Adam Bresnick - 1994 - Paragraph 17 (2):134-152.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  32
    Alienation and identification in addiction.Philip Gerrans - 2024 - Philosophical Psychology 37 (3):684-706.
    A recent strand in the philosophical literature on addiction emphasizes problems with diachronic self-control. Hanna Pickard, for example, argues that an important aspect of addiction consists in inability to identify with a non-addicted future self. This literature sits alongside another that treats addiction as the product of neural changes that “hijack” mechanisms of reward prediction, habit formation decision making and cognitive control. This hijacking literature originates in accounts that treat the neural changes characteristic of addiction as a brain disease. This (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  21
    Word identification in reading and the promise of subsymbolic psycholinguistics.Guy C. Van Orden, Bruce F. Pennington & Gregory O. Stone - 1990 - Psychological Review 97 (4):488-522.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  27. Identification in Games: Changing Places.Darrell Patrick Rowbottom - 2012 - Erkenntnis 77 (2):197-206.
    This paper offers a novel ‘changing places’ account of identification in games, where the consequences of role swapping are crucial. First, it illustrates how such an account is consistent with the view, in classical game theory, that only outcomes (and not pathways) are significant. Second, it argues that this account is superior to the ‘pooled resources’ alternative when it comes to dealing with some situations in which many players identify. Third, it shows how such a ‘changing places’ account can (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  28.  10
    Structure identification in relational data.Rina Dechter & Judea Pearl - 1992 - Artificial Intelligence 58 (1-3):237-270.
  29.  97
    Identification in the Cinema.R. Allen - 2012 - British Journal of Aesthetics 52 (2):197-200.
  30.  19
    Discipline Identification in Chemistry and Physics.Erwin N. Hiebert - 1996 - Science in Context 9 (2):93-119.
    The ArgumentDuring the nineteenth century, physicists and chemists, using different linguistic modes of expression, sought to describe the world for different purposes; thus, both disciplines gradually were nudged toward demarcation and self-image identification. In the course of doing so the rich complexity of the empire of chemistry was born. The essential challenge was closely connected with analysis, synthesis, and chemical process: learning the art ofwatchingsubstances change andmakingsubstances change. Pursued in theory-poor and phenomenology-rich contexts chemistry nevertheless made itself intellectually, professionally, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Cyberethics: Morality and Law in Cyberspace.Richard Spinello - 2005 - Journal of Information Ethics 14 (1):70-90.
  32.  66
    Identification in the limit of first order structures.Daniel Osherson & Scott Weinstein - 1986 - Journal of Philosophical Logic 15 (1):55 - 81.
  33.  4
    Doubling, distance and identification in the cinema.Paul Coates - 2015 - New York, NY: Palgrave-Macmillan.
    The intention of this project is to argue theoretically for, and exemplify through critical and historical analysis, the interrelatedness of discourses on scale, distance, identification and doubling in the cinema. The link between the first two terms (scale and distance) and the latter two (identification and doubling) is implicit in the title, and its unfolding constitutes the project: for instance, the closer one comes, the deeper identification is likely to be, and the greater the likelihood that what (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Semantic activation without conscious identification in dichotic listening, parafoveal vision, and visual masking: A survey and appraisal.Daniel Holender - 1986 - Behavioral and Brain Sciences 9 (1):1-23.
    When the stored representation of the meaning of a stimulus is accessed through the processing of a sensory input it is maintained in an activated state for a certain amount of time that allows for further processing. This semantic activation is generally accompanied by conscious identification, which can be demonstrated by the ability of a person to perform discriminations on the basis of the meaning of the stimulus. The idea that a sensory input can give rise to semantic activation (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   447 citations  
  35.  68
    Code and moral values in cyberspace.Richard A. Spinello - 2001 - Ethics and Information Technology 3 (2):137-150.
    This essay is a critique of LarryLessig's book, Code and other Laws ofCyberspace (Basic Books, 1999). Itsummarizes Lessig's theory of the fourmodalities of regulation in cyberspace: code,law, markets, and norms. It applies thistheory to the topics of privacy and speech,illustrating how code can undermine basicrights or liberties. The review raisesquestions about the role of ethics in thismodel, and it argues that ethical principlesmust be given a privileged position in anytheory that purports to deal with the shapingof behavior in (...). Finally, itproposes a philosophy of ethicalself-regulation instead of an over-reliance ongovernment policy to deal with certainimproprieties and negative externalities thattend to disrupt the Net. (shrink)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark  
  36.  3
    Identification in Games: Changing Places.Darrell Patrick Rowbottom - 2012 - Erkenntnis 77 (2):197-206.
    This paper offers a novel ‘changing places’ account of identification in games, where the consequences of role swapping are crucial. First, it illustrates how such an account is consistent with the view, in classical game theory, that only outcomes are significant. Second, it argues that this account is superior to the ‘pooled resources’ alternative when it comes to dealing with some situations in which many players identify. Third, it shows how such a ‘changing places’ account can be used in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  36
    Fallacy Identification in a Dialectical Approach to Teaching Critical Thinking.Mark Battersby, Sharon Bailin & Jan Albert van Laar - 2015 - Inquiry: Critical Thinking Across the Disciplines 30 (1):9-16.
