Results for ' Cybersecurity, Network Engineering, Network Segmentation, Firewalls, Vulnerability Assessment, Network Monitoring'

983 found
Order:
  1.  9
    An empirical study on vulnerability assessment and penetration detection for highly sensitive networks.Mehedi Masud, Roobaea Alroobaea, Gurjot Singh Gaba, Fahad M. Almansour, Robert Abbas & Liwei Wang - 2021 - Journal of Intelligent Systems 30 (1):592-603.
    With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  54
    Assessing the impact of heat vulnerability on urban public spaces using a fuzzy-based unified computational technique.Rajeev Kumar & Saswat Kishore Mishra - forthcoming - AI and Society:1-18.
    Over the years, the urban heat vulnerability has evolved as a pressing global concern for researchers and policymakers alike. Numerous studies have aimed at mitigating the adverse effects of urban heat vulnerability on public health and safety. However, the critical task of selecting the most fitting indicator for urban heat islands in public spaces is not emphasized in the existing studies, considering the diverse indices available. Beyond identification, studies that delve into the prioritization of these indices and the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  32
    Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State.Norma Möllers - 2021 - Science, Technology, and Human Values 46 (1):112-138.
    Drawing on an analysis of German national cybersecurity policy, this paper argues that cybersecurity has become a key site in which states mobilize science and technology to produce state power. Contributing to science and technology studies work on technoscience and statecraft, I develop the concepts of “territorialization projects” and “digital territory” to capture how the production of state power in the digital age increasingly relies on technoscientific expertise about information infrastructure, shifting tasks of government into the domain of computer scientists (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  64
    River Segmentation of Remote Sensing Images Based on Composite Attention Network.Zhiyong Fan, Jianmin Hou, Qiang Zang, Yunjie Chen & Fei Yan - 2022 - Complexity 2022:1-13.
    River segmentation of remote sensing images is of important research significance and application value for environmental monitoring, disaster warning, and agricultural planning in an area. In this study, we propose a river segmentation model in remote sensing images based on composite attention network to solve the problems of abundant river details in images and the interference of non-river information including bridges, shadows, and roads. To improve the segmentation efficiency, a composite attention mechanism is firstly introduced in the central (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Readymades in the Social Sphere: an Interview with Daniel Peltz.Feliz Lucia Molina - 2013 - Continent 3 (1):17-24.
    Since 2008 I have been closely following the conceptual/performance/video work of Daniel Peltz. Gently rendered through media installation, ethnographic, and performance strategies, Peltz’s work reverently and warmly engages the inner workings of social systems, leaving elegant rips and tears in any given socio/cultural quilt. He engages readymades (of social and media constructions) and uses what are identified as interruptionist/interventionist strategies to disrupt parts of an existing social system, thus allowing for something other to emerge. Like the stereoscope that requires two (...)
     
    Export citation  
     
    Bookmark  
  6.  4
    Urban Traffic Identification by Comparing Machine Learning Algorithms.Boris A. Medina Salgado, Jhon Jairo Feria Diaz & Sandra Rojas Sevilla - forthcoming - Evolutionary Studies in Imaginative Culture.
    The Internet of Things (IoT) applied to intelligent transport systems has become a key element for understanding the way traffic flow behaves in cities, which helps in decision-making to improve the management of the transport system by monitoring and analyzing network traffic in real time, all with the aim of daily benefiting users of the city’s road infrastructure. Traffic volume estimation in real time, with high effectiveness, may help mobility management and improve traffic flow. Moreover, machine-learning algorithms have (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  2
    Dual-Use in Cybersecurity Research. Towards a New Culture of Research Ethics.Kaya Cassing & Sebastian Weydner-Volkmann - 2024 - In Elisabeth Ehrensperger, Jeannette Behringer, Michael Decker, Bert Droste-Franke, Nils B. Heyen, Mashid Sotoudeh & Birgit Weimert, Gestreamt, gelikt, flüchtig – schöne neue Kulturwelt? Digitalisierung und Kultur im Licht der Technikfolgenabschätzung. Baden-Baden: Nomos. pp. 349-359.
