Search Results/Filters    

Filters

Year

Banks



Expert Group










Full-Text


Author(s): 

Gillies Donald

Issue Info: 
  • Year: 

    2023
  • Volume: 

    17
  • Issue: 

    42
  • Pages: 

    80-90
Measures: 
  • Citations: 

    0
  • Views: 

    141
  • Downloads: 

    25
Abstract: 

The aim of this paper is to consider whether critical rationalism has any ideas which could usefully be applied to the INTERNET.  Today we tend to take the INTERNET for granted and it is easy to forget that it was only about two decades ago that it began to be used to any significant extent. Accordingly in section 1 of the paper, there is a brief consideration of the history of the INTERNET.  At first sight this makes it looks implausible that any of Popper’s ideas could be applicable to the INTERNET, since Popper died before the INTERNET came into general use.  However, section 2 argues that Popper’s theory of World 3 does apply very well to the INTERNET.  This application is significant because, as shown in section 3, it leads to the problem of misinformation, which is one of the most significant problems generated by the INTERNET.  In section 4 there is an attempt to solve this problem using ideas taken from Popper’s epistemology. It is argued that there should be changes in education designed to prepare students for the INTERNET age. Teaching in the INTERNET age should focus on presenting to the students not just the accepted theories but also the evidence on which they are based. An illustration of how this might be done is given by considering an example from science teaching, namely the teaching of Newtonian mechanics in the last years of school or first years of university.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 141

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 25 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

LONGE O.B. | CHIEMEKE S.C.

Issue Info: 
  • Year: 

    2008
  • Volume: 

    6
  • Issue: 

    4
  • Pages: 

    132-139
Measures: 
  • Citations: 

    1
  • Views: 

    655
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 655

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Journal: 

Communications

Issue Info: 
  • Year: 

    0
  • Volume: 

    46
  • Issue: 

    4
  • Pages: 

    516-539
Measures: 
  • Citations: 

    1
  • Views: 

    143
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 143

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

DEHGHAN A.R.

Issue Info: 
  • Year: 

    2005
  • Volume: 

    1
  • Issue: 

    2-3
  • Pages: 

    45-72
Measures: 
  • Citations: 

    6
  • Views: 

    3521
  • Downloads: 

    0
Abstract: 

This paper is on INTERNET gambling. INTERNET gambling includes any activities that occurs through INTERNET, and includes any involvement in lotleries, sweeps takes, or any activity based on chances for winning money, prizes or any kind of privileges. According to this paper, INTERNET gambling can lead to problems which include wastage of time and energy, less rate of production, lower efficates in organizations and money laundering.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3521

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 6 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
Issue Info: 
  • Year: 

    2019
  • Volume: 

    10
  • Issue: 

    39
  • Pages: 

    9-27
Measures: 
  • Citations: 

    0
  • Views: 

    700
  • Downloads: 

    0
Abstract: 

One of the CRIMEs that has slowly taken on a global form is environmental CRIME, and international organizations are working to bring nations together to tackle CRIMEs against transnational environmentalism by formulating a global consensus and by enacting laws between them.-Internationals are trying to protect the environment. In the future, environmental resources will bring about war and violence between nations. Because environmental CRIME focuses on CRIMEs and damages to the environment and animals, it also includes sustainability and climate change. The concept of transnational CRIME therefore encompasses at least two different conceptual considerations. First, CRIME must involve the movement of people, objects, or decisions across borders. Second, the injury must be recognized internationally as a CRIME. This study utilized documentary and library method and data analysis was qualitative and based on researcher inference from sources and texts. The environment and the future of work are two of the biggest challenges facing the world today, and one cannot be tackled without the other. Because environmental degradation can act as a cause or an accelerating factor in violent conflict. This paper attempts to examine the dimensions of environmental CRIME that limit the outcome of the conflict to address its specific causes.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 700

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    5
  • Issue: 

    3
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    215
  • Downloads: 

    77
Abstract: 

Background: The anonymity in the cyberspace environment, as well as the rapid advent of and improvements to online activities has increased cyberCRIME.Objectives: The aim of this paper was to survey the relationship between attachment styles, self-monitoring and cyberCRIME in social network users.Patients and Methods: The Collins and Read Adult Attachment Scale, and the Snyder self-monitoring and cyberCRIME scales were sent to 500 social network users. Of these, 203 users (103 men and 100 women) filled out the questionnaires.Results: The results showed that women achieved higher scores in self-monitoring and the anxious attachment style, and men achieved higher scores in cyberCRIME and the anxious attachment style. There was a negative correlation between self-monitoring and cyberCRIME, and the anxious attachment style had a positive correlation with cyberCRIME and a negative correlation with self monitoring. The secure attachment stylehada positive correlation with self-monitoringanda negative correlation with cyberCRIME. The dependent attachment style had a positive correlation with self-monitoring and a negative correlation with cyberCRIME. All correlations were significant.Conclusions: Attachment styles have significant relationships with both self-monitoring and cyberCRIME. Self-monitoring and attachment styles are significant predictors of cyberCRIMEs.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 215

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 77 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

FARIBORZI E.