    The dialectical approach to teaching critical thinking is centred on a comparative evaluation of contending arguments, so that generally the strength of an argument for a position can only be assessed in the context of this dialectic. The identification of fallacies, though important, plays only a preliminary role in the evaluation to individual arguments. Our approach to fallacy identification and analysis sees fallacies as argument patterns whose persuasive power is disproportionate to their probative value.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  25
    The musical work in cyberspace: some ontological and aesthetic implications.Alessandro Arbo - 2016 - Aisthesis: Pratiche, Linguaggi E Saperi Dell’Estetico 9 (1):5-27.
    The article examines some of the consequences of the migration of musical works in cyberspace, particularly with regard to their ways of being and the ways in which we listen to them. Streaming is interpreted as the last stage in the expansion of a phenomenon that arose with the advent of phonography, namely, the ubiquity and availability of the works. A new development consists in the production of musical units in modular terms: works can consist of independent parts, which (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Our moral condition in cyberspace.Diane P. Michelfelder - 2000 - Ethics and Information Technology 2 (3):147-152.
    Some kinds of technological change not only trigger new ethical problems, but also give rise to questions about those very approaches to addressing ethical problems that have been relied upon in the past. Writing in the aftermath of World War II, Hans Jonas called for a new ``ethics of responsibility,'' based on the reasoning that modern technology dramatically divorces our moral condition from the assumptions under which standard ethical theories were first conceived. Can a similar claim be made about the (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  8
    Human dragons playing in cyberspace.André Sier - 2017 - Technoetic Arts 15 (3):283-296.
    DRACO.WOLFANDDOTCOM.INFO is an interactive proto-videogame installation that immerses users, personified as abstract dragons in a cathartic, stochastic, full-body immersive videogame experience, in cyberspace. The work attempts to playfully shift user consciousness towards non-human embodiment, by real-time 3D meshing the data from the human body into a mirrored abstract, ill-defined dragonic 3D shape. It gifts humans with special virtual powers, such as flying and cusping fireballs, as they fight for their progression in the game-space and facing annihilation, through invisible, interactional (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  27
    Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  4
    The Body and Communities in Cyberspace: A Marcellian Analysis.Thomas C. Anderson - unknown
    Many who speak glowingly about the possibilities for human relations in cyberspace, or virtual communities, laud them precisely because such communities are to a great extent free of the real spatial-temporal restrictions rooted in the limitations of our bodies. In this paper I investigate the importance of the body in establishing and maintaining human relations by considering the thought of the twentieth century French philosopher Gabriel Marcel. Because Marcel emphasized the central importance of the body in one's personal self-identity (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  17
    Geography and nursing: convergence in cyberspace?Gavin J. Andrews & Rob Kitchin - 2005 - Nursing Inquiry 12 (4):316-324.
    During the last 3 years the interface between geography and nursing has provided fertile ground for research. Not only has a conceptual emphasis on space and place provided nurse researchers with a robust and subtly different way to deconstruct and articulate nursing environments, but also their studies have provided a much needed focus on certain areas of health‐care, and in particular clinical practice, not currently prioritized by health geographers. We argue that, as something that is forcing fundamental re‐considerations of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  21
    Modelling Hegemonic Power Transition in Cyberspace.Dmitry Brizhinev, Nathan Ryan & Roger Bradbury - 2018 - Complexity 2018:1-13.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  8
    Ethical Dilemmas in Cyberspace.Martha Finnemore - 2018 - Ethics and International Affairs 32 (4):457-462.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Free speech in cyberspace.Robert M. O'neil - 1998 - Journal of Information Ethics 7 (1):15-23.
  47.  13
    An Identification in Suidas.A. F. Norman - 1953 - Classical Quarterly 3 (3-4):171-.
    This passage was attributed to Menander Protector by Bernhardy, who, influenced apparently by Men. Prot. fr. 43 , suggested that here the name disguised the of Menander. This explanation, besides interfering with the text without due cause, ignores altogether the name . In fact, the incident occurs a century earlier, in the period A.D. 467–70. Anagastes is then found in Roman service in Thrace during the reign of Leo . Moreover, the name of Anagastes is linked with an easily recognized (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  22
    Letter identification in normal and dyslexic readers: A verification.Anthony R. Perry, William N. Dember, Joel S. Warm & Joel G. Sacks - 1989 - Bulletin of the Psychonomic Society 27 (5):445-448.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Effective identification in the limit of first order structures and creative sets.Antonio Mn Coelho - 1996 - Logique Et Analyse 39 (154):201-204.
     
    Export citation  
     
    Bookmark  
  50.  18
    Critical education in cyberspace?Ilan Gur-Ze'ev - 2000 - Educational Philosophy and Theory 32 (2):209–231.
1 — 50 / 989