    The fact that information and communication technologies (ICTs) increasingly shape our online and offline lifeworlds has lead to the emergence of a new societal threat in the form of vulnerabilities in critical ICT systems that may be exploited by malicious actors. Cybersecurity researchers work on finding such vulnerabilities and on identifying new attack vectors, i.e. they systematically step into the role of attackers. Normatively, however, the goal of this research is to strengthen ICTs against cyberattacks and, thus, to reduce the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  20
    Evaluating the Impact of Different Feature as a Counter Data Aggregation approaches on the Performance of NIDSs and Their Selected Features.Roberto Magán-Carrión, Daniel Urda, Ignacio Diaz-Cano & Bernabé Dorronsoro - 2024 - Logic Journal of the IGPL 32 (2):263-280.
    There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming (...) traffic raw data onto derived one suitable for ML models. In this work, we study the effects of applying one such FE technique in different ways on the performance of two ML models (linear and non-linear) and their selected features. This the Feature as a Counter approach. The derived observations are computed from either with the same number of raw samples, (batch-based approaches) or by aggregating them by time intervals (timestamp-based approach). Results show that there is no significant differences between the proposed approaches neither in the performance of the models nor in the selected features that validate our proposal making it feasible to be widely used as a standard FE method. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  15
    Monitoring of MAID: Deficits of Transparency and Accountability.Jaro Kotalik - 2023 - In Jaro Kotalik & David Shannon, Medical Assistance in Dying (MAID) in Canada: Key Multidisciplinary Perspectives. Springer Verlag. pp. 115-126.
    Monitoring of MAIDMonitoring of MAID was recognised as an essential component of the MAID program. However, monitoring started late in the rollout of the program, and even at present is missing some essential elements that would be important for effective oversight and public accountability. Health CanadaCanada is using some of the data obtained from practitioners and pharmacists to produce Annual Reports on MAID, but these reports aim at providing only a “societal perspective,” rather than an in-depth assessment of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  21
    Climate change and vulnerability of agribusiness: Assessment of climate change impact on agricultural productivity.Shruti Mohapatra, Swati Mohapatra, Heesup Han, Antonio Ariza-Montes & Maria del Carmen López-Martín - 2022 - Frontiers in Psychology 13.
    The current study has mapped the impact of changes in different climatic parameters on the productivity of major crops cultivated in India like cereal, pulses, and oilseed crops. The vulnerability of crops to different climatic conditions like exposure, sensitivity, and adaptive indicators along with its different components and agribusiness has been studied. The study uses data collected over the past six decades from 1960 to 2020. Analytical tools such as the Tobit regression model and Principal Component Analysis were used (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Genetically engineered mosquitoes, Zika and other arboviruses, community engagement, costs, and patents: Ethical issues.Zahra Meghani & Christophe Boëte - 2018 - PLoS Neglected Tropical Diseases 7 (12).
    Genetically engineered (GE) insects, such as the GE OX513A Aedes aegypti mosquitoes, have been designed to suppress their wild-type populations so as to reduce the transmission of vector-borne diseases in humans. Apart from the ecological and epidemiological uncertainties associated with this approach, such biotechnological approaches may be used by individual governments or the global community of nations to avoid addressing the underlying structural, systemic causes of those infections... We discuss here key ethical questions raised by the use of GE mosquitoes, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Assessing Cybercrime Syndicates: Understanding ‘Black Axe’ Confraternity and Cybercriminal Networks in Business Email Compromise (BEC) Scams.Suleman Lazarus - 2024 - Public Sector Counter Fraud Journal 1 (14):24-26.
    Cybercrime is a global threat affecting both public and private sectors. Business email compromise (BEC) is one of the most advanced and lucrative forms of cybercrime, exploiting vulnerabilities in corporate email systems to facilitate unauthorised financial transactions. Organisations worldwide suffer substantial losses from these attacks. This article explores the connection between Black Axe and BEC scams, providing insights into how public sector organisations can better combat these sophisticated criminal networks.
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  10
    Histopathological Image Segmentation Using Modified Kernel-Based Fuzzy C-Means and Edge Bridge and Fill Technique.Hosahally Narayangowda Suresh & Faiz Mohammad Karobari - 2019 - Journal of Intelligent Systems 29 (1):1301-1314.
