Kasus pelecehan seksual di media sosial yang melibatkan mahasiswa Universitas Jember menunjukkan bahwa pelanggaran cyber ethics dan degradasi akhlak terjadi dalam interaksi digital. Tujuan dari penelitian ini adalah untuk mempelajari... more
Fenomena viral di media sosial seringkali melibatkan batasan antara kebebasan berekspresi dan pelanggaran privacy (Infringement Privacy). Penelitian ini mengeksplorasi bagaimana interaksi digital yang intensif berkontribusi pada... more
Throughout the internet's evolution , debates on cyber ethics had raised concerns within the educational system. New ethical dilemmas turned to emerge out of compounding facebook communication among users. Ethical behaviour involving... more
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute... more
“Özgürlükler ve Güvenlik Dengesinde Siber Dünya” başlıklı bu kitap, dijital dünyada güvenlik ve özgürlük dengesinde kullanıcılar, devletler ve şirketler arasındaki karmaşık ilişkileri derinlemesine incelemektedir. Kitap dört ana bölümden... more
This article explores the ethical dilemmas propelled by a significant shift in the allocation of trust and intelligence due to blockchain technology and AI, resulting in a notable decrease in transaction costs. The ethical and political... more
The aim of this study is to develop cyber security competency scale to measure the security competency of prospective teachers in relation to the educational environment. It included 100 participants from various teacher training colleges... more
The educational environment became the common locations for many internet-related risks and incidents like consumption of sites of online pornography, hate-sites, defective online communication and copyright violation or copyright... more
section devoted entirely to online copyright infringement, and the Technology, Education, and Copyright Harmonization Act of 2002, which granted almost the same rights to distance learning environments as enjoyed by face-to-face learning... more
Counterfeit goods provide a substantial risk to both consumers and corporations. This study presents a system that employs blockchain technology to address the issue of counterfeiting by validating the authenticity of products using QR... more
Despite the increasing use of computers and internet resources for various purposes in different sectors of the economy, threats and attacks in cyberspace are on the increase. This is because internet attackers keep devising new... more
Internet etiquette is very necessary as teachers increasingly use the internet in teaching and communicate online. Netiquette is introduced in schools so that teachers would be more ethical in utilizing and dealing with the dynamics of... more
In Tunisia, one of the major problems of the olive oil industry is marketing. Several factors have an impact, such as quality, originality, lobbying, subsidies and the certification of extra virgin olive oil. The major problem remains the... more
ACTIVITY 6: Letter to the Women of Malolos Critically appraised Rizal's views on women in nation-building. Examine closely how Rizal instigated the women of Malolos to rise and take an active role in society. Write a 2-paper on this... more
The paper discusses Jose Rizal's forward-thinking ideas on women's rights and education, as expressed in his letter to the young women of Malolos. Rizal's campaign for women's education and social status challenged the existing... more
Critically appraised Rizal's views on women in nation-building. Examine closely how Rizal instigated the women of Malolos to rise and take an active role in society. Hundreds of years ago, during the Spanish pre-colonialism, both men and... more
Uluslararasi insan haklari belgeleri, egitimde ayrimciligi ve dislamayiyasaklarken; kapsayici, cogulcu, elestirel, katilimci ve insan kisiliginin tamgelismesi icin bir ortamin olusturulmasini desteklemektedir. Uluslararasi insanhaklari... more
In today’s era, humanity has been overwhelmed by technological revolutions that have changed and will continue to change how business operations are performed, directly or indirectly. At the same time, the processes within the supply... more
Characteristics of an Islamic View of Cyber Ethics C Ch ha ar ra ac ct te er ri is st ti ic cs s o of f a an n I Is sl la am mi ic c V Vi ie ew w o of f C Cy yb be er rE Et th hi ic cs s H Ha am mi id dr re ez za a A Ay ya at to ol ll la... more
Agriculture sector is the backbone of a given economy. Globally, this sector does not only provide food and basic materials, but also employs an immense percentage of population. Nonetheless, it is afflicted with many predicaments such as... more
In the ever-evolving landscape of sports betting exchange, Orbit Exchange emerges as a pioneer in leveraging blockchain technology to enhance transparency, trust, and decentralization. This blog will delve into how Orbit Exchange... more
This article intends to explain women's roles in technology, specifically focusing on their challenges in cyberspace, particularly in internet technology. The term 'cyber' focuses on controlling every social vis-à-vis technological... more
More women are now claiming their space in the public sphere and are recognised for their significant contributions in society. With the greater recognition of women's rights and agency, have dating/courting scripts also changed?... more
Cyberbullying has become a major challenge for authorities, parents, guardians and schools in particular, especially in the era of the digital world. This paper reviews available empirical research to examine the issues such as the... more
Data security has been consistent in being a major issue in information technology. In the cloud computing world, becomes specifically critical as the data is situated in different places all over the world. As per user's concerns about... more
The study investigated Academic Librarians' perceptions of cybercrime information in curbing security threats in Federal university libraries in the FCT, Abuja. The study was guided by five (5) objectives and five (5) research questions.... more
Increasing demand for food requires modernization of agricultural process. Agricultural process involves crop production as well as food supply chain. Optimizing farming requires real time monitoring of agricultural fields and... more
Bu araştırma maksimum çeşitlilik örneklemesi kullanılarak Gaziantep'te görev yapan öğretmenlerin katılımıyla gerçekleştirilen nitel bir çalışmadır. Araştırma kapsamında yer alan veriler odak grup görüşmeleri ile elde edilmiştir. Elde... more
This case study investigates Nigeria's cybercrime agencies' digital forensic readiness and forensic capability and how this affects the cybercrime caseloads and prosecution. The Routine Activity Theory (RAT) and the Technology,... more
In accordance with Rule G4.6.3, I hereby declare that the above-mentioned thesis is my own work and that it has not previously been submitted for assessment to another University or for another qualification.
