Results for 'software theory'

969 found
Order:
  1.  11
    Software Theory: A Cultural and Philosophical Study.Federica Frabetti - 2014 - Rowman & Littlefield International.
    This book engages directly in close readings of technical texts and computer code in order to show how software works. It offers an analysis of the cultural, political, and philosophical implications of software technologies that demonstrates the significance of software for the relationship between technology, philosophy, culture, and society.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  3
    Nelson algebras, residuated lattices and rough sets: A survey.Lut School of Engineering Science Jouni Järvinen Sándor Radeleczki Umberto Rivieccio A. SOftware Engineering, Finlandb Institute Of Mathematics Lahti, Uned Hungaryc Departamento de Lógica E. Historia Y. Filosofía de la Ciencia & Spain Madrid - 2024 - Journal of Applied Non-Classical Logics 34 (2):368-428.
    Over the past 50 years, Nelson algebras have been extensively studied by distinguished scholars as the algebraic counterpart of Nelson's constructive logic with strong negation. Despite these studies, a comprehensive survey of the topic is currently lacking, and the theory of Nelson algebras remains largely unknown to most logicians. This paper aims to fill this gap by focussing on the essential developments in the field over the past two decades. Additionally, we explore generalisations of Nelson algebras, such as N4-lattices (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  24
    A theory of change for prioritised resilient and evolvable software systems.Giuseppe Primiero, Franco Raimondi & Taolue Chen - 2019 - Synthese 198 (S23):5719-5744.
    The process of completing, correcting and prioritising specifications is an essential but very complex task for the maintenance and improvement of software systems. The preservation of functionalities and the ability to accommodate changes are main objectives of the software development cycle to guarantee system reliability. Logical theories able to fully model such processes are still insufficient. In this paper we propose a full formalisation of such operations on software systems inspired by the Alchourrón–Gärdenfors–Makinson paradigm for belief revision (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  4.  58
    Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  5.  40
    Comparing software piracy in South Africa and Zambia using social cognitive theory.Andrew Thatcher & Mary Matthews - 2012 - African Journal of Business Ethics 6 (1):1.
  6. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller, Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  20
    Synthesis Theory in Action: Deductive Derivation of Algorithms for Application Software.Valery Kolisnyk & Ostap Bodyk - 2023 - Epistemological studies in Philosophy, Social and Political Sciences 6 (2):11-26.
    The significance of the study is contingent upon two criteria. All objects in the actual world that can capture a researcher’s attention are inherently complicated. Furthermore, every commodity that an individual manufactures and every work of art that an individual develops are intricate in nature. The entirety of the processes that an individual perceives and instigates are intricate. Although many professions have established techniques for constructing intricate entities, there currently exists no universally applicable concepts or methodologies for comprehensively studying, designing, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Neutralization theory and online software piracy: An empirical analysis. [REVIEW]Sameer Hinduja - 2007 - Ethics and Information Technology 9 (3):187-204.
    Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  9. Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  10. Situational determinants of software piracy: An equity theory perspective. [REVIEW]Richard S. Glass & Wallace A. Wood - 1996 - Journal of Business Ethics 15 (11):1189 - 1198.
    Software piracy has become recognized as a major problem for the software industry and for business. One research approach that has provided a theoretical framework for studying software piracy has been to place the illegal copying of software within the domain of ethical decision making assumes that a person must be able to recognize software piracy as a moral issue. A person who fails to recognize a moral issue will fail to employ moral decision making (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   56 citations  
  11.  93
    Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy.Kanika Tandon Bhal & Nivedita D. Leekha - 2008 - Journal of Business Ethics 81 (3):635-646.
    The article reports findings of a study conducted to explore the cognitive moral logics used for considering software piracy as ethical or unethical. Since the objective was to elicit the moral logics from the respondents, semi-structured in-depth interviews of 38 software professionals of India were conducted. The content of the interviews was analyzed using the grounded theory framework which does not begin with constructs and their interlinkages and then seek proof instead it begins with an area of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12.  16
    The logical structure of modular semantic theories of software systems.Nicola Angius & Petros Stefaneas - 2024 - Metaphilosophy 55 (3):440-456.
