Results for ' Cybersecurity Strategies'

974 found
Order:
  1.  18
    Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating.Sebastian Knebel, Mario D. Schultz & Peter Seele - 2022 - Journal of Information, Communication and Ethics in Society 20 (1):91-109.
    Purpose This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus constitutes organization. The authors build on Agamben's state of exception and translate it into communicative constitution of organization theory. Design/methodology/approach A significant increase of cyberattacks have impacted organizations in recent times and laid organizations under siege. This conceptual research builds on illustrative cases chosen by positive deviance case selection of ransomware attacks. Findings CCO theory focuses (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  22
    Challenges in cybersecurity.Thomas S. K. Tang - forthcoming - Asian Journal of Business Ethics:1-7.
    Digital technologies can be an asset to serving communities and societies through data analytics and management to achieve greater good. However, care must be exercised in that societies without digital access do not get overlooked or, worse, face abuses of privacy disclosure or exploitation. Regulations exist to prevent this happening, but ethical considerations are important in deciding in what is allowable and what is not. The further risk of artificial intelligence where computers start to make autonomous decisions and the vulnerabilities (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  10
    Impact of Defending Strategy Decision on DDoS Attack.Chunming Zhang - 2021 - Complexity 2021:1-11.
    Distributed denial-of-service attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently. To study the impact of defense strategy selection on DDoS attack behavior, the current study uses logistic function as basis to propose a dynamic model of DDoS attacks with defending strategy decisions. Thereafter, the attacked threshold of this model is calculated. The existence and stability of attack-free and attacked equilibria are proved. Lastly, some effective strategies to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  42
    Ethics, Information Manipulation and Cyber Security in Social Media.Aynur Tekke & Aybala Lale - 2021 - Akademik İncelemeler Dergisi 16 (2):44-62.
    The aim of this study is to analyze the information in the social media which is being produced and included into the stream by mass media in the context of digital ethics and cyber security. The principles of digital ethics includes norms that takes individual’s privacy of life into consideration. In addition to being a concept related to cyberspace, computer, and computer networks, it also includes the whole human-made activities, for this reason manipulation techniques in cyberspace appear as an important (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5. Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  43
    Protecting critical infrastructure: implementing integration and expanding education: first prize: 2007 Schubmehl-Prein Essay contest.David A. Martinez - 2008 - Acm Sigcas Computers and Society 38 (1):12-17.
    The tenuous network of interconnected data that supports our nation's critical infrastructure has been built up, computer by computer, over only the last few decades. From punch cards to the supercomputers constructed by pioneers in today's fields, computers have been controlling our nation's critical sectors nearly every step of the way. As designers of today's critical systems gravitate slowly towards systems that require less human oversight than ever before, the vulnerability of the networks that control our electricity systems, water supply, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7.  73
    Ethical and legal challenges of AI in marketing: an exploration of solutions.Dinesh Kumar & Nidhi Suthar - 2024 - Journal of Information, Communication and Ethics in Society 22 (1):124-144.
    Artificial intelligence (AI) has sparked interest in various areas, including marketing. However, this exhilaration is being tempered by growing concerns about the moral and legal implications of using AI in marketing. Although previous research has revealed various ethical and legal issues, such as algorithmic discrimination and data privacy, there are no definitive answers. This paper aims to fill this gap by investigating AI’s ethical and legal concerns in marketing and suggesting feasible solutions.,The paper synthesises information from academic articles, industry reports, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  99
    Out of the laboratory and into the classroom: the future of artificial intelligence in education.Daniel Schiff - 2021 - AI and Society 36 (1):331-348.
