Results for ' Regulatory Compliance and Cyber Threats'

972 found
Order:
  1.  36
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These strategies aim (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  52
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  41
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The Good, The Bad, and the Puzzled: Coercion and Compliance.Lucas Miotto - 2021 - In Jorge Luis Fabra Zamora & Gonzalo Villa Rosas (eds.), Conceptual Jurisprudence: Methodological Issues, Conceptual Tools, and New Approaches.
    The assumption that coercion is largely responsible for our legal systems’ efficacy is a common one. I argue that this assumption is false. But I do so indirectly, by objecting to a thesis I call “(Compliance)”, which holds that most citizens comply with most legal mandates most of the time at least partly in virtue of being motivated by legal systems’ threats of sanctions and other unwelcome consequences. The relationship between (Compliance) and the efficacy of legal systems (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Emerging viral threats and the simultaneity of the non-simultaneous: zooming out in times of Corona.Hub Zwart - 2020 - Medicine, Health Care and Philosophy 23 (4):589-602.
    This paper addresses global bioethical challenges entailed in emerging viral diseases, focussing on their socio-cultural dimension and seeing them as symptomatic of the current era of globalisation. Emerging viral threats exemplify the extent to which humans evolved into a global species, with a pervasive and irreversible impact on the planetary ecosystem. To effectively address these disruptive threats, an attitude of preparedness seems called for, not only on the viroscientific, but also on bioethical, regulatory and governance levels. This (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Risk-driven global compliance regimes in banking and accounting: the new Law Merchant.James Franklin - 2005 - Law, Probability and Risk 4 (4):237-250.
    Powerful, technically complex international compliance regimes have developed recently in certain professions that deal with risk: banking (the Basel II regime), accountancy (IFRS) and the actuarial profession. The need to deal with major risks has acted as a strong driver of international co-operation to create enforceable international semilegal systems, as happened earlier in such fields as international health regulations. This regulation in technical fields contrasts with the failure of an international general-purpose political and legal regime to develop. We survey (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  44
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Fair machine learning under partial compliance.Jessica Dai, Sina Fazelpour & Zachary Lipton - 2021 - In Jessica Dai, Sina Fazelpour & Zachary Lipton (eds.), Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society. pp. 55–65.
    Typically, fair machine learning research focuses on a single decision maker and assumes that the underlying population is stationary. However, many of the critical domains motivating this work are characterized by competitive marketplaces with many decision makers. Realistically, we might expect only a subset of them to adopt any non-compulsory fairness-conscious policy, a situation that political philosophers call partial compliance. This possibility raises important questions: how does partial compliance and the consequent strategic behavior of decision subjects affect the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Global technology regulation and potentially apocalyptic technological threats.James J. Hughes - 2007 - In Fritz Allhoff, Patrick Lin, James Moor, John Weckert & Mihail C. Roco (eds.), Nanoethics: The Ethical and Social Implications of Nanotechnology. Wiley. pp. 201-214.
    In 2000 Bill Joy proposed that the best way to prevent technological apocalypse was to "relinquish" emerging bio-, info- and nanotechnologies. His essay introduced many watchdog groups to the dangers that futurists had been warning of for decades. One such group, ETC, has called for a moratorium on all nanotechnological research until all safety issues can be investigated and social impacts ameliorated. In this essay I discuss the differences and similarities of regulating bio- and nanotechnological innovation to the efforts to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Global Regulatory System of Human Resources Development.Sergii Sardak - 2014 - Dissertation, Київський Національний Економічний Університет Імені Вадима Гетьмана
    ANNOTATION Sardak S.E. Global Regulatory System of Human Resources Development. – Manuscript. Thesis for the Doctor of Economic Science academic degree with major in 08.00.02 – World Economy and international economic relations. – SHEE «Kyiv National Economic University named after Vadym Hetman», Kyiv, 2014. The preconditions and factors of the global economic system with the identified relevant subjects areas and mechanisms of regulation instruments have been investigated. The crucial role of humans in the global economic system as a key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Electronic Warfare and Artificial Intelligence.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    Electronic warfare is a critical component of modern military operations and has undergone significant advances in recent years. This book provides an overview of electronic warfare, its historical development, key components, and its role in contemporary conflict scenarios. It also discusses emerging trends and challenges in electronic warfare and its contemporary relevance in an era of advanced technology and cyber threats, emphasizing the need for continued research and development in this area. The book explores the burgeoning intersection of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Evaluating extreme risks in invasion ecology: learning from banking compliance.James Franklin, Mark Burgman, Scott Sisson & J. K. Martin - 2008 - Diversity and Distributions 14:581-591.
