Results for 'theft'

389 found
Order:
  1.  24
    Identity Theft, Deep Brain Stimulation, and the Primacy of Post‐trial Obligations.Joseph J. Fins, Amanda R. Merner, Megan S. Wright & Gabriel Lázaro-Muñoz - 2024 - Hastings Center Report 54 (1):34-41.
    Patient narratives from two investigational deep brain stimulation trials for traumatic brain injury and obsessive‐compulsive disorder reveal that injury and illness rob individuals of personal identity and that neuromodulation can restore it. The early success of these interventions makes a compelling case for continued post‐trial access to these technologies. Given the centrality of personal identity to respect for persons, a failure to provide continued access can be understood to represent a metaphorical identity theft. Such a loss recapitulates the pain (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  2.  27
    Identity Theft: A Thought Experiment on the Fragility of Identity.David Menčik - 2020 - Conatus 5 (1):71.
    This paper intends to discuss some aspects of what we conceive as personal identity: what it consists in, as well as its alleged fragility. First I will try to justify the methodology used in this paper, that is, the use of allegories in ontological debates, especialy in the form of thought experiments and science fiction movies. Then I will introduce an original thought experiment I call “Who am I actually?,” one that was coined with the intent to shed light on (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  3.  18
    Time Theft: Exposing a Subtle Yet Serious Driver of Socioeconomic Inequality.Jason R. Pierce, Laura M. Giurge & Brad Aeon - 2025 - Business and Society 64 (1):3-8.
    Socioeconomic inequality is perpetuated and exacerbated by an overlooked yet serious epidemic of time theft: the act of causing others to lose their time without adequate cause, compensation, or consent. We explain why time theft goes unnoticed, how it drives socioeconomic inequality, and what businesses and policymakers can do to address it.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  31
    Identity Theft in the Academic World Leads to Junk Science.Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (1):287-290.
    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  25
    The Theft: An Analysis of Moral Agency.Gerard Elfstrom - 2020 - Conatus 5 (1):27.
    Adam and Eve’s theft marks the beginning of the human career as moral agents. This article will examine the assumptions underlying the notion of moral agency from the perspective of three unremarkable human beings who found themselves in situations of moral difficulty. The article will conclude that these three people could not have acted differently than they did. It will conclude that it is unreasonable to assume that ordinary human beings will inevitably possess the resources to address difficult moral (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6. AI Art is Theft: Labour, Extraction, and Exploitation, Or, On the Dangers of Stochastic Pollocks.Trystan S. Goetze - 2024 - Proceedings of the 2024 Acm Conference on Fairness, Accountability, and Transparency:186-196.
    Since the launch of applications such as DALL-E, Midjourney, and Stable Diffusion, generative artificial intelligence has been controversial as a tool for creating artwork. While some have presented longtermist worries about these technologies as harbingers of fully automated futures to come, more pressing is the impact of generative AI on creative labour in the present. Already, business leaders have begun replacing human artistic labour with AI-generated images. In response, the artistic community has launched a protest movement, which argues that AI (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis.Litska Strikwerda - 2012 - Ethics and Information Technology 14 (2):89-97.
    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This legal question has both an ontological and a moral component. The question whether or not virtual items count as “objects” that can be “stolen” is an ontological question. The question whether (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  16
    The Theft of Anthropology.Chris Hann - 2009 - Theory, Culture and Society 26 (7-8):126-147.
    Social anthropology flourished in the 20th century but ethnographic methods and intensifying ‘creative destruction’ in the elaboration of theory have combined to deflect attention away from earlier concerns with long-term historical change. The ‘theft of history’ that took place within anthropology refers to this loss, which is not to be confused with healthy interdisciplinary borrowing. With the demise of the evolutionist paradigm and intensifying global connectivity, anthropologists have struggled to find a new balance between empirical ethnographic description, the interpretation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  31
    Employee Perceptions of Workplace Theft Behavior: A Study Among Supermarket Retail Employees in Malaysia.M. Krishna Moorthy, A. Seetharaman, Nahariah Jaffar & Yeap Peik Foong - 2015 - Ethics and Behavior 25 (1):61-85.
    Employee theft is costly to any business, especially to big retail chain organizations. This research is to study the perception of retail employees on the impact of the individual and organizational factors contributing to workplace theft behavior in supermarkets in Malaysia and to study the mediating effect of intention to steal and the moderating effect of internal control systems. The results proved that individual and organizational factors do influence workplace theft behavior. It is also established that internal (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  19
    The theft of history.Jack Goody - 2006 - New York: Cambridge University Press.
