Search results for "Cyberspace"

showing 10 items of 30 documents

Infoética y derechos humanos.

2009

En los últimos años, se ha popularizado el término “Infoética”, empleado para analizar los problemas éticos que está generando la sociedad de la información, de ahí que en este texto se realice una aproximación a este concepto, describiendo algunos de sus usos más habituales. Este análisis se completa con un repaso de las razones que han llevado a algunos autores a revisar el planteamiento de los derechos humanos como consecuencia de las transformaciones que provoca la sociedad del conocimiento. Finalmente, se abordan las posibilidades que presenta la Infoética para construir una nueva dimensión de la ciudadanía: la ciudadanía digital, que surge por la aparición del ciberespacio, la socieda…

Knowledge societyHuman rightsmedia_common.quotation_subjectGeneral MedicineSociologyInformation societyDimension (data warehouse)Reflection (computer graphics)CyberspaceCitizenshipmedia_commonEpistemologyTerm (time)Revista de Fomento Social
researchProduct

How Much Are We Willing To Lose in Cyberspace? On the Tail Risk of Scam in the Market for Initial Coin Offerings

2020

From an entrepreneurial perspective, Initial Coin Offering (ICO) has become an alternative way for attaining funding for business projects using the new evolving digital financial market for tokens. Unfortunately, the majority of all ICOs are subject to scam which casts doubt on this new innovative tool for acquiring funding. Using a unique intensively hand-collected data set covering more than 5000 ICOs which have been launched in the August 2014–December 2019 period, we could identify 1014 ICOs exhibiting data on raised funding whereof 576 turned out to be scams projects. The cumulative losses due to scam in the ICO market correspond to $10.12 billion which is 66% of our identified overal…

Market capitalizationFinancebusiness.industryFinancial marketSocietal impact of nanotechnologyICOTail riskcomputer.file_formatbusinessCyberspacecomputerRisk managementFinTechSSRN Electronic Journal
researchProduct

The ‘gig economy’: employee, self-employed or the need for a special employment regulation?

2017

The digital era has changed employment relationships dramatically, causing a considerable degree of legal uncertainty as to which rules apply in cyberspace. Technology is transforming business organisation in a way that makes employees – as subordinate workers – less necessary. New types of companies, based on the ‘on-demand economy’ or so-called ‘sharing economy’ and dedicated to connecting customers directly with individual service providers, are emerging. These companies conduct their entire core business through workers that they classify as self-employed. In this context, employment law is facing its greatest challenge, as it has to deal with a very different reality to the one existi…

Organizational Behavior and Human Resource ManagementLabour economicsbusiness.industry05 social sciences050209 industrial relationsDegree (music)OutsourcingEmployment contractSharing economy0502 economics and businessIndustrial relationsSelf employedDret del treballbusinessCyberspace050203 business & managementSelf-employmentGig economyTransfer: European Review of Labour and Research
researchProduct

Privacy invasions

2006

Nowhere has technological progress been as dramatic as in the field of information and communication technology (ICT). Citizens of the developed world now live in an environment in which access to electronic information and communication is nearly ubiquitous—and we rely heavily on being surrounded by this technology. In fact, it is so omnipresent that we only recognize our dependence on ICT when a network server or a communications system fails, leaving us cut off from cyberspace. > …computers, mobile telephones, personal digital assistants, music players and all other types of electronic gadgets are further shrinking in size, and we will soon wear them as we do clothes or jewellery… The fi…

Public SectorPatriot ActScience and Societybusiness.industryInternet privacyPublic sectorHomelandBiochemistryIdentification (information)Credit cardPrivacyInformation and Communications TechnologyGeneticsHumansPrivate SectorConfidentialityCyberspacebusinessMolecular BiologyComputer SecurityConfidentialityEMBO reports
researchProduct

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

2013

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…

Security analysisInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryInternet privacyComputer securitycomputer.software_genreHardware and ArchitectureNational Strategy to Secure CyberspaceCyber-attackBusinessSafety Risk Reliability and QualityCyberspaceSafety ResearchcomputerComputingMilieux_MISCELLANEOUSSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Learning and Relationships in the Cyberspace

2008

The cyberspace is an instrument through which internet users could get new experiences. It could contribute to foster one-s own growth, widening cognitive, creative and communicative abilities and promoting relationships. In the cyberspace, in fact, it is possible to create virtual learning communities where internet users improve their interpersonal sphere, knowledge and skills. The main element of e-learning is the establishment of online relationships, that are often collaborative.

Settore M-PSI/07 - Psicologia Dinamicacyberspace group learning
researchProduct

'Uber Economy': Employee, Self-Employed or a Need of a Special Employment Regulation?

2015

The Digital era has changed industrial relationships dramatically. This has caused a considerable legal uncertainty about which rules apply to cyberspace. Technology is transforming business organization in a way that makes employees -- as subordinate work -- less necessary. A new type of companies "on demand economy" "sharing economy" -- dedicated to connecting customers directly with individual service providers are emerging. Thus, these companies develop their core business completely through workers classified as self-employed. In this context, employment law is facing its greatest challenge, dealing with a very different reality compared to the one existing when it was created. This pa…

Sharing economyCore businessEconomyLabour lawBusinessDigital economyService providerCyberspaceSelf-employmentEmployment contractSSRN Electronic Journal
researchProduct

Cyber-Identities and Social Life in Cyberspace

2011

Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-pr…

Social lifebusiness.industryInternet privacySociologyComputer securitycomputer.software_genrebusinessCyberspacecomputerPseudonymityAnonymity
researchProduct

Przestrzenne ograniczenie teatru wojny w kontekście praw i obowiązków państw neutralnych

2018

Współcześnie, tradycyjnie rozumiana kategoria państwa neutralnego uległa zmianie. Spowodowane jest to przede wszystkim ewolucją nietykalności terytorium państwa. Obecnie, tradycyjnie rozumiana nietykalność terytorialna państwa, wobec współczesnych, technicznych możliwości prowadzenia wojny musi, w sensie regulacji prawnomiędzynarodowych, ulec zmianie. Należy jednoznacznie stwierdzić, że dotychczasowa neutralność państwa jest li tylko kategorią historyczną

State neutralitystate bordersstate territorytheatre of wargranice państwawojna w cyberprzestrzeniterytorium państwaNeutralność państwateatr wojnywar in cyberspacePrzegląd Nauk Stosowanych
researchProduct

Some reflections on non-contractual obligations in cyberspace considering the Rome II regulation

2014

Internet penetration has created a revolutionary change in people's communication nowadays. By creating immaterial and elusive cyberspace, without borders and limits of communication a three-dimensional territorial concept has been transformed by globalizing social relations and reducing importance of regional or national dimensions. All situations taking place on the Internet also occur somewhere in the reality. Sometimes it is difficult to measure whether the events are random or unrelated to particular events. Technological progress offers new possibilities to change a user's real location either consciously or subconsciously. However, the law is highly territorial in nature. This articl…

Subconsciousbusiness.industryTechnological changeCommon lawmedia_common.quotation_subjectMedia studiesInformation technologyDoctrinelcsh:Social Scienceslcsh:HPolitical scienceThe InternetbusinessCyberspaceLaw and economicsmedia_commonRome II RegulationSHS Web of Conferences
researchProduct