    Histopathological lung cancer segmentation using region of interest is one of the emerging research area in the field of health monitoring system. In this paper, the histopathological images were collected from the database Stanford Tissue Microarray Database (TMAD). After image collection, pre-processing was performed using a normalization technique, which enhances the quality of the histopathological image by eliminating unwanted noise. After pre-processing, segmentation was carried out using the modified kernel-based fuzzy c-means clustering (KFCM) approach along with the edge bridge (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  92
    Engineers and Active Responsibility.Udo Pesch - 2015 - Science and Engineering Ethics 21 (4):925-939.
    Knowing that technologies are inherently value-laden and systemically interwoven with society, the question is how individual engineers can take up the challenge of accepting the responsibility for their work? This paper will argue that engineers have no institutional structure at the level of society that allows them to recognize, reflect upon, and actively integrate the value-laden character of their designs. Instead, engineers have to tap on the different institutional realms of market, science, and state, making their work a ‘hybrid’ activity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  15.  39
    Novel Node Centrality-Based Efficient Empirical Robustness Assessment for Directed Network.Xiaolong Deng, Hao Ding, Yong Chen, Cai Chen & Tiejun Lv - 2020 - Complexity 2020:1-14.
    In recent years, while extensive researches on various networks properties have been proposed and accomplished, little has been proposed and done on network robustness and node vulnerability assessment under cascades in directed large-scale online community networks. In essential, an online directed social network is a group-centered and information spread-dominated online platform which is very different from the traditional undirected social network. Some further research studies have indicated that the online social network has high robustness to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  51
    An Ethical Justification for Expanding the Notion of Effectiveness in Vaccine Post-Market Monitoring: Insights from the HPV Vaccine in Canada.Ana Komparic, Maxwell J. Smith & Alison Thompson - 2016 - Public Health Ethics 9 (1):78-91.
    Health regulators must carefully monitor the real-world safety and effectiveness of marketed vaccines through post-market monitoring in order to protect the public’s health and promote those vaccines that best achieve public health goals. Yet, despite the fact that vaccines used in collective immunization programmes should be assessed in the context of a public health response, post-market effectiveness monitoring is often limited to assessing immunogenicity or limited programmatic features, rather than assessing effectiveness across populations. We argue that post-market (...) ought to be expanded in two ways to reflect a ‘public health notion of post-market effectiveness’, which incorporates normative public health considerations: effectiveness monitoring should yield higher quality data and grant special attention to underrepresented and vulnerable populations; and the scope of effectiveness should be expanded to include a consideration of the various social factors that maximize a vaccine’s effectiveness at the population level, paying particular attention to how immunization programmes impact related health gradients. We use the case of the human papillomavirus vaccine in Canada to elucidate how expanding post-market effectiveness monitoring is necessary to close the gap between clinical practice and public health, and to ensure that vaccines are effective in a morally relevant sense. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  17.  66
    Toward a Human-Centric Approach to Cybersecurity.Ronald J. Deibert - 2018 - Ethics and International Affairs 32 (4):411-424.
    A “national security–centric” approach currently dominates cybersecurity policies and practices. Derived from a realist theory of world politics in which states compete with each other for survival and relative advantage, the principal cybersecurity threats are conceived as those affecting sovereign states, such as damage to critical infrastructure within their territorial jurisdictions. As part of a roundtable on “Competing Visions for Cyberspace,” this essay presents an alternative approach to cybersecurity that is derived from the tradition of “human security.” Rather than prioritizing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  38
    Monitoring Effective Connectivity in the Preterm Brain: A Graph Approach to Study Maturation.M. Lavanga, O. De Wel, A. Caicedo, K. Jansen, A. Dereymaeker, G. Naulaers & S. Van Huffel - 2017 - Complexity:1-13.