    This paper studies the structure of semantic theories over modular computational systems and applies the algebraic Theory of Institutions to provide a logical representation of such theories. A modular semantic theory is here defined by a cluster of semantic theories, each for a single program's module, and by a set of relations connecting models of different semantic theories. A semantic theory of a single module is provided in terms of the set of ∑‐models mapped from the category (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  25
    Effect of Honesty as an Ethical Value on Software Project Performance: A Grounded Theory Approach.Shradha Padhi & Sumita Mishra - 2017 - Journal of Human Values 23 (2):92-105.
    For successful project outcomes to organizations and clients alike, project managers (PMs) need to make ethical decisions and yet balance the interests of all stakeholders involved. Hence, honest communication among project stakeholders is essential as a countermeasure to this paradox. Honesty is one of the core ethical values propagated by the Project Management Institute (PMI), USA. Our study aimed to gain an endogenous perspective on honesty vis-à-vis its reification by PMI in its effect on software project performance. Empirical data (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  96
    A software agent model of consciousness.Stan Franklin & Art Graesser - 1999 - Consciousness and Cognition 8 (3):285-301.
    Baars (1988, 1997) has proposed a psychological theory of consciousness, called global workspace theory. The present study describes a software agent implementation of that theory, called ''Conscious'' Mattie (CMattie). CMattie operates in a clerical domain from within a UNIX operating system, sending messages and interpreting messages in natural language that organize seminars at a university. CMattie fleshes out global workspace theory with a detailed computational model that integrates contemporary architectures in cognitive science and artificial intelligence. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  15.  24
    Free Software and non-exclusive individual rights.Tercio Sampaio Ferraz Junior & Juliano Souza de Albuquerque Maranhão - 2008 - Archiv für Rechts- und Sozialphilosophie 94 (2):237-252.
    Free software introduces a challenge to the classical conception of individual rights. The model of software licensing given by the General Public License generates the question whether it constitutes an exercise or a wavering of copyright. It is argued in this paper that the later alternative is entrenched in the classical concept of freedom as autonomy, which, by its turn, is reflected in a classical conception of individual rights based on the model of propriety as a dominion over (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  41
    (Out of) Control Demons: Software Agents, Complexity Theory and the Revolution in Military Affairs.Ian Roderick - 2007 - Theory and Event 10 (2).
  17.  53
    Software vulnerability due to practical drift.Christian V. Lundestad & Anique Hommels - 2007 - Ethics and Information Technology 9 (2):89-100.
    The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  52
    Law and software agents: Are they “Agents” by the way?Emad Abdel Rahim Dahiyat - 2020 - Artificial Intelligence and Law 29 (1):59-86.
    Using intelligent software agents in the world of e-commerce may give rise to many difficulties especially with regard to the validity of agent-based contracts and the attribution of liability for the actions of such agents. This paper thus critically examines the main approaches that have been advanced to deal with software agents, and proposes the gradual approach as a way of overcoming the difficulties of such agents by adopting different standards of responsibility depending whether the action is done (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  16
    Grounded Theory-Based User Needs Mining and Its Impact on APP Downloads: Exampled With WeChat APP.Tinggui Chen, Chu Zhang, Jianjun Yang & Guodong Cong - 2022 - Frontiers in Psychology 13.
    Software development is an iterative process from designing to implementation, and to testing, in which product development staff should be closely integrated with users. Satisfying user needs effectively is often the pain point for developers. In order to alleviate this, this paper manages to establish the quantitative connection between users' online reviews and APP downloads. By analyzing user online comments, companies can dig out user needs and preferences. This could benefit them by making accurate market positioning of their APP (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  82
    Unauthorized copying of software: an empirical study of reasons for and against.Mikko T. Siponen & Tero Vartiainen - 2007 - Acm Sigcas Computers and Society 37 (1):30-43.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  21. Software Immortals—Science or Faith?Diane Proudfoot - 2012 - In Amnon H. Eden & James H. Moor, Singularity Hypotheses: A Scientific and Philosophical Assessment. Springer. pp. 367-389.
    According to the early futurist Julian Huxley, human life as we know it is ‘a wretched makeshift, rooted in ignorance’. With modern science, however, ‘the present limitations and miserable frustrations of our existence could be in large measure surmounted’ and human life could be ‘transcended by a state of existence based on the illumination of knowledge’ (1957b, p. 16).
    No categories
     
    Export citation  
     
    Bookmark   6 citations  
  22. J.M. Balkin, Cultural Software: A Theory Of Ideology. [REVIEW]Emily Sherwin - 1999 - Philosophy in Review 19:160-163.
     