    Like previous educational technologies, artificial intelligence in education threatens to disrupt the status quo, with proponents highlighting the potential for efficiency and democratization, and skeptics warning of industrialization and alienation. However, unlike frequently discussed applications of AI in autonomous vehicles, military and cybersecurity concerns, and healthcare, AI’s impacts on education policy and practice have not yet captured the public’s attention. This paper, therefore, evaluates the status of AIEd, with special attention to intelligent tutoring systems and anthropomorphized artificial educational agents. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9. Connected and Automated Vehicles: Integrating Engineering and Ethics.Fabio Fossa & Federico Cheli (eds.) - 2023 - Cham: Springer.
    This book reports on theoretical and practical analyses of the ethical challenges connected to driving automation. It also aims at discussing issues that have arisen from the European Commission 2020 report “Ethics of Connected and Automated Vehicles. Recommendations on Road Safety, Privacy, Fairness, Explainability and Responsibility”. Gathering contributions by philosophers, social scientists, mechanical engineers, and UI designers, the book discusses key ethical concerns relating to responsibility and personal autonomy, privacy, safety, and cybersecurity, as well as explainability and human-machine interaction. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  34
    Generative AI Security: Theories and Practices.Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.) - 2024 - Springer Nature Switzerland.
    This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  11
    Centre de Recherches Sociologiques sur le Droit et les Institutions Pénales conditional fee agreement confidence interval.Clean Air Act & Chicago Alternative Policing Strategy - 2010 - In Peter Cane & Herbert M. Kritzer, The Oxford handbook of empirical legal research. New York: Oxford University Press.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. Medicine 299 part IV.New Strategies & New Possibilities - 2002 - In Julia Lai Po-Wah Tao, Cross-cultural perspectives on the (im) possibility of global bioethics. Boston: Kluwer Academic.
     
    Export citation  
     
    Bookmark  
  13.  34
    Cybersecurity, Bureaucratic Vitalism and European Emergency.Stephanie Simon & Marieke de Goede - 2015 - Theory, Culture and Society 32 (2):79-106.
    Securing the internet has arguably become paradigmatic for modern security practice, not only because modern life is considered to be impossible or valueless if disconnected, but also because emergent cyber-relations and their complex interconnections are refashioning traditional security logics. This paper analyses European modes of governing geared toward securing vital, emergent cyber-systems in the face of the interconnected emergency. It develops the concept of ‘bureaucratic vitalism’ to get at the tension between the hierarchical organization and reductive knowledge frames of security (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
    Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity. Design/methodology/approach This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  27
    Cybersecurity and Authentication: The Marketplace Role in Rethinking Anonymity – Before Regulators Intervene.Clyde Wayne Crews - 2007 - Knowledge, Technology & Policy 20 (2):97-105.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  2
    Clothing the Naked Soldier: Virtuous Conduct on the Augmented Reality Battlefield.Strategy Anna Feuer School of Global Policy, Usaanna Feuer is an Assistant Teaching Professor at the School of Global Policy Ca, Focusing on Insurgency San Diegoher Research is in International Security, Defense Technology Counterinsurgency, the Environment War & at the School of Oriental Politics at Oxford - 2024 - Journal of Military Ethics 23 (3):264-276.
    The U.S. military is developing augmented reality (AR) capabilities for use on the battlefield as a means of achieving greater situational awareness. The superimposition of digital data—designed to expand surveillance, enhance geospatial understanding, and facilitate target identification—onto a live view of the battlefield has important implications for virtuous conduct in war: Can the soldier exercise practical wisdom while integrated into a system of militarized legibility? Adopting a virtue ethics perspective, I argue that AR disrupts the soldier’s immersion in the scene (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18. A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  20
    Cybersecurity trends in Cooperative, Connected and Automated Mobility.O. Castillo Campo, V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz & R. Álvarez Fernández - forthcoming - Logic Journal of the IGPL.