    In recent years, functional connectivity in the developmental science received increasing attention. Although it has been reported that the anatomical connectivity in the preterm brain develops dramatically during the last months of pregnancy, little is known about how functional and effective connectivity change with maturation. The present study investigated how effective connectivity in premature infants evolves. To assess it, we use EEG measurements and graph-theory methodologies. We recorded data from 25 preterm babies, who underwent long-EEG monitoring at least twice (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  19.  72
    Electrocorticographic representations of segmental features in continuous speech.Fabien Lotte, Jonathan S. Brumberg, Peter Brunner, Aysegul Gunduz, Anthony L. Ritaccio, Cuntai Guan & Gerwin Schalk - 2015 - Frontiers in Human Neuroscience 9:119171.
    Acoustic speech output results from coordinated articulation of dozens of muscles, bones and cartilages of the vocal mechanism. While we commonly take the fluency and speed of our speech productions for granted, the neural mechanisms facilitating the requisite muscular control are not completely understood. Previous neuroimaging and electrophysiology studies of speech sensorimotor control has typically concentrated on speech sounds (i.e., phonemes, syllables and words) in isolation; sentence-length investigations have largely been used to inform coincident linguistic processing. In this study, we (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20. REFLECTIVE AND DIALOGICAL APPROACHES IN ENGINEERING ETHICS EDUCATION.Lavinia Marin, Yousef Jalali, Alexandra Morrison & Cristina Voinea - 2025 - In Shannon Chance, Tom Børsen, Diana Adela Martin, Roland Tormey, Thomas Taro Lennerfors & Gunter Bombaerts, The Routledge international handbook of engineering ethics education. New York, NY: Routledge. pp. 441-458.
    This chapter addresses the challenges of implementing reflective thinking in engineering ethics education (EEE). It examines existing methods for teaching ethical reflection in EEE and argues that pedagogical activities aiming to foster ethical reflection need to be infused with dialogical interactions and, at a deeper level, informed by dialogism. Dialogism is understood as a relational approach to inquiry in which interactions between moral agents enable them to develop their own understandings through the process of finding shared meanings with the others (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21. The Impact of Continuity Editing in Narrative Film on Event Segmentation.Joseph P. Magliano & Jeffrey M. Zacks - 2011 - Cognitive Science 35 (8):1489-1517.
    Filmmakers use continuity editing to engender a sense of situational continuity or discontinuity at editing boundaries. The goal of this study was to assess the impact of continuity editing on how people perceive the structure of events in a narrative film and to identify brain networks that are associated with the processing of different types of continuity editing boundaries. Participants viewed a commercially produced film and segmented it into meaningful events, while brain activity was recorded with functional magnetic resonance imaging (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  22.  64
    Biosemiotics and ecological monitoring.Luis Emilio Bruni - 2001 - Sign Systems Studies 29 (1):293-311.
    During the recent decades, a global culrural-institutional network has gradually grown lip to project, implement, and use an enormous technological web that is supposed to observe, monitor, communicate, inventory, and assess our environment and its biodiversity in order to implement sustainable management models. The majority of "knowledge tools" that have been incorporated in the mainstream of this "techno-web" are amply based on a combination of mechanistic biology, genetic reductionism, economical determinism and neo-Darwinian cultural and biological perspectives. These approaches leave (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  22
    Building capacity in planning, monitoring and evaluation: Lessons from the field.Douglas Horton - 1999 - Knowledge, Technology & Policy 11 (4):152-188.
    This paper reports on the author’s experiences as manager of a capacity-building project in Latin America. The project aimed to strengthen planning, monitoring, and evaluation (PM&E) in agricultural research. Nine lessons are drawn: (1) Project design is much more than a technical process; it is essentially one of negotiation. (2) In capacity-building projects, design activities cannot end when implementation begins. (3) Capacity-building efforts should prepare managers to deal with complexity, uncertainty and change. (4) In capacity-building efforts, it is essential (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  18
    Fishing for a New Way to Teach Environmentally Sensitive Engineering Practice.Christopher A. Kennedy, Bryan W. Karney & Rosamund A. Hyde - 2000 - Bulletin of Science, Technology and Society 20 (5):383-392.
    Professional engineers are under increasing pressure to practice in an environmentally sensitive way. To prepare engineers for this new reality, changes in engineering education are needed. For example, engineering hydrology has traditionally been taught with an emphasis on the interpretation of numerical data bout rainfall and runoff in watersheds. However, to do environmentally sensitive hydrology work, it is necessary to also understand the life forms that share the watershed. In 1997, a project was undertaken in the Department of Civil Engineering (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  83
    Recognitional Justice, Climate Engineering, and the Care Approach.Christopher Preston & Wylie Carr - 2018 - Ethics, Policy and Environment 21 (3):308-323.