    Export citation  
     
    Bookmark  
  23.  38
    Software, Sovereignty and the Post-Neoliberal Politics of Exit.Harrison Smith & Roger Burrows - 2021 - Theory, Culture and Society 38 (6):143-166.
    This paper examines the impact of neoreactionary (NRx) thinking – that of Curtis Yarvin, Nick Land, Peter Thiel and Patri Friedman in particular – on contemporary political debates manifest in ‘architectures of exit’. We specifically focus on Urbit, as an NRx digital architecture that captures how post-neoliberal politics imagines notions of freedom and sovereignty through a micro-fracturing of nation-states into ‘gov-corps’. We trace the development of NRx philosophy – and situate this within contemporary political and technological change to theorize the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  24.  42
    Free and open source software (FOSS) as a model domain for answering big questions about creativity.Scott Dexter & Aaron Kozbelt - 2013 - Mind and Society 12 (1):113-123.
    In free and open source software (FOSS), computer code is made freely accessible and can be modified by anyone. It is a creative domain with many unique features; the FOSS mode of creativity has also influenced many aspects of contemporary cultural production. In this article we identify a number of fundamental but unresolved general issues in the study of creativity, then examine the potential for the study of FOSS to inform these topics. Archival studies of the genesis of FOSS (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  61
    Trade Liberalization, Corruption, and Software Piracy.Christopher Robertson, K. M. Gilley & William F. Crittenden - 2008 - Journal of Business Ethics 78 (4):623-634.
    As multinational firms explore new and promising national markets two of the most crucial elements in the strategic decision regarding market-entry are the level of corruption and existing trade barriers. One form of corruption that is crucially important to firms is the theft of intellectual property. In particular, software piracy has become a hotly debated topic due to the deep costs and vast levels of piracy around the world. The purpose of this paper is to assess how laissez-faire trade (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26.  70
    The Problem of Justification of Empirical Hypotheses in Software Testing.Nicola Angius - 2014 - Philosophy and Technology 27 (3):423-439.
    This paper takes part in the methodological debate concerning the nature and the justification of hypotheses about computational systems in software engineering by providing an epistemological analysis of Software Testing, the practice of observing the programs’ executions to examine whether they fulfil software requirements. Property specifications articulating such requirements are shown to involve falsifiable hypotheses about software systems that are evaluated by means of tests which are likely to falsify those hypotheses. Software Reliability metrics, used (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  27.  42
    Cutting the Trees of Knowledge: Social Software, Information Architecture and Their Epistemic Consequences.Michael Schiltz, Frederik Truyen & Hans Coppens - 2007 - Thesis Eleven 89 (1):94-114.
    This article inquires whether and to which degree some fundamental traits of the World Wide Web may encourage us to revise traditional conceptions of what constitutes scientific information and knowledge. Turning to arguments for `open access' in scientific publishing and its derivatives (open content, open archives, etc.), contemporary tendencies in `social software' and knowledge sharing, the authors project a new look on knowledge, dissociated with linear notions of cumulation, progression, and hierarchy (e.g. of scientific argument), but related to circularity, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  70
    A Philosophy of Maintenance? Engaging with the Concept of Software.David Love - 2007 - Philosophy of Management 6 (2):27-30.
    Although reducing the costs of software maintenance has long been held as an important goal, few researchers have studied software maintenance — except in the context of software design. However, thinking in software design is itself muddled by the frequent confusion over the term ‘software’ and ‘programs’. In this paper we argue for a re-examination of the underlying philosophical foundations of programs, in order to establish software as a phenomenon in its own right. Once (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  29. Factors that Influence the Intention to Pirate Software and Media.Timothy Paul Cronan & Sulaiman Al-Rafee - 2008 - Journal of Business Ethics 78 (4):527-545.
    This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual’s intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior ( (...) of Planned Behavior), were studied to determine the influence on digital piracy intention. Based on the results of this study, planned behavioral factors in addition to past piracy behavior and moral obligation were found to influence an individual’s intention to pirate digital material. Attitude, past piracy behavior, perceived behavior control, and moral obligation explained 71 percent of the intention to pirate variance. Using these results, a better understanding of why individuals pirate is presented and can be used to help combat digital piracy. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   35 citations  
  30. Axioms of distinction in social software.Vincent Hendricks - manuscript
    ‘Over a ten year period starting in the mid 90’s I became convinced that all these topics –game theory, economic design, voting theory –belonged to a common area which I called Social Software.’ — Rohit Parikh, [Parikh 05]: p. 252..
     
