Results for 'Cyber victimization'

983 found
Order:
  1.  18
    Cyber Victimization Is Associated With Eating Disorder Psychopathology in Adolescents.Jose H. Marco & M. Pilar Tormo-Irun - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  36
    The Effect of Parental Control on Cyber-Victimization in Adolescence: The Mediating Role of Impulsivity and High-Risk Behaviors.David Álvarez-García, José Carlos Núñez, Paloma González-Castro, Celestino Rodríguez & Rebeca Cerezo - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. General and ICT Self-Efficacy in Different Participants Roles in Cyberbullying/Victimization Among Pakistani University Students.Sadia Musharraf, Sheri Bauman, Muhammad Anis-ul-Haque & Jamil Ahmad Malik - 2019 - Frontiers in Psychology 10:450100.
    The study examines both general and Internet and Communication Technology (ICT) self-efficacy in cyber-victims, cyber-bullies, and cyber bully victims in comparison to un-involved students. Gender differences were also examined. A total of 1115 Pakistani university students from six universities participated in the study. Analyses were conducted on 950 complete cases (371 males, and 579 females). Data were collected on cyberbullying/victimization, general self-efficacy (GSE), ICT self-efficacy, traditional bullying/victimization, ICT usage, social desirability, and demographics. Multinomial logistic regression (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  64
    The Influence of Using Cyber Technologies in Armed Conflicts on International Humanitarian Law.Justinas Žilinskas - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (3):1195-1212.
    Cyber warfare is becoming a new reality with new battles fought everyday on virtual battlefields. For a century and a half, International Humanitarian Law has been a sentry for victims of wars guaranteeing their legal protection from the calamities of war, trying hard to respond to Clausewitz’s “chameleon of war”. Cyber conflict marks new chameleon’s colour together with the unmanned aerial vehicles, autonomic battle systems and other technologies deployed on battlefields. However, it would be greatly erroneous to claim (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  5. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  6.  15
    Examination of cyber aggression by adult consumers: ethical framework and drivers.Mei Han & Arturo Z. Vasquez - 2019 - Journal of Information, Communication and Ethics in Society 18 (2):305-319.
    Purpose The widespread use of information and communication technologies enables consumers to obtain and share information whenever they feel the urge. With the advent of review websites and forums, companies and business owners may find themselves victims of consumer cyber aggression, which can hurt a company badly. This study aims to explore why consumers would engage in cyber aggression against companies, and to that end, it examines consumers’ ethical orientation and other possible drivers of cyber aggression. Design/methodology/approach (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  14
    Gender Differences in the Associations Between Perceived Parenting Styles and Young Adults’ Cyber Dating Abuse.F. Giorgia Paleari, Laura Celsi, Desirèe Galati & Monica Pivetti - 2022 - Frontiers in Psychology 13.
    Existing literature indicates that parenting styles affect the development of cyber aggression in offspring differently, depending on the gender of children. The present study investigates whether mothers’ and fathers’ parenting styles show similar gender differences in their associations with a new form of dating violence, i.e., cyber dating abuse. The limited evidence on the issue focuses on the relation that each parenting style has with CDA perpetration, without considering CDA victimization and the joint effects of fathers’ and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  19
    The psychology of the internet fraud victimization of older adults: A systematic review.Yuxi Shang, Zhongxian Wu, Xiaoyu Du, Yanbin Jiang, Beibei Ma & Meihong Chi - 2022 - Frontiers in Psychology 13.
    Criminals targeting and exploiting older adults in online environments are of great concern. This study systematically retrieved and analyzed articles on the psychological characteristics of older adult victims of online fraud. First, we found that there was no evidence that older adults were more prevalent than other individuals of other ages among online fraud victims, and current researchers have focused more on why older adults are easy targets for fraud. Second, research on psychological factors of older adults' susceptibility to online (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  16
    Perception of Cyberbullying in Adolescence: A Brief Evaluation Among Italian Students.Valeria Saladino, Stefano Eleuteri, Valeria Verrastro & Filippo Petruccelli - 2020 - Frontiers in Psychology 11.
    Cyberbullying is associated with the expansion of digital devices and the Internet. In Italy and other European and non-European countries, the phenomenon is growing. Young people who suffer from cyberbullying develop psychopathological symptoms of anxiety, depression, and social phobia that can lead to extreme acts, such as suicide. The pressure, the sense of isolation, and helplessness experienced by cyber-victims also affect their family and the school context. Cyberbullying is acted through digital tools, it is often anonymous, and aims to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  32
    A Quantitative Study on the Relationship Among Religiosity, Cyberbullying, and Problematic Internet Use.Sezai Korkmaz & Ali Ulvi Mehmedoğlu - 2018 - Dini Araştırmalar 21 (53 (15-06-2018)):35-54.
