Results for 'internet fraud'

976 found
Order:
  1.  12
    Yahooism or Internet Fraud in the Nigerian Higher Education System.Peter Eshioke Egielewa - 2022 - Journal of Ethics in Higher Education 1:75-101.
    This study interrogates narrow-mindedness and laziness leading many of the Nigerian undergraduates to be tempted to cheat and fraud on Internet instead of working hard for their studies. The author proposes a contextual survey around a tendency also called “yahooism”, “yahoo-yahooism”, as most of the first attempted cybercrimes were realized by sending yahoo emails. This harmful tendency is contrasted with Prof Obiora Ike’s teaching on the value of hard work as the road to wealth. The study used the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  19
    The psychology of the internet fraud victimization of older adults: A systematic review.Yuxi Shang, Zhongxian Wu, Xiaoyu Du, Yanbin Jiang, Beibei Ma & Meihong Chi - 2022 - Frontiers in Psychology 13.
    Criminals targeting and exploiting older adults in online environments are of great concern. This study systematically retrieved and analyzed articles on the psychological characteristics of older adult victims of online fraud. First, we found that there was no evidence that older adults were more prevalent than other individuals of other ages among online fraud victims, and current researchers have focused more on why older adults are easy targets for fraud. Second, research on psychological factors of older adults' (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  12
    Proverbs 4:10–19 and the growing spate of Internet fraud amongst Nigerian youths.Favour C. Uroko - 2021 - HTS Theological Studies 77 (4):7.
    This research article examines the increasing spate of youths who engage in fraudulent Internet activities in Nigeria in the light of Proverbs 4:10–19. Nigerian youths are fast becoming impatient with their quest for wealth. This had led many of them to engage in high-level fraudulent Internet activities. It has come to a point where Internet fraudsters opened schools to teach prospecting youths how to make money fast. The circle keeps expanding on a daily basis. Their victims include (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  65
    Online Auction Fraud: Ethical Perspective.Alex Nikitkov & Darlene Bay - 2008 - Journal of Business Ethics 79 (3):235-244.
    Internet fraud is an issue that increasingly concerns regulators, consumers, firms, and business ethics researchers. In this article, we examine one common form of internet fraud, the practice of shill bidding (when a seller in an auction enters a bid on his or her own item). The significant incidence of shill bidding on eBay (in spite of the fact that it is illegal just as it is in live auctions) exemplifies the current ineffectiveness of regulatory means (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  6
    Fraud as Legitimate Retribution for Colonial Injustice: Neutralization Techniques in Interviews with Police and Online Romance Fraud Offenders.Suleman Lazarus, Hughes Mariata, Button Mark & Garba Kaina Habila - 2025 - Deviant Behavior 38 (2):1-24.
    This qualitative research examines the phenomenon of online romance fraud, exploring it from contrasting perspectives. The study engaged two distinct groups of participants: (1) fraudsters actively involved in online romance scams (commonly referred to as “Sakawa Boys”) and (2) police officers with experience in investigating and policing internet crimes. We explore the usefulness of neutralization techniques in interpreting data within the cultural context of individuals’ subjective experiences. Thematic analysis of data reveals that both offenders and police officers employ (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  44
    Detecting, Preventing, and Responding to “Fraudsters” in Internet Research: Ethics and Tradeoffs.Jennifer E. F. Teitcher, Walter O. Bockting, José A. Bauermeister, Chris J. Hoefer, Michael H. Miner & Robert L. Klitzman - 2015 - Journal of Law, Medicine and Ethics 43 (1):116-133.
    Internet-based health research is increasing, and often offers financial incentives but fraudulent behavior by participants can result. Specifically, eligible or ineligible individuals may enter the study multiple times and receive undeserved financial compensation. We review past experiences and approaches to this problem and propose several new strategies. Researchers can detect and prevent Internet research fraud in four broad ways: through the questionnaire/instrument ; through participants' non-questionnaire data and seeking external validation through computer information,, and 4) through study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  7.  11
    Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting.Mark R. Freiermuth - 2011 - Discourse and Communication 5 (2):123-145.
    Despite the preponderance of advance fee fraud scams, many in society still fall victim to such con games. The internet has provided scammers with an opportunity to perpetrate fraud on a global scale. In particular, the 419 email scam has become a popular tool used by scammers to entice their victims. Our purpose is to establish rhetorical moves that exist in these 419 messages, and then analyze the intention of the scammers behind each move — a scam (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  20
    The Vanishing Square: Civic Learning in the Internet Age.Sheila Jasanoff - 2021 - Hastings Center Report 51 (S1):5-9.
    Nation states in the twenty‐first century confront new challenges to their political legitimacy. Borders are more porous and less secure. Infectious disease epidemics, climate change, financial fraud, terrorism, and cybersecurity all involve cross‐border flows of material, human bodies, and information that threaten to overwhelm state power and expert knowledge. Concurrently, doubts have multiplied about whether citizens, subject to manipulation through the internet, have lost the critical capacity to hold rulers accountable for their expert decisions. I argue that the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  14
    Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology.Pingping Sun & Lingang Gu - 2021 - Complexity 2021:1-11.
    Based on the Internet of Things technology, this paper proposes building a cross-border e-commerce logistics supervision system and determines the evaluation index system from the overall framework design of the system, supply chain supervision process optimization, risk supervision optimization, and system order degree optimization. First of all, the framework adopts the national certification center to supervise the logistics service platform and logistics service platform to supervise the logistics participants of the secondary supervision system. Then, functions such as swarm intelligence (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. What is Disinformation?Don Fallis - 2015 - Library Trends 63 (3):401-426.
    Prototypical instances of disinformation include deceptive advertising (in business and in politics), government propaganda, doctored photographs, forged documents, fake maps, internet frauds, fake websites, and manipulated Wikipedia entries. Disinformation can cause significant harm if people are misled by it. In order to address this critical threat to information quality, we first need to understand exactly what disinformation is. This paper surveys the various analyses of this concept that have been proposed by information scientists and philosophers (most notably, Luciano Floridi). (...)
     