    Cooperative, connected and automated mobility technologies have the potential to revolutionize transportation systems and enhance safety, efficiency and sustainability. However, the increasing reliance on digital technologies also introduces new cybersecurity risks that can compromise the safety and privacy of passengers and the integrity of transportation systems. The purpose of this article is to examine the most important threats, vulnerabilities, risks and challenges related to automated mobility and to review the status of the most promising standardization initiatives on cryptography in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Ethics of AI and Cybersecurity When Sovereignty is at Stake.Paul Timmers - 2019 - Minds and Machines 29 (4):635-645.
    Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  21.  31
    Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach.Jing Chen, Elaine Henry & Xi Jiang - 2023 - Journal of Business Ethics 187 (1):199-224.
    By examining managers’ decisions about disclosing updated assessments of firms’ risks, we present evidence that the risk factor disclosures are informative. We use the setting of cybersecurity risk factor disclosures after a data breach because data breaches, especially severe breaches, serve as a natural experiment where an exogenous shock to managers’ assessment of their firm’s cybersecurity risks occurs. We analyze the topic from the perspective of two different theoretical lenses: the economic lens of optimal risk exposure and the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  29
    Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph.Josep Domingo-Ferrer & Alberto Blanco-Justicia - 2020 - Science and Engineering Ethics 26 (3):1267-1285.
    Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies. The pervasiveness and democratization of ICTs have allowed people from all backgrounds to access and use them, which has resulted in new information-based assets. At the same time, this phenomenon has brought a new class of problems, in the form of activists, criminals and state actors that target the new assets to achieve their goals, legitimate or not. (...) includes the research, tools and techniques to protect information assets. However, some cybersecurity measures may clash with the ethical values of citizens. We analyze the synergies and tensions between some of these values, namely security, privacy, fairness and autonomy. From this analysis, we derive a value graph, and then we set out to identify those paths in the graph that lead to satisfying all four aforementioned values in the cybersecurity setting, by taking advantage of their synergies and avoiding their tensions. We illustrate our conceptual discussion with examples of enabling technologies. We also sketch how our methodology can be generalized to any setting where several potentially conflicting values have to be satisfied. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  51
    Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance.Gary L. Brase, Eugene Y. Vasserman & William Hsu - 2017 - Frontiers in Psychology 8:306785.
    Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security risk, or criminal behavior risk). However, little research has directly evaluated if this is an accurate or productive framework. To assess this question, two experiments asked participants to respond to a statistical reasoning task framed in one of four different contexts (cybersecurity, plus the above alternative models). Each context was also presented using either percentages or natural frequencies, and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Ethical principles shaping values-based cybersecurity decision-making.Joseph Fenech, Deborah Richards & Paul Formosa - 2024 - Computers and Society 140 (103795).
    The human factor in information systems is a large vulnerability when implementing cybersecurity, and many approaches, including technical and policy driven solutions, seek to mitigate this vulnerability. Decisions to apply technical or policy solutions must consider how an individual’s values and moral stance influence their responses to these implementations. Our research aims to evaluate how individuals prioritise different ethical principles when making cybersecurity sensitive decisions and how much perceived choice they have when doing so. Further, we sought to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  29
    A Strategy to Prevent and Control Zoonoses?Ruipeng Lei & Renzong Qiu - 2020 - Hastings Center Report 50 (3):73-74.
    The authors argue that in preventing and controlling the pandemic of Covid‐19, we should have taken an offensive or proactive strategy rather than a defensive or reactionary one because the former type of approach can bring about more health benefits and fewer harms than can the latter. The offensive or proactive approach consists of two parts: The first part is to preemptively establish a barrier between a novel virus and humans in order to prevent the spillover of the virus into (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  32
    Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State.Norma Möllers - 2021 - Science, Technology, and Human Values 46 (1):112-138.
    Drawing on an analysis of German national cybersecurity policy, this paper argues that cybersecurity has become a key site in which states mobilize science and technology to produce state power. Contributing to science and technology studies work on technoscience and statecraft, I develop the concepts of “territorialization projects” and “digital territory” to capture how the production of state power in the digital age increasingly relies on technoscientific expertise about information infrastructure, shifting tasks of government into the domain of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  16
    Strategies for translating machine errors in automatically generated texts (using GPT-4 as an example).В. И Алейникова - 2023 - Philosophical Problems of IT and Cyberspace (PhilIT&C) 1:39-52.
