Filters








63 Hits in 3.9 sec

Industrial Espionage – A Systematic Literature Review (SLR)

Tie Hou, Victoria Wang
2020 Computers & security  
Particularly, we systematically: i) identify key features of IE by analysing its current definitions, and coin our own working definition; ii) discuss the current state of research on IE from different  ...  Currently, techniques generated by rapid developments of Internet of Things (IOTs) and Data Science are enabling a massive increase of both frequency and power of IE related activities in our increasingly  ...  The complexity of insider threat research requires a series of theories and approaches, including threat modelling; enterprise security policy and architecture; human governance strategies; insider vulnerability  ... 
doi:10.1016/j.cose.2020.102019 fatcat:y2jottg3srebrhazc3q5glap4e

Technosocial Predictive Analytics in Support of Naturalistic Decision Making

Antonio Sanfilippo, Andrew J. Cowell, Liz Malone, Roderick Riensche, Jim Thomas, Stephen Unwin, Paul Whitney, Pak Chung Wong
2009 unpublished
Originality/Value -Integration of technosocial predictive modeling with knowledge management and analytic gaming to support collaborative decision making.  ...  First, it strives to create decision advantage through the integration of human and physical models.  ...  The IED process model shown in Figure 4 represents an IED attack as a number of explicit steps.  ... 
doi:10.14236/ewic/ndm2009.13 fatcat:nl2uqanfrjcdbeavv4d6ulyp7a

Distributed Algorithm to Locate Critical Nodes to Network Robustness based on Spectral Analysis [article]

Klaus Wehmuth, Artur Ziviani
2011 arXiv   pre-print
Experimental results confirm the effectiveness of our proposal considering networks of different scales and topological characteristics.  ...  Such critical nodes may be thought of as those most related to the notion of network centrality.  ...  ACKNOWLEDGEMENTS This work was partially supported by the Brazilian Funding Agencies FAPERJ, CNPq, CAPES, and by the Brazilian Ministry of Science and Technology (MCT).  ... 
arXiv:1101.5019v3 fatcat:kibuvyf4czhepfzat3yhoj2xvm

Life, but not as we know it: A.I. and the popular imagination

Luke Goode
2018 Culture Unbound: Journal of Current Cultural Research  
Seeking only to critique the emotive, mythical or fanciful aspects of the discourse in service of an idealised model of rational, deliberative public discourse can only take us so far, I suggest.  ...  coverage of both the potential benefits and threats posed by the technology.  ... 
doi:10.3384/cu.2000.1525.2018102185 fatcat:oiqjv4bbxzhwxhc57ehdoknrqa

Data Control Wars: Collaborative Fiction, Transition Design and Technological Sovereignty

Andreu Belsunces Gonçalves, Grace Polifroni Turtle, Antonio Calleja, Raul Nieves Pardo, Bani Brusadin, Ignasi Ayats Soler
2020 Temes de Disseny  
between industry, democracy, citizenship and data; to stimulate social imagination through the simulation of sociotechnical scenarios, thus decolonising imaginaries captured by techno-capitalist logic  ...  as a device to question techno-capitalist cultural hegemony through the construction of other stories about what the technosocial body can be.  ...  More specifically, compared to the Futures Wheel, the STEEP analysis, scenario building, the Three Horizons method and backcasting, CW does not seek to analyse a limited number of technosocial scenarios  ... 
doi:10.46467/tdd36.2020.208-239 fatcat:ssazxbbeu5hvzhdqhxev46lyva

Conclusion: Infrastructural Brutalism and Brisantic Politics [chapter]

2020 Infrastructural Brutalism  
logistical intervention, because labor power has been attacked and diminished by capitalism over centuries, the ecological crisis presents an immediate and existential threat, and the multiplication of  ...  are convinced of "apocalyptic scenarios" they become "more apathetic," and over time a "catastrophe fatigue" develops. 37 ere are many aspects of this discussion on which I agree with the critics of catastrophism  ... 
doi:10.7551/mitpress/10905.003.0007 fatcat:vtdsm5fgyfg2xbxrt3aljgxnnm

Cultural robotics: on the intersections of identity and autonomy in people and machines

Audrey Bennett, Ron Eglash
2013 Revista Teknokultura  
It is our hope that more democratic and sustainable ways of designing and using robots can emerge from this view of hybridity and co-evolution between social and technical worlds.  ...  We will examine the cultural significance of two SIRs portrayed in pop culture, analyze the socio-technical history of autonomous devices such as the master-slave circuit, and explore the ways in which  ...  attacks.  ... 
doi:10.5209/rev_tk.2013.v10.n2.48254 doaj:122a66e1331b4f9ca349fae1a1da13c7 fatcat:qweux6e2b5eq7i3a62toctfh2u

Lie Detectors: On Secrets and Hypersecurity in Los Alamos

J. Masco
2002 Public culture  
He is the author of "States of Insecurity: Plutonium and Post-Cold War Anxiety in New Mexico, 1992 -96" in Cultures of Insecurity: States, Communities, and the Production of Danger, edited by Jutta Weldes  ...  , Mark Laffey, Hugh Gusterson, and Raymond Duvall (1999), and is currently completing an ethnographic study of post-Cold War debates about national security in and around Los Alamos National Laboratory  ...  What is particularly remarkable about this last bit of gossip is that it exchanges one threat with another, replacing fears of nuclear espionage against the United States with fears of an attack on the  ... 
doi:10.1215/08992363-14-3-441 fatcat:oik2mz7ambehtmum2uo7fpcwfe