    Professor Jack Goody builds on his own previous work to extend further his highly influential critique of what he sees as the pervasive eurocentric or occidentalist biases of so much western historical writing. Goody also examines the consequent 'theft' by the West of the achievements of other cultures in the invention of (notably) democracy, capitalism, individualism, and love. The Theft of History discusses a number of theorists in detail, including Marx, Weber and Norbert Elias, and engages with critical (...)
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  11.  3
    Sacrilegious Theft in First-Millennium BCE Babylonia.Małgorzata Sandowicz - 2024 - Journal of the American Oriental Society 144 (4):739-763.
    Scholars have long wrestled with the question of why the Laws of Hammurabi provide two different sanctions for the theft of temple (and palace) property: the death penalty (§6) and thirtyfold restitution (§8). While reviewing Neo- and Late Babylonian evidence on sacrilegious theft, this paper argues that Babylonian law neatly distinguished between the theft of sacred objects and the theft of nonsacred temple property, which incurred different penalties, corresponding to those that §6 and §8 of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  67
    Identity Theft: Doubles and Masquerades in Cassius Dio's Contemporary History.Maud Gleason - 2011 - Classical Antiquity 30 (1):33-86.
    The contemporary books of Cassius Dio's Roman History are known for their anecdotal quality and lack of interpretive sophistication. This paper aims to recuperate another layer of meaning for Dio's anecdotes by examining episodes in his contemporary books that feature masquerades and impersonation. It suggests that these themes owe their prominence to political conditions in Dio's lifetime, particularly the revival, after a hundred-year lapse, of usurpation and damnatio memoriae, practices that rendered personal identity problematic. The central claim is that narratives (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  51
    Theft Is Property! The Recursive Logic of Dispossession.Robert Nichols - 2018 - Political Theory 46 (1):3-28.
    This article offers a preliminary critical-historical reconstruction of the concept of dispossession. Part I examines its role in eighteenth- and nineteenth- century struggles against European feudal land tenure. Drawing upon Marx’s critique of French anarchism in particular, I identify a persistent limitation at the heart of the concept. Since dispossession presupposes prior possession, recourse to it appears conservative and tends to reinforce the very proprietary and commoditized models of social relations that radical critics generally seek to undermine. Part II turns (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  14.  50
    Theft in a wireless world.Luc Small - 2007 - Ethics and Information Technology 9 (3):179-186.
    I explore philosophically the phenomenon of home wireless networks as used to share broadband Internet connections. Because such networks are frequently unsecured, third parties can use them to access the Internet. Here I consider carefully whether this kind of behaviour should be properly called theft. I begin with a brief non-technical introduction to 802.11 wireless networks. Subsequently, I present a four part argument – appealing to the unsecured nature of the networks discussed, entrenched software and hardware behaviours, trespass law, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  43
    Identity, Moral, and Equity Perspectives on the Relationship Between Experienced Injustice and Time Theft.Yan Liu & Christopher M. Berry - 2013 - Journal of Business Ethics 118 (1):73-83.
    Time theft is a costly burden on organizations. However, there is limited knowledge about why time theft occurs. To advance this line of research, this conceptual paper looks at the association between organizational injustice and time theft from identity, moral, and equity perspectives. This paper proposes that organizational injustice triggers time theft through decreased organizational identification. It also proposes that moral disengagement and equity sensitivity moderate this process such that organizational identification is less likely to mediate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  16.  27
    Commerce, Theft and Deception : The Etymology of Hermes in Plato’s Cratylus.Olof Pettersson - 2022 - In Vladimir Mikes (ed.), Plato's Cratylus. Proceeding from the XI Symposium Platonicum Pragense. Leiden: Brill.
    In the light of Socrates’ largely neglected etymological account of the name Hermes, this article reexamines the dialogue’s perplexing conclusion that reality should not be sought through names, but through itself. By a close scrutiny of three claims made in this etymology – that language is commercial, thievish and deceptive – it argues that Socrates’ discussion about the relation between names and reality cannot only be meaningfully understood in terms of his characterization of language as deceptive and therefore tragic, but (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17. Fictionalism, theft, and the story of mathematics.Mark Balaguer - 2009 - Philosophia Mathematica 17 (2):131-162.