    ABSTRACTGiven the existing inequities in climate change, any proposed climate engineering strategy to solve the climate problem must meet a high threshold for justice. In contrast to an overly thin paradigm for justice that demands only a science-based assessment of potential temperature-related benefits and harms, we argue for the importance of attention to recognitional justice. Recognitional justice, we go on to claim, calls for a different type of assessment tool. Such an assessment would pay attention to neglected considerations such as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26.  85
    The Corporate Social Assessment: Making Public Purpose Pay.Michael Bennett - 2024 - Review of Social Economy 82 (1):147-175.
    Corporations can be powerful engines of economic prosperity, but also for the public good more broadly conceived. But they need to be properly incentivized to fulfil these missions. We propose an innovative plan called the Corporate Social Assessment (CSA). Every four years, a randomly selected Citizens’ Assembly will meet to decide a grading scheme for assessing companies’ conduct. At the end of the cycle, a professional assessment body will grade the companies and rank them. The ranking will be the basis (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  63
    Design for values and conceptual engineering.Herman Veluwenkamp & Jeroen van den Hoven - 2023 - Ethics and Information Technology 25 (1):1-12.
    Politicians and engineers are increasingly realizing that values are important in the development of technological artefacts. What is often overlooked is that different conceptualizations of these abstract values lead to different design-requirements. For example, designing social media platforms for deliberative democracy sets us up for technical work on completely different types of architectures and mechanisms than designing for so-called liquid or direct forms of democracy. Thinking about Democracy is not enough, we need to design for the proper conceptualization of these (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  28.  54
    Assessing the Human Genome Project: Effects on world agriculture. [REVIEW]M. S. Lesney & V. B. Smocovitis - 1994 - Agriculture and Human Values 11 (1):10-18.
    The Human Genome Project is the attempt to sequence the complement of human DNA. Its ultimate purpose is to understand and control human genetics. The social and ethical concerns raised by this attempt have been much debated, especially fears concerning human genetic engineering and eugenics. An almost completely neglected aspect of the genome project's potential effects is its impact on world agriculture. The Human Genome Project will provide source information to transform commercially and therapeutically valuable segments of the human genetic (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  20
    Deploying the Precautionary Principle to Protect Vulnerable Populations in Canadian Post-Market Drug Surveillance.Maxwell Smith, Ana Komparic & Alison Thompson - 2020 - Canadian Journal of Bioethics / Revue canadienne de bioéthique 3 (1):110-118.
    Drug regulatory bodies aim to ensure that patients have access to safe and effective drugs; however, no matter the quality of pre-licensure studies, uncertainty will remain regarding the safety and effectiveness of newly approved drugs until a large and diverse population uses those drugs. Recent analyses of Canada’s post-market drug surveillance system have found that Canada is not keeping pace with international requirements for PMDS, and have noted that efforts must be improved to monitor and address the safety and effectiveness (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30.  71
    Gender and trust in medicine: Vulnerabilities, abuses, and remedies.Wendy Rogers & Angela Ballantyne - 2008 - International Journal of Feminist Approaches to Bioethics 1 (1):48-66.
    Trust is taken to be one of the foundational values in the doctor-patient relationship, facilitating access to the benefits of health care and providing a guarantee against possible harms. Despite this foundational role, some doctors betray the trust of their patients. Trusting involves granting discretionary powers and makes the truster vulnerable to the trustee. Patients trust medical practitioners to act with goodwill and to act competently. Some patients carry pre-existing vulnerabilities, for reasons such as gender, poverty, age, ethnicity, or disability, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  31.  34
    Prospective Technology Assessment of Synthetic Biology: Fundamental and Propaedeutic Reflections in Order to Enable an Early Assessment.Jan Cornelius Schmidt - 2016 - Science and Engineering Ethics 22 (4):1151-1170.