    Export citation  
     
    Bookmark   27 citations  
  11.  17
    Introduction: A sociosemiotic exploration of identity and discourse. Le Cheng, Ning Ye & David Machin - 2020 - Semiotica 2020 (236-237):395-404.
    Among the categories of the telecom and internet frauds, the online romance scam is of particular concern for its sharp rise of victim numbers and the huge amount of cost. A social semiotic approach could be used to investigate the victim identity of the online romance scam from the aspects of the (re)construction and interpretation of discursive practices. The range of papers in this section shows that the study of text, context and the way that people use semiotic resources (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12. Ethical issues connected with multi-level marketing schemes.Daryl Koehn - 2001 - Journal of Business Ethics 29 (1-2):153 - 160.
    Multi-level marketing (MLM) schemes are one of the fastest growing types of business. However, little has been written about the ethics of MLMs. This oversight is somewhat surprising, especially because some prominent MLMs have been accused of being pyramid schemes. Pyramid schemes were the number one type of internet fraud in 1996, and the fourth most common form of internet fraud in 1997 (National Consumers League, 1997). This paper examines the nature of MLMs and their similarities (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  60
    The Nature of and Conditions for Online Trust.Daryl Koehn - 2003 - Journal of Business Ethics 43 (1/2):3 - 19.
    As use of the Internet has increased, many issues of trust have arisen. Users wonder: will may privacy be protected if I provide information to this Internet vendor? Will my credit card remain secure? Should I trust that this party will deliver the goods? Will the goods be as described? These questions are not merely academic. A recent Boston Consulting Group study revealed that one out of ten consumers have ordered and paid for items online that never were (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  14.  26
    Plagiarism in five universities in Mozambique: Magnitude, detection techniques, and control measures: Magnitude, detection techniques, and control measuresa.Peter E. Coughlin - 2015 - International Journal for Educational Integrity 11 (1).
    Hugely facilitated by the Internet, plagiarism by students threatens educational quality and professional ethics worldwide. Plagiarism reduces learning and is correlated with increased fraud and inefficiency on the job, thus lessening competitiveness and hampering development.In this context, the present research examines 48 licenciatura theses and 102 masters theses from five of Mozambique’s largest universities. Of the 150 theses, 75% contained significant plagiarism (>100 word equivalents) and 39%, very much (>500 word equivalents). Significant plagiarism was detected in both licenciatura (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  35
    Legislation on Cybercrime in Lithuania: Development and Legal Gaps in Comparison with Convention on Cybercrime.Darius Sauliūnas - 2010 - Jurisprudencija: Mokslo darbu žurnalas 122 (4):203-219.
    The Convention on Cybercrime (the Convention) adopted in the framework of the Council of Europe is the main international legislative tool in the fight against cybercrime. It is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. Lithuania is among its signatory states, therefore, the provisions of the Convention have become binding on its legislator, obliging it to take (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  68
    Between the summits: What americans think about media ethics.Tom Cooper - 2008 - Journal of Mass Media Ethics 23 (1):15 – 27.
    An inventory of major studies between 1986 and 2006 indicates the public has continuing and in some cases increasing concerns about specific ethical practices in the mass media industries. While some concerns such as deception, invasion of privacy, advertising saturation, and excessive violence apply to multiple channels of communication, others are medium specific. For example, the public's primary anxieties about the Internet include fraud, spam, and the availability of pornography to children, while the primary concerns about telephone have (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  17.  13
    Bedeviled: A Shadow History of Demons in Science.Oren Harman - 2022 - Common Knowledge 28 (3):447-449.
