Results for 'Insurance, security and finance'

999 found
Order:
  1. Pandemic Economic Crisis: Changes and New Challenges to Society: scientific monograph.Maksym Bezpartochnyi (ed.) - 2020 - Sofia, Bułgaria: VUZF Publishing House “St. Grigorii Bogoslov”.
    The current economic crisis caused by the COVID-19 pandemic has created new changes and challenges for society, which has led to a deeper identification of pressing problems and to develop strategies and models for overcoming crises in various countries, industries and businesses. The formation and improvement of modern strategies and models of crisis management is impossible without optimizing the resources of economic entities, providing assistance at various levels of government to support priority sectors of the economy, finding additional sources of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Philosophical & Sociological Inquires in Material Aspects of the Human Life namely Risk, Finance and Insurance.Syed Danish Ali - manuscript
    Given how much importance there is of economics and finance in our lives as humans (materialist side is foremost as per Marx), it should be given more importance by Philosophy and Sociology. This brief report is meant to highlight few research paradigms available in Philosophy and Sociology to give its proper social context and provide deep underlying of Risk, Insurance and Finance.
    Download  
     
    Export citation  
     
    Bookmark  
  3. Transformation of international economic relations: modern challenges, risks, opportunities and prospects: collective monograph.M. Bezpartochnyi - 2017 - ISMA University.
    The authors of the book have come to the conclusion that it is necessary to effectively use the methodological tools for assessing the competitiveness of financial and insurance markets, methodological approaches to assessing the effectiveness of regional policy, internal audit of resources. Basic research is aimed at researching the main trends in the international economy, socialization of global economic development, investment aspects of development countries, functioning of consumer market in the international economic system, trends of international population migration, processes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  5. Hypothetical Insurance and Higher Education.Ben Colburn & Hugh Lazenby - 2016 - Journal of Philosophy of Education 50 (4):587-604.
    What level of government subsidy of higher education is justified, in what form, and for what reasons? We answer these questions by applying the hypothetical insurance approach, originally developed by Ronald Dworkin in his work on distributive justice. On this approach, when asking how to fund and deliver public services in a particular domain, we should seek to model what would be the outcome of a hypothetical insurance market: we stipulate that participants lack knowledge about their specific resources and risks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. PERSONAL FINANCIAL MANAGEMENT PRACTICES AMONG SELECTED PERSONNEL OF THE BUREAU OF THE TREASURY – CENTRAL OFFICE.Daren D. Cortez - 2023 - Get International Research Journal 1 (2).
    The study aimed to determine the personal financial management practices among selected personnel of the Bureau of the Treasury – Central Office. It used the descriptive method of gathering data. The respondents of the study consisted of 183 personnel from 35 divisions of the Bureau and selected through simple random probability sampling technique. The study shown that most of the respondents aged 26 to 35 years old, female, single, bachelor’s degree holder, rank and file workers, permanent employees, have been in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The essence of financing the space in in the post-war period as an integral part of the country’s reconstruction plan.Svitlana Koshova, Igor Britchenko & Maksym Bezpartochnyi - 2022 - Financial and Credit Activity: Problems of Theory and Practice 45 (4):405-415.
    This paper studies the issue of financing the Space Industry at the State Level in the Postwar period as part of the country’s recovery plan, as one of the foremost critical zones of technological development and to ensure space security and defence. The European Space Agency (ESA) is, identified as the main player in the European space sector. It is determined that the current structure of ESA – Space 4.0 – provides for the success of European space activities in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Corporate Social Responsibility Accounting and Financial Performance of Insurance Companies in Nigeria (2007-2016).Efe Efosa Ehioghiren & Onyinye Eneh - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (5):8-12.
    Abstract: Before now it is believe that it is only company that their activities adversely affect the environment that should be socially responsible. This has change over the years as some country has made it mandatory for business to be socially responsible without which they cannot do business. For insurance company, their activities have to do with rendering of services and as such do not destroy the environment. The main objective of the study was to determine corporate social responsibility accounting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Development of a method for selected financing of scientific and educational institutions through targeted capital investment in the development of innovative technologies.Iaroslava Levchenko, Oksana Dmytriieva, Inna Shevchenko, Igor Britchenko, Vitalii Kruhlov, Nina Avanesova, Oksana Kudriavtseva & Olesia Solodovnik - 2021 - Eastern-European Journal of Enterprise Technologies 3 (13 (111)):55 - 62.