Legal Conundrums of the Metaverse

Safari Kasiyanto, Mustafa R. Kilinc
2022 Journal of Central Banking Law and Institutions  
The market capital and the economic potential of the metaverse are enormous.  ...  It also discusses some other legal aspects such as privacy and data protection, contract law and smart contracts, cybersecurity and cyberattacks, monetary and payment systems laws, and regulation of virtual  ...  The key points of security issues of the metaverse encompass: (i) identity management, how providers design and strengthens its security; (ii) DDoS attacks; (iii) device vulnerability, which is more on  ... 
doi:10.21098/jcli.v1i2.25 fatcat:5zkhul7yvbhoti7ufq62j7lgh4

Jnanadeepa Pune Journal of Religious Studies: July-September 2022 26/3

Kuruvilla Pandikattu
2022 Zenodo  
Dabhi "Go and Do Likewise:" The Biblical Underpinnings of Fratelli Tutti 79 Patrick McDonald Fratelli Tutti, Technology, and Shannon Vallor's Technomoral Virtues. 101 Selva Rathinam SJ Linking Ethics,  ...  , Inspired by Fratelli Tutti 34 Kuruvilla Pandikattu SJ A Heart Open to the Whole World: Creating a World of Freedom, Love and Forgiveness Based on Fratelli Tutti 56 James B.  ...  He is a full time professor of Biblical Studies and is also involved in pastoral and retreat works. He has numerous academic articles to his credit.  ... 
doi:10.5281/zenodo.6383243 fatcat:xvujmi3an5c6jn5kvizdjocj4e

Hack or be Hacked: The Quasi-Totalitarianism of Global Trusted Networks

Athina Karatzogianni, Martin Gak
2015 New Formations  
legitimate concerns of users for their own political and financial subsistence.  ...  and, sometimes, NGOs; b. the role of civil society NGOs as mechanisms for circumventing democratic processes c. enterprise association politics that ensures that the dual goal of state (security) and  ...  I called for a review of our surveillance programs.  ... 
doi:10.3898/newf:84/85.06.2015 fatcat:s4ohl6cvdfhiveiqslxkin2cye

Legitimising Misogyny [chapter]

Lisa Sugiura
2021 The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women  
Much of what is being espoused, however, long predates the internet and patriarchal ideologies about the inferiority of women are being regurgitated and recycled online, into the minds and mouths of people  ...  much of the support and dissemination of the misogynistic and anti-feminist messages are generated and propagated by men with extensive public platforms and followings, which then extend offline.  ...  (Tom) We are sick of getting rejected and sick of being led on by women. (Lee) I feel like a loser because I can't find anyone.  ... 
doi:10.1108/978-1-83982-254-420211008 fatcat:5ngyu4qtg5bxrk3zqty6b4xzbi

Yvonne Jewkes and Carol Andrews (2005), 'Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales', Policing and Society, 15, pp. 42-62 [chapter]

2017 Crime and Deviance in Cyberspace  
Wall, D.S. (2007) SHEILA BROWN is a criminologist whose recent and current research includes technosocial and mediated aspects of serious crime processing; and refugees and dangerization.  ...  Brenner, S.w. (2007) , Law in an Era of Smart Technology, New York: Oxford University Press.  ...  escalate to threats of, or actual, sexual violence and death.  ... 
doi:10.4324/9781315095325-31 fatcat:d3vzmgzf6zbz5anlkew3i6pkoe

Discourses of the digital divide

Kevin McSorley
2001 Philosophers' magazine  
This thesis concludes that the digital divide can be considered as an incomplete and open-ended object of government, a brand of inequality, through which a particular understanding of technosocial formation  ...  Consistent rules of discursive formation are identified across discourses: the ethical equivalence of a concern with the social and the promotion of the techno-economic, and a teleological conception of  ...  I identified technosocial implosion as the concomitant discursive organization of ethos and teleology.  ... 
doi:10.5840/tpm200114134 fatcat:3fzmpakfpfhwbc2qrvohmill4q

Theorizing STS from Asia—Toward an STS Multiscale Bioecology Framework: A Blurred Genre Manifesto/Agenda for an Emergent Field

Michael M. J. Fischer
2018 East Asian Science, Technology and Society: an International Journal  
By citing the growing new anthropological STS ethnographic work in a variety of Asian locales, I suggest that new narratives and models are already out there as emergent forms of life, that is, as contested  ...  I document a moment in East Asian and Southeast Asian STS that grounds methodological advocacy for how anthropological STS initiatives revise received models and theories and how they work from multiple  ...  and corporate equivalents), the attacks against homeland security, and the gambles of financial speculation.  ... 
doi:10.1215/18752160-7219380 fatcat:3usmidsrgndyzhhooiaig4tyb4
« Previous Showing results 1 — 15 out of 63 results