We live in a thoroughly technocratic culture (Castells 2010; Germain 2017). 'Technocratic' means literally 'the rule of technology', and as Heidegger demonstrated in his forceful essay, "The Question Concerning Technology" (1977), our era... more
OSINT stands for Open Source Intelligence , (O)SI for (Open) Social Intelligence , and PbD for Privacy by Design. The CAPER EU project has built an OSINT solution oriented to the prevention of organized crime. How to balance freedom and... more
The dominance of digital technology and increased online activities have penetrated the risks of unethical practices and abuses in cyberspace. Many people misuse the internet by believing its risk challenge is very low. To limit the... more
Information and knowledge has become vital economic resources in this new era. Yet, along with new opportunities, the dependence on information systems brought new threats. Crime remains elusive and ever strives to hide in the face of... more
Information and knowledge has become vital economic resources in this new era. Yet, along with new opportunities, the dependence on information systems brought new threats. Crime remains elusive and ever strives to hide in the face of... more
Every internet user is affected by digital etiquette. Unfortunately, most of us are unable to keep up with the rate at which technology is being used. Problems with digital etiquette have persisted in society because of people's lack of... more
Ethics has become an important part in the interaction among humans being. This paper specifically discusses applied ethics as one type of ethics. There are three applied ethics that will be reviewed in this paper, i.e. computer ethics,... more
Agriculture is one of the areas where blockchain technology could bring a revolution by solving the existing problem of Agri-product fraud, its traceability, price manipulation, and lack of customer trust in the product. This paper aims... more
Kapsayıcılık; sosyal politikalar, eğitim, yasalar ve istihdam gibi birçok alanı kapsayan çok boyutlu bir kavramdır (Mitchell 2005). Kapsayıcılık uluslararası bir hareket olmasına rağmen, uluslararası veya ortak kabul görmüş bir tanımı... more
Cyber security has become essential for information security. Keeping the information safe is one of the major challenges nowadays. Given the unrestricted number of free websites, the Internet has undeniably opened a new way of... more
In agriculture supply chain management, traceability is a crucial aspect to ensure food safety for increasing customer loyalty and satisfaction. Lack of quality assurance in centralized data storage makes us move towards a new approach... more
Today, with modern lifestyles, people have become involved in the life and use of technology. More technology for financial transactions as well as shopping in their cyberspace.At the same time, the protection of knowledge has become... more
IntroductionInformation and communication technology (ICT) systems are embraced in all facets of life. They are utilized virtually in all households, associations, organizations and governments. Hence, information and communication... more
Information and knowledge has become vital economic resources in this new era. Yet, along with new opportunities, the dependence on information systems brought new threats. Crime remains elusive and ever strives to hide in the face of... more
Global warming has changed our environment and our society at a high speed. Luckily for us, scientists and researchers have worked around the clock on technologies that could ease the effects of the principal sectors of the... more
This study was conducted to reveal the observations and expectations regarding the rights, freedoms and responsibilities parameters of democracy, of teacher trainees, who are to help individuals gain such values, To do this, the views of... more
Smallholder farmers produce over 70% of the world’s food needs. Yet, the socioeconomic conditions of the smallholder farmers are substandard. One of the primary reasons for this unpropitious situation is that they generate modest income... more