    The article discusses the strategies of translation of «machine texts» on the example of generative transformers (GPT). Currently, the study and development of machine text generation has become an important task for processing and analyzing texts in different languages. Modern technologies of artificial intelligence and neural networks allow us to create powerful tools for activities in this field, which are becoming more and more effective every year. Generative transformers are one of such tools. The study of generative transformers also (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  49
    The Cyberethics, Cybersafety, and Cybersecurity at Schools.Irene L. Chen & Libi Shen - 2016 - International Journal of Cyber Ethics in Education 4 (1):1-15.
    The 2006 Megan Meier case, where a teenage girl who was bullied on the Internet through e-mail and Myspace which was said to ultimately lead to her suicide, shed light on the cyber bullying issue in schools. This article uses a case study approach to describe how a number of school institutes were grappling with the loss of confidential information and protecting students on the WWW, each through a unique set of circumstances. It will reveal potential reactions of the institutions (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  13
    Stratégies de gestion de la présence parentale à distance adoptées par les étudiants chinois en France.Yiwen Wu - 2023 - Dialogue: Families & Couples 241 (3):127-144.
    Cet article s’intéresse aux familles chinoises vivant à distance dans le contexte de l’immigration intellectuelle des jeunes chinois. Les communications intrafamiliales s’appuient sur Wechat, qui permet non seulement de garantir les échanges quotidiens, mais aussi de gérer la présence parentale en ligne. Partant d’une approche sociologique, cet article traite des stratégies de mise en scène adoptées par les jeunes chinois étudiant en France. Un travail empirique a été mené afin d’analyser comment ils se comportent devant leurs parents restés en Chine (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  16
    Nonmarket Strategy for Merger Reviews.Joseph A. Clougherty - 2003 - Business and Society 42 (1):115-143.
    Mergers and acquisitions can involve a significant review by antitrust authorities; however, neither the business strategy nor the corporate political strategy literature has fully explored the antitrust dimensions of merger activity. This article considers the ability of corporate political activity to influence antitrust policy by setting out some determinants of antitrust-review outcomes. The analysis consists of two main contentions: (a) Antitrust institutional independence plays a fundamental role in determining the effectiveness of corporate political activity, and (b) domestic mergers with international (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  21
    Human risk factors in cybersecurity.Tom Cuchta, Brian Blackwood, Thomas R. Devine & Robert J. Niichel - 2023 - Interaction Studies 24 (3):437-463.
    This article presents an experimental analysis of several cybersecurity risks affecting the human attack surface of Fairmont State University, a mid-size state university. We consider two social engineering experiments: a phishing email barrage and a targeted spearphishing campaign. In the phishing experiment, a total of 4,769 students, faculty, and staff on campus were targeted by 90,000 phishing emails. Throughout these experiments, we explored the effectiveness of three types of phishing awareness training. Our results show that phishing emails that make (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity.Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato & Luciano Floridi - 2024 - Computer Law and Security Review 55.
    The complexity and emergent autonomy of Generative AI systems introduce challenges in predictability and legal compliance. This paper analyses some of the legal and regulatory implications of such challenges in the European Union context, focusing on four areas: liability, privacy, intellectual property, and cybersecurity. It examines the adequacy of the existing and proposed EU legislation, including the Artificial Intelligence Act (AIA), in addressing the challenges posed by Generative AI in general and LLMs in particular. The paper identifies potential gaps (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33. Immunizing Strategies and Epistemic Defense Mechanisms.Maarten Boudry & Johan Braeckman - 2011 - Philosophia 39 (1):145-161.