    Poreskoro, with three cat and four dog heads and a snake with a forked tongue as his tail, is responsible for epidemics of contagious diseases in Romany folklore. The Pishachas of Vedic mythology lurk in charnel houses and graveyards, waiting for humans to infect with madness. In Christian demonology, Pythius is known as the ruler of the eighth circle of the Inferno, bestowing heinous and unspeakable tortures on those who have committed fraud. Demons are the stuff of legends, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  16
    The discourse of digital deceptions and ‘419’ emails.Innocent Chiluwa - 2009 - Discourse Studies 11 (6):635-660.
    This study applies a computer-mediated discourse analysis to the study of discourse structures and functions of ‘419’ emails — the Nigerian term for online/financial fraud. The hoax mails are in the form of online lottery winning announcements, and email ‘business proposals’ involving money transfers/claims of dormant bank accounts overseas. Data comprise 68 email samples collected from the researcher’s inboxes and colleagues’ and students’ mail boxes between January 2008 and March 2009 in Ota, Nigeria. The study reveals that the writers (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  17
    The Risky Promises and Promising Risks of New Information Technologies for Education.Thomas A. Callister & Nicholas C. Burbules - 1999 - Bulletin of Science, Technology and Society 19 (2):105-112.
    Most discussions of the potential of new information technologies (IT) for education have taken one of two forms: enthusiastic proclamations of the revolutionary impact that IT can have for teaching and learning in school and nonschool settings, or dire warnings of the terrible fraud being perpetrated on society about the educational potential of IT. This essay attempts to avoid exaggerated optimism and pessimism about IT and education, while avoiding the trite oversimplification that technology is “neutral” and can be used (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  44
    The Dissemination of Fake Science : On the Ranking of Retracted Articles in Google.Emmanuel Genot & Erik J. Olsson - 2021 - In Sven Bernecker, Amy K. Flowerree & Thomas Grundmann (eds.), The Epistemology of Fake News. New York, NY: Oxford University Press.
    Fake news can originate from an ordinary person carelessly posting what turns out to be false information orfrom the intentional actions of fake news factory workers,but broadly speaking it can also originate from scientific fraud. In the latter case, the article can be retracted upon discovery of the fraud. A case study shows, however, that such fake sciencecan be visible in Google even after the article was retracted, in fact more visible thanthe retraction notice. We hypothesize that the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  52
    Machine learning in human creativity: status and perspectives.Mirko Farina, Andrea Lavazza, Giuseppe Sartori & Witold Pedrycz - 2024 - AI and Society 39 (6):3017-3029.
    As we write this research paper, we notice an explosion in popularity of machine learning in numerous fields (ranging from governance, education, and management to criminal justice, fraud detection, and internet of things). In this contribution, rather than focusing on any of those fields, which have been well-reviewed already, we decided to concentrate on a series of more recent applications of deep learning models and technologies that have only recently gained significant track in the relevant literature. These applications (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Plagiarism and Profit. Ethical and Moral Issues of Scientific Writing and Academic Publishing in the 21st Century.Martin A. M. Gansinger & Ayman Kole - 2017 - In Martin A. M. Gansinger & Ayman Kole (eds.), Mapping Media Responsibility. Contemporary Aspects of Morals, Ethics and Social Discourse. Hamburg: Anchor. pp. 14-49.
    The purpose of this article is to provide viewpoints and discussion of a variety of potentially problematic aspects and mechanisms regarding academic publishing in relation to economical and ethical issues. Starting with the establishment of wide-scale internet access in the beginning of the 21st century, a considerable increase of plagiarism and more sophisticated forms of academic fraud, expanded infrastructure of academic publication channels and forms, combined with strong tendencies of concentration in terms of research disciplines and outlets have (...)
     