    Synthetic biology is regarded as one of the key technosciences of the future. The goal of this paper is to present some fundamental considerations to enable procedures of a technology assessment of synthetic biology. To accomplish such an early “upstream” assessment of a not yet fully developed technology, a special type of TA will be considered: Prospective TA. At the center of ProTA are the analysis and the framing of “synthetic biology,” including a characterization and assessment of the technological core. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Rapid initiative assessment for counter-IED investment.Charles Twardy, Ed Wright, Tod Levitt, Kathryn Laskey & Kellen Leister - 2009 - In Charles Twardy, Ed Wright, Tod Levitt, Kathryn Laskey & Kellen Leister, Proceedings of the Seventh Bayesian Applications Modeling Workshop.
    There is a need to rapidly assess the impact of new technology initiatives on the Counter Improvised Explosive Device battle in Iraq and Afghanistan. The immediate challenge is the need for rapid decisions, and a lack of engineering test data to support the assessment. The rapid assessment methodology exploits available information to build a probabilistic model that provides an explicit executable representation of the initiative’s likely impact. The model is used to provide a consistent, explicit, explanation to decision makers on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  8
    Chegg’s Growth, Response Rate, and Prevalence as a Cheating Tool: Insights From an Audit within an Australian Engineering School.Edmund Pickering & Clancy Schuller - forthcoming - Journal of Academic Ethics:1-15.
    Online tools are increasingly being used by students to cheat. File-sharing and homework-helper websites offer to aid students in their studies, but are vulnerable to misuse, and are increasingly reported as a major source of academic misconduct. Chegg.com is the largest such website. Despite this, there is little public information about the use of Chegg as a cheating tool. This is a critical omission, as for institutions to effectively tackle this threat, they must have a sophisticated understanding of their use. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  21
    Hybrid Warfare in the Western Balkans: How Structural Vulnerability Attracts Maligned Powers and Hostile Influence.Chris J. Dolan - 2022 - Seeu Review 17 (1):3-25.
    This study analyzes the domestic political, economic, and social conditions in the Western Balkans that provide fertile ground for hostile and maligned actors to manipulate and exploit governments and societies with hybrid war measures, namely cyberattacks and cyber intrusions and disinformation and fake news. It begins with a review and assessment of the prevailing empirical and theoretical literature on hybrid warfare. It then describes two leading empirical indices that measure degrees of permeability and structural vulnerability that elevate or reduce (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  27
    From Cognitive Bias Toward Advanced Computational Intelligence for Smart Infrastructure Monitoring.Meisam Gordan, Ong Zhi Chao, Saeed-Reza Sabbagh-Yazdi, Lai Khin Wee, Khaled Ghaedi & Zubaidah Ismail - 2022 - Frontiers in Psychology 13.
    Visual inspections have been typically used in condition assessment of infrastructure. However, they are based on human judgment and their interpretation of data can differ from acquired results. In psychology, this difference is called cognitive bias which directly affects Structural Health Monitoring -based decision making. Besides, the confusion between condition state and safety of a bridge is another example of cognitive bias in bridge monitoring. Therefore, integrated computer-based approaches as powerful tools can be significantly applied in SHM systems. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  17
    Networked Struggles: Placards at Pakistan’s Aurat March.Daanika R. Kamal - 2022 - Feminist Legal Studies 30 (2):219-233.
    Aurat March [Women’s March] is an annual event organised in various cities across Pakistan to observe International Women’s Day. Since its inception in 2018, the March has been condemned by conservative religious and political segments of society for reasons relating to propriety. This commentary explores how placards predominantly form the object of censure in the movement’s backlash. By reflecting on discourses on mainstream and social media, I first assess the use of placards in constructing networks of feminist voices. I then (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Validation of monitoring anesthetic depth by closed-loop control.Assessment of A. New Monitor - 1993 - In P. S. Sebel, B. Bonke & E. Winograd, Memory and Awareness in Anesthesia. Prentice-Hall.
  38.  34
    A Two-Layer Architecture for Failure Prediction Based on High-Dimension Monitoring Sequences.Xue Wang, Fan Liu, Yixin Feng & Jiabao Zhao - 2021 - Complexity 2021:1-9.