Issue Info: 
  • Year: 

    2011
  • Volume: 

    7
  • Issue: 

    27
  • Pages: 

    157-185
Measures: 
  • Citations: 

    0
  • Views: 

    4557
  • Downloads: 

    0
Abstract: 

Today, Computers and the INTERNET help people to run many tasks easily. But the speed and the ability to easily doing the tasks provide new open ways for committing a CRIME. Thus, the governments are facing the increase of laws to punish the people who abuse this technology and threat to personal privacy and their business, the public safety, and the national security.The purpose of the present paper is to study, explain and analyze the evolution of laws related to computer CRIMEs in Iran and in other countries. The occurrence of this CRIME can be reduced with the appropriate information and education to prevent the happening of many other CRIMEs. In addition, it causes to reduce the existing legal vacuum in this area in the country. The paper proceeds to offer suggestions useful and helpul for the legislators as well as for the programmers and users of computers and the INTERNET.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 4557

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Legal Civilization

Issue Info: 
  • Year: 

    2023
  • Volume: 

    5
  • Issue: 

    13
  • Pages: 

    53-78
Measures: 
  • Citations: 

    0
  • Views: 

    285
  • Downloads: 

    0
Abstract: 

The criminalization or non-criminalization of political activities shows the approach of the political system and the government in dealing with adversity and political criticism towards itself. Systematic and comprehensive analysis of Iran's legal system shows that the field of citizens' activities sometimes fluctuates towards "freedom" and "CRIME" and that is two "political" or "security" CRIMEs, and this main issue emerges. It determines when the citizen's freedom is bound to the field of "CRIME" and basically gets a political and security description. In the meantime, what seems to be the main question of this research and the challenge of Iran's judicial system is what is the correct criterion for distinguishing political CRIME from security CRIME, so that in the light of it, the ambiguity and inadequacy in the field of distinguishing political CRIME from security CRIME can be resolved. Therefore, the present article, with a descriptiveanalytical approach, while examining the political CRIME cases and paying attention to the documents as well as the legal aspects, examines how the Iranian criminal system deals with them and even if possible, presents a fair criticism. The result is that, although the quality of the CRIME seems to be a suitable indicator for differentiating political CRIME from security CRIME, but the totality of subjective criteria, mental, and public opinion can be considered as "accumulation of suspicion".

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 285

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

TORABZADEH H.

Issue Info: 
  • Year: 

    2009
  • Volume: 

    2
  • Issue: 

    6
  • Pages: 

    110-140
Measures: 
  • Citations: 

    0
  • Views: 

    1388
  • Downloads: 

    0
Abstract: 

Computers might be used in CRIMEs. They may also contain some evidences which prove a CRIME or be used in committing CRIMEs. Therefore, these electronic equipments include valuable evidences for CRIME detection. In this article it is attempted to realize the importance of dealing with these kind of evidences without any major damage to them and how to answer the law enforcement officers in this regard.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1388

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Issue Info: 
  • Year: 

    2024
  • Volume: 

    2
  • Issue: 

    2
  • Pages: 

    7-39
Measures: 
  • Citations: 

    0
  • Views: 

    0
  • Downloads: 

    0
Abstract: 

Background and Objective: The traditional form of human trafficking is slavery, which has been prevalent since ancient times. Human trafficking has been considered the third most profitable criminal activity in the world. This CRIME is committed for the purposes of sexual prostitution, slavery, organ harvesting, and marriage. Currently, most countries in the world are facing this phenomenon and it is one of the CRIMEs that grossly violate human rights and human dignity. Human trafficking is an organized CRIME that threatens national security, and its social, political, and security consequences affect individuals and society. Therefore, identifying ways to criminalize human trafficking as an organized and transnational CRIME is a topic that is addressed in this article.Methodology: The present study is applied in terms of type and purpose, and descriptive-analytical in terms of nature. The necessary data was collected in a documentary and qualitative manner, using a purposeful sampling method and through semi-structured in-depth interviews with experts and those involved in the fight against human trafficking until theoretical saturation was reached.Results and Findings: The results of the study show that the methods of criminalizing human trafficking include: intelligence gathering, law enforcement, CRIME scene management, national, regional, and international interaction and cooperation, and facilitating the extradition of criminals, training citizens and CRIME-fighting forces, including police officers and judicial authorities, controlling and strengthening borders, and the participation of CRIME whistleblowers, such as victims, witnesses, and informants.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button