    This paper develops a novel version of mathematical fictionalism and defends it against three objections or worries, viz., (i) an objection based on the fact that there are obvious disanalogies between mathematics and fiction; (ii) a worry about whether fictionalism is consistent with the fact that certain mathematical sentences are objectively correct whereas others are incorrect; and (iii) a recent objection due to John Burgess concerning “hermeneuticism” and “revolutionism”.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   45 citations  
  18.  29
    Combatting Identity Theft: A Proposed Ethical Policy Statement and Best Practices.Dinah Payne & Pamela A. Kennett-Hensel - 2017 - Business and Society Review 122 (3):393-420.
    The purpose of this article is to explore the law related to identity theft, to review corresponding rights, and responsibilities of stakeholders involved in identity theft and to formulate a system of best practices businesses could engage in to prevent or reduce identity theft threats. Utilizing two ethical frameworks based on deontological approaches, the authors conclude that there should be a well-defined management scheme to prevent identity theft, which is easy to comprehend and comply with for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  16
    Theft, Law and Society.Jerome Hall - 1937 - International Journal of Ethics 47 (3):390-393.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  17
    Theft in Broad Daylight: Racism and Neoliberal Legality.Brenna Bhandar - 2021 - Law and Critique 32 (3):285-299.
    In this article the author examines Fitzpatrick’s foundational critique of liberal legality and racism, a theme which remained central to his decades-long excavation of modern law’s self-identity. After considering Fitzpatrick’s ‘separation thesis’, the author then turns to consider the ways in which neoliberal legality is parasitic upon liberal legal racial formations while at the same time, obscuring the foundational place of race in contemporary capitalism by subsuming material life within its modes of value extraction.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  17
    Schiller meets “Grand Theft Auto”: Perspectives of Video Game Ethics.Ralf Beuthan - 2021 - Cheolhak-Korean Journal of Philosophy 148:113-138.
    ‘비디오게임 하는 것’은 어떤 윤리적 모델을 통해 새로운 방식으로 게임행위를 평가할 수 있는지에 대한 질문을 제기하도록 만들었다. 이러한 맥락 속에서 고전적인 윤리학적 모델 (덕 윤리, 의무론, 공리주의)은 궁극적으로 오직 ‘현실적 행위’에만 적용되고, 비디오 게임의 ‘가상적 행위’에 적용되지 않는다는 논증은 “놀이 무도덕주의” (Ostritsch 2018) 테제로 귀결된다. 이는 특히 노골적인 ‘폭력의 행위’의 경우의 게임 행위가 도덕적으로 판단될 수 있고 그래야만 한다는 공적 토론의 크게 우세한 직감(直感)에 의해 반박되어 왔다. 이러한 양자의 논의 속에 프리드리히 실러 (Friedrich Schiller)의 고전적 놀이 이론에 따른 중간적 입장이 (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22. The puzzle of virtual theft.Nathan Wildman & Neil McDonnell - 2020 - Analysis 80 (3):493-499.
    How can you steal something that doesn’t exist? This question confronts those of us who take an irrealist view of virtual objects and agree with the Supreme Court of the Netherlands that robbery took place when two boys used non-virtual violence to coerce a third boy into relinquishing his virtual amulet and mask. Here we outline this Puzzle of Virtual Theft, along with the closely related Puzzle of Virtual Value. After demonstrating how these puzzles are deeply problematic for the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  23.  21
    Identity Theft: A Cost of Business?Thomas A. Hemphill - 2001 - Business and Society Review 106 (1):51-63.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  11
    Theft of DNA: do we need a new criminal offence?Loane Skene - 2005 - In Jennifer Gunning & Søren Holm (eds.), Ethics, Law, and Society. Ashgate. pp. 1--85.
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  44
    "Theft's way" a comparative study of Chuang Tzu's Tao and derridean trace.Chi-hui Chien - 1990 - Journal of Chinese Philosophy 17 (1):31-49.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  28
    Theft is property! Dispossession and critical theory.Christopher Balcom - 2021 - Contemporary Political Theory 20 (3):119-122.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  42
    (1 other version)The Theft of the Pears.William E. Mann - 1978 - Apeiron 12 (1):51 - 58.
  28.  28
    Gift, theft, apology.Constantin V. Boundas - 2001 - Angelaki 6 (2):1 – 5.
  29.  59
    The advantage of theft over honest toil.Joseph Agassi - 2009 - Philosophy of the Social Sciences 39 (3):507-526.