    In this research, firstly, the related literature of cyberbullying/victimization, problematic internet usage and religiosity and correlations among religiosity, cyberbullying/victimization and problematic internet use were tried to be revealed. Subsequently, the differences between the gender groups on cyberbullying/victimization, problematic internet use and religiosity were examined. Moreover, the differences among the age groups on cyberbullying/victimization, problematic internet use and religiosity were analyzed. The study was conducted with 1130 participants between 16-55 years old. In the study, Personal Information Form, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  42
    Cheques or dating scams? Online fraud themes in hip-hop songs across popular music apps.Suleman Lazarus, Olaigbe Olaigbe, Ayo Adeduntan, Tochukwu Dibiana, Edward & Uzoma OKolorie, Geoffrey - 2023 - Journal of Economic Criminology 2:1-17.
    How do hip-hop songs produced from 2017 to 2023 depict and rationalize online fraud? This study examines the depiction of online fraudsters in thirty-three Nigerian hip-hop songs on nine popular streaming platforms such as Spotify, Deezer, iTunes, SoundCloud, Apple Music, and YouTube. Using a directed approach to qualitative content analysis, we coded lyrics based on the moral disengagement mechanism and core themes derived from existing literature. Our findings shed light on how songs (a) justify the fraudulent actions of online fraudsters, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  12
    Postfeminism: cultural texts and theories.Stéphanie Genz - 2018 - Edinburgh: Edinburgh University Press. Edited by Benjamin A. Brabon.
    Introduction -- Postfeminist contexts -- Backlash, new traditionalism and austerity-nostalgia -- New feminism : victim vs. power -- Girl power and chick lit -- Do-me feminism and raunch culture -- Liberal sexism -- Postmodern (post)feminism -- Queer (post) feminism -- Men and postfeminism -- Cyber-postfeminism -- Third-wave feminism -- Micro/macro-politics and enterprise culture -- Postfeminist brand culture and celebrity authenticity.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  36
    Machiavellian Apparatus of Cyberbullying: Its Triggers Igniting Fury With Legal Impacts.Anne Wagner & Wei Yu - 2021 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (4):945-963.
    Young netizens are an emerging generator of online content, engaging in an increasing number of online flaming interactions. This shortened communication mode has incorporated power amplifiers, enabling the inclusion of both verbal and non-verbal triggers, thereby initiating abuses akin to cyberbullying. Cyberbullying has emerged as an extremely unstable hot issue, which is difficult to regulate upstream, severely impacting inexperienced young netizens. This Machiavellian apparatus proves to be sophisticated, given its powerful nature, and results in its victims being ensnared in a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  60
    Professional Ethics in a Virtual World: The Impact of the Internet on Traditional Notions of Professionalism.Ellen M. Harshman, James F. Gilsinan, James E. Fisher & Frederick C. Yeager - 2005 - Journal of Business Ethics 58 (1-3):227-236.
    Numerous articles in the popular press together with an examination of websites associated with the medical, legal, engineering, financial, and other professions leave no doubt that the role of professions has been impacted by the Internet. While offering the promise of the democratization of expertise – expertise made available to the public at convenient times and locations and at an affordable cost – the Internet is also driving a reexamination of the concept of professional identity and related claims of expertise (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  62
    Examination of cybercrime and its effects on corporate stock value.Katherine Taken Smith, Amie Jones, Leigh Johnson & Lawrence Murphy Smith - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):42-60.
    Purpose Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  3
    Cyberbullying, student nurses’ ethical awareness and the Covid-19 pandemic.Ka Young Kim & Jeong Sil Choi - 2021 - Nursing Ethics 28 (7-8):1258-1268.
    Background: The global COVID-19 pandemic has increased cyber communication, causing nursing students’ clinical practice to be held in cyberspace. Thus, it is essential to ensure that nursing students develop comprehensive cyber ethics awareness. Moreover, cyberbullying is becoming more widespread and is an increasingly relevant new concept. Objectives: This study aimed to assess the experiences of cyberbullying among nursing students during clinical practice and determine the effects of cyberbullying victimization and cyber environments on their cyber ethics (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  18.  44
    Cyberbullying a desecration of information ethics.Lancelord Siphamandla Ncube & Luyanda Dube - 2016 - Journal of Information, Communication and Ethics in Society 14 (4):313-322.