    Export citation  
     
    Bookmark  
  31. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  99
    Towards a Realist Metaphysics of Software Maintenance.Keith Begley - 2024 - In Mark Thomas Young & Mark Coeckelbergh, Maintenance and Philosophy of Technology: Keeping Things Going. New York: Routledge. pp. 162–183.
    This chapter discusses the nature of software maintenance in light of software’s ontological status. A realist view of software need not commit us to the otiose position that software maintenance is impossible. Many philosophers and computer scientists have been concerned with drawing attention to software’s dual nature, its being both symbolic and physical, abstract and concrete. There are strong connections to be found between this topic and recent investigations in the philosophy of linguistics, particularly the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33. A note on the evolutionary theory of software development.L. Jonathan Cohen - 1987 - British Journal for the Philosophy of Science 38 (3):381-384.
  34.  43
    Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy?Shariffah Zamoon & Shawn P. Curley - 2008 - Journal of Business Ethics 83 (3):515-533.
    Software piracy is an instance of unauthorized duplication of information goods where laws and norms are not agreed-upon. This article presents a content analysis of articles from the five highest circulating U.S. newspapers 1989-2004 as evidence of the prevailing social environment surrounding software piracy. The rationales in the news articles are analyzed as evidence of the social and psychological underpinnings of attitudes toward software piracy. An expanded version of Sykes and Matza's (American Sociological Review 22, 664-670, 1957); (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  78
    Predictors of Usage Intentions of Pirated Software.Ian Phau & James Ng - 2010 - Journal of Business Ethics 94 (1):23-37.
    The purpose of this study is to investigate the salient factors influencing consumers’ attitudes and usage intentions towards pirated software. Using the Theory of Planned Behaviour, this study investigates the relationships between three sets of factors, i.e. personal, social and perceived behavioural control onto attitudes towards pirated software. Through a multiple regression, only personal factors have shown significant relationship with attitudes towards software piracy. Further results from this study have supported that favourable attitudes towards pirated (...) is likely to result in stronger intentions to use pirated software. It was found that computer proficiency acts as a predictor for intentions towards pirated software, rather than a moderator as originally postulated. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  36.  19
    Explanations in Software Engineering: The Pragmatic Point of View.Jan Winter - 2010 - Minds and Machines 20 (2):277-289.
    This article reveals that explanatory practice in software engineering is in accordance with pragmatic explanatory pluralism, which states that explanations should at least partially be evaluated by their practical use. More specifically, I offer a defense of the idea that several explanation-types are legitimate in software engineering, and that the appropriateness of an explanation-type depends on (a) the engineer’s interests, and (b) the format of the explanation-seeking question he asks, with this format depending on his interests. This idea (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software.Mei-Fang Chen, Ching-Ti Pan & Ming-Chuan Pan - 2009 - Journal of Business Ethics 90 (3):361-373.
    Moral issues have been included in the studies of consumer misbehavior research, but little is known about the joint moderating effect of moral intensity and moral judgment on the consumer’s use intention of pirated software. This study aims to understand the consumer’s use intention of pirated software in Taiwan based on the theory of planned behavior (TPB) proposed by Ajzen (Organizational Behavior and Human Decision Processes, 50, 179, 1991). In addition, moral intensity and moral judgment are adopted (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  38. A MODERN SCIENTIFIC INSIGHT OF SPHOTA VADA: IMPLICATIONS TO THE DEVELOPMENT OF SOFTWARE FOR MODELING NATURAL LANGUAGE COMPREHENSION.Varanasi Ramabrahmam - manuscript
