Now showing items 31-40 of 191
Cyborg Humanity and the Technologies of Human Enhancement
(Macmillan Interdisciplinary, 2017)
Cooperative Volunteer Protocol to Detect Non-Line of Sight Nodes in Vehicular Ad hoc Networks
A vehicular Ad hoc Network (VANET) is a special type of Mobile Ad hoc Network (MANET) application that impacts wireless communications and Intelligent Transport Systems (ITSs). VANETs are employed to develop safety ...
The Data Shadow
This hypothetical story is about personal data which resides on the internet. It has its foundation in things which have happened. It raises serious questions about whether we should be more wary of, and whether there are ...
How to describe and evaluate “deception” phenomena: recasting the metaphysics, ethics, and politics of ICTs in terms of magic and performance and taking a relational and narrative turn
(Ethics of Information Technology, 2017-10-19)
Contemporary ICTs such as speaking machines and computer games tend to create illusions. Is this ethically problematic? Is it deception? And what kind of “reality” do we presuppose when we talk about illusion in this ...
Ubiquitous Intelligence and computing for enabling a smarter world
Special issue editorial
Information systems ethics – challenges and opportunities
The purpose of this paper is to explore the ethical issues surrounding information systems (IS) practice with a view to encouraging greater involvement in this aspect of IS research. Information integrity relies upon the ...
Quantification Machines and Artificial Agents in Global Finance: Historical-Phenomenological Perspectives from Philosophy and Sociology of Technology and Money
This paper raises questions regarding the societal, cultural, and ethical significance of finance, mathematics, and financial-mathematical technologies, discussing in particular the phenomenon of quantification as mediated ...
Semantic modelling for learning styles and learning material in an e-learning environment
Various learners with various requirements have led to the raise of a crucial concern in the area of e-learning. A new technology for propagating learning to learners worldwide, has led to an evolution in the e-learning ...
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject ...
WannaCry Report Shows NHS Chiefs Knew of Security Danger, but Management Took No Action
It turns out you can't ensure cyber-security in the world's fifth-largest employer if there's no one in charge of making it happen.