    Purpose Cyberbullying occurs when a minor is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child. Given that cyberbullying entails defamation or spreading false information or portfolios about someone, it is regarded as a violation of the ethical code of information use. The purpose of the study was to explore the perceptions, experiences and challenges of post-high school youth with regards to cyberbullying. This is a quantitative study that used a survey approach to gather data using a self-administered (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  12
    Significados ideacionales asociados a la comunidad gay en textos de ciberprensa chilena.Claudio Araya Seguel - 2020 - Logos: Revista de Lingüística, Filosofía y Literatura 30 (2):331-348.
    This article describes the participation of social actors from the gay community in the Chilean cyber press between 2012-2017. These texts were gathered in the socio-historical context of significant milestones for the gay community: the Zamudio Case, Anti-discrimination Law, Civil Union Agreement and discussion on Equal Marriage. The participation of these social actors is explored using the IDEATIONAL system from functional systemic linguistics (FSL). The processes associated with the collective and individual actors that represent the gay community in the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  21
    Friendship Quality and Gender Differences in Association With Cyberbullying Involvement and Psychological Well-Being.Mairéad Foody, Lian McGuire, Seffetullah Kuldas & James O’Higgins Norman - 2019 - Frontiers in Psychology 10:460972.
    Current literature has documented the detrimental effects of cyberbullying which include a range of internalising and externalising problems for those involved. Although critical, this research can sometimes ignore social-ecological aspects of a child’s life that can potentially ‘buffer’ the negative psychological effects of such involvement. With this in mind, this cross-sectional investigation of 12-16 year olds [M(SD): 13.5(1) years] in Ireland focused on the role of friendship quality and gender in association with cyberbullying involvement and psychological well-being (N= 2410). The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  88
    Cyberbullying in Nigeria: Examining the Adequacy of Legal Responses.Adejoke O. Adediran - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (4):965-984.
    Cyberbullying has been defined as the “process of using the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person.” The word “cyberbullying” is often used interchangeably with “cyber stalking” and in fact the Cybercrimes Act 2015 of Nigeria, uses the word “cyber stalking” which it defines as any course of conduct directed at a specific person that would cause a reasonable person to feel fear. By the provisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Does Putnam's argument Beg the question against the skeptic? Bad news for radical skepticism.Olaf Müller - 2001 - Erkenntnis 54 (3):299-320.
    Are we perhaps in the "matrix", or anyway, victims of perfect and permanent computer simulation? No. The most convincing—and shortest—version of Putnam's argument against the possibility of our eternal envattment is due to Crispin Wright (1994). It avoids most of the misunderstandings that have been elicited by Putnam's original presentation of the argument in "Reason, Truth and History" (1981). But it is still open to the charge of question-begging. True enough, the premisses of the argument (disquotation and externalism) can be (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  24. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  25. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  27. The Controversy over Shared Responsibility.Is Victim-Blaming Ever Justified - 1991 - In Diane Sank & David I. Caplan (eds.), To Be a Victim: Encounters with Crime and Injustice. Plenum.
     
    Export citation  
     
    Bookmark  
  28. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  29.  58
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  21
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  35
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  36
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  24
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  37
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  38
    Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
    This special issue gathers together a selection of papers presented by international experts during a workshop entitled ‘Ethics of Cyber-Conflicts’, which was devoted to fostering interdisciplinary debate on the ethical and legal problems and the regulatory gap concerning cyber conflicts. The workshop was held in 2013 at the Centro Alti Studi Difesa in Rome under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence . This NATO-accredited international military organisation that has always placed a high (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37.  46
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  38. Afro cyber resistance: South African Internet art.Tabita Rezaire - 2014 - Technoetic Arts 12 (2):185-196.
    Looking at the digital–cultural–political means of resistance and media activism on the Internet, this article explores Internet art practices in South Africa as a manifestation of cultural dissent towards western hegemony online. Confronting the unilateral flow of online information, Afro Cyber Resistance is a socially engaged gesture aiming to challenge the representation of the African body and culture through online project. Talking as examples the WikiAfrica project, Cuss Group’s intervention Video Party 4 (VP4) and VIRUS SS 16 by artiste (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39.  30
    Victim and Culprit? The Effects of Entitlement and Felt Accountability on Perceptions of Abusive Supervision and Perpetration of Workplace Bullying.Jeremy D. Mackey, Jeremy R. Brees, Charn P. McAllister, Michelle L. Zorn, Mark J. Martinko & Paul Harvey - 2018 - Journal of Business Ethics 153 (3):659-673.