    methods that have shown promise for improving extreme risk analysis, particularly for assessing the risks of invasive pests and pathogens associated with international trade. We describe the legally inspired regulatory regime for banks, where these methods have been brought to bear on extreme ‘operational risks’. We argue that an ‘advocacy model’ similar to that used in the Basel II compliance regime for bank operational risks and to a lesser extent in biosecurity import risk analyses is ideal for permitting (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Public Procurement and Environmental Sustainability in Developing Countries: A South African Perspective.Ogunlela Oyebanjo & Robertson K. Tengeh - 2020 - Cape Town, South Africa: Proceedings of the 6th International Conference on Business and Management Dynamics.
    The concept of Sustainable Public Procurement (SPP) has attracted the interests of academics, practitioners, policymakers and the media recently. The interest can be attributed to the strategic role of purchasing and supply chain as a lever for sustainable development. Despite the enormous amount of funds spent on public procurements in South Africa annually, tender irregularities, corrupt practices, non-compliance and lack of knowledge, casts doubts on its role in fostering sustainable development. An in-depth literature review on SPP implementation was adopted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Professionalism, Agency, and Market Failures.Hasko von Kriegstein - 2016 - Business Ethics Quarterly 26 (4):445-464.
    According to the Market Failures Approach to business ethics, beyond-compliance duties can be derived by employing the same rationale and arguments that justify state regulation of economic conduct. Very roughly the idea is that managers have a duty to behave as if they were complying with an ideal regulatory regime ensuring Pareto-optimal market outcomes. Proponents of the approach argue that managers have a professional duty not to undermine the institutional setting that defines their role, namely the competitive market. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  24.  44
    IT & C, Volumul 3, Numărul 1, Martie 2024.Nicolae Sfetcu - 2024 - It and C 3 (1).
    Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIAL / EDITORIAL -/- Challenges and Limitations in the Use of Artificial Intelligence Provocări și limitări în utilizarea inteligenței artificiale -/- TEHNOLOGIA INFORMAȚIEI / INFORMATION TECHNOLOGY -/- Impact of Big Data Technology on Contemporary Society Impactul tehnologiei Big Data asupra societății contemporane -/- Methods, Techniques and Patterns of Advanced Persistent Threats – APT Lifecycle Metode, tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Algorithms and Posthuman Governance.James Hughes - 2017 - Journal of Posthuman Studies.
    Since the Enlightenment, there have been advocates for the rationalizing efficiency of enlightened sovereigns, bureaucrats, and technocrats. Today these enthusiasms are joined by calls for replacing or augmenting government with algorithms and artificial intelligence, a process already substantially under way. Bureaucracies are in effect algorithms created by technocrats that systematize governance, and their automation simply removes bureaucrats and paper. The growth of algorithmic governance can already be seen in the automation of social services, regulatory oversight, policing, the justice system, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. The Concept of Accountability in AI Ethics and Governance.Theodore Lechterman - 2023 - In Justin B. Bullock, Yu-Che Chen, Johannes Himmelreich, Valerie M. Hudson, Anton Korinek, Matthew M. Young & Baobao Zhang (eds.), The Oxford Handbook of AI Governance. Oxford University Press.