    The problem of supporting scientific and educational institutions is considered. A method of selective financing of scientific and educational institutions that create innovative technologies taking into account their investment in innovative developments is proposed. On the basis of statistical data on the indicators for assessing the activities of scientific and educational institutions and the indicator of the innovative potential of a scientific and educational institution from the production of innovations (PNn), their rating was calculated. The essence of PNn is to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Prospects for sustainable development and ensuring the security of economic systems in the new geostrategic realities.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring sustainable development and security of economic systems in the new geostrategic realities requires the use of mechanisms for state protection of national economic interests, innovative outsourcing and digital technologies, and environmental protection. Basic research focuses on assessment the economic security of insurance companies, logistics processes, farms, healthcare organisations, retail and e-commerce, and tourist destinations. The research results have been implemented in the different decision-making models in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Predictors of Community-Based Health Insurance in Ethiopia via Multilevel Mixed-Effects Modelling: Evidence from the 2019 Ethiopia Mini Demography and Health Survey.Wondesen Teshome Bekele - 2022 - ClinicoEconomics and Outcomes Research 14:547–562.
    Background: The World Health Organization has endorsed a community-based health insurance scheme (CBHIS) as a shared financing plan to improve access to health services and ensure universal coverage of the healthcare delivery system. Such a contributory scheme is the most likely option to provide health insurance coverage when governments cannot offer direct health care support. Despite improvements in access to current healthcare services, Ethiopia’s healthcare delivery remained low, owing to the country’s underdeveloped healthcare finance system. As a result, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Fair climate policy in an unequal world: Characterising responsibilities and designing institutions for mitigation and international finance.Jonathan Pickering - 2013 - Dissertation, Australian National University
    The urgent need to address climate change poses a range of complex moral and practical concerns, not least because rising to the challenge will require cooperation among countries that differ greatly in their wealth, the extent of their contributions to the problem, and their vulnerability to environmental and economic shocks. This thesis by publication in the field of climate ethics aims to characterise a range of national responsibilities associated with acting on climate change (Part I), and to identify proposals for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Predictors of Community-Based Health Insurance in Ethiopia via Multilevel Mixed-Effects Modelling: Evidence from the 2019 Ethiopia Mini Demography and Health Survey.Wondesen Teshome Bekele - 2022 - ClinicoEconomics and Outcomes Research 14:547–562.
    Background: The World Health Organization has endorsed a community-based health insurance scheme (CBHIS) as a shared financing plan to improve access to health services and ensure universal coverage of the healthcare delivery system. Such a contributory scheme is the most likely option to provide health insurance coverage when governments cannot offer direct health care support. Despite improvements in access to current healthcare services, Ethiopia’s healthcare delivery remained low, owing to the country’s underdeveloped healthcare finance system. As a result, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Counteracting the financing of terrorism in the light of the legal regulations of the European Union.Igor Britchenko & Krzysztof Chochowski - 2022 - Politics and Security 6 (2):11 - 18.
    The purpose of this article is to define the methods of counteracting the financing of terrorism, as well as the obligations of public and private entities in this regard. The basis for the considerations will be the analysis of EU normative acts, and the leading research method will be the dogmatic method supported by the historical method.
    Download  
     
    Export citation  
     
    Bookmark  
  15. May a Government Mandate More Comprehensive Health Insurance than Citizens Want for Themselves?Alex Voorhoeve - 2018 - In David Sobel, Peter Vallentyne & Steven Wall (eds.), Oxford Studies in Political Philosophy, Vol 4. Oxford University Press. pp. 167-191.