    Gregory Landini offers a new and an illuminating reading of Ludwig Wittgenstein’s idea about his own innovation: it is the invention of a notation that removes the mystery from all theorems of logic and of mathematics as it renders their proofs part of their wordings. This makes all theorems in principle as boring as “all four-legged animals are animals.” This idea is Wittgenstein’s doctrine of showing. It is worthless; yet, as Landini shows, every time Wittgenstein offered an elaboration on it, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  23
    Theft, Law and Society. Jerome Hall.Malcolm Sharp - 1937 - International Journal of Ethics 47 (3):390-393.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  73
    Theft' in greek oratory.David Whitehead - 2007 - Classical Quarterly 57 (01):70-.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  32.  18
    The Impact of Work-Related Use of Information and Communication Technologies After Hours on Time Theft.Chenqian Xu, Zhu Yao & Zhengde Xiong - 2022 - Journal of Business Ethics 187 (1):185-198.
    Time theft is a prevalent, costly, and generally discreet employee activity in firms; nonetheless, very limited research is available on it. To explore why, how, and when employees exhibit time theft, we investigate the influence mechanism of work-related use of information and communication technologies after hours (W_ICTs) on time theft from the perspective of resource gain and loss. Our study found that W_ICTs significantly promotes employee time theft. Emotional exhaustion and moral disengagement play a mediating role (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  22
    Exploitation as Theft vs. Exploitation as Underpayment.Lamont Rodgers - 2015 - Disputatio 7 (40):45-59.
    Marxists claim capitalists unjustly exploit workers, and this exploitation is to show that workers ought to hold more than they do. This paper presents two accounts of exploitation. The Theft Account claims that capitalists steal some of the value to which workers are entitled. The Underpayment Account holds that capitalists are not entitled to pay workers as little as they do, even if the workers are not entitled to the full value they produce. This paper argues that only the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  19
    Truth, Theft and Gift: Thoughts on Alētheia.William Desmond - 2024 - Filozofia 79 (4):351-364.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. Entitlements and the Theft of Taxation.Richard Mckenzie - 1980 - Reason Papers 6:15-24.
     
    Export citation  
     
    Bookmark  
  36.  16
    The Concept of Theft in Classical Hindu Law.R. K. Sharma & Chanchal Bhattacharya - 1992 - Journal of the American Oriental Society 112 (1):168.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Is AI Art Theft? The Moral Foundations of Copyright Law in the Context of AI Image Generation.Eric Shoemaker - 2024 - Philosophy and Technology 37 (3):1-21.
    The recent swell of public interest in AI image generating software, such as Midjourney, DALL-E 2, and Stable Diffusion, has led to a great deal of consternation among conventional visual artists. Understanding that the process through which these machines generate images depends ultimately on a machine learning process that involves the use of copyrighted artworks, has led many artists to allege that AI art is theft. There has already been a substantive debate in the literature concerning whether this use (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38. Theft, Law and Society. By Malcolm Sharp. [REVIEW]Jerome Hall - 1936 - International Journal of Ethics 47:390.
     
    Export citation  
     
    Bookmark  
  39.  44
    Adultery, Theft, Murder: Aristotelian Practical Rationality and Absolute Prohibitions.Victor Saenz - 2023 - Ancient Philosophy Today 5 (1):55-79.
    In a neglected passage, Aristotle affirms that certain action-types and emotions – for example, murder, and shamelessness – 'have names that imply badness’ and are categorically prohibited ( EN II.6 1107a8–15). Two questions are of interest. First, on Aristotle’s view, why are these act-types and emotions always vicious? Whether giving little money or feeling anger are vicious is context sensitive. Why aren’t murder and its ilk like that? Second, why are the prohibitions absolute? Why shouldn’t, say, the prospect of avoiding (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  57
    Stealing Time on the Company’s Dime: Examining the Indirect Effect of Laissez-Faire Leadership on Employee Time Theft.Biyun Hu, Crystal M. Harold & Dayoung Kim - 2023 - Journal of Business Ethics 183 (2):475-493.
    Employee time theft is a costly and prevalent unethical work behavior. Yet, this construct has received less attention compared to other unethical behaviors, and as such, the literature has only a rudimentary understanding of why employees engage in time theft. Thus, the primary goal of this research is to provide greater insight into both _why_ employees engage in time theft and _who_ is most likely to engage in time theft. To do so, we draw from social (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. (1 other version)Epistemic Conservatism: Theft or Honest Toil?Richard Fumerton - 2007 - In Tamar Szabo Gendler & John Hawthorne (eds.), Oxford Studies in Epistemology:Volume 2: Volume 2. Oxford University Press.