    Calls to hold artificial intelligence to account are intensifying. Activists and researchers alike warn of an “accountability gap” or even a “crisis of accountability” in AI. Meanwhile, several prominent scholars maintain that accountability holds the key to governing AI. But usage of the term varies widely in discussions of AI ethics and governance. This chapter begins by disambiguating some different senses and dimensions of accountability, distinguishing it from neighboring concepts, and identifying sources of confusion. It proceeds to explore the idea (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Blame for Hum(e)an beings: The role of character information in judgments of blame.Samuel Murray, Kevin O'Neill, Jordan Bridges, Justin Sytsma & Zac Irving - forthcoming - Social Psychological and Personality Science.
    How does character information inform judgments of blame? Some argue that character information is indirectly relevant to blame because it enriches judgments about the mental states of a wrongdoer. Others argue that character information is directly relevant to blame, even when character traits are causally irrelevant to the wrongdoing. We propose an empirical synthesis of these views: a Two Channel Model of blame. The model predicts that character information directly affects blame when this information is relevant to the wrongdoing that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Ethics of Algorithmic Outsourcing in Everyday Life.John Danaher - 2019 - In Karen Yeung & Martin Lodge (eds.), Algorithmic Regulation. Oxford University Press.
    We live in a world in which ‘smart’ algorithmic tools are regularly used to structure and control our choice environments. They do so by affecting the options with which we are presented and the choices that we are encouraged or able to make. Many of us make use of these tools in our daily lives, using them to solve personal problems and fulfill goals and ambitions. What consequences does this have for individual autonomy and how should our legal and (...) systems respond? This chapter defends three claims by way of response. First, it argues that autonomy is indeed under threat in some new and interesting ways. Second, it evaluates and disputes the claim that we shouldn’t overestimate these new threats because the technology is just an old wolf in a new sheep’s clothing. Third, and finally, it looks at responses to these threats at both the individual and societal level and argues that although we shouldn’t encourage an attitude of ‘helplessness’ among the users of algorithmic tools there is an important role for legal and regulatory responses to these threats that go beyond what are currently on offer. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  29. Derrida's Shylock: The Letter and the Life of Law.Katrin Trüstedt - 2019 - In Peter Goodrich & Michel Rosenfeld (eds.), Administering Interpretation: Derrida, Agamben, and the Political Theology of Law. New York, NY: Fordham University Press. pp. 168-185..
    This contribution addresses issues of interpretation and translation in Derrida’s reading of Shakespeare’s Merchant of Venice in relation to the supposed opposition of the letter and the spirit of the law. Rather than supporting a supersession of the law’s letter in favor of its spirit and advocating a sublation of the law by means of mercy, as a traditional reading suggests, this essay’s reading of Shakespeare’s play suggests that it deconstructs the underlying opposition. By linking the insistence on “the letter (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  30. Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity.Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato & Luciano Floridi - manuscript
    The advent of Generative AI, particularly through Large Language Models (LLMs) like ChatGPT and its successors, marks a paradigm shift in the AI landscape. Advanced LLMs exhibit multimodality, handling diverse data formats, thereby broadening their application scope. However, the complexity and emergent autonomy of these models introduce challenges in predictability and legal compliance. This paper analyses the legal and regulatory implications of Generative AI and LLMs in the European Union context, focusing on liability, privacy, intellectual property, and cybersecurity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Targeted Human Trafficking -- The Wars between Proxy and Surrogated Economy.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):398-409.
    Upon Brexit & Trade War, the research took a supply-side analysis in macroeconomic paradigm for the purpose and cause of the actions. In the geopolitical competitions on crude oil resources between the allied powers & the Russian hegemony, the latter of which has effective control over P. R. China’s multilateral behaviors, the external research induced that trade war, either by complete information in intelligence or an unintended result, was a supply chain attack in prohibiting the antisatellite weapon supplies in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Global Warming and Our Natural Duties of Justice.Aaron Maltais - 2008 - Dissertation, Uppsala University
    Compelling research in international relations and international political economy on global warming suggests that one part of any meaningful effort to radically reverse current trends of increasing green house gas (GHG) emissions is shared policies among states that generate costs for such emissions in many if not most of the world’s regions. Effectively employing such policies involves gaining much more extensive global commitments and developing much stronger compliance mechanism than those currently found in the Kyoto Protocol. In other words, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. The Asymmetries of Disability Rights Protection in the Inter-American System.Ottavio Quirico & Pablo Cristóbal Jiménez Lobeira - 2022 - In Inclusive Sustainability: Harmonising Disability Law and Policy. Springer.