    An immunizing strategy is an argument brought forward in support of a belief system, though independent from that belief system, which makes it more or less invulnerable to rational argumentation and/or empirical evidence. By contrast, an epistemic defense mechanism is defined as a structural feature of a belief system which has the same effect of deflecting arguments and evidence. We discuss the remarkable recurrence of certain patterns of immunizing strategies and defense mechanisms in pseudoscience and other belief systems. Five (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   30 citations  
  34.  12
    Viewing Strategies in Children With Visual Impairment and Children With Normal Vision: A Systematic Scoping Review.Anke Fonteyn-Vinke, Bianca Huurneman & Frouke N. Boonstra - 2022 - Frontiers in Psychology 13.
    Viewing strategies are strategies used to support visual information processing. These strategies may differ between children with cerebral visual impairment, children with ocular visual impairment, and children with normal vision since visual impairment might have an impact on viewing behavior. In current visual rehabilitation practice a variety of strategies is used without consideration of the differences in etiology of the visual impairment or in the spontaneous viewing strategies used. This systematic scoping review focuses on viewing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  1
    Dual-Use in Cybersecurity Research. Towards a New Culture of Research Ethics.Kaya Cassing & Sebastian Weydner-Volkmann - 2024 - In Elisabeth Ehrensperger, Jeannette Behringer, Michael Decker, Bert Droste-Franke, Nils B. Heyen, Mashid Sotoudeh & Birgit Weimert, Gestreamt, gelikt, flüchtig – schöne neue Kulturwelt? Digitalisierung und Kultur im Licht der Technikfolgenabschätzung. Baden-Baden: Nomos. pp. 349-359.
    The fact that information and communication technologies (ICTs) increasingly shape our online and offline lifeworlds has lead to the emergence of a new societal threat in the form of vulnerabilities in critical ICT systems that may be exploited by malicious actors. Cybersecurity researchers work on finding such vulnerabilities and on identifying new attack vectors, i.e. they systematically step into the role of attackers. Normatively, however, the goal of this research is to strengthen ICTs against cyberattacks and, thus, to reduce (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36. Strategy-proof judgment aggregation.Franz Dietrich & Christian List - 2005 - Economics and Philosophy 23 (3):269-300.
    Which rules for aggregating judgments on logically connected propositions are manipulable and which not? In this paper, we introduce a preference-free concept of non-manipulability and contrast it with a preference-theoretic concept of strategy-proofness. We characterize all non-manipulable and all strategy-proof judgment aggregation rules and prove an impossibility theorem similar to the Gibbard--Satterthwaite theorem. We also discuss weaker forms of non-manipulability and strategy-proofness. Comparing two frequently discussed aggregation rules, we show that “conclusion-based voting” is less vulnerable to manipulation than “premise-based voting”, (...)
    Direct download (20 more)  
     
    Export citation  
     
    Bookmark   51 citations  
  37.  43
    Reproductive strategies and sex-biased investment.Susan Scott & C. J. Duncan - 1999 - Human Nature 10 (1):85-108.
    Sex-biased investment in children has been explored in a historic population in northern England, 1600 to 1800, following a family reconstitution study. An examination of the wills and other available data identified three social groups: the elite, tradesmen, and subsistence farmers. The community lived under marginal conditions with poor and fluctuating levels of nutrition; infant and child mortalities were high. Clear differences were found between the social groups, and it is suggested that the elite wetnursed their daughters whereas the elite (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  67
    Strategies for the control of voluntary movements with one mechanical degree of freedom.Gerald L. Gottlieb, Daniel M. Corcos & Gyan C. Agarwal - 1989 - Behavioral and Brain Sciences 12 (2):189-210.