    Export citation  
     
    Bookmark  
  23.  76
    The Dissemination of Scientific Fake News.Emmanuel J. Genot & Erik J. Olsson - 2021 - In Sven Bernecker, Amy K. Flowerree & Thomas Grundmann (eds.), The Epistemology of Fake News. New York, NY: Oxford University Press.
    Fake news can originate from an ordinary person carelessly posting what turns out to be false information or from the intentional actions of fake news factory workers, but broadly speaking it can also originate from scientific fraud. In the latter case, the article can be retracted upon discovery of the fraud. A case study shows, however, that such fake science can be visible in Google even after the article was retracted, in fact more visible than the retraction notice. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  30
    Your urgent assistance is requested: The intersection of 419 spam and new networks of imagination.Matthew Zook - 2007 - Ethics, Place and Environment 10 (1):65 – 88.
    This article introduces a series of measures of the geographical manifestation of a subset of unsolicited commercial email, i.e. spam, used to perpetrate 'advanced fee fraud'. Known as '419 spam', this activity has strong historic ties to Nigeria, where similar frauds were operated via physical letters and faxes during the 1970s and 1980s. This article's analysis reveals that 419 spam operates via a globally dispersed network that nevertheless contains a clear agglomeration of activity in West Africa. Building upon theories (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  63
    Profiling and the rule of law.Mireille Hildebrandt - 2008 - Identity in the Information Society 1 (1):55-70.
    Both corporate and global governance seem to demand increasingly sophisticated means for identification. Supposedly justified by an appeal to security threats, fraud and abuse, citizens are screened, located, detected and their data stored, aggregated and analysed. At the same time potential customers are profiled to detect their habits and preferences in order to provide for targeted services. Both industry and the European Commission are investing huge sums of money into what they call Ambient Intelligence and the creation of an (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26. Ethical issues in electronic comemrce.Bette Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  27.  23
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  22
    Toward a digital civil society: digital ethics through communication education.Sophia Kaitatzi-Whitlock - 2021 - Journal of Information, Communication and Ethics in Society 19 (2):187-206.
    Purpose In the face of the enormous rise in digital fraud and criminality, resulting in diverse afflictions to millions of user-victims, emanating from users’ horizontal interactive and transactive exchanges on the internet, but due significantly to internet’s deregulation and anonymity, this study aims to showcase the need for a socially grounded self-regulation. It holds, that this is feasible and that it can be achieved through large scale, comprehensive digital communication education programs. Design/methodology/approach The composite methodology of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension (cyber spiritualism) to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space Transition (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  31. Who Should We Be Online?: A Social Epistemology for the Internet.Karen Frost-Arnold - 2023 - New York, US: OUP Usa.
    From social media to search engines to Wikipedia, the internet is thoroughly embedded in how we produce, locate, and share knowledge around the world. Who Should We Be Online? provides an account of online knowledge that takes seriously the role of sexist, racist, transphobic, colonial, and capitalist forms of oppression. Frost-Arnold argues against analyzing internet users as a collection of identical generic people with smartphones. The novel epistemology developed in this book recognizes that we are differently embodied beings (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  32.  30