    This contribution explores disability rights protection in Inter-American States within the framework of the OAS and in the context of the obligations established under the CIADDIS and the CRPD. Following the classical division between ‘primary’ and ‘secondary’ rules, the contribution first sketches key regulatory initiatives in the area of disability rights and second considers compliance and enforcement mechanisms. Along these lines, the first section illustrates similarities and differences between the CIADDIS and the CRPD and, within this framework, essential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Beyond Deadlock: Low Hanging Fruit and Strict yet Available Options in AWS Regulation.Maciej Zając - 2022 - Journal of Ethics and Emerging Technologies 2 (32):1-14.
    Efforts to ban Autonomous Weapon Systems were both unsuccessful and controversial. Simultaneously the need to address the detrimental aspects of AWS development and proliferation continues to grow in scope and urgency. The article presents several regulatory solutions capable of addressing the issue while simultaneously respecting the requirements of military necessity and so attracting a broad consensus. Two much stricter solutions – regional AWS bans and adoption of a no first use policy – are also presented as fallback strategies in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. (1 other version)Fundamentals of Order Ethics: Law, Business Ethics and the Financial Crisis.Christoph Luetge - 2012 - Archiv für Rechts- Und Sozialphilosophie Beihefte 130:11-21.
    During the current financial crisis, the need for an alternative to a laissez-faire ethics of capitalism (the Milton Friedman view) becomes clear. I argue that we need an order ethics which employs economics as a key theoretical resource and which focuses on institutions for implementing moral norms. -/- I will point to some aspects of order ethics which highlight the importance of rules, e.g. global rules for the financial markets. In this regard, order ethics (“Ordnungsethik”) is the complement of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  38. Mental Action and the Threat of Automaticity.Wayne Wu - 2013 - In Andy Clark, Julian Kiverstein & Tillmann Vierkant (eds.), Decomposing the Will. , US: Oxford University Press USA. pp. 244-61.
    This paper considers the connection between automaticity, control and agency. Indeed, recent philosophical and psychological works play up the incompatibility of automaticity and agency. Specifically, there is a threat of automaticity, for automaticity eliminates agency. Such conclusions stem from a tension between two thoughts: that automaticity pervades agency and yet automaticity rules out control. I provide an analysis of the notions of automaticity and control that maintains a simple connection: automaticity entails the absence of control. An appropriate analysis, however, shows (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  39. Doing and allowing, threats and sequences.Fiona Woollard - 2008 - Pacific Philosophical Quarterly 89 (2):261–277.
    The distinction between doing and allowing appears to have moral significance, but the very nature of the distinction is as yet unclear. Philippa Foot's ‘pre-existing threats’ account of the doing/allowing distinction is highly influential. According to the best version of Foot's account an agent brings about an outcome if and only if his behaviour is part of the sequence leading to that outcome. When understood in this way, Foot's account escapes objections by Warren Quinn and Jonathan Bennett. However, more (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  40. Cognitive Enhancement and the Threat of Inequality.Walter Veit - 2018 - Journal of Cognitive Enhancement 2 (4):1-7.
    As scientific progress approaches the point where significant human enhancements could become reality, debates arise whether such technologies should be made available. This paper evaluates the widespread concern that human enhancements will inevitably accentuate existing inequality and analyzes whether prohibition is the optimal public policy to avoid this outcome. Beyond these empirical questions, this paper considers whether the inequality objection is a sound argument against the set of enhancements most threatening to equality, i.e., cognitive enhancements. In doing so, I shall (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  41. Regulatory evolution and theoretical arguments in evolutionary biology.Stavros Ioannidis - 2013 - Science & Education 22 (2):279-292.