    I critically examine a common liberal egalitarian view about the justification for, and proper content of, mandatory health insurance. This view holds that a mandate is justified because it is the best way to ensure that those in poor health gain health insurance on equitable terms. It also holds that a government should mandate what a representative prudent individual would purchase for themselves if they were placed in fair conditions of choice. I argue that this common justification for a mandate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Sufficiency, Comprehensiveness of Health Care Coverage, and Cost-Sharing Arrangements in the Realpolitik of Health Policy.Govind Persad & Harald Schmidt - 2017 - In Carina Fourie & Annette Rid (eds.), What is Enough?: Sufficiency, Justice, and Health. Oxford University Press. pp. 267-280.
    This chapter explores two questions in detail: How should we determine the threshold for costs that individuals are asked to bear through insurance premiums or care-related out-of-pocket costs, including user fees and copayments? and What is an adequate relationship between costs and benefits? This chapter argues that preventing impoverishment is a morally more urgent priority than protecting households against income fluctuations, and that many health insurance plans may not adequately protect individuals from health care costs that threaten to drop their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Experts and Cultural Narcissism. Relations in the Early 21st Century.Andrzej Klimczuk - 2012 - Lap Lambert Academic Publishing.
    Local and global dependencies and interactions between individuals, groups and institutions are becoming increasingly opaque and risky. This is due to increased importance of highly complex abstract systems created and supported in order to maintain of transport, communications, finance, energy, media, security infrastructure, as well as social and cultural institutions. These systems require the knowledge and skills of experts. Professionals that not only satisfy identified needs, but also create new thereby contribute the development of cultural narcissism phenomenon. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - forthcoming - Critical Review of International Social and Political Philosophy.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  76
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Ethical leadership and employee ethical behaviour: exploring dual-mediation paths of ethical climate and organisational justice: empirical study on Iraqi organisations.Hussam Al Halbusi, Mohd Nazari Ismail & Safiah Binti Omar - 2021 - International Journal of Business Governance and Ethics 15 (3):303–325.
    Due to ethical lapses of leaders, interest in ethical leadership has grown, raising important questions about the responsibility of leaders in ensuring moral and ethical conduct. Research conducted on ethical leadership failed to investigate the active role that the characteristics of ethical climate and organisational justice have an increasing or decreasing influence on the ethical leadership in the organisation’s outcomes of employees’ ethical behaviour. Thus, this study examined the dual-mediations of work ethical climate and organisational justice on the relation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Security and the 'war on terror': a roundtable.Julian Baggini, Alex Voorhoeve, Catherine Audard, Saladin Meckled-Garcia & Tony McWalter - 2007 - In Julian Baggini & Jeremy Strangroom (eds.), What More Philosophers Think. Continuum. pp. 19-32.
    What is the appropriate legal response to terrorist threats? This question is discussed by politician Tony McWalter, The Philosophers' Magazine editor Julian Baggini, and philosophers Catherine Audard, Saladin Meckled-Garcia, and Alex Voorhoeve.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Global security and economic asymmetry: a comparison of developed and developing countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience for this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  87
    A Forward-Looking Approach to Climate Change and the Risk of Societal Collapse.Daniel Steel, Charly Phillips, Amanda Giang & Kian Mintz-Woo - 2024 - Futures 158:103361.
    Highlights: -/- • -/- Proposes forward-looking approach to studying climate collapse risks. • -/- Suggests diminishing returns on climate adaptation as a collapse mechanism. • -/- Suggests strategies for sustainable adaptation pathways in face of climate change. • -/- Illustrates analysis with examples of small island states and global food security. -/- Abstract: -/- This article proposes a forward-looking approach to studying societal collapse risks related to climate change. Such an approach should indicate how to study emerging collapse risks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  89
    FINANCIAL COPING MECHANISMS AND HOUSEHOLD DECISION-MAKING FOLLOWING AN INJURY-RELATED HEALTH SHOCK: IMPLICATIONS FOR THE IMPLEMENTATION OF UNIVERSAL HEALTH COVERAGE IN VIETNAM.Anna Taber Niloufer - 2021 - Dissertation, Johns Hopkins University
    In a context of imperfect risk protection, households may protect against the impact of a health shock by employing various financial and non-financial coping mechanisms, such as foregoing or reducing needed medical care, labor substitution, consumption reduction, borrowing money, dissaving, and selling assets. However, leveraging certain coping mechanisms may reduce future productivity, potentially trapping households in chronic or persistent poverty. Resources and risk are not necessarily shared equitably within a household; the ability and willingness of the household to leverage coping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Whose Justice is it Anyway? Mitigating the Tensions Between Food Security and Food Sovereignty.Samantha Noll & Esme G. Murdock - 2020 - Journal of Agricultural and Environmental Ethics 33 (1):1-14.