    Sabdabrahma Siddhanta, popularized by Patanjali and Bhartruhari will be scientifically analyzed. Sphota Vada, proposed and nurtured by the Sanskrit grammarians will be interpreted from modern physics and communication engineering points of view. Insight about the theory of language and modes of language acquisition and communication available in the Brahma Kanda of Vakyapadeeyam will be translated into modern computational terms. A flowchart of language processing in humans will be given. A gross model of human language acquisition, comprehension and communication process (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Ontological theory for ontological engineering: Biomedical systems information integration.James M. Fielding, Jonathan Simon, Werner Ceusters & Barry Smith - 2004 - In Fielding James M., Simon Jonathan, Ceusters Werner & Smith Barry, Proceedings of the Ninth International Conference on the Principles of Knowledge Representation and Reasoning (KR2004), Whistler, BC, 2-5 June 2004. pp. 114–120.
    Software application ontologies have the potential to become the keystone in state-of-the-art information management techniques. It is expected that these ontologies will support the sort of reasoning power required to navigate large and complex terminologies correctly and efficiently. Yet, there is one problem in particular that continues to stand in our way. As these terminological structures increase in size and complexity, and the drive to integrate them inevitably swells, it is clear that the level of consistency required for such (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  40.  53
    Predicting Accounting Students’ Intentions to Engage in Software and Music Piracy.Philmore Alleyne, Sherlexis Soleyn & Terry Harris - 2015 - Journal of Academic Ethics 13 (4):291-309.
    The purpose of this study is to investigate the salient factors that influence accounting students to engage in software and music piracy. This study uses the theory of reasoned action and the theory of planned behavior, and extends these models to incorporate other variables to predict individuals’ behavioral intentions. Specifically, we hypothesize that attitudes toward the behavior, subjective norms, perceived behavioral control, moral obligation and perceived prosecution risk influence intentions to engage in software and music piracy. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  22
    The ‘assolutamente improfanabile’ software: Thoughts on new tactics.Salvatore Poier - 2017 - Thesis Eleven 140 (1):22-37.
    In this essay, I intend to focus on De Certeau’s ideas of use as consumption, as well as his theory of play, and then to place them both in conversation with Agamben’s conception of the ‘ assolutamente improfanabile’ – the absolute impossibility of profaning. I intend to apply De Certeau’s and Agamben’s ideas to an exploration of some recent trends in the high tech market regarding the creation of goods to which the notion of ‘AI’ may be particularly salient. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  21
    Lewis Harry R. and Papadimitriou Christos H.. Elements of the theory of computation. Prentice-Hall software series. Prentice-Hall, Inc., Englewood Cliffs, N.J., 1981, xiv + 466 pp. [REVIEW]Jean H. Gallier - 1984 - Journal of Symbolic Logic 49 (3):989-990.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  50
    (1 other version)Jeffrey D. Ullman. Principles of database systems. Second edition. Computer software engineering series. Computer Science Press, Rockville, Md., 1982, vii + 484 pp. - David Maier. The theory of relational databases. Computer Science Press, Rockville, Md., 1983, xv + 637 pp. - Ashok K. Chandra and David Harel. Computable queries for relational data bases. Journal of computer and system sciences, vol. 21 , pp. 156–178. [REVIEW]J. A. Makowsky - 1986 - Journal of Symbolic Logic 51 (4):1079-1084.
  44. Acknowledgements 1. Introduction 1.1 Attention, Economy, Power 1.2 Post-Phenomenology and New Materialism 1.3 Media, Software and Game Studies 1.4 Chapter outlines 2. Interface 2.1 Interface theory 2.3 Interfaces as Environments 2.4 Interface, Object, Transduction 3. Resolution 3.1 Resolution 3.2 Neuropower 3.3 High and low Resolution 3.4 Phasing between resolutions 3.5 Resolution, Habit, Power 4. Technicity 4.1 Technicity 4.2 Psychopower 4.3 Homogenization 4.4 Irreversibility 4.5 Technicity, Time, Power 5. Envelopes 5.1 Homeomorphic Modulation 5.2 Envelope Power 5.3 Shifting Logics of the Envelope in Games Design 5.4 The Contingency of Envelopes 6. Ecotechnics 6.1 The Ecotechnics of Care 6.2 Ecotechnics of Care: two sites of transduction 6.3 From suspended to immanent ecotechnical systems of care 6.4 The Temporal Deferral of Negative Affect 7. Envelope Life 7.1 Gamification 7.2 Non-gaming interface envelopes 7.3 Questioning Envelope Life 7.4 Pharmacology 8. Conclusions 8.1 Games / Dig. [REVIEW]Capitalism Bibliography Index - 2015 - In James Ash, The interface envelope: gaming, technology, power. New York: Bloomsbury Academic, an imprint of Bloomsbury Publishing.
    No categories
     