    A theory is presented to explain how accurate, single-joint movements are controlled. The theory applies to movements across different distances, with different inertial loads, toward targets of different widths over a wide range of experimentally manipulated velocities. The theory is based on three propositions. (1) Movements are planned according to “strategies” of which there are at least two: a speed-insensitive (SI) and a speed-sensitive (SS) one. (2) These strategies can be equated with sets of rules for performing diverse (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   183 citations  
  39. CSR Strategies of SMEs and Large Firms. Evidence from Italy.Francesco Perrini, Angeloantonio Russo & Antonio Tencati - 2007 - Journal of Business Ethics 74 (3):285-300.
    While corporate social responsibility (CSR) is becoming a mainstream issue for many organizations, most of the research to date addresses CSR in large businesses rather than in small- and medium-sized enterprises (SMEs), because it is too often considered a prerogative of large businesses only. The role of SMEs in an increasingly dynamic context is now being questioned, including what factors might affect their socially responsible behaviour. The goal of this paper is to make a comparison of SME and large firm (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   69 citations  
  40.  21
    Communicative strategies for building public confidence in data governance: Analyzing Singapore's COVID-19 contact-tracing initiatives.Sun Sun Lim & Gordon Kuo Siong Tan - 2022 - Big Data and Society 9 (1).
    Effective social data governance rests on a bedrock of social support. Without securing trust from the populace whose information is being collected, analyzed, and deployed, policies on which such data are based will be undermined by a lack of public confidence. The COVID-19 pandemic has accelerated digitalization and datafication by governments for the purposes of contact tracing and epidemiological investigation. However, concerns about surveillance and data privacy have stunted the adoption of such contact-tracing initiatives. This commentary analyzes Singapore's contact-tracing initiative (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  26
    The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.Jessica Dawson & Robert Thomson - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  42.  11
    Strategies for Knowledge Elicitation: The Experience of the Russian School of Field Linguistics.Tatiana B. Agranat & Leyli R. Dodykhudoeva (eds.) - 2021 - Springer Verlag.
    This volume provides an overview of experimental methods, approaches, and techniques used by field linguists of the Russian school, and highlights the fieldwork experience of Russian scholars working in regions with a range of languages that differ genetically, typologically, and in the degree of their preservation. The collection presents language and sociolinguistic data relating to fieldwork in diverse languages: Uralic, Altaic, Paleo-Siberian, Yeniseian, Indo-European Iranian, Vietic, Kra-Day, and Mayan languages, as well as pidgin. The authors highlight the fieldwork techniques they (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  44
    Strategie komplementarne: Dlaczego używamy rąk, kiedy myślimy.David Kirsh - 2012 - Avant: Trends in Interdisciplinary Studies 3 (T).
    A complementary strategy can be defined as any organizing activity which recruits external elements to reduce cognitive loads. Typical organizing activities include pointing, arranging the position and orientation of nearby objects, writing things down, manipulating counters, rulers or other artifacts that can encode the state of a process or simplify perception. To illustrate the idea of a complementary strategy, a simple experiment was performed in which subjects were asked to determine the dollar value of collections of coins. In the no-hands (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  33
    Examining Strategy Documents on the Internet.Johanna Kujala & Juha Näsi - 2006 - Proceedings of the International Association for Business and Society 17:261-266.
    Due to continual challenges in their external environment, corporations are facing an increased demand for public participation and stakeholder inclusion. As aresult, companies are seeking ways to improve communication with their stakeholders. The emergence of the Internet has provided new corporate channelsfor offering information to stakeholders. This paper suggests that the information contained in company web pages reflects strategic information about the company. In addition to offering information to the public, web pages signal which issues a company holds as strategically (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  45.  20
    Strategie van de vrouwenbeweging bij parlementsverkiezingen.Mia Nysmans - 1977 - Res Publica 19 (3):469-491.
    The problem of political apathy and poor representation of women in the Belgian parliament bas been focused and seriously challenged with the 1974 parliamentary elections. Two different strategies hereby have been developed: on the one hand a separate, exclusive feminist party ; on the other hand a strategy of female candidates on the more conventional ballots. The effects of both strategies are quite remarkable : whereas the newcoming feminist party was struggling with breakthrough problems, the female candidate strategy (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  26
    Autoaesthetics: Strategies of the Self after Nietzsche.Stephen Barker - 1992 - Atlantic Highlands, N.J.: Humanities Press.