    In recent years, the distributed architecture has been widely adopted by security companies with the rapid expansion of their business. A distributed system is comprised of many computing nodes of different components which are connected by high-speed communication networks. With the increasing functionality and complexity of the systems, failures of nodes are inevitable which may result in considerable loss. In order to identify anomalies of the possible failures and enable DevOps engineers to operate in advance, this paper proposes a two-layer (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  46
    Challenges in Collecting Big Data in A Clinical Environment with Vulnerable Population: Lessons Learned from A Study Using A Multi-modal Sensors Platform.Bing Ye, Shehroz S. Khan, Belkacem Chikhaoui, Andrea Iaboni, Lori Schindel Martin, Kristine Newman, Angel Wang & Alex Mihailidis - 2019 - Science and Engineering Ethics 25 (5):1447-1466.
    Agitation is one of the most common behavioural and psychological symptoms in people living with dementia. This behaviour can cause tremendous stress and anxiety on family caregivers and healthcare providers. Direct observation of PLwD is the traditional way to measure episodes of agitation. However, this method is subjective, bias-prone and timeconsuming. Importantly, it does not predict the onset of the agitation. Therefore, there is a need to develop a continuous monitoring system that can detect and/or predict the onset of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  30
    Cybercriminal Networks and Operational Dynamics of Business Email Compromise (BEC) Scammers: Insights from the “Black Axe” Confraternity.Suleman Lazarus - 2024 - Deviant Behavior 46:1-25.
    I explored the relationship between the “Black Axe” Confraternity and cybercrime, with a particular emphasis on the structural dynamics of the Business Email Compromise (BEC) schemes. I investigated whether a conventional hierarchical system governs the membership and remuneration for BEC roles as perpetrators by interviewing an accused “leader” of the “Black Axe” affiliated cybercriminal incarcerated in a prominent Western nation. I supplemented the analysis of interview data with insights from tapped phone records monitored by a law enforcement entity. I merged (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Precarious work and its complicit network.Chuanfei Chin - 2019 - Journal of Contemporary Asia 49.
    How does precarious work entail social vulnerabilities and moral complicities? Theorists of precarity pose two challenges for analysing labour conditions in Asia. Their first challenge is to distinguish the new kinds of social vulnerability which constitute precarious work. The second is to assign moral responsibility in the social network that produces vulnerability in depoliticised and morally detached ways. In this article, the social and normative dimensions of precarious work are connected through a conceptual investigation into how Singapore (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  55
    Developing a framework for assessing responsible conduct of research education programs.Lynne E. Olson - 2010 - Science and Engineering Ethics 16 (1):185-200.
    Education in the responsible conduct of research (RCR) in the United States has evolved over the past decade from targeting trainees to including educational efforts aimed at faculty and staff. In addition RCR education has become more focused as federal agencies have moved to recommend specific content and to mandate education in certain areas. RCR education has therefore become a research-compliance issue necessitating the development of policies and the commitment of resources to develop or expand systems for educating faculty and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  43.  70
    Assessing the Preparedness of Research Integrity Officers (RIOs) to Appropriately Handle Possible Research Misconduct Cases.Arthur J. Bonito, Sandra L. Titus & David E. Wright - 2012 - Science and Engineering Ethics 18 (4):605-619.
    Institutions receiving federal funding for research from the U.S.Public Health Service need to have policies and procedures to both prevent research misconduct and to adjudicate it when it occurs. The person who is designated to handle research misconduct is typically referred to as the research integrity officer (RIO). In this interview study we report on 79 RIOs who describe how they would handle allegations of research misconduct. Their responses were compared to two expert RIOs. The responses to the allegations in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  21
    Characterization of Meteorological Drought Using Monte Carlo Feature Selection and Steady-State Probabilities.Rizwan Niaz, Fahad Tanveer, Mohammed M. A. Almazah, Ijaz Hussain, Soliman Alkhatib & A. Y. Al-Razami - 2022 - Complexity 2022:1-19.
    Drought is a creeping phenomenon that slowly holds an area over time and can be continued for many years. The impacts of drought occurrences can affect communities and environments worldwide in several ways. Thus, assessment and monitoring of drought occurrences in a region are crucial for reducing its vulnerability to the negative impacts of drought. Therefore, comprehensive drought assessment techniques and methods are required to develop adaptive strategies that a region can undertake to reduce its vulnerability to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. MVi_Scorecard Guideline for Sub-National Community Network (SCN) on NRM.Narith Por - 2023 - Cambodia: My Village Organization.