    The cis-regulatory hypothesis is one of the most important claims of evolutionary developmental biology. In this paper I examine the theoretical argument for cis-regulatory evolution and its role within evolutionary theorizing. I show that, although the argument has some weaknesses, it acts as a useful example for the importance of current scientific debates for science education.
    Download  
     
    Export citation  
     
    Bookmark  
  42. (1 other version)Science, biases, and the threat of global pessimism.K. Brad Wray - 2001 - Proceedings of the Philosophy of Science Association 2001 (3):S467-.
    Philip Kitcher rejects the global pessimists' view that the conclusions reached in inquiry are determined by the interests of some segment of the population, arguing that only some inquiries, for example, inquiries into race and gender, are adversely affected by interests. I argue that the biases Kitcher believes affect such inquiries are operative in all domains, but the prevalence of such biases does not support global pessimism. I argue further that in order to address the global pessimists' concerns, the scientific (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Rheological Properties of Polyvinylacetate: Compliance and Relaxation Spectrum.Mahmoud Abdel-Halim Abdel-Goad - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (5):8-10.
    Abstract: The dynamic viscoelastic properties of Polyvinylacetate with molecular weight 83000g/mol (PVA 83K ) were determined by using a Rheometer operated in the dynamic mode and 8 mm parallel plate over a wide range of temperature as a function of frequency. The measurements were performed successively in the parallel plate geometry using 8 mm plate instead of 25 mm. The glass plateau regime is clearly observed because we could measure PVA 83K sample successively under its glass temperature. The rheological properties (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Compliance and Conjunction.Samuel Elgin - manuscript
    I provide counterexamples to Kit Fine's semantics for imperative and deontic modals. In particular, I argue that the semantics fails to provide necessary conditions for conjunctive imperatives.
    Download  
     
    Export citation  
     
    Bookmark  
  45. Depression, Regulatory Focus, and Motivation.Keith Markman - 2007 - Personality and Individual Differences 43:427-436.
    The present study examined relationships between chronic regulatory focus and motivation to improve upon academic outcomes in a sample of individuals varying in degree of hopelessness depression (HD) symptoms. Participants recalled a recent negative academic outcome, completed a measure of regulatory focus, reported their subsequent motivation to improve upon future academic outcomes, and then indicated whether their grades on examinations, assignments, and their GPAs had improved or worsened since the described outcome. Results indicate that degree of HD symptoms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Kant, Real Possibility, and the Threat of Spinoza.Andrew Chignell - 2012 - Mind 121 (483):635-675.
    In the first part of the paper I reconstruct Kant’s proof of the existence of a ‘most real being’ while also highlighting the theory of modality that motivates Kant’s departure from Leibniz’s version of the proof. I go on to argue that it is precisely this departure that makes the being that falls out of the pre-critical proof look more like Spinoza’s extended natura naturans than an independent, personal creator-God. In the critical period, Kant seems to think that transcendental idealism (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  49. Climate Change and the Threat of Disaster: The Moral Case for Taking Out Insurance at Our Grandchildren's Expense.Matthew Rendall - 2011 - Political Studies 59 (4):884-99.
    Is drastic action against global warming essential to avoid impoverishing our descendants? Or does it mean robbing the poor to give to the rich? We do not yet know. Yet most of us can agree on the importance of minimising expected deprivation. Because of the vast number of future generations, if there is any significant risk of catastrophe, this implies drastic and expensive carbon abatement unless we discount the future. I argue that we should not discount. Instead, the rich countries (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  50. Defusing Existential and Universal Threats to Compatibilism: A Strawsonian Dilemma for Manipulation Arguments.Andrew J. Latham & Hannah Tierney - 2022 - Journal of Philosophy 119 (3):144-161.
    Many manipulation arguments against compatibilism rely on the claim that manipulation is relevantly similar to determinism. But we argue that manipulation is nothing like determinism in one relevant respect. Determinism is a "universal" phenomenon: its scope includes every feature of the universe. But manipulation arguments feature cases where an agent is the only manipulated individual in her universe. Call manipulation whose scope includes at least one but not all agents "existential manipulation." Our responsibility practices are impacted in different ways by (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 972