    Combining a Nietzschean framework with close attention to a wide range of carefully selected literary texts, Autoaesthetics presents a case for Nietzche's centrality in contemporary aesthetic and literary studies. Based on Nietzche's own practice of combining poetry and philosophy by transcending ressentiment and approaching life to its fullest, Autoaesthetics engages in a heated but intricate debate through and with Nietzche's re-articulation of the self as a strategic (and impossible) aesthetic creation." "Stephen Barker argues that all notions of self are aesthetic, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  40
    Strategies for question selection in argumentative dialogues about plans.Rolando Medellin-Gasque, Katie Atkinson, Trevor Bench-Capon & Peter McBurney - 2013 - Argument and Computation 4 (2):151-179.
    In this article, we present a proposal to enable agents to discuss the suitability of plans based on an argumentation scheme and associated critical questions. Agents coordinate their beliefs, intentions and preferences using a dialogue game based on this argumentation scheme and its critical questions. The detail encompassed by the argumentation scheme means that there is a large number of critical questions, and so dialogues may in principle be very lengthy. To improve the efficiency of dialogues, we present two (...) for selecting questions. We have implemented the system and, here, presented results showing how both strategies are effective in reducing the number of questions required to reach agreement, although their relative effectiveness is dependent on characteristics of the problem domain. (shrink)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  48.  16
    Educative strategy on healthy sexuality in teenagers.Carmen Olivera Carmenates & Bestard Aranda - 2014 - Humanidades Médicas 14 (3):629-645.
    Se realizó un estudio de intervención con el objetivo de elaborar una estrategia educativa para incrementar conocimientos sobre sexualidad sana en un grupo de adolescentes de la escuela Secundaria Básica Alfredo Gómez del Municipio Camagüey entre octubre de 2012 y febrero de 2013. La muestra fue de 37 estudiantes. Se aplicó una encuesta que se convirtió en el registro primario de datos, confeccionada según criterios de expertos y la bibliografía. Una vez analizados los resultados se procedió a diseñar la estrategia (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  27
    Surface Strategies And Constructive Line-Preferential Planes, Contour, Phenomenal Body In The Work Of Bacon, Chalayan, Kawakubo.Dagmar Reinhardt - 2005 - Colloquy 9:49-70.
    The paper investigates Maurice Merleau-Ponty’s discussion of body and space and Gilles Deleuze’s reading of Francis Bacon’s work, in order to derive a renegotiated interrelation between habitual body, phenomenal space, preferential plane and constructive line. The resulting system is ap- plied as a filter to understand the sartorial fashion of Rei Kawakubo and Hussein Chalayan and their potential as a spatial prosthesis: the operative third skin. If the evolutionary nature of culture demands a constant change, how does the surface of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50. Memory strategies mediate the relationships between memory and judgment.Silvio Aldrovandi, Marie Poirier, Daniel Heussen & Peter Ayton - 2009 - In N. A. Taatgen & H. van Rijn, Proceedings of the 31st Annual Conference of the Cognitive Science Society.
    In the literature, the nature of the relationships between memory processes and summary evaluations is still a debate. According to some theoretical approaches (e.g., “two-memory hypothesis”; Anderson, 1989) retrospective evaluations are based on the impression formed while attending to the to-be-assessed stimuli(on-line judgment) – no functional dependence between information retrieval and judgment is implied. Conversely, several theories entail that judgment must depend, at least in part, on memory processes (e.g., Dougherty, Gettys, & Ogden, 1999; Schwarz, 1998; Tversky & Kahneman, 1973). (...)
     
    Export citation  
     
    Bookmark  
1 — 50 / 974