    Ethical issues and practical barriers in internet-based suicide prevention research: a review and investigator survey.Eleanor Bailey, Charlotte Mühlmann, Simon Rice, Maja Nedeljkovic, Mario Alvarez-Jimenez, Lasse Sander, Alison L. Calear, Philip J. Batterham & Jo Robinson - 2020 - BMC Medical Ethics 21 (1):1-16.
    Background People who are at elevated risk of suicide stand to benefit from internet-based interventions; however, research in this area is likely impacted by a range of ethical and practical challenges. The aim of this study was to examine the ethical issues and practical barriers associated with clinical studies of internet-based interventions for suicide prevention. Method This was a mixed-methods study involving two phases. First, a systematic search was conducted to identify studies evaluating internet-based interventions for people (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  3
    There Is No Ethical Automation: Stanislav Petrov’s Ordeal by Protocol.Technology Antón Barba-Kay A. Center on Privacy, Usab Institute for Practical Ethics Dc, Usaantón Barba-Kay is Distinguished Fellow at the Center on Privacy Ca, Hegel-Studien Nineteenth Century European Philosophy Have Appeared in the Journal of the History of Philosophy, Among Others He has Also Published Essays About Culture The Review of Metaphysics, Commonweal Technology for A. Broader Audience in the New Republic & Other Magazines A. Web of Our Own Making – His Book About What the Internet Is The Point - 2024 - Journal of Military Ethics 23 (3):277-288.
    While the story of Stanislav Petrov – the Soviet Lieutenant Colonel who likely saved the world from nuclear holocaust in 1983 – is often trotted out to advocate for the view that human beings ought to be kept “in the loop” of automated weapons’ responses, I argue that the episode in fact belies this reading. By attending more closely to the features of this event – to Petrov’s professional background, to his familiarity with the warning system, and to his decisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  96
    The impact of the internet on our moral lives.Amy E. White - 2005 - Journal of Value Inquiry 39 (3-4):537-539.
  35. On fraud.Liam Kofi Bright - 2017 - Philosophical Studies 174 (2):291-310.
    Preferably scientific investigations would promote true rather than false beliefs. The phenomenon of fraud represents a standing challenge to this veritistic ideal. When scientists publish fraudulent results they knowingly enter falsehoods into the information stream of science. Recognition of this challenge has prompted calls for scientists to more consciously adopt the veritistic ideal in their own work. In this paper I argue against such promotion of the veritistic ideal. It turns out that a sincere desire on the part of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  36.  20
    Exploration and Practice of “Internet + Maker Education” University Innovative Entrepreneurship Education Model From the Perspective of Positive Psychology.Xiaomeng Sun - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37. Voyeurism and Exhibitionism on the Internet: The Libidinal Economy of the Spectacle of Instanternity.Bara Kolenc - 2023 - Filozofski Vestnik 43 (3).
    Today, in the situation that we call the instanternity of the digital age, the visual aspect of the social (and power) relations is ever more important. The majority of human interactions on the Internet are happening in the field of vision. In this field, human desire follows the scopic drive, which is, according to Freud, expressed in the ambivalence of voyeurism and exhibitionism. This means that voyeurism and exhibitionism are the fundamental mechanisms operating in, and structuring, the digital virtual. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38. The Internet: A Philosophical Inquiry.Gordon Graham - 1999 - Routledge.
    _The Internet: A Philosophical Inquiry_ develops many of the themes Gordon Graham presented in his highly successful radio series, _The Silicon Society_. Exploring the tensions between the warnings of the Neo-Luddites and the bright optimism of the Technophiles, Graham offers the first concise and accessible exploration of the issues which arise as we enter further into the world of Cyberspace. This original and fascinating study takes us to the heart of questions that none of us can afford to ignore: (...)
    Direct download  
     