    This paper explores the tensions between two disparate approaches to addressing hunger worldwide: Food security and food sovereignty. Food security generally focuses on ensuring that people have economic and physical access to safe and nutritious food, while food sovereignty movements prioritize the right of people and communities to determine their agricultural policies and food cultures. As food sovereignty movements grew out of critiques of food security initiatives, they are often framed as conflicting approaches within the wider literature. (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  35. Casteism, Social Security and Violation of Human Rights.Desh Raj Sirswal - 2012 - In Manoj Kumar (ed.), Human Rights for All. Centre for Positive Philosophy and Interdisciplinary Studies (CPPIS), Pehowa (Kurukshetra). pp. 128-131.
    The consciousness of social security comes to a man when he feels that he is getting his basic rights. Human Rights are related to those rights which are related to man’s life, freedom, equality and self-esteem, are established by Indian constitution or universal declaration of human rights and implemented by Indian judiciary system. In other words, “Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, color, religion, language, or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Ethical Importance of Conflicts of Interest: Accounting and Finance Examples.John B. Dilworth - 1994 - Business and Professional Ethics Journal 13 (1-2):25-40.
    The general area of business and professional ethics is full of vexing and confusing problems. For example, questions concerning the im portance of ethical standards, whether ethics is unnecessary given appropriate legal enforcement, whether it is imperative to teach ethical behavior in professional education, and similar questions are all controversial. The specific ethical problems to be found in the areas of accounting and finance are at least as difficult as those in other areas. However, there is one kind of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. The Effects of The Hidden Economy in Sudan And its Reduction Strategies.Abdel Muttalib Ali Ibnouf & Howyda Tahir Hassan Taha - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (1):44-52.
    Abstract: The economic and social effects of the phenomenon of the hidden economy include that some of the funds practiced by the hidden economic activity result from evasion of payment of taxes owed to the state, which necessarily means the lack of resources available to the state to finance its economic and social development programs. Through the ability to secure goods at prices lower than the prices of goods in the official sector and this is generated by encouraging the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Assuming Identities: Media, Security and Personal Privacy.Steven DeCaroli - 2003 - In Robin Wang & Timothy Shanahan (eds.), Reason and Insight. pp. 421-430.
    Download  
     
    Export citation  
     
    Bookmark  
  40. Public health policy in resource allocation: the role of ubuntu ethics in redressing resource disparity between public and private healthcare in South Africa.Nosisa Cynthia Madaka - 2019 - Dissertation, University of Stellenbosch
    This thesis under the title “Public Health Policy in Resource Allocation: the Role of Ubuntu Ethics in Redressing Resource Disparity between Public and Private Healthcare in South Africa” explores health care disparities pertaining to resource allocation between public and private sector. It is of relevance and importance in South Africa where 54% of the population live on less than US$3 per day. Although the government has instituted certain changes aimed at transforming the public health care system, the resource allocation gap (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Open and Inclusive: Fair processes for financing universal health coverage.Elina Dale, David B. Evans, Unni Gopinathan, Christoph Kurowski, Ole Frithjof Norheim, Trygve Ottersen & Alex Voorhoeve - 2023 - Washington, DC: World Bank.
    This World Bank Report offers a new conception of fair decision processes in health financing. It argues that such procedural fairness can contribute to fairer outcomes, strengthen the legitimacy of decision processes, build trust in authorities, and promote the sustainability of reforms on the path to health coverage for all.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Methodical approaches to assessing the military and economic capacity of the country.Mykola Tkach, Ivan Tkach, Serhii Yasenko, Igor Britchenko & Peter Lošonczi - 2022 - Journal of Scientific Papers «Social Development and Security» 12 (3):81-97.
    The aim of the article is to develop the existing methodological approaches to assessing the military and economic capabilities of the country in conditions of war and peace. To achieve the purpose of the study, its decomposition was carried out and the following were investigated: existing approaches to assessing the military and economic potential of the country, the country's power and national power; the concept of critical load of the national economy is revealed; the generally accepted norms on financing of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Stability of sociopolitical systems in the context of globalization: revolution and democracy.Leonid Grinin & Andrey V. Korotayev - 2015 - Central European Journal of International and Security Studies 9 (2):01-34.
    Issues of sociopolitical systems’ stability and risks of their destabi-lization in process of political transformations belong to the most important ones as regards the social development perspectives, as has been shown again by the recent events in Ukraine. In this re-spect it appears necessary to note that the transition to democracy may pose a serious threat to the stability of respective sociopolitical systems. This article studies the issue of democratization of countries within globalization context, it points to the unreasonably high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. A Sense of Proportion: Some Thoughts on Equality, Security and Justice.Annabelle Lever - 2020 - Res Publica 26 (3):357-371.
    This article develops an intuitive idea of proportionality as a placeholder for a substantive conception of equality, and contrasts it with Ripstein’s ideas, as presented in an annual guest lecture to the Society of Applied Philosophy in 2016. It uses a discussion of racial profiling to illustrate the conceptual and normative differences between the two. The brief conclusion spells out my concern that talk of ‘proportionality’, though often helpful and, sometimes, necessary for moral reasoning, can end up concealing, rather than (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Estimation of state financial support for non-priority territorial units using the example of bridge constructions.Iaroslava Levchenko & Igor Britchenko - 2021 - Eastern-European Journal of Enterprise Technologies 1 (13 (109) (2021)):26 - 34.
    The article discloses the problem of distributing state financial support based on an integrated approach. The study has proved the urgency and necessity of state support for the lowest priority territorial units (regions). It answers the research question of what components need to be included in the methodology for determining state financial support. A comprehensive method for estimating the share of public funds is proposed, taking into account the investment attractiveness of a region (oblast) and the risk of the corresponding (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. ROLE OF WOMEN IN ENVIRONMENTAL SECURITY AND CONSERVATION IN INDIA.Rashmee Yadav - 2020 - In A. K. Verma (ed.), ENVIRONMENT AND SOCIETY. Prayagraj: Government P.G. College Saidabad, Prayagraj (U.P.). pp. 252-256.
    Women are significant actors in natural resources management and they are major contributors to environment rehabilitation and conservation. Women are not only knowledgeable about the environment; they are also protective and caring. Women being primarily responsible for domestic and household management interact more intensively with both the natural and built environment. This study was carried out on role of women in environmental security in India with the objective to socio-economic status of women.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Australia's Approach to AI Governance in Security and Defence.Susannah Kate Devitt & Damian Copeland - forthcoming - In M. Raska, Z. Stanley-Lockman & R. Bitzinger (eds.), AI Governance for National Security and Defence: Assessing Military AI Strategic Perspectives. Routledge. pp. 38.
    Australia is a leading AI nation with strong allies and partnerships. Australia has prioritised the development of robotics, AI, and autonomous systems to develop sovereign capability for the military. Australia commits to Article 36 reviews of all new means and method of warfare to ensure weapons and weapons systems are operated within acceptable systems of control. Additionally, Australia has undergone significant reviews of the risks of AI to human rights and within intelligence organisations and has committed to producing ethics guidelines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. HUMAN TRAFFICKING: A THREAT TO STATE SECURITY AND HUMAN SECURITY.Duško Peulić - 2017 - Bezbjednost, Policija, Građani 13 (1):69-79.
    Abstract: The study observes the core of both trafficking in persons and security offering a preliminary understanding the interconnection between the two concepts which is indeed a precondition of the more thorough contemplation of this security problem. Noteworthy is also the further elaboration of the risk that link between violence and modern-day slavery represents having in mind society and the individual. This informal economy violates the principle of morality and is understood to be one of the most offensive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the global (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999