نتایج جستجو برای: cyber ethics
تعداد نتایج: 111166 فیلتر نتایج به سال:
The explosive growth of computer and communications technology raises new legal and ethical challenges that reflect tensions between individual rights and societal needs. For instance, should cracking into a computer system be viewed as a petty prank, as trespassing, as theft, or as espionage? Should placing copyrighted material onto a public file server be treated as freedom of expression or a...
The importance of an ethics component in the undergraduate education of computing professionals is well established. However, the inclusion of computer and professional ethics in a graduate IS curriculum has not been so well defined. This paper describes an elective graduate course in computer and professional ethics developed by the author during 2004 and taught for the first time in the Sprin...
Online risks and harms, including cyber-bullying, trolling, revenge porn digital harassment, are an everyday reality in many young people’s lives. Educators increasingly being called upon to address these concerns but not adequately equipped do so. In this article the case is made for a new educational model cyber-flourishing. The constructed through pragmatic approach moral theory, adopting ce...
Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...
Faced with the increasing need for correctly designed hybrid and cyber-physical systems today, the problem of including provision for continuously varying behaviour as well as the usual discrete changes of state is considered in the context of Event-B. An extension of Event-B called Hybrid Event-B is presented, that accommodates continuous behaviours (called pliant events) in between familiar d...
this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...
The software application Golfmetrics was created to capture and store golfer shot data and to quantify differences in shot patterns between players of different skill levels. Across golfers it is shown, somewhat surprisingly, that longer hitters tend to be straighter than shorter hitters. Individual golfers can be measured relative to a benchmark to assess relative accuracy and to suggest wheth...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید