Results for 'Cyber-Politics'

1000+ found
Order:
  1. Digital Socialism and Cyber-Communism in the Fourth Industrial Revolution.Piero Gayozzo - 2023 - Interfases 18:169-184.
    Socialism is a political ideology that proposes that the state should control the means of production to manage a planned economy. The possibility of realizing this thesis has been debated throughout the 20th century. The Fourth Industrial Revolution (4IR) includes technologies such as artificial intelligence or big data that could reopen the debate through the formulation of new digital models of planned economy. This qualitative research presents some theoretical models proposed in academia to update socialism in the 4IR. It describes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Cartografía filosófico-política del ciberespacio: posturas extremas y moderadas.Lucas Emmanuel Misseri - 2015 - Cuadernos Del Sur. Filosofía (43-44):207-228.
    Information and communication technologies present new challenges for political theory and philosophy due to its large-scale and scope transformations. Their demands are reflected in institutional needs that cover a “cyber-political” space, i. e., a cluster of problems of the governance of the network of networks –Internet– that results in the formation of new institutions –e. g. ICANN. The question I try to answer here is: What characterizes cyberspace political discourses? The proposed hypothesis is that it is possible to interpret (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. The Varieties of Musical Experience.Brandon Polite - 2014 - Pragmatism Today 5 (2):93-100.
    Many philosophers of music, especially within the analytic tradition, are essentialists with respect to musical experience. That is, they view their goal as that of isolating the essential set of features constitutive of the experience of music, qua music. Toward this end, they eliminate every element that would appear to be unnecessary for one to experience music as such. In doing so, they limit their analysis to the experience of a silent, motionless individual who listens with rapt attention to the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Definite Descriptions and the Gettier Example.Christoph Schmidt-Petri & London School of Economics and Political Science - 2002 - CPNSS Discussion Papers.
    This paper challenges the first Gettier counterexample to the tripartite account of knowledge. Noting that 'the man who will get the job' is a description and invoking Donnellan's distinction between their 'referential' and 'attributive' uses, I argue that Smith does not actually believe that the man who will get the job has ten coins in his pocket. Smith's ignorance about who will get the job shows that the belief cannot be understood referentially, his ignorance of the coins in his pocket (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The Chinese approach to artificial intelligence: an analysis of policy, ethics, and regulation.Huw Roberts, Josh Cowls, Jessica Morley, Mariarosaria Taddeo, Vincent Wang & Luciano Floridi - 2021 - AI and Society 36 (1):59–⁠77.
    In July 2017, China’s State Council released the country’s strategy for developing artificial intelligence, entitled ‘New Generation Artificial Intelligence Development Plan’. This strategy outlined China’s aims to become the world leader in AI by 2030, to monetise AI into a trillion-yuan industry, and to emerge as the driving force in defining ethical norms and standards for AI. Several reports have analysed specific aspects of China’s AI policies or have assessed the country’s technical capabilities. Instead, in this article, we focus on (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  7. Targeted Human Trafficking -- The Wars between Proxy and Surrogated Economy.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):398-409.
    Upon Brexit & Trade War, the research took a supply-side analysis in macroeconomic paradigm for the purpose and cause of the actions. In the geopolitical competitions on crude oil resources between the allied powers & the Russian hegemony, the latter of which has effective control over P. R. China’s multilateral behaviors, the external research induced that trade war, either by complete information in intelligence or an unintended result, was a supply chain attack in prohibiting the antisatellite weapon supplies in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and harness (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  70
    Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. A socio-psychological approach towards terrorism: How and why do individuals support, join, stay in, and leave terrorist organizations?Alireza Salehi-Nejad - 2019 - In International Conference on Peace and Conflict Resolution. Tehran: University of Tehran.
    The phenomena of terrorism and other politically motivated violence have been assessed across different disciplines from political science and economics to theology and psychology. Whereas the definitions of the concepts of “terrorism” and “terrorist” are disputed and they rather reflect the perspectives of the defining entity, there is a common consensus that terrorism can be classified in terms of its type (such as state-sponsored, dissent, religious, pathological, narco-, cyber-, and bioterrorism), the scale (i.e. domestic vs. international), motives, and objectives. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. An Evidence-driven Research to the Transgressions of Geneva Conventions by the Communist Party of China Led Autocratic Regime.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (10):249-266.
    The "second-generation indigenization" hypothesis of Huntington's phenomenological observations on totalitarianism in Cold War regime collapse subtly portrayed the realpolitik interest groups' political influences with autocracy disbandment processes. The research puts democratization as the premise and globalization as purpose for the analysis, with the cultural anthropological psychopathology & criminological elements of genocide and crime against humanity explained, underlying some of the Communist Party of China (CPC)’s organizational behaviors. With the regionalism purposes & approaches to multilateralism by People's Republic of China (PRC), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  84
    Cyber-Threats: Anticipation & Strategic Management, SciencesPo, 24h, 2023.Jan Stoermann & Jean Langlois-Berthelot - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  17. Political Realism in International Relations.W. Julian Korab-Karpowicz - 2010 - The Stanford Encyclopedia of Philosophy.
    In the discipline of international relations there are contending general theories or theoretical perspectives. Realism, also known as political realism, is a view of international politics that stresses its competitive and conflictual side. It is usually contrasted with idealism or liberalism, which tends to emphasize cooperation. Realists consider the principal actors in the international arena to be states, which are concerned with their own security, act in pursuit of their own national interests, and struggle for power. The negative side (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  18. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige & Sikiru Adewale - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  19. Political Equality and Epistemic Constraints on Voting.Michele Giavazzi - 2024 - Philosophy and Public Affairs 52 (2):147-176.
    As part of recent epistemic challenges to democracy, some have endorsed the implementation of epistemic constraints on voting, institutional mechanisms that bar incompetent voters from participating in public decision-making procedures. This proposal is often considered incompatible with a commitment to political equality. In this paper, I aim to dispute the strength of this latter claim by offering a theoretical justification for epistemic constraints on voting that does not rest on antiegalitarian commitments. Call this the civic accountability justification for epistemic constraints (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Political Hinge Epistemology.Christopher Ranalli - 2022 - In Constantine Sandis & Danièle Moyal-Sharrock (eds.), Extending Hinge Epistemology. Anthem Press. pp. 127-148.
    Political epistemology is the intersection of political philosophy and epistemology. This paper develops a political 'hinge' epistemology. Political hinge epistemology draws on the idea that all belief systems have fundamental presuppositions which play a role in the determination of reasons for belief and other attitudes. It uses this core idea to understand and tackle political epistemological challenges, like political disagreement, polarization, political testimony, political belief, ideology, and biases, among other possibilities. I respond to two challenges facing the development of a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  22. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The Necessity of Memory for Self-identity: Locke, Hume, Freud and the Cyber-self.Shane J. Ralston - 2000 - Cyberphilosophy Journal 1 (1).
    John Locke is often understood as the inaugurator of the modern discussion of personal human identity—a discussion that inevitably falls back on his own theory with its critical reliance on memory. David Hume and Sigmund Freud would later make arguments for what constituted personal identity, both relying, like Locke, on memory, but parting from Locke's company in respect the role that memory played. The purpose of this paper will be to sketch the groundwork for Locke's own theory of personal identity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Regulate artificial intelligence to avert cyber arms race.Mariarosaria Taddeo & Luciano Floridi - 2018 - Nature 556 (7701):296-298.
    This paper argues that there is an urgent need for an international doctrine for cyberspace skirmishes before they escalate into conventional warfare.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  25. Political Philosophy in the Global South: Harmony in Africa, East Asia, and South America.Thaddeus Metz - 2023 - In Uchenna B. Okeja (ed.), Routledge Handbook of African Political Philosophy. New York, NY: Routledge. pp. 369-383.
    Harmony as a basic value is neglected in internationally influential philosophical discussions about rights, power, and other facets of public policy; it is not prominent in articles that appear in widely read journals or in books published by presses with a global reach. Of particular interest, political philosophers and policy makers remain ignorant of the similarities and differences between various harmony-oriented approaches to institutional choice from around the world. In this chapter, I begin to rectify these deficiencies by critically discussing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Political realism as ideology critique.Janosch Prinz & Enzo Rossi - 2017 - Critical Review of International Social and Political Philosophy 20 (3):334-348.
    This paper outlines an account of political realism as a form of ideology critique. Our focus is a defence of the normative edge of this critical-theoretic project against the common charge that there is a problematic trade-off between a theory’s groundedness in facts about the political status quo and its ability to consistently envisage radical departures from the status quo. To overcome that problem we combine insights from three distant corners of the philosophical landscape: theories of legitimacy by Bernard Williams (...)
    Download  
     
    Export citation  
     
    Bookmark   83 citations  
  27. AI Powered Anti-Cyber bullying system using Machine Learning Algorithm of Multinomial Naïve Bayes and Optimized Linear Support Vector Machine.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 5.
    Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Methodology of Political Theory.Christian List & Laura Valentini - 2016 - In Herman Cappelen, Tamar Gendler & John P. Hawthorne (eds.), The Oxford Handbook of Philosophical Methodology. Oxford, United Kingdom: Oxford University Press.
    This article examines the methodology of a core branch of contemporary political theory or philosophy: “analytic” political theory. After distinguishing political theory from related fields, such as political science, moral philosophy, and legal theory, the article discusses the analysis of political concepts. It then turns to the notions of principles and theories, as distinct from concepts, and reviews the methods of assessing such principles and theories, for the purpose of justifying or criticizing them. Finally, it looks at a recent debate (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  29.  75
    The Conscription of Informal Political Representatives.Wendy Salkin - 2021 - Journal of Political Philosophy 29 (4):429-455.
    Journal of Political Philosophy, Volume 29, Issue 4, Page 429-455, December 2021.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  30. Global Political Legitimacy and the Structural Power of Capital.Ugur Aytac - 2023 - Journal of Social Philosophy 54 (4):490-509.
    In contemporary democracies, global capitalism exerts a significant influence over how state power is exercised, raising questions about where political power resides in global politics. This question is important, since our specific considerations about justifiability of political power, i.e. political legitimacy, depend on how we characterize political power at the global level. As a partial answer to this question, I argue that our notion of global political legitimacy should be reoriented to include the structural power of the Transnational Capitalist (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  31. Political Realism and Epistemic Constraints.Ugur Aytac - 2022 - Social Theory and Practice 48 (1):1-27.
    This article argues that Bernard Williams’ Critical Theory Principle (CTP) is in tension with his realist commitments, i.e., deriving political norms from practices that are inherent to political life. The Williamsian theory of legitimate state power is based on the central importance of the distinction between political rule and domination. Further, Williams supplements the normative force of his theory with the CTP, i.e., the principle that acceptance of a justification regarding power relations ought not to be created by the very (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  32. A Guide to Political Epistemology.Michael Hannon & Elizabeth Edenberg - 2024 - In Jennifer Lackey & Aidan McGlynn (eds.), Oxford Handbook of Social Epistemology. Oxford University Press.
    Political epistemology is a newly flourishing area of philosophy, but there is no comprehensive overview to this burgeoning field. This chapter maps out the terrain of political epistemology, highlights some of the key questions and topics of this field, draws connections across seemingly disparate areas of work, and briefly situates this field within its historical and contemporary contexts.
    Download  
     
    Export citation  
     
    Bookmark  
  33.  61
    Murdoch and Politics.Lawrence Blum - 2022 - In Silvia Caprioglio Panizza & Mark Hopwood (eds.), Murdochian Mind. New York, NY: Routledge.
    Politics never became a central intellectual interest of Murdoch’s, but she produced one important and visionary political essay in the ‘50’s, several popular writings on political matters, and a significant chapter in Metaphysics as a Guide to Morals that echoes throughout that book. In the 1958 “House of Theory,” she sees the welfare state as having almost entirely failed to address the deeper problems of capitalist society, including a failure to create the conditions for values she saw as central (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Pluralist Politics, Relational Worlds.Didier Zúñiga - 2023 - Toronto: University of Toronto Press.
    This book aims to overcome the disconnect between human and ecological concerns in political theory and political philosophy.
    Download  
     
    Export citation  
     
    Bookmark  
  35. The Politics of Post-Truth.Michael Hannon - 2023 - Critical Review: A Journal of Politics and Society 35 (1):40-62.
    A prevalent political narrative is that we are facing an epistemological crisis, where many citizens no longer care about truth and facts. Yet the view that we are living in a post-truth era relies on some implicit questionable empirical and normative assumptions. The post-truth rhetoric converts epistemic issues into motivational issues, treating people with whom we disagree as if they no longer believe in or care about truth. This narrative is also dubious on epistemic, moral, and political grounds. It is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. The Politics of Becoming: Anonymity and Democracy in the Digital Age.Hans Asenbaum - 2023 - Oxford: Oxford University Press.
    When we participate in political debate or protests, we are judged by how we look, which clothes we wear, by our skin colour, gender and body language. This results in exclusions and limits our freedom of expression. The Politics of Becoming explores radical democratic acts of disidentification to counter this problem. Anonymity in masked protest, graffiti, and online de-bate interrupts our everyday identities. This allows us to live our multiple selves. In the digital age, anonymity becomes an inherent part (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Political vandalism as counter‐speech: A defense of defacing and destroying tainted monuments.Ten-Herng Lai - 2020 - European Journal of Philosophy 28 (3):602-616.
    Tainted political symbols ought to be confronted, removed, or at least recontextualized. Despite the best efforts to achieve this, however, official actions on tainted symbols often fail to take place. In such cases, I argue that political vandalism—the unauthorized defacement, destruction, or removal of political symbols—may be morally permissible or even obligatory. This is when, and insofar as, political vandalism serves as fitting counter-speech that undermines the authority of tainted symbols in ways that match their publicity, refuses to let them (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  38. The Future of AI: Stanisław Lem’s Philosophical Visions for AI and Cyber-Societies in Cyberiad.Roman Krzanowski & Pawel Polak - 2021 - Pro-Fil 22 (3):39-53.
    Looking into the future is always a risky endeavour, but one way to anticipate the possible future shape of AI-driven societies is to examine the visionary works of some sci-fi writers. Not all sci-fi works have such visionary quality, of course, but some of Stanisław Lem’s works certainly do. We refer here to Lem’s works that explore the frontiers of science and technology and those that describe imaginary societies of robots. We therefore examine Lem’s prose, with a focus on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Political Ideals and the Feasibility Frontier.David Wiens - 2015 - Economics and Philosophy 31 (3):447-477.
    Recent methodological debates regarding the place of feasibility considerations in normative political theory are hindered for want of a rigorous model of the feasibility frontier. To address this shortfall, I present an analysis of feasibility that generalizes the economic concept of a production possibility frontier and then develop a rigorous model of the feasibility frontier using the familiar possible worlds technology. I then show that this model has significant methodological implications for political philosophy. On the Target View, a political ideal (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  41. Understanding Political Feasibility.Holly Lawford-Smith - 2012 - Journal of Political Philosophy 21 (3):243-259.
    Download  
     
    Export citation  
     
    Bookmark   75 citations  
  42. The politics of becoming: Disidentification as radical democratic practice.Hans Asenbaum - 2021 - European Journal of Social Theory 24 (1):86-104.
    Current radical democratic politics is characterized by new participatory spaces for citizens’ engagement, which aim at facilitating the democratic ideals of freedom and equality. These spaces are, however, situated in the context of deep societal inequalities. Modes of discrimination are carried over into participatory interaction. The democratic subject is judged by its physically embodied appearance, which replicates external hierarchies and impedes the freedom of self-expression. To tackle this problem, this article seeks to identify ways to increase the freedom of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  43. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Dogwhistles, Political Manipulation, and Philosophy of Language.Jennifer Saul - 2018 - In Daniel Fogal, Harris Daniel & Moss Matt (eds.), New Work on Speech Acts. Oxford University Press. pp. 360–383.
    This essay explores the speech act of dogwhistling (sometimes referred to as ‘using coded language’). Dogwhistles may be overt or covert, and within each of these categories may be intentional or unintentional. Dogwhistles are a powerful form of political speech, allowing people to be manipulated in ways they would resist if the manipulation was carried outmore openly—often drawing on racist attitudes that are consciously rejected. If philosophers focus only on content expressed or otherwise consciously conveyed they may miss what is (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  45. Charitable Interpretations and the Political Domestication of Spinoza, or, Benedict in the Land of the Secular Imagination.Yitzhak Y. Melamed - 2013 - In Justin Smith, Eric Schliesser & Mogens Laerke (eds.), The Methodology of the History of Philosophy. Oxford University Press.
    In a beautiful recent essay, the philosopher Walter Sinnott-Armstrong explains the reasons for his departure from evangelical Christianity, the religious culture in which he was brought up. Sinnot-Armstrong contrasts the interpretive methods used by good philosophers and fundamentalist believers: Good philosophers face objections and uncertainties. They follow where arguments lead, even when their conclusions are surprising and disturbing. Intellectual honesty is also required of scholars who interpret philosophical texts. If I had distorted Kant’s view to make him reach a conclusion (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  46. Political Legitimacy as a Problem of Judgment.Thomas Fossen - 2022 - Social Theory and Practice 48 (1):89-113.
    This paper examines the differences between moralist, realist, and pragmatist approaches to political legitimacy by articulating their largely implicit views of judgment. Three claims are advanced. First, the salient opposition among approaches to legitimacy is not between “moralism” and “realism.” Recent realist proposals for rethinking legitimacy share with moralist views a distinctive form, called “normativism”: a quest for knowledge of principles that solve the question of legitimacy. This assumes that judging legitimacy is a matter of applying such principles to a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. Conceptual Engineering and the Politics of Implementation.Matthieu Https://Orcidorg Queloz & Friedemann Https://Orcidorg Bieber - 2022 - Pacific Philosophical Quarterly 103 (3):670-691.
    Conceptual engineering is thought to face an ‘implementation challenge’: the challenge of securing uptake of engineered concepts. But is the fact that implementation is challenging really a defect to be overcome? What kind of picture of political life would be implied by making engineering easy to implement? We contend that the ambition to obviate the implementation challenge goes against the very idea of liberal democratic politics. On the picture we draw, the implementation challenge can be overcome by institutionalizing control (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  48. Political realism meets civic republicanism.Philip Pettit - 2017 - Critical Review of International Social and Political Philosophy 20 (3):331-347.
    The paper offers five desiderata on a realist normative theory of politics: that it should avoid moralism, deontologism, transcendentalism, utopianism, and vanguardism. These desiderata argue for a theory that begins from values rooted in a people’s experience; that avoids prescribing a collective deontological constraint; that makes the comparison of imperfect regimes possible; that takes feasibility and sustainability into account; and that makes room for the claims of democracy. The paper argues, in the course of exploring the desiderata, that a (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  49. From Political Liberalism to Para-Liberalism: Epistemological Pluralism, Cognitive Liberalism & Authentic Choice.Musa al-Gharbi - 2016 - Comparative Philosophy (2):1-25.
    Advocates of political liberalism hold it as a superior alternative to perfectionism on the grounds that it avoids superfluous and/or controversial claims in favor of a maximally-inclusive approach undergirded by a "free-standing" justification for the ideology. These assertions prove difficult to defend: political interpretations of liberalism tend to be implicitly ethnocentric; they often rely upon a number of controversial, and even empirically falsified, assumptions about rationality--and in many ways prove more parochial than their perfectionist cousins. It is possible to reform (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Democracy within, justice without: The duties of informal political representatives.Wendy Salkin - 2022 - Noûs 56 (4):940-971.
    Informal political representation can be a political lifeline, particularly for oppressed and marginalized groups. Such representation can give these groups some say, however mediate, partial, and imperfect, in how things go for them. Coeval with the political goods such representation offers these groups are its particular dangers to them. Mindful of these dangers, skeptics challenge the practice for being, inter alia, unaccountable, unauthorized, inegalitarian, and oppressive. These challenges provide strong pro tanto reasons to think the practice morally impermissible. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 1000