  42.  7
    Theft in the information age: Music, technology, crime, and claims-making.Stéphane Leman-Langlois - 2004 - Knowledge, Technology & Policy 17 (3-4):140-163.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  48
    Nominalism by Theft.Richard Creath - 1980 - American Philosophical Quarterly 17 (4):311 - 318.
  44.  4
    Logical Contradictions and Moral-legal Paradoxes at the Intersection of Scientometrics and Ethics of Scientific Publications (Oxymorons “Self-Pillage” and “Self-Theft” in the AI-System Called “Anti-Plagiarism”).В. О Лобовиков - 2024 - Siberian Journal of Philosophy 21 (3):5-19.
    The subject matter of research is contradictions and moral-legal antinomies arising in the philosophy of science, in relation to a set of technologies called “Anti-Plagiarism”. The formal-logical and formal-axiological aspects of the notions “property”, “common property”, “private property”, “theft”, “plundering” and others are considered. The paper argues for the urgent necessity to allow authors unlimited reuse of any fragments of their previously published texts in their new publications actually containing novel scientific results. The condition is that such duplication is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Lanceros, Patxi Theft of the future. Borders, Fear, Crisis, Madrid: Catarata.Valerio D'Angelo - 2019 - Las Torres de Lucca. International Journal of Political Philosophy 8 (14):189-193.
    Hay un proverbio que circula en algunos países europeos que dice: “el futuro es un mal recuerdo del presente”. Esta expresión, algo paradójica, cobra un sentido claro a la luz de la lectura del último trabajo de Patxi Lanceros, profesor de filosofía política y teoría de la cultura en la Universidad de Deusto. En El robo del futuro, el autor trata de reflexionar, lucida y sosegadamente, acerca de alguno de los fenómenos políticos más acuciantes de nuestros tiempos; de la emergencia (...)
    No categories
     
    Export citation  
     
    Bookmark  
  46.  77
    Ownership as Theft.James O. Grunebaum - 1990 - The Monist 73 (4):544-563.
  47.  40
    Can rewards induce corresponding forms of theft? Introducing the reward‐theft parity effect.Jeff S. Johnson, Scott B. Friend & Sina Esteky - 2022 - Business Ethics, the Environment and Responsibility 31 (3):846-858.
    Rewards are reinforcement mechanisms that organizations use to shape desirable employee behaviors. However, rewards may also have unintended consequences, such as building expectations for receiving extra benefits and weakening employee barriers to unethical acts. This article investigates the dark side of the reward–behavior association, and exploring what is referred to as the reward–theft parity effect (RTPE). The authors hypothesize that receiving rewards induces a corresponding type of theft. In Study 1, survey results (n = 634) show initial support (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  24
    Getting the advantages of theft without honest toil: Realism about the complexity of physical systems without realist commitments to their scientific representations.Cyrille Imbert - unknown
    This paper shows that, under certain reasonable conditions, if the investigation of the behavior of a physical system is difficult, no scientific change can make it significantly easier. This impossibility result implies that complexity is then a necessary feature of models which truly represent the target system and of all models which are rich enough to catch its behavior and therefore that it is an inevitable element of any possible science in which this behavior is accounted for. I finally argue (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  24
    Cultural Appropriation as Theft.James O. Young - 2008 - In Cultural Appropriation and the Arts. Wiley-Blackwell. pp. 63–105.
    This chapter contains section titled: Harm by Theft Possible Owners of Artworks Cultures and Inheritance Lost and Abandoned Property Cultural Property and Traditional Law Collective Knowledge and Collective Property Ownership of Land and Ownership of Art Property and Value to a Culture Cultures and Intellectual Property Some Conclusions About Ownership and Appropriation The Rescue Argument.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  36
    An interdisciplinary approach to address identity theft education.S. Helser - 2011 - Acm Sigcas Computers and Society 41 (2):38-50.
    An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society at Saint Xavier University in Chicago, Illinois. The focus of this paper is to present observations related to information assurance in rural and urban populations. Based on our experience teaching college students in these environments, we have noted that on entering school, generally, individuals demonstrate limited background knowledge of a variety of computer related technologies. Students begin with a technical disadvantage that represents (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 389