    Although workplace bullying is common and has universally harmful effects on employees’ outcomes, little is known about workplace bullies. To address this gap in knowledge, we draw from the tenets of social exchange and displaced aggression theories in order to develop and test a model of workplace bullying that incorporates the effects of employees’ individual differences, perceptions of their work environments, and perceptions of supervisory treatment on their tendencies to bully coworkers. The results of mediated moderation analyses that examine responses (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  40.  43
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Armchair Cyber Travelers: A Kansas City-Cairo Discussion Group.Safia El-Wakil & Daniel J. Martin - 2002 - Kairos (Université de Toulouse-Le Mirail. Faculté de philosophie) 7:24.
    No categories
     
    Export citation  
     
    Bookmark  
  42.  46
    Do Victims of Supervisor Bullying Suffer from Poor Creativity? Social Cognitive and Social Comparison Perspectives.Thomas Li-Ping Tang, Qinxuan Gu & Wan Jiang - 2019 - Journal of Business Ethics 157 (3):865-884.
    This study explores the dark side of leadership, treats creative self-efficacy as a mediator, and frames supervisor bullying and employee creativity in the context of social cognition and social comparison. We theorize that with a high social comparison orientation, the combination of high supervisory abuse toward themselves (own abusive supervision) and low supervisory abuse toward other team members (peer abusive supervision) leads to a double whammy effect: When employees are “singled out” for abuse, these victims suffer from not only low (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  43.  51
    Cyber terrorism: A case study of islamic state.Zaheema Iqbal & Khurram Iqbal - 2017 - Journal of Social Sciences and Humanities 56 (2):67-79.
    In today’s postmodern world with the latest and top notch internet technologies in the market, if it has become easy and accessible for everyone to communicate with others sitting at the other corner of the world, it has also given rise to the cybercrimes including cyber terro rism which has not only provided grave threats to the whole world but also posed a question of whether with the manipulation of cyber space, cyber terrorists can damage or destroy (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  42
    A Victim's Right to Access Justice (text only in Lithuanian).Rima Ažubalytė - 2010 - Jurisprudencija: Mokslo darbu žurnalas 122 (4):221-244.
    The right of a person, who is a victim of a criminal act, to access justice (court) according to the criminal legal order, is analyzed in this article. The right to appeal to a court is analyzed as a constituent part of the principle of accessibility to legal defence. Pre-eminently, the general constitutional fundamentals of the right towards legal defence are estimated. The provisions of the jurisprudence of the Constitutional Court of Lithuania, i.e. that the right towards legal defence of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  31
    Victims’ Reasons and Responses in the Face of Oppression.Ashwini Vasanthakumar - 2021 - The Harvard Review of Philosophy 28:143-155.
    Victims of oppression often disagree amongst themselves on how best to respond to their oppression. Often, these disagreements are cast as disagreements about what strategies of resistance would be most effective. In this article, I argue that victims have a wider repertoire of responses to their oppression which reflect the different underlying reasons they have to respond. I outline three distinct reasons for action—self-respect, assistance, and justice—and the respective responses to oppression—rejection, assistance, and resistance—that these reasons call for. I then (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  99
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  14
    #WeareUnited, cyber-nationalism during times of a national crisis: The case of a terrorist attack on a school in Pakistan.Fauzia Janjua & Salma Kalim - 2019 - Discourse and Communication 13 (1):68-94.
    Seeing language as a social practice and national identities as a product of discourse, the study intends to analyze discursive practices employed on social media to create the discourses of sameness and difference in times of national crisis. Following the discourse historical approach, I have illustrated how argumentative strategies and topos have been strategically employed to draw boundaries between Us and Them. In this exploration of exclusionary rhetoric, I have also underlined the use of images, memes and hashtags in the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  31
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  64
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  38
    Cyber-animism: the art of being alive in hybrid society.V. I. Arshinov, O. A. Grimov & V. V. Chekletsov - forthcoming - Philosophical Problems of IT and Cyberspace.
    The boundaries of social acceptance and models of convergence of human and non-human actors of digital reality are defined. The constructive creative possibilities of convergent processes in distributed neural networks are analyzed from the point of view of possible scenarios for building “friendly” human-dimensional symbioses of natural and artificial intelligence. A comprehensive analysis of new management challenges related to the development of cyber-physical and cybersocial systems is carried out. A model of social organizations and organizational behavior in the conditions (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 983