    Export citation  
     
    Bookmark  
  45. Scientific Theories of Computational Systems in Model Checking.Nicola Angius & Guglielmo Tamburrini - 2011 - Minds and Machines 21 (2):323-336.
    Model checking, a prominent formal method used to predict and explain the behaviour of software and hardware systems, is examined on the basis of reflective work in the philosophy of science concerning the ontology of scientific theories and model-based reasoning. The empirical theories of computational systems that model checking techniques enable one to build are identified, in the light of the semantic conception of scientific theories, with families of models that are interconnected by simulation relations. And the mappings between (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  46. Towards mkm in the large: Modular representation and scalable software architecture.Michael Kohlhase - unknown
    MKM has been defined as the quest for technologies to manage mathematical knowledge. MKM “in the small” is well-studied, so the real problem is to scale up to large, highly interconnected corpora: “MKM in the large”. We contend that advances in two areas are needed to reach this goal. We need representation languages that support incremental processing of all primitive MKM operations, and we need software architectures and implementations that implement these operations scalably on large knowledge bases. We present (...)
     
    Export citation  
     
    Bookmark   1 citation  
  47. Case studies of constructivist comprehension in software engineering.Václav Rajlich - 2003 - Brain and Mind 4 (2):229-238.
    Program comprehension is an essential part of software engineering. The paper describes the constructivist theory of comprehension, a process based on assimilation and accommodation of knowledge. Assimilation means that the new facts are either added to the existing knowledge or rejected. Accommodation means that the existing knowledge is reorganized in order to absorb new facts. These processes are illustrated by case studies of knowledge-level reengineering of a legacy program and of incremental change. In both cases, we constructed preliminary (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  48.  2
    “Ease, comfort, and control”: Ideologies of design in software coding.Jürgen Spitzmüller - forthcoming - AI and Society:1-14.
    This paper provides an explorative investigation into how the development of software (front- and backends) is framed by reflexive assumptions, ascriptions, and expectations as to how software should be ‘designed’ to provide the user with ‘good’, ‘transparent’ and ‘controllable’ handling of applications or software environments. Drawing on metapragmatic theory, the notions of ideologies of communication, ideologies of communification, and particularly ideologies of design, the paper unfolds how software designers draw on, and struggle upon, specific notions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. Using Process Algebra to Describe Human and Software Behaviors.Yingxu Wang - 2003 - Brain and Mind 4 (2):199-213.
    Although there are various ways to express actions and behaviors in natural languages, it is found in cognitive informatics that human and system behaviors may be classified into three basic categories: to be, to have, and to do. All mathematical means and forms, in general, are an abstract description of these three categories of system behaviors and their common rules. Taking this view, mathematical logic may be perceived as the abstract means for describing ‘to be,’ set theory for describing (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  54
    Theory of Virtue Ethics: Do Consumers’ Good Traits Predict Their Socially Responsible Consumption?So Young Song & Youn-Kyung Kim - 2018 - Journal of Business Ethics 152 (4):1159-1175.
    Drawing upon the theory of virtue ethics, this study builds a decision tree predictive model to explore the anticipated impact of good traits on socially responsible consumption. Using R statistical software, we generate a classification tree and cross-validate the model on two independent datasets. The results indicate that the virtuous traits of self-efficacy, courage, and self-control, as well as the personality traits of openness and conscientiousness, predict socially responsible purchase and disposal behavior. Remarkably, the largest segment of socially (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 969