    MVi is actively engaged with the Bounorng, Kouy, Stieng, Kreung, Prov, Laak, and Kavet communities in the provinces of Mondulkiri, Stung Treng, and Kratie. Over the years, MVi has implemented three strategic plans since 2006, focusing on supporting indigenous and rural communities in these three provinces. The strategic plan for the period 2023–2027 is designed to enhance the livelihoods and economic conditions of indigenous and vulnerable communities. This plan prioritizes four key areas: climate change, natural resource management, modern agriculture production (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  16
    David A. Mindell. War, Technology, and Experience Aboard the USS Monitor. xii + 187 pp., frontis., illus., bibl., index. Baltimore/London: Johns Hopkins University Press, 2000. $35 ; $14.95. [REVIEW]Ed Constant - 2002 - Isis 93 (2):323-324.
    This is a fun, chatty little book that also manages to say, comprehensibly, much that is profound about technology. This trifecta is an embarrassment to those of us phlegmatic of mind and turgid of prose, but more about that presently. First, the book.For any kid who ever doodled his way through junior high school American history—and therefore for most of our countrymen—the “victory” of the Union ironclad Monitor over the CSS Virginia preserved the Union blockade, assured Northern victory in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  26
    Analysing and organising human communications for AI fairness assessment.Mirthe Dankloff, Vanja Skoric, Giovanni Sileno, Sennay Ghebreab, Jacco van Ossenbruggen & Emma Beauxis-Aussalet - forthcoming - AI and Society:1-21.
    Algorithms used in the public sector, e.g., for allocating social benefits or predicting fraud, often require involvement from multiple stakeholders at various phases of the algorithm’s life-cycle. This paper focuses on the communication issues between diverse stakeholders that can lead to misinterpretation and misuse of algorithmic systems. Ethnographic research was conducted via 11 semi-structured interviews with practitioners working on algorithmic systems in the Dutch public sector, at local and national levels. With qualitative coding analysis, we identify key elements of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48. A Rawlsian approach to distribute responsibilities in networks.Neelke Doorn - 2010 - Science and Engineering Ethics 16 (2):221-249.
    Due to their non-hierarchical structure, socio-technical networks are prone to the occurrence of the problem of many hands. In the present paper an approach is introduced in which people’s opinions on responsibility are empirically traced. The approach is based on the Rawlsian concept of Wide Reflective Equilibrium (WRE) in which people’s considered judgments on a case are reflectively weighed against moral principles and background theories, ideally leading to a state of equilibrium. Application of the method to a hypothetical case with (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  49.  8
    Study of infostealers using Graph Neural Networks.Álvaro Bustos-Tabernero, Daniel López-Sánchez, Angélica González-Arrieta & Paulo Novais - forthcoming - Logic Journal of the IGPL.
    Cybersecurity technology has the ability to detect malware through a variety of methods, such as signature recognition, logical rules or the identification of known malware stored in a database or public source. However, threat actors continuously try to create new variants of existing malware by obfuscating or altering parts of the code to evade detection by antivirus engines. Infostealers are one of the most common malicious programs aimed at obtaining personal or banking information from an infected system and exfiltrating it. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  38
    The Quantified Animal: Precision Livestock Farming and the Ethical Implications of Objectification.Ynte K. van Dam, Peter H. Feindt, Bernice Bovenkerk & Jacqueline M. Bos - 2018 - Food Ethics 2 (1):77-92.
    Precision livestock farming (PLF) is the management of livestock using the principles and technology of process engineering. Key to PLF is the dense monitoring of variegated parameters, including animal growth, output of produce (e.g. milk, eggs), diseases, animal behaviour, and the physical environment (e.g. thermal micro-environment, ammonia emissions). While its proponents consider PLF a win-win strategy that combines production efficiency with sustainability goals and animal welfare, critics emphasise, inter alia, the potential interruption of human-animal relationships. This paper discusses the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 983