    Export citation  
     
    Bookmark   12 citations  
  39.  2
    Transparência do Estado, administração aberta e internet.Sérgio Pratas - 2013 - Lisboa: INA.
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  27
    Trickle-Down Effects of Entrepreneurial Bricolage and Business Model Innovation on Employee Creativity: Evidence From Entrepreneurial Internet Firms in China.Fei Hou, Ming-De Qi, Yu Su, Xiu-Xia Tan & Bin-Xin Yang - 2022 - Frontiers in Psychology 12.
    Although most existing studies have considered entrepreneurial bricolage as a means to overcome resource constraints in new ventures, few have explored the direct effects of entrepreneurial bricolage on employee creativity, particularly in the context of entrepreneurial internet firms. Drawing from multiple theories, this study proposes a cross-level mediation model for the trickle-down effects of entrepreneurial bricolage and business model innovation on employee creativity. By using a 2-wave longitudinal design, survey data were collected from multiple sources, including 49 leaders and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  50
    The morality of an internet market in human ova.Amy E. White - 2006 - Journal of Value Inquiry 40 (2-3):311-321.
  42.  12
    Research on transformer vibration monitoring and diagnosis based on Internet of things.Amit Sharma & Zhenzhuo Wang - 2021 - Journal of Intelligent Systems 30 (1):677-688.
    A recent advent has been seen in the usage of Internet of things (IoT) for autonomous devices for exchange of data. A large number of transformers are required to distribute the power over a wide area. To ensure the normal operation of transformer, live detection and fault diagnosis methods of power transformers are studied. This article presents an IoT-based approach for condition monitoring and controlling a large number of distribution transformers utilized in a power distribution network. In this article, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Science Communication on the Internet: Old Genres Meet New Genres.[author unknown] - 2019
     
    Export citation  
     
    Bookmark  
  44.  24
    Exercise-Based Interventions for Internet Addiction: Neurobiological and Neuropsychological Evidence.Shanshan Li, Qianjin Wu, Cheng Tang, Zichao Chen & Li Liu - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  68
    Attitudes and behaviors of Japanese physicians concerning withholding and withdrawal of life-sustaining treatment for end-of-life patients: results from an Internet survey.Seiji Bito & Atsushi Asai - 2007 - BMC Medical Ethics 8 (1):1-9.
    Background Evidence concerning how Japanese physicians think and behave in specific clinical situations that involve withholding or withdrawal of medical interventions for end-of-life or frail elderly patients is yet insufficient. Methods To analyze decisions and actions concerning the withholding/withdrawal of life-support care by Japanese physicians, we conducted cross-sectional web-based internet survey presenting three scenarios involving an elderly comatose patient following a severe stroke. Volunteer physicians were recruited for the survey through mailing lists and medical journals. The respondents answered questions (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  8
    Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan’s Adolescents.Cheng-Min Chao & Tai-Kuei Yu - 2017 - Frontiers in Psychology 8.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  20
    Algorithmic regulation and the global default: Shifting norms in Internet technology.Ben Wagner - 2016 - Etikk I Praksis - Nordic Journal of Applied Ethics 1 (1):5-13.
    The world we inhabit is surrounded by ‘coded objects’ from credit cards to airplanes to telephones. Sadly the governance mechanisms of many of these technologies are only poorly understood, leading to the common premise that such technologies are ‘neutral’, thereby obscuring normative and power-related consequences of their design. In order to unpack supposedly neutral technologies, the following paper will try and foreground two of key questions around the technologies used on the global Internet: 1) how are content regulatory regimes (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  22
    Using Social Influence Technique as a Tool to Reduce the Diffusion of Responsibility on the Internet.Jakub Kuś & Agata Kocimska-Bortnowska - forthcoming - Polish Psychological Bulletin:252-261.
    Diffusion of responsibility is a well-known effect widely studied in a real-life setting. It can occur in a situation in which the more people observe a crisis event, the less likely it is that someone will react and provide real assistance. These days of a galloping digital revolution a question is to be raised as to whether the same effect can be observed in the online space of communication. In order to investigate this phenomenon we designed a study aimed at (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. L’evoluzione dei mass media: come coesisteranno internet e la TV?Luciano Floridi - 1996 - In Dopo la “Cattiva Maestra” TV il miglior amico è il PC. Rome, Metropolitan City of Rome, Italy: pp. 195–207.
     
    Export citation  
     
    Bookmark  
  50. Difficulty of Enforcing Laws in the Extraterritorial Internet, The.James Alexander French & Rafael X. Zahralddin - 1996 - Nexus 1